1. Computing
Send to a Friend via Email
Andy O'Donnell

Network Security

By

Follow me on:

What to do About Heartbleed

Sunday April 13, 2014

If you haven't heard about the Heartbleed vulnerability by now then you must have had your TV,  computer, and phone turned off for the last week.

Heartbleed is probably one of the scariest, most far reaching vulnerabilities, of recent times. Why is it so scary? The main reason is because it's related to a core security technology that is used by a ton of companies, governments, and other folks.

In this week's article, What You Need to Know About Heartbleed, we'll help you deal with the Heartbleed vulnerability, whether you're an end user trying to protect yourself or a system administrator trying to protect both users and data.

Can Your Cordless Phone Be Hacked?

Sunday March 30, 2014

Cordless phones. You use them every day in your home. Did you ever stop to wonder if there was any way that someone could listen in on your conversations?

In this week's featured article: Is Your Cordless Phone Being Hacked? We'll discuss how various types of cordless phones might be prone to eavesdropping and look at some ways of mitigating the risk of someone listening in.

Have you ever thought someone was listening in on your cordless calls? What made you suspicious? Let us know your experience int the comments area:

Tips for Locking Down Your Portable Hotspot

Sunday March 30, 2014

Portable Wi-Fi hotspots are all the rage these days. Most modern smartphones even have them built-in.

People are a lot more cautious with their mobile hotspot bandwidth, as the days of unlimited bandwidth seem to be behind us. In this week's featured article, we'll show you How to Secure Your Portable Hotspot.

Do you use a mobile hotspot? Do you leave it open for everyone to use or do you restrict access? Let us know your thoughts about mobile hotspot security in the comments section below:

Kick Those Pesky Wi-Fi Freeloaders Off Your Network

Sunday March 30, 2014

Are you tired of your neighbors getting a free ride off of wireless network? Their not only getting free Internet, they're also eating up your bandwidth.

In our featured article: How to Detect and Remove Wi-Fi Freeloaders from Your Network, we'll show you how to end their gravy train.

Do you think your neighbors are using your wireless network without your permission? Tell us about it in the comments area.

6 Security Tips For Telecommuters

Sunday March 30, 2014

Are you a telecommuter? Does your company provide adequate security for your work-at-home PC or do they rely on you to take some of the burden on yourself?

This week, our featured article will provide some Security Tips for Telecommuters. We'll show you how to help ensure that you don't become your companies weakest link.

Do you telecommute? Do you think it's more or less secure than working onsite? Let us know your opinion in the comments area:

Security Tips For Online Dating

Sunday March 30, 2014

Spring is here and love is in the air. Millions of people are looking for love online. Unfortunately, they are also encountering the dark side of the online dating world: creepers and criminals.

In this week's featured article: Online Dating Security Tips, we'll look at some things you can do to help keep yourself a little safer while you look for love online.

Have you ever had a bad online dating experience? Tell us about it in the comments section below:

Is That File You Deleted Really Gone?

Saturday March 29, 2014

When you clean out the "recycle bin" or "trash" folder on your computer, you probably expect the files to be gone for good at that point, right?

What if they we're still recoverable but you didn't know it? That's exactly what we're going to talk about in this weeks featured article: Data Remanence Security. We'll give you some tips to help you determine if the file you thought was deleted is really gone, or if it could still be recovered with the right tools.

Have you ever sold a computer with a hard drive still in it? Did you format it or just delete the files? Let us know your thoughts in the comments area.

Tips for Preventing Employee Data Leaks

Thursday March 27, 2014

Is your company's sensitive data walking out the door right under your nose. We worry a lot about hackers, but what about the insider threat?

How do you prevent employees from leaking your critical data. Maybe they do it accidentally or maybe on purpose. Either way, in this week's featured article, Preventing Employee Data Leaks, we'll give you data loss prevention tips so that you don't lose your company's critical data that might put you out of business?

Do you think hackers or insiders are the bigger threat? Let us know your thoughts in the comments section.

What to do if Your Facebook Account is Hacked

Friday February 28, 2014

Your Facebook account has been hacked, you don't know how, why, or by whom, but you want to do something quick to stop the bleeding because your losing friends by the minute.

Fortunately, we've got your back. Check out our Article Help! My Facebook Account Has Been Hacked! for instructions on what you need to do to take control back from the hackers.

Has your Facebook account ever been hacked? Let us know your horror story in the comments section below:

Can You Recover a File That Has Been Emptied From The Recycle Bin? Maybe.

Friday February 28, 2014

Did you accidentally delete a file and then empty out your 'recycle bin'. Is it really gone or can it still be recovered.

The answer to this question depends on several factors, but there may be more hope than you realize. Check out our article on How to Recover A Deleted File for tips on how to perform some DIY computer forensics file recovery procedures.

Have you ever successfully brought a file back from the dead using a file recovery tool? Which one did you use? Tell us your story in the comments area below:

©2014 About.com. All rights reserved.