tag:blogger.com,1999:blog-5710205.post6032373360172907136..comments2024-02-08T11:00:53.069-06:00Comments on Gordon's Tech: After the hack: A disposable Google IdentityJGFhttp://www.blogger.com/profile/14580785981874040314noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-5710205.post-39343982055366829402011-11-13T22:38:35.797-06:002011-11-13T22:38:35.797-06:00Nice trick! New to me.Nice trick! New to me.JGFhttps://www.blogger.com/profile/14580785981874040314noreply@blogger.comtag:blogger.com,1999:blog-5710205.post-58254360093634654422011-11-10T15:10:18.318-06:002011-11-10T15:10:18.318-06:00Here's a simple trick to mitigate the risk of ...Here's a simple trick to mitigate the risk of entering passwords on untrusted devices. <br /><br />As you're entering your password, in a couple places in the middle of your password, click outside the password box and type a few random chars. Then go back and continue typing your password. To a keylogger it will look like the entire string of chars (including the gibberish) is your password.Anonymousnoreply@blogger.com