J. Forlanda

Business Networks: Remote Access Security 101

You have users clamoring to work at home using their personal computers and they need to access internal network resources. A VPN server might do the job, but then you realize your remote user computers aren’t managed at all and could put your network at risk. What options do you have?

Free Hard Disk Drive Eraser Tools for Windows

Over a period of time, you may find a need to replace your computer or simply upgrade your hard disk drive for a larger one. When that time comes, you migrate your data from the old drive to the new one. What do you do with the old disk drive? Well, you’ll find out in this article.

10 Cyber Security Tips for Small Business Owners

Small business owners are no less susceptible to cyber attacks than big companies, but typically have no personnel to help secure their business from these threats. This article will provide cyber security tips to help small business owners secure their businesses at a very minimal cost.

Using PGP Encryption on an FTP site

Ever had to provide a copy of a confidential file to another organization? Have you ever used some encryption program like PGP (Pretty Good Privacy) and then emailed the file? What if the file was larger than is allowed for email and what if the only option you have is FTP? What to do you do then?

Jump Drive Encryption

One major advantage of using a jump drive is the ability to carry gigabytes worth of data at your fingertips. Most of this information are likely personal or confidential in nature. Imagine losing those data to the wrong hands. Don’t like to worry? Why not use jump drive encryption?

Safe Internet Browsing at Wireless Hotspots

In today’s Internet culture, many businesses are providing free wireless hotspots. The service may not cost you a dime, but it may cost you your identity if you don’t know how to protect your computer or watch what you do at these free hotspots.

What is WireShark Used For?

Are you trying to find out what Wireshark is used for? Or are you one who already knows that Wireshark is a protocol analyzer, but aren’t really sure of its uses? This article will introduce you to a few uses that will put you a step closer to becoming a network troubleshooting black belt.

How to Backup Your Laptop

Everyone should have a backup plan. This is very critical to those who use laptops. Laptops have a higher chance of being lost or stolen than your typical desktop computer, and when it is lost or stolen, your precious files are forever lost: unless they

VPN or Virtual Private Network Definition

Virtual private network, what is it? If you’ve been searching for an easy to understand definition of a virtual private network, then you’ve found it. This article explains it and provides some perspective that will help you put the term in perspective in today’s highly Internet-dependent society.

Personal Computer Data Security – Part 1

In this day and age of computers and high speed Internet, when your personal data is compromised, you can guarantee that someone is bound to gain from them financially. If you want to learn how to deal with this threat, read on, and be introduced to the concept of personal computer data security.

Overview of Microsoft Outlook Security Settings

Do you use Microsoft Outlook? If so, you might want to read this article as it enumerates security features you may not realize exist in Microsoft Outlook that may help protect you from viruses, worms, spam, phishing, and other nasty things that can come in through e-mail.

The Hosts File in Windows 7: What You Need to Know

With the recent release of Windows 7 in October 2009, it is imperative for security professionals to continue to understand and be aware of areas that could impact the security of a computer system. In this article we will look at the hosts file and how it appears/used in Windows 7.

Product Review: ZoneAlarm ForceField

In today’s Internet, it is not enough to have an AntiVirus (AV) solution. Web browsing is now the new vector for computer infections, phishing attacks, and spyware. Zone Alarm’s ForceField could be just the right shield to protect you from these. Read on and find out!