VPN Encryption Protocols Explained

A VPN can provide a way to keep your location private by replacing the IP address of your ISP’s gateway router with an anonymous IP from the VPN provider’s pool.  It will prevent your ISP, or Google and other websites from discovering your location, tracking your activity online, or saving your search history.  The contents of your communications are changed from plaintext to ...

Continue Reading →
0

How to Pick a VPN

If you are looking to protect yourself and your computer communications by using a VPN, the hardest part often is knowing where to start.  There are dozens of companies providing VPN services for a fee.  How can you know which one is best for you?

There are a number of features to consider when shopping for a VPN service.  Some of the features ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


620 million records from 16 websites listed for sale on the Dark Web

The Register reports that a seller on the Dream Market – a Dark Web marketplace hidden by the encrypted layers of Tor – began offering 16 stolen databases with 620 million accounts.


First it was location, now every app wants your contacts

Why do app ...

Continue Reading →
0

Russia Disconnecting From The Internet?

Russia has announced plans to temporarily “disconnect” itself from the global Internet. What does this mean for Russia, its citizens, and the rest of the world that is connected to the World Wide Web?

Russia is not the first country to disconnect the Internet.  In January the government of the Democratic Republic of Congo turned off its Internet during the presidential elections there.  ...

Continue Reading →
1

Smartphone Malware Exploits On The Rise

Lately there have been a spate of incidents involving smartphone apps for the iPhone and Android phones that were discovered to be malicious in various ways.  The important commonality in these revelations was that cyber-criminals had actually modified legitimate apps by hijacking several developer’s credentials, including their “Developer Certificate.”  The developer key provides a digital signature that validates the app as being ...

Continue Reading →
0

Top Paying Information Technology Jobs

Looking at a career in IT?  Got a techie kid heading off to college?  Or just trying to puff some life into your current IT career?

I found this list in a report from training company Global Knowledge and thought it was worth passing on.  Not surprisingly, the big bucks are going to IT professionals with certifications and experience in hot, in-demand sectors such as cloud computing, project management, ...

Continue Reading →
0

Sunday Funnies – Printer’s Down

I was surprised when I started teaching the CompTIA A+ class how much of the course was devoted to printer problems.  Then I had three calls in the same week from clients with printer problems.  This is a big source of computer problems, and based on the following cartoon, has been for a long time.  From Pinterest.  Enjoy.

0
Page 128 of 278 «...100110120126127128129130...»