file

Self-Destructing Cookies — Silently Dispose Of All Those Unwanted Cookies

Self Destructing Cookies is a Firefox add-on that automatically removes cookies when they are no longer used by open browser tabs. I’ve found this to be an excellent solution that works silently in the background. Websites will only be permitted to identify you while you actually use them and can not stalk you across the

Self-Destructing Cookies — Silently Dispose Of All Those Unwanted Cookies Read More »

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

A Guide To Avoiding Ransomware (Part 1) Read More »

How North Korea’s “Red Star OS” Implements Censorship

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is

How North Korea’s “Red Star OS” Implements Censorship Read More »

South Korea Revises Law Affecting Online Censorship

South Korea’s modification of a law that regulates online content could lead to more Internet censorship in the country, critics say. Korea Times reports that the Korea Communications Standards Commission, or KCSC, has revised a law that allows people to dispute online content that may be defamatory in nature. In its previous form, the law

South Korea Revises Law Affecting Online Censorship Read More »

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine

A virtual machine makes it possible for your child to explore your computer freely without fears of configuration problems or lost files. If things do stop working, you can delete the virtual machine, restore from a backup, and the child is back with a working machine in just a few minutes You create a Virtual

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine Read More »