Latest Articles tagged with secure

4 Options to Create a Safe Personal Cloud

4 Options to Create a Safe Personal Cloud

No matter where you turn, people seem to be talking about the cloud. And while cloud computing does have its attractions and advantages, there are still a few concerns about it. Like what? Well, your data is in someone else’s hands. And what happens if a service you’re using closes up shop, denies you access […]

Deleting Files on a Mac – Empty Trash or Secure Empty Trash?

Deleting Files on a Mac – Empty Trash or Secure Empty Trash?

Deleting files in Mac OS isn’t a difficult thing to do by any means, yet it can be confusing. Everyone knows how to drag files into the trash can in the dock, yet to actually delete them, there are two choices in the Finder Menu – Empty Trash and Secure Empty Trash. Which one should […]

Share Sensitive Information Online With CloudSafe

Share Sensitive Information Online With CloudSafe

The internet helps you quickly share important information with your contacts. However you have to be careful about the internet channels you use to transmit sensitive information. Today’s hackers and malware are very advanced and can possibly intercept the files you share with your friends over IM or other applications. Of course the safest option […]

Email Large Files Securely With Securely Send

Email Large Files Securely With Securely Send

If you work in a web environment, you are likely to be familiar with torrent files and other file sharing sites. When you need to send a file larger than is allowed by most email providers, you need alternatives; of which there are many. When dealing with someone who is tech savvy, it is easy […]

How to Make Your iPhone Secure After the Jailbreak

How to Make Your iPhone Secure After the Jailbreak

Let me start this article by telling you about a person who was successful in attacking the vulnerabilities of phones on T-mobile Netherlands last year. There was not really a grave malicious intent on the side of the hacker except that he just wanted the people–whose iPhones were hacked–to know how vulnerable their gadgets were […]

6 Ways to Reclaim Your Privacy When Using Google Products

6 Ways to Reclaim Your Privacy When Using Google Products

Google knows a lot about you. To date, they’ve been pretty good about handling that information responsibly, but many people are still concerned over the quality and quantity of information held by the search giant. Additionally, other websites have learned to expect that we all use Google and have created tools to harvest as much […]

7 Ways to Protect Your Gmail Account From Getting Hacked

7 Ways to Protect Your Gmail Account From Getting Hacked

Email is the most invaluable asset of anyone’s identity on the web. You use email everyday and have all the important information stored in your inbox. All your social networking accounts, website registrations, Paypal accounts etc are connected and controlled by your email and thus it makes sense to completely secure your Gmail account and […]

How to Secure Your Internet Connection via SSH

How to Secure Your Internet Connection via SSH

Wouldn’t it be great if all the Internet connection in the World are secure and encrypted and you don’t have to worry about hackers sniffing your data in the network? Apparently, that does not exist in the real world. Most of the time, when you are using a public network, you are exposing yourself to […]