cybersecurity
Our personal, digital, national and military security depend on a safe cyber space.
How to Stay Cyber-Safe While Working From Home
Ever since the global pandemic took the world by a deadly storm, working from home has become the new normal. In the beginning, we all struggled to adjust to this new work model. It was hard to focus on work because of greater distractions at home. The fear of COVID-19 and the safety concern had been hovering over our heads. Almost everyone was worried regarding their job security.
By Rizwan Ahmad5 years ago in 01
Social Media Profiles| Defining a New Search Engine
Google searches provide greats results, DuckDuckgo is a good alternative Bing also does wonders but, if you’re profiling someone nothing is better than finding that person’s online profile or profiles in this case. For the purpose of this post I’ll only use a few Social Media platforms but you’re free to explore as many as you need.
By Sam Writes Security5 years ago in 01
Some thoughts on free and paid antivirus and firewall applications
Downloading and running an antivirus and firewall program is absolutely necessary Let’s face it. Running a robust antivirus and firewall program on your computer or mobile device is more than necessary.
By thepavsalford5 years ago in 01
This Page Reveals What Google Knows About You - And How To Delete The Data
A post on the video platform TikTok recently went viral in which a user shows how much Google actually knows about the user - depending on usage behavior, the information collected can be quite extensive.
By Ghani Mengal5 years ago in 01
Theory Of No Hope: Go Offline
When we search for ways to protect ourselves and data online we get a number of results most of which provide very informative how-to guides that we can follow. But, what if we didn’t have to do all there is to protect ourselves online, what if we could live without passwords? What if we could live without a VPN, what if we didn’t need a password manager?
By Sam Writes Security5 years ago in 01
Internet Security | A Guide To Safer Browsing
We’re constantly hiding day, and night. We hide in the name of security, privacy and safer browsing. When we connect our devices to the internet we share our IP address (Internet Protocol) every device that connects to the internet has an IP address this is how devices are identified online, this is also one of the ways you can identity who might be behind such a device. Well, maybe not you but believe me someone can. So, let’s talk about it.
By Sam Writes Security5 years ago in 01
Meet Your Online Identity: Internet Protocol (IP)
IP is short for internet protocol, this is how we know that you shop online and watch all kinds of videos on YouTube. So how do we know what you do online exactly? Let's start with what helps us figure out what you do then we’ll talk about how we figure this out how’s that?
By Sam Writes Security5 years ago in 01
Stop Emailing Yourself: Send Files Like You’re in The IT Department
Before presenting you with a solution let us remind ourselves why we need this in the first place shall we? So, why wouldn’t you want to share files via email? There are probably a million reasons but I’ll touch on two and if this isn’t your first stop here you already know that security is always a priority.
By Sam Writes Security5 years ago in 01
Free Apps VS Open Source |You’re Better Off -With Google
Do you acknowledge the fact that we’re suffering and most of these Tech Giants are just thinking about their pockets, hundred dollar bills, bank accounts and maybe a little more about their pockets? I said the same thing trice didn’t I?
By Sam Writes Security5 years ago in 01
The Best Way To Use The Internet Without a VPN
This is a routine and if you haven't considered doing this give it a try it definitely won't hurt. Adding these tweaks to your online experience will definitely help and although the title says otherwise consider doing this even if you use a VPN, Tor or any other service. Do your part.
By Sam Writes Security5 years ago in 01






