Biometric Authentication - What's That?
You may have heard of biometric authentication, but weren’t sure exactly what that meant. This article will help you understand biometrics, …
Continue ReadingYou may have heard of biometric authentication, but weren’t sure exactly what that meant. This article will help you understand biometrics, …
Continue ReadingThe CAN-SPAM Act is an US Federal law regulating sending commercial (not necessarily bulk) emails commonly referred to as a Spam or unsolicited mail. …
Continue ReadingPC Tools’ latest version of their Firewall Plus product is available. It’s still free, and promises to be easy to use, provide good …
Continue ReadingCan Free OTFE take on the big guys in encryption software? Read on to find out.
Continue ReadingWant to create Windows install CDs which can install Windows automatically? Want to create a custom Windows CD which installs only the components you …
Continue ReadingNetwork security is serious business. With attacks and hackers out there using the best tools they can find, you need the best tools to defend and …
Continue ReadingIf you’re looking for the best antispyware program, look no further. Here is a list of the top antispyware programs, how they compare to each other …
Continue ReadingIf you ever decide to give away your old computer after an upgrade, you need to make sure you securely wipe the hard drive. Performing a format or …
Continue ReadingYou are looking for a free encryption solution. The two choices that you’ve narrowed it down to are Free OTFE and TrueCrypt. Read on for a …
Continue ReadingSometimes during a penetration test we find that we need more than what our vulnerability scanner provides, but less than coding a full exploit. On …
Continue ReadingAt your business or in your home, we take a look at the three best ways to have a secure email experience without compromises. Read on inside.
Continue ReadingGreen Computing and Cloud Computing are each some of the cutting edge IT topics today. But how can they work together? This article examines how Cloud …
Continue Reading