Blog

How Public Systems Protect Users

Some businesses and services offer public use of their computers and internet systems. For example, libraries frequently provide use of computers, and many shops provide ...

Protecting Children from Malware

We are surrounded by incredibly powerful technology. Computers can store vast amounts of data, communicate over distance instantly, and provide us with nearly every bit ...

Internet Privacy - Part 3

Internet Privacy Part 3

In my previous two posts, I have discussed many of the dangers associated with losing control of your information. Not only are you setting yourself ...

Internet Privacy Part 2

Electronic privacy is more than simply trying to protect your anonymity. In the wrong hands, your private information could be used to wreak all kinds ...

Privacy In the Modern World

  Much has changed in the last few decades. The explosion of the internet, and the rapid proliferation of personal computers has led to an ...

Securing Your Data: WiFi

One of the mots convenient aspects of the modern internet is its ability to be wireless. We can take our phones and computers anywhere, and ...

Extending The Life of Your System

Computers are an integral part of modern life and productivity. We use them to gather information, stay connected, and work efficiently. Having a functioning computer ...

Is That Link Safe?

We often hear about phishing scams where a hacker will attempt to create a situation where an unsuspecting victim will clink on a link or ...

What are the Goals of Malware?

Malware is a blanket term which refers to all types of malicious software which attempt to covertly insert themself into your computers, and do something ...