KenCrooker.com

Fingers Were Meant to be Inky

TwitterFacebookPhotosRSS
  • Home
  • Reviews
  • Pen Pain
  • Internet Safety
  • About
  • Contact
  • Toggle Mobile Menu
  • Back to Top

September 22, 2014 / Ken Crooker / Fountain Pens, Reviews / Leave a Comment

Crocodile 806 / NCR64 Fountain Pen Review

ncr64_01

Recently, I went a little berzerk with eBay and picked up a poop-load of Chinese pens. As they come rolling in, I’d like to share my thoughts with everyone on their performance.

My first contribution in the Fountain Pen Reviews Department is for the…

CROCODILE 806 (AKA NCR64) Green Marble Celluloid Fountain Pen

   Price: $18.50
   Nib: Medium, Steel, 22KGP/two-tone
   Country of Origin: China
   Filling System: Piston / Cartridge (International Standard, I believe)… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

April 6, 2014 / Ken Crooker / Security, Tech / Leave a Comment

How Do I Manage All These Freaking Passwords?

A Box of Index Cards

If you’re like me, you have accounts on a ton of web sites. I probably have over 200 accounts, including my email services, storage & note-taking sites, organizations, social sites, and a pile of online stores. In my previous articles, I’ve hopefully convinced you that you need good, strong passwords that are different for every site. The good side to this plan is that it helps keep your accounts secure. The bad side is that all these good, strong, unique passwords are a nightmare to remember. In fact, unless you’re one of the lucky few with a photographic memory, there’s no way you’ll remember all these passwords.

So what’s an Internet surfer to do?… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

March 15, 2014 / Ken Crooker / Security, Tech / Leave a Comment

Hacking Types: Man In the Middle (MITM)

How a Man In The Middle Attack Works

There is no shortage of ways hackers get their hands on your sensitive data. And usually, when the industry catches up and patches the vulnerabilities, the hackers find others holes to exploit. It’s a never-ending cycle. And because computers are so sophisticated these days, the hackers come up with equally sophisticated types of hacks. I’ve already described what Phishing is. Today I want to cover another hacking method, one you may have heard a lot about recently: the Man In the Middle (or MITM) attack.

… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

March 2, 2014 / Ken Crooker / Security, Tech, Tutorials / Leave a Comment

Show Me How: Make Great Passwords

Sign In

So over the past few weeks, I informed you that your passwords probably suck and why they suck, and then I gave you some general tips on how to make sure your passwords are strong. Today, we’ll take a look at how to actually put together some killer passwords that aren’t going to get hacked (unless you write them down on sticky notes and plaster them all over your office…I just can’t help you with that one).

… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

February 23, 2014 / Ken Crooker / Security, Tech / Leave a Comment

Gone Phishing: The Catch of the Day is YOU!

phishing

There are a lot of bad people out there who want to steal your information and your money. I’ve already written multiple articles on why it’s important to have strong passwords. Cracking passwords is pretty mild compared to some of the more insidious ways hackers have of compromising your computer and accounts.

For example, they can control your computer’s camera and secretly watch you while you work.

They can install keylogger software that records every keystroke you make on your keyboard…meaning
… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

February 18, 2014 / Ken Crooker / Social, Tech, Tutorials / Leave a Comment

Did You Know You Can Block Facebook Games?

So you logged into Facebook to find the 46th request of the week to play Monster Face Punch from your Facebook friends. You’re sick of getting these invitations. You hate monsters, and the last thing you want to do is spend time punching one in the face. (Note: There is no Monster Face Punch. I made it up, so stop looking for it.)

Instead of screaming, “For the last time, I don’t want to run a match-three mafia farm!” at your screen, you can simply block the game in Facebook so that you stop getting those requests. Cool, eh? Facebook wants to make money by sucking you into more Facebook games and pages, so they don’t make a big fuss about this blocking feature. But it’s there.

Here’s how you can do it…

… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

February 13, 2014 / Ken Crooker / Security, Tech / Leave a Comment

Your Passwords Suck, Part III: If You Can’t Beat ‘Em, Tire ‘Em Out

In Parts 1 and 2 of this series, I terrified you with stories about how sites store your passwords and how hackers can then crack them. As I said, no password is uncrackable. That’s the bad news. The good news, though, is that you can generate passwords that are strong enough so that hackers don’t bother with you.

Hackers may target specific, high-profile people, expending a lot of energy to access to their accounts. But most of the time, they’re looking for quick and easy ways to get into a large number of accounts. Remember, a really weak password can be cracked immediately.

… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

February 9, 2014 / Ken Crooker / Security, Tech / Leave a Comment

Your Passwords Suck, Part II: How Passwords are Stored and Hacked

encryptionLock

Before we start, let’s get one thing straight: No password is uncrackable. Given enough time and resources, hackers can figure out your password. In this article, I’m going to cover the history of how sites store passwords and give you a brief explanation for how hackers bypass different storage types to get your passwords. Once you understand how passwords are stored, hacked, and cracked, you’ll be much better prepared to develop good, strong passwords.

So back in the Internet’s Iron Age (i.e., the mid 90s), sites wanted to personalize their user experiences, so they designed membership frameworks that allowed people to maintain virtual online personalities (a.k.a. user accounts). Essentially, this gave users their own little place on the Internet where they could maintain an identity, participate in discussions, and eventually purchase things.

… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

February 5, 2014 / Ken Crooker / Tech / Leave a Comment

Your Passwords Suck, Part I: The Whole World Has Gone Crazy

keyboard

Yahoo was hacked last week. Again. It’s the second time in a month. The hackers made off with an untold number of passwords and other user data. (If you have a Yahoo account and haven’t changed your password lately, drop everything and do that right now. No really, I’ll still be here when you finish.)

Last December, hackers busted their way into Google and Facebook, absconding with over 2 million passwords.

In November, they got 150 million passwords from Adobe. Yes, you read that right: 150 million…. Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

January 26, 2014 / Ken Crooker / Entertainment, Music, Tech / 1 Comment

Why I Ditched XM Radio

xmlogo

When I bought a new car last year, it came with a complementary, three-month subscription to XM satellite radio. I’d never had it before, so I was kind of excited to check it out. After all, it did have Hair Nation: All your Hair Bands are Belong to Us!

At first, I loved it. Between Hair Nation, Ozzy’s Boneyard, and the 80s channel, I got to listen to tons of rocking tunes, some of which I hadn’t heard since high school. But after a couple months, I started to hear a lot of the same songs over and over again. I started checking out some of the other stations, but could never find one to settle on for any length of time.

… Read More

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print
  • « Previous Page
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • Next Page »

What’s Next?

You may have noticed that I haven't posted anything in a really long time. Sorry about that. Once we started up the St. Louis Pen Show and the St. Louis pen meetups, most of my free "pen time" started going into those activities.

My goal was always to write very thorough reviews with lots of great pictures, and that takes a ton of time. The writing, editing, and photo editing for one review took up a full weekend, and that doesn't take into account actually using the pens and taking notes along the way. With all I have going on, it just wasn't sustainable to keep this site going on a consistent basis.

Will I ever come back and start doing reviews again? Maybe. But not anytime soon. I am still around, though. You can catch me at the monthly St. Louis Area Pen Meetup & Eats (SLAPME) events, the St. Louis Pen Show, and a handful of other pen shows around the country.

Subscribe!

Type your email, click Subscribe, and you'll get notified via email when I post!

Categories

Babble Commentary Conspiracy Entertainment Fountain Pens Ink Music Paper Pen Pain Photography Reviews Security Social Tech Tutorials Uncategorized

Copyright KenCrooker.com

 

Loading Comments...