22182 Notes. Evernote to Apple Notes (Fail) to DEVONthink.

I’m looking for a scan of a blue note, and I simply can’t find it in Evernote. Evernote versions 4 and 5 were the prime of Evernote. Kris and I used it extensively as our document management system, document knowledge management, and notetaking application. It was a great way to organize things. Every note, every … Read more

LastPass Breach and Alternatives

By now, almost everyone has heard of the LastPass breach. Most cybersecurity professionals are taking a well-reasoned approach that we need to take action but let’s do it right. Here are my thoughts: First off, I must compliment LastPass on two things: LastPass had tools in place to detect data exfiltration. I suspect several password … Read more

Best Gigabit Routers

So, you are getting Gigabit Internet, and you need a faster router? Here are your best firewall/router options. With all the ISPs starting to roll out fiber many folks have asked which Firewall or Router to get for Gigabit Internet. Instead of answering the same question over and over, I made this post to link … Read more

Ben’s Phone Guide (2016 edition)

Phones depreciate in value fast, their useful life is less than their lifespan.  Not because old phones don’t work anymore.  But because manufacturers stop providing security updates after about 3 years (at best!) What If I Told You a Hacker Can Take over Your Phone with One Text… And You Don’t Even Have to Open … Read more

How to Encrypt Your Email

So, you want to hide your email from the NSA’s prying eyes?  It’s impossible… but here are some steps you can use to make it harder. This isn’t theoretical.  The NSA has and does intercept this traffic. Common Points of NSA Interception The NSA has unlimited resources to compromise your communications.  You’re not going to stop … Read more