
What to do if you find a lost AirTag
If you find an Apple AirTag that belongs to someone else, learn how to help reunite the lost items with their owner using an iOS or Android device--or, how to prevent the device from tracking you.
You're on page 80, See the latest articles on Security.
If you find an Apple AirTag that belongs to someone else, learn how to help reunite the lost items with their owner using an iOS or Android device--or, how to prevent the device from tracking you.
MOSH makes it possible for SSH connection to persist, even as you roam from one network to another. Jack Wallen shows you how to install and use this handy tool.
While many employers are tapping technologies to monitor workflows, a new report highlights potential drawbacks and even resentment among surveilled employees.
Looking to eke out as much security as you can from your Linux servers? Jack Wallen shows you how you can limit the information would-be ne'er-do-wells get by disabling the login banner.
The 1Password UI is very well designed and integrated into the Linux desktop.
Jack Wallen installed 1Password on Linux and found it to be a fantastic solution for password management. Follow his tutorial on how to get this proprietary solution installed on your open source OS.
Cybercriminals are increasingly using email as an easy and effective way to infect computers with malware and trick potential victims with phishing scams, says Trustwave.
The 12% bump in spending will be driven by ongoing demand for remote workers and cloud security, says Gartner.
Enabling the Active Directory connection during the installation of Ubuntu Desktop 21.04.
Canonical has made it easy for admins to join Ubuntu Desktop to Active Directory domains. Jack Wallen walks you through the steps.
Government and business both need to step up to combat ransomware attacks against critical systems before they spiral further out of control.
According to the software company Egress, 85% of organizations using Microsoft 365 have experienced an email data breach.
The use of web shells is increasing, which could put your business at risk. Tom Merritt lists five things to know about web shells.
Switching to Cloudflare secure DNS in Chrome.
Jack Wallen walks you through the process of using DNS-over-HTTPS on your Chromebook for a more secure experience.
Jack Wallen walks you through the steps of installing both Linux Malware Detection and ClamAV for a reliable one-two punch of malware and virus prevention.
The first Thursday in May is World Password Day. Keeping your data safe isn't as difficult as you think. Here are some strategies.
Before you can use a camera app in Windows 10 you have to allow access to the camera itself. Only then can you allow access to the app. We walk you through it.