Home > Blogs > John Traenkenschuh

RSS Feed Subscribe  RSS details

Ethical Hacker

It's time to take back the term hacker from the wanna-be's...

Continue reading...

What would it take to sell you this Surface Pro 3 today?

Traenk wonders, what would it take to get someone to buy a Surface Pro 3?

Continue reading...

Gone with the passwords

How much can Digital Cryptography do?

Continue reading...

OpenSSL: More Problems. Again.

Traenk wonders what's missing in the OpenSSL message.

Continue reading...

Everything You've Heard is True

With TrueCrypt in the Crypt of its own making, what is the True story?

Continue reading...

Human Telematics II

Are you using a Jawbone UP or the Fitbit?  Useful?  Traenk weighs in on his experiences.

Continue reading...

Heartbleed? You're too late.

Traenk offers a friendly reminder that this is shape of things to come...

Continue reading...

Spot the Hacker (Part I)

Traenk wonders aloud at the changing face of Security--and Hacking.

Continue reading...

My iMovie is here, and it looks great!

Traenk just downloaded his pre-purchased book on iMovie.  Is a book on an 'easy' app like iMovie needed? 

Yes.

Continue reading...

Human Telematics v2

What is Data Leakage, any way?  Why is it now such a big problem?

Continue reading...

Should You Share Your Fitness Information?

Whether using a Fitbit or Jawbone UP, many are recording their fitness information and sending the changes to the Cloud.  


Continue reading...

It was 20 years ago today: Data Migration Strategy II

Is your information ready for the next 20 years?  Traenk gives more information on what you must understand when creating a Data Migration Strategy, something all organizations, businesses, and people must create.

Continue reading...

1 2 3 4 5 Next >