About 74 results
-
The basics of using a proxy server for privacy and security
Patrick Lambert goes over the basics of how proxy servers work and why they are used to add security and privacy.
-
Changes to Google Chrome and Chrome OS certificate handling
Beefed up requirements for RSA keys and changes to the way Google Chrome handles certificates will benefit Internet security for end users.
-
How facial recognition software can track you in the offline world
Patrick Lambert looks at the increased use of facial recognition software.
-
DDoS attack methods and how to prevent or mitigate them
Patrick Lambert covers the various methods attackers use to launch distributed denial of service attacks, and the precautions you can take to prevent or at least, mitigate these ty...
-
Everything you need to know about using TOR
TOR's anonymizing and encrypting features make it a very useful tool for privacy. Here's a quick look at the basics.
-
Email encryption: Using PGP and S/MIME
For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.
-
Freedom Hosting and 'torsploit': Troubles on the Onion router
The arrest of the Freedom Hosting CEO has set in motion a crisis for TOR and unleashed a java exploit designed to expose Freedom Hosting users.
-
Researchers create nearly undetectable hardware backdoor
University of Massachusetts researchers have found a way to make hardware backdoors virtually undetectable.
-
How effective is antivirus software on smartphones?
Patrick Lambert looks at the limited usefulness of smartphone antivirus apps. Should you bother with it?
-
How to check and configure your browser plugins
Patrick Lambert offers some basic tips on how to check web plugins in four major browsers.