key

The Best VPN Service Providers Of 2021

There are now over a hundred VPN providers located across the world. To create this list of the best VPN service providers, I test customer service, the reliability of their network, and commitment to privacy.

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies

Here are three hardware wallets that can be used for the long term storage of bitcoin and other cryptocurrencies. These devices are separated from your computer — and thus virtually hacker proof. I recommend storing these wallets in a fireproof safe. For daily use, you can keep a small amount of bitcoins in a smartphone …

Three Hardware Wallets For Storing Bitcoin and Other Cryptocurrencies Read More »

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

Lead Linux Coder Warns Against Inevitable Security Flaws

From Heartbleed to Shellshock, the world of open-source computing has faced several high-profile security breaches in the last year. What are open-source developers – whose code powers many of the servers and websites that store millions of people’s personal information – doing about them? That’s the question Linus Torvalds, lead Linux kernel developer, helped answer …

Lead Linux Coder Warns Against Inevitable Security Flaws Read More »

Scroll to Top