Please turn on your JavaScript for this page to function normally.
Guide to Online Antivirus Solutions: NanoScan and TotalScan

Internet connections are getting faster every day, so online antivirus solutions have transformed from proof-of-concept into actual quality security services. I’ve been …

Top 5 Security and Networking Widgets for Mac OS X

This article presents 5 widgets that that enable you to perform various tasks quickly, straight off the Dashboard. AirTrafficControl AirTrafficControl is the most advanced …

Lock the Door and Make Sure Your Data is Protected

You would think that at some point in time your children will reach the age at which you can reason with them, I’m hoping it’s a year older than the oldest one is …

The Rules for Computer Forensics

The recovery of evidence from electronic devices is fast becoming another component of many the IT Manager’s remit. Electronic evidence gathered is often valuable …

How To Recover Forgotten Microsoft Word Passwords

Microsoft Office applications have an option for setting up different levels of passwords. They can be used for specific actions such as preventing reading, writing or adding …

Web Vulnerabilities in the Age of the iPhone

I’ve read lots of articles about hacking the iPhone lately. They’re mostly focused on exploring the hardware, circumventing the intended activation process, or …

Certifying Information Security Management Systems

An information security management system (ISMS) is focused on managing information security within an organization, a topic that is of growing concern to many organizations …

Secure Encryption and Backup with Knox

Mac geeks usually have the Disk Utility placed somewhere within easy reach ready to be fired up to make encrypted disk images whenever needed. However, there’s a more …

Open Source Filtering Solutions and the Spam Problem

Let us face it, modern e-mail communication relying on SMTP is fundamentally broken – there is no sender authentication. There are lot of countermeasures in form of …

Online Secure Backups with the Allmydata Web 2.0 Application

Backups are an important part of anyone’s computer life. As a result of Murphy’s Laws, you will lose your precious data in the most inappropriate situation, so …

Tunnelling HTTP Traffic Through XSS Channels

An XSS Channel is an interactive communication channel between two systems which is opened by an XSS attack. At a technical level, it is a type of AJAX application which can …

Running the PuTTY SSH Client on a Nokia E61

PuTTY allows you to use your Symbian-powered mobile device to connect securely to a remote computer no matter where you are located. The software is free and it enables you to …

Don't miss

Cybersecurity news