My top recommendation for securing your home network (after turning off wireless services such as WiFi and Bluetooth and going with an ethernet setup) would [Read More…]
One option for your home networking setup would be to use fiber optics connections for some or all of your networking needs. For targeted individuals [Read More…]
The idea behind encryption is a good one – protecting the integrity and confidentiality of your data. Encryption uses algorithms. The concept of an algorithm [Read More…]
Paid Anti-Malware Programs (which also include anti-virus protection) will provide security features not available with an out of the box computer or phone setup. You [Read More…]
In late 2013 a leaked NSA document was published by the press. The document originated in the 2008-2009 timeframe and it contains 49 pages of [Read More…]
A new site feature is now available, the technology checklist page. This checklist makes it easy to see at a glance a consolidated list that [Read More…]
As a targeted individual, it is important to understand some of the fundamental behavior and organization of the NSA which is responsible directly or indirectly [Read More…]