Home » How To's » Page 13

How To’s

Protect your WiFi Against Hackers: And your Own Ignorance

The magic that is WiFi is something that most people barely understand, let alone appreciate. I mean seriously, it’s invisible waves of information floating all around you, how awesome is that?!?…I digress. This lack of understanding is the greatest threat against your security, and is a reason why you need to read this article and protect your WiFi against hackers.

Your average hacker is no more knowledgable than your average ‘white hat’ hacker. The problem is that there are only so many white hat hackers in the world. This has opened the door for hackers who can easily exploit those who just don’t know any better. Credit card theft, social media profile takeovers, session hijacking, and identity theft are the result.

Here are five ways to protect your WiFi against hackers, and learn something about those magic invisible waves of information floating around you!Read More »Protect your WiFi Against Hackers: And your Own Ignorance

Why Would you Want to Hide your IP Address?

Finding out how to hide your IP address is something that most people think is tactic used by hackers and other people online with less than noble intentions. This isn’t exactly the case as nearly everyone could use some more privacy, and have their data tracked a little bit less.

How to do this correctly is key. Firewalls will only protect the data on your computer. Anti-virus software will protect you from viruses, but little else. Web proxies will hide your IP address, but not protect you.Read More »Why Would you Want to Hide your IP Address?

P2P File Sharing Risks: Don’t Go Unprotected!

Safe browsing should be one of the next biggest pushes that people learn about. The digital world is becoming closer ingrained with the real world all the time. P2P file sharing risks are very real, and can result in a number of real world problems if you’re not careful.

In an effort to help people understand online security better, this article is going to look at a number of P2P file sharing risks, and then give you a few tips on how you can get past them and share safely.Read More »P2P File Sharing Risks: Don’t Go Unprotected!

How to Speed up VPN Services with Hide My Ass

Hide My Ass is a very popular VPN service provider. Many people ask us how they can speed up VPN services, and HMA gives you great opportunities to do just that with their many advanced features.

You’ll get a great service with them even if you don’t do any of these tips, but to really speed up VPN services with them you’ll have to try out the techniques below!Read More »How to Speed up VPN Services with Hide My Ass

Five Best iPad Security Apps for Safer Mobile Browsing

“Wait? Isn’t my iPad magically secured by the fact it’s an Apple product, and the ghost of Steve Jobs?” Blind ignorance is the stuff that hacker’s dreams are made of, and this myth plays right into their hands.

While your iPad is a relatively secure device, it is still vulnerable to the same theft, hacking, and cyber crime as anything else that connects to the Internet. You can call me paranoid if you want, maybe I’ve seen too many things during my time as a security analyst, but I can tell you that your iPad can be hacked.

To help fight the hackers, here are 5 iPad security apps that can slow them down to the point that you’re no longer a valued target, or outright stop them in their tracks.Read More »Five Best iPad Security Apps for Safer Mobile Browsing

Secure your iCloud Account: Don’t be the Next Photo Leaked!

By now, the entire world has heard about the celebrity nude photo hack. Images of Jennifer Lawrence, Kate Upton, and a few others were leaked first on 4Chan (the worst place to ever exist), and spread further on Reddit. It’s believed that this happened through the iCloud, and points to why you need to secure your iCloud account.Read More »Secure your iCloud Account: Don’t be the Next Photo Leaked!

Online Security for Kids: Having “The Talk” Before Anything Happens

A few short years ago I became an uncle for the first time. This was a pretty big deal as I had, and have, no kids of my own. I’m what they call “an eternal bachelor.” Think Barney Stinson, but with more comic books and nerdy cyber-ness …and slightly fewer ladies.

My brother, the father of said nephew of mine, is a roofer. He understands the architecture of homes perfectly well, but not the Internet. It came down to me to talk with his son when he became old enough recently to use the Internet. That’s what has caused me to write the online security for kids guide below.Read More »Online Security for Kids: Having “The Talk” Before Anything Happens

Conference CyberSecurity: Keyloggers and Man in the Middle Attacks

There are two common security problems at conferences, and in public in general, that you can protect yourself from with some basic security measures. Conference security is becoming increasingly important as more people not only attend these conferences, but also work remotely in general.

I’m going to look at two conference security issues which you may encounter the next time you’re looking to log onto a public wifi that has been provided, or use a public computer room that is set up for your use.Read More »Conference CyberSecurity: Keyloggers and Man in the Middle Attacks