<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://cybersecurity.adamgreenberg.com/feed.xml" rel="self" type="application/atom+xml" /><link href="https://cybersecurity.adamgreenberg.com/" rel="alternate" type="text/html" /><updated>2026-04-14T09:01:06+00:00</updated><id>https://cybersecurity.adamgreenberg.com/feed.xml</id><title type="html">Cybersecurity.AdamGreenberg.com</title><subtitle>Cybersecurity Consultation
</subtitle><author><name>Adam Greenberg</name></author><entry><title type="html">How To: Create a Double-Blind Password</title><link href="https://cybersecurity.adamgreenberg.com/blog/2020/08/28/how-to-create-a-double-blind-password/" rel="alternate" type="text/html" title="How To: Create a Double-Blind Password" /><published>2020-08-28T00:00:00+00:00</published><updated>2020-08-28T00:00:00+00:00</updated><id>https://cybersecurity.adamgreenberg.com/blog/2020/08/28/how-to-create-a-double-blind-password</id><content type="html" xml:base="https://cybersecurity.adamgreenberg.com/blog/2020/08/28/how-to-create-a-double-blind-password/"><![CDATA[<p>For even more security, here’s an interesting idea. You could certainly do this, though one potential downside is you might find your password manager app annoys you repeatedly about storing the correct password. If you can put up with that, this method is certainly worth your consideration:</p>

<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/boj9q26gadE?si=aTWvTjr__R9gCqxF" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen=""></iframe>

<p><a href="https://www.allthingssecured.com/tips/password-security/double-blind-password-strategy/">https://www.allthingssecured.com/tips/password-security/double-blind-password-strategy/</a></p>

<hr />

<p><a href="https://web.archive.org/web/20210114052849/https://cybersecurity.adamgreenberg.com/2020/08/how-to-create-a-double-blind-password/">Archive.org</a></p>]]></content><author><name>Adam Greenberg</name></author><category term="cybersecurity" /><category term="double-blind" /><category term="LastPass" /><category term="password" /><category term="passwords" /><category term="security" /><category term="privacy" /><summary type="html"><![CDATA[For even more security, here’s an interesting idea. You could certainly do this, though one potential downside is you might find your password manager app annoys you repeatedly about storing the correct password. If you can put up with that, this method is certainly worth your consideration:]]></summary></entry><entry><title type="html">Download Your Free Security Guide</title><link href="https://cybersecurity.adamgreenberg.com/blog/2020/08/23/download-your-free-security-guide/" rel="alternate" type="text/html" title="Download Your Free Security Guide" /><published>2020-08-23T00:00:00+00:00</published><updated>2020-08-23T00:00:00+00:00</updated><id>https://cybersecurity.adamgreenberg.com/blog/2020/08/23/download-your-free-security-guide</id><content type="html" xml:base="https://cybersecurity.adamgreenberg.com/blog/2020/08/23/download-your-free-security-guide/"><![CDATA[<p>Download Your Free 2020 Internet Privacy and Security Guide of Best Practices.</p>

<p>No incentive has been made to the author -me- in recommending any products or services within the guide.</p>

<hr />

<p><a href="https://web.archive.org/web/20210113234030/https://cybersecurity.adamgreenberg.com/2020/08/download-your-free-security-guide/">Archive.org</a></p>]]></content><author><name>Adam Greenberg</name></author><category term="cybersecurity" /><category term="Authy" /><category term="Brave" /><category term="cybersecurity" /><category term="free guide" /><category term="LastPass" /><category term="privacy" /><summary type="html"><![CDATA[Download Your Free 2020 Internet Privacy and Security Guide of Best Practices.]]></summary></entry><entry><title type="html">Welcome</title><link href="https://cybersecurity.adamgreenberg.com/blog/2020/08/17/welcome/" rel="alternate" type="text/html" title="Welcome" /><published>2020-08-17T00:00:00+00:00</published><updated>2020-08-17T00:00:00+00:00</updated><id>https://cybersecurity.adamgreenberg.com/blog/2020/08/17/welcome</id><content type="html" xml:base="https://cybersecurity.adamgreenberg.com/blog/2020/08/17/welcome/"><![CDATA[<p>Thanks for being here. Site is brand new and under construction! Please bear with me, shortly.</p>

<hr />

<p><a href="https://web.archive.org/web/20210114001141/https://cybersecurity.adamgreenberg.com/2020/08/welcome/">Archive.org</a></p>]]></content><author><name>Adam Greenberg</name></author><category term="cybersecurity" /><summary type="html"><![CDATA[Thanks for being here. Site is brand new and under construction! Please bear with me, shortly.]]></summary></entry></feed>