Home > Blogs > Security > Network Security

Blog Posts about Network Security

RSS Feed Subscribe  RSS details

The Best Browser Extensions

Brad Yale

We spend a lot of time online. According to a recent Mashable article posted by Matt Petronzio on March 5, 2014, the average American adult spends 11 hours per day with electronic media. Of that, three hours is spent on social media, nearly one hour is spent on a smartphone and nearly one hour is spent on the Internet via a PC. Taken as a whole, the average American adult spends between 2 – 4 hours online every day.

We spend a lot of time online. To make your daily online life better, below is a list of the five coolest Internet Browser extensions.

Continue reading...

How Long?

John  Traenkenschuh

Traenk kept his Windows system from the Internet, from even starting, for some 45 days.  A lot can de-evolve in 45 days...  Honestly, how long does it take before your system becomes very vulnerable and how long must we wait for new Windows components?  Will Windows 9 fix the issues?

Continue reading...

Ethical Hacker

John  Traenkenschuh

It's time to take back the term hacker from the wanna-be's...

Continue reading...

Gone with the passwords

John  Traenkenschuh

How much can Digital Cryptography do?

Continue reading...

OpenSSL: More Problems. Again.

John  Traenkenschuh

Traenk wonders what's missing in the OpenSSL message.

Continue reading...

Heartbleed? You're too late.

John  Traenkenschuh

Traenk offers a friendly reminder that this is shape of things to come...

Continue reading...

Spot the Hacker (Part I)

John  Traenkenschuh

Traenk wonders aloud at the changing face of Security--and Hacking.

Continue reading...

Human Telematics v2

John  Traenkenschuh

What is Data Leakage, any way?  Why is it now such a big problem?

Continue reading...

It was 20 years ago today: Data Migration Strategy II

John  Traenkenschuh
Is your information ready for the next 20 years?  Traenk gives more information on what you must understand when creating a Data Migration Strategy, something all organizations, businesses, and people must create.

Continue reading...

What is your data migration strategy?

John  Traenkenschuh

Traenk wonders how we should manage our data when so many formats come and go so rapidly.

Continue reading...

New Operating System Upgrades--And the winner is . . .

John  Traenkenschuh

Traenk recently upgraded to the free Windows 8.1 and Mac OS X Mavericks updates.  Which of the two was the better, more effortless upgrade?

Continue reading...

Email Compromised; What Now?

John  Traenkenschuh

What is your response plan for your email being compromised?

Continue reading...

1 2 3 4 5 Next >