An introduction to six types of VPN software

A VPN is simply an encrypted connection between two computers, each side running VPN software. The…

How to test your home network for a Telnet vulnerability

The latest online malware, dubbed Brickerbot, is particularly nasty, as it virtually destroys vulnerable devices. This…

VPNs on a Chromebook: a scorecard of VPN providers

My last blog discussed the use of VPNs on a Chromebook. As a Chromebook fan, I…

Triple your privacy with a Chromebook and two VPNs

Now that Republicans in Congress have sold us out, everyone is writing about technical ways to…

Ubiquiti called out for security flaw

When it comes to evaluating networking devices (routers, Access Points, switches), almost everyone focuses on the…

Defensive Computing for email attachments

Email attachments remain an effective way to infect/compromise computers because people trust them too much. Blindly…

Computers in the news — how much can we trust what we read?

The phrase "Never send a boy to do a man's job" often comes to mind when a…

Computers in the news – how much can we trust what we read?

The phrase "Never send a boy to do a man's job" often comes to mind when a…