What is a VPN? Security and Privacy, Up To a Point
Virtual Private Networks (VPN) have been around for roughly thirty years. They provide secure communication between two networks, even over the public internet. What is a VPN? It’s how you communicate in public but...
What is a Spear Phishing Attack?
Spear phishing is sending illicit emails to someone to make them do something to the threat actor's benefit. What is a spear phishing attack? It's a one-on-one scam, and you're the target.
Phishing Versus...
Shielding Your Computer From Malware During the COVID-19 Pandemic
Hackers are the bad eggs in the cyber world that try to make use of any opportunity to steal information or money. Characteristically, they latch onto vulnerabilities and security loopholes to exploit computer users....
SSD vs. HDD: What’s the Difference?
If I were to be cavalier about the question posed and answered by this article, I'd simply tell you that Solid-State Drives (SSDs) are very fast, and Hard Disk Drives (HDDs) are not; though...
What is JBOD? Quick and Dirty Maximum Capacity
RAID (Redundant Array of Inexpensive Disks) is the combining of multiple disks to mimic a single logical storage unit, i.e., a single drive. Depending on the type, or "level", RAID increases performance, capacity, and...
ExpressVPN Review: How Does It Perform (and How to Install) on Ubuntu?
ExpressVPN is considered one of the top-tier VPN products. We install it on Ubuntu 21.04 and use it from the command-line and from within a browser. How does it shape up?
What is VPN?
A Virtual Private...
What is RAID 1? Simple, Safe, and Easy
RAID (Redundant Array of Inexpensive Disks) is the combining of multiple disks to mimic a single physical storage device. Depending on the type, or "level", RAID increases performance, capacity, or fault tolerance, or in...
What is RAID 6? Good Speed, Good Protection
RAID (Redundant Array of Inexpensive Disks) is the combining of multiple disks to mimic a single hardware storage device. Depending on the type, or "level", RAID increases performance, capacity, and fault tolerance in some...
Top 3 Microsoft Office 365 Backup Solutions
Mention data safety, and backup will instantly spring to mind. What is not immediately available, even to seasoned IT professionals, is information about what makes a good backup solution. With more businesses embracing Microsoft...
What RF Attacks Are and How to Defend Against Them
Firewall and rules are in place, intrusion detection systems are running, and all industry best practices are being followed. Great, but what about Radio Frequency attacks? They nimbly sidestep all of that.
Radio Frequency Attacks
Firewalls...