Getting Started With Ethereum

Ethereum is a decentralized computing platform and crytocurrency. Ethereum uses Bitcoin’s blockchain technology to create a protocol for “smart contracts”.

A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

Using A VPN On A Windows Phone

VPN access is not currently available in Windows Phone 8. However, Microsoft is preparing to add VPN support to Windows Phone 8.x in 2014 via a new Enterprise Pack. There’s more information about this, see this article on CNET: Microsoft to add VPN support to Windows Phone 8 in 2014. Windows Phone 6 (WP6) does have a limited support for VPNs. …

How To Jailbreak Or Root Your Smartphone or Tablet

Why Jailbreak or “Root” Your Mobile Device? Jailbreaking is the act of overriding the software limitations on the iPhone, iPod Touch, or iPad. Similarly, on an Android device, the terms “rooting” means giving yourself root permissions on your phone. It’s similar to running programs as an administrator in Windows, or running a command with sudo in Linux. With a rooted …