Do You Need A Virtual Private Network?

encryptionA virtual private network, or VPN, is a type of network computer connection that creates a private encrypted communications channel, commonly called a “tunnel,” when using insecure networks, such as in hotels and coffee shops, or when communicating over the Internet.  Many businesses provide a VPN connection for their mobile and traveling employees.  This means that when out of the office, a worker can open the VPN and be connected to the ...

Continue Reading →
0

What is Security In A Box?

linux-logoAt the November meeting of Penguins Unbound, the local Linux Users Group, I was introduced to a group of people from CryptoPartyMN.  These guys and gals are serious about anonymity on the web.  On of the resources they discussed was a great website called Security in a Box.  If you would like to learn how to be more secure in your online communications, this is certainly ...

Continue Reading →
0

New Tor Messenger App Offers Encrypted Communications

TORlogoThe Tor Project released the beta of their new Messenger app.  This messenging client is based on Mozilla’s Instantbird, and works with several popular messaging platforms, including Facebook Chat, Twitter, Google Talk, and Jabber.

The encryption piece is handled using Tor’s OTR Protocol (for Off-The Record), and requires that users exchange a secret key.  This is available in Windows, Linus, and OSX versions from the Tor website.

For more information:

Continue Reading →
0

Good Question

free-wifiMy Facebook friend Jeff Wegge asked:  “Security question Bob. Is the hotspot on my mobile verizon phone any more secure than public Wi-Fi?”

This is a most excellent question! Generally speaking, the mobile hotspot will be more secure for two reasons The first is that only you are likely to be using it, unless you explicitly shared the SSID (network name) and passphrase with someone else. The second reason ...

Continue Reading →
0
Page 12 of 12 «...89101112