DIY Server Rack (How to Build Your Own)
Are you interested in building out your own at-home server rack? In this guide I’ll walk you through what you need. What Is a Rack Unit or “U” ? Before I list the equipment you …
Internet privacy and how-to guides — learn how to erase yourself from the internet and protect your online activities from snoopers
Are you interested in building out your own at-home server rack? In this guide I’ll walk you through what you need. What Is a Rack Unit or “U” ? Before I list the equipment you …
The following list of resources is exceptional and will help you pass (on the first attempt) your Offensive Security Certification Program (OSCP) certification. Here’s the recommended path. Recommended Path First, review this resource: The Journey …
This is a tutorial on using Google hacking to find specific information within the Google index. Google deploys web crawlers to collect information on all the websites on the internet and to make them searchable …
Are you ready for gigabit cellular Wi-Fi speeds? Well, if you aren’t, you should be! The deployment of 5G cellular network technology is happening and its eventual widespread adoption is going to change the way …
What Is 5G? Is It Secure? And How Fast Is It? (With Chart!) CONTINUE READING
Espionage has been a topic of intrigue for as long as it’s existed, the subject of countless films and books, both fictional and nonfictional. In the modern age, the world’s intelligence agencies have shifted their …
Five Eyes, Nine Eyes, Fourteen Eyes (Who Are They Really?) CONTINUE READING
So you’ve taken an interest in computer security and you’re looking for the right tools to get you going. And that all starts with choosing the right OS. It’s clear that Windows has too many …
Kali Linux OS for Beginners: What It Is & Why It’s Different CONTINUE READING
You plop down on the couch after a long day and turn on your favorite crime show. Those tireless detectives have yet another new case. This time, the criminals have gone digital: they’ve hacked a …
SIFT Workstation Review: Evidence Shows It’s the Leader in Digital Forensics CONTINUE READING
When digital life gets stressful, you can’t help but wish you could just disappear from the internet. Imagine a day without constant email and social network notifications. A disconnect from the web that lets you …
How to ERASE Yourself from the Internet (Digital Disappearance) CONTINUE READING
A log file maintains records of events (a history of what happened on your system). And they’re generally event-specific. This means that operating systems will maintain many different log files, each with a specific kind …
21 Critical Linux Log Files (Server & Network Monitoring) CONTINUE READING
Another day, another site demanding that you make a new account to view its content. And that means another new password to come up with. Sure, you could use the same password you used on …
Fail-Words: The Most Popular Passwords (and Why They’re the Worst) CONTINUE READING
Email is one of those things we simply take for granted – it’s so easy to set up and access a Gmail, Yahoo or Outlook account that most of us never think twice about it. …
Everyone knows that VPNs boost your online privacy and amp up your data security. However, they’ve got many other uses as well. A VPN is a surprisingly powerful streaming enhancer, and many users get one …
Unblock or Be Blocked: Does Netflix Work With PIA? CONTINUE READING
Wondering if torrenting is illegal? We don’t blame you – there’s a lot of conflicting information out there. You’ve read horror stories about million-dollar lawsuits, bankruptcies and even criminal charges due to torrenting. You sit …
Peer-to-Peer… or Prosecution-to-Prison: Is Torrenting Illegal? CONTINUE READING
You run the Tails OS if you want privacy, security, and anonymity. But for a more interesting review, let’s start with a story … one that involves a little adventure and travel to a beautiful …
Tails: the Leave-No-Trace Behind Privacy OS CONTINUE READING
If you’re anything like the majority of internet users, you probably don’t feel any pressing need to encrypt your internet traffic. After all, you’re no Edward Snowden or Chelsea Manning. You’re not a government target …
You plop down in your cubicle after a long weekend and see that you have a new email. It’s from your boss, though it’s not his work email. A little strange, but maybe he was …
Spear Phishing: How It Works and How to Protect Yourself CONTINUE READING
Ever wish that your entire operating system could be anonymous? Sure, you could try to configure your existing computer to be as private as possible. You could spend hours, if not days, finding secure versions …
Whonix OS Review (Taking TOR to the Next Level) CONTINUE READING
You’ve got the fastest internet package and the most reliable wireless router… but if you’re not using the best WiFi channel, your connection-boosting efforts may be fruitless! Everyone has a WiFi network these days. It’s …
How to FIND the Best WiFi Channel for FASTER Internet CONTINUE READING
When you want to go covert online, channeling all your web activity through a virtual private network, or VPN, is one of the smartest moves you can make – but is it legal? The short …
No matter where you live, a VPN can provide you with greater peace of mind when using the internet. But when you’re traveling internationally, it becomes an absolute necessity. Internet laws in foreign countries are …
Passports and Privacy: Five Reasons Why You Need a VPN for International Travel CONTINUE READING