Free Services to Send Files End-To-End Encrypted

Free Services to Send Files End-To-End Encrypted
There are a number of services for sending files to someone else that are both free and secure. This post provides an overview. What is End-to-End Encrypted File Sending? File sending services work similarly to file synchronization & sharing services, except there is no synchronization part. You navigate to the service’s website, select the files you want to send, and they’re encrypted on your machine while being uploaded. You get a link to be shared with the files’ recipient. The service stores the files for a certain time, typically seven days. That is how long the link remains valid. It is important to note that end-to-end encrypted sending services cannot decipher your data, for them it’s just meaningless bits.
Applications

Finding (Executables in) User-Writeable Directories

Finding (Executables in) User-Writeable Directories
This article presents two different detection types for insecure filesystem permissions on Windows endpoints: scanning for directories that are user-writable, and detecting processes that are started from user-writeable directories. Directory Scan With ListUserWriteableDirectories & SetACL My ListUserWriteableDirectories script is an implementation of the first detection type: it scans the filesystem listing any permissions not known to be safe.
Security

Top 10 IT Security Tips for Individual Users

Top 10 IT Security Tips for Individual Users
This is a list of simple things that will protect you from nearly all the real-world IT security issues affecting individuals and SOHO users. 1. Install All the Updates What Should You Do? Enable automatic updates wherever possible Don’t use obsolete software versions Why Is It Important? Older software versions often have known security issues for which exploits are readily available. This means that even script kiddies can easily attack large numbers of users.
Security

Should I Have Separate Personal & Professional Twitter Accounts?

Should I Have Separate Personal & Professional Twitter Accounts?
That was a question I was asking myself more and more recently. After a bit of deliberation, I answered it with yes. This article summarizes my reasoning. My Twitter History I have been on Twitter for more than 11 years. If I remember correctly, Brian Madden - whose website was extremely popular in the Citrix community at the time - had urged people to join Twitter a little earlier. I responded to Brian’s call and quickly realized that Twitter was a great platform that allows people with a common interest to identify each other and communicate. In my case, that interest was end-user computing, of course, the products and technologies from companies like Citrix or Microsoft. After joining Twitter, at conferences, many of the names were known to me, and sometimes I to them. Getting into contact was so much easier. The major difficulty was recognizing someone from their Twitter profile picture (something we often joked about).
Miscellaneous