fbpx

How to Prevent Identity Theft by Freezing Your Credit

The Great Equifax Debacle of 2017 is just one more in a long line of security breaches that may have released your sensitive personal details into the wild. If that data falls into the wrong hands, someone could use it to steal your identity and ruin your life. How to Check If Your Data Was…

What Is a Botnet and Is Your Computer Part of One?

One of my favorite cybersecurity terms is “botnet.” It conjures all sorts of imagery: interconnected robots, legions of networked workers simultaneously powering toward a single goal. Funnily enough, the image the word evokes is similar to what a botnet is — in roundabout terms, at least. Botnets account for a serious amount of computing power…

The 6 Best Mesh Wi-Fi Networks for Your Home

If you’ve found yourself suffering from a notorious Wi-Fi dead zone in your home, then a mesh Wi-Fi network may be precisely what you need. Mesh networks add nodes or satellite units that can be placed around the house to extend the reach of your Wi-Fi network. But with so many to choose from, which…

CentOS vs. Ubuntu: The Best Web Hosting Server OS

With so many Linux distributions available, choosing one for your home computer isn’t easy. Choosing a Linux distribution for a server is even tougher. A server runs 24 hours a day, often performing complex tasks, so picking a distribution you can trust is key. Ubuntu is one of the more popular options due to its…

How P2P (Peer to Peer) File Sharing Works

Software piracy and file sharing existed well before the internet as we know it today, mainly through message boards and private FTP sites. But it was tedious to find files, and even slower to actually download them. It was more common to get your software or music fix from a friend as a physical copy…

How to Run macOS on Windows 10 in a Virtual Machine

Windows 10 is a great operating system. It has its quirks and annoyances, but what operating system doesn’t? Even if you’re beholden to Microsoft and Windows 10, you can still shop around. What better way to do that than from the safe confines of your existing operating system and a virtual machine? This way, you…

How to Protect Your Most Sensitive Data Information With Tomb

Encryption is an essential security practice. While your file system may have encryption enabled, what about shared machines or extremely sensitive information? Fear not, you can keep your secret Justin Bieber music collection in your closet with Tomb. What Is a Tomb? In the Linux sense of the word, a tomb is like a locked…

6 Easy Ways to Connect Arduino to Android

Arduino boards and similar microcontrollers are making creativity more accessible than ever. Whether you are controlling LED strips, automating your home, or even protecting your property, these little marvels are the heart of most DIY electronic builds. If you need to tell your Arduino to change the state of a pin (for example to turn the lights on),…

Doing Data Science in the Cloud With ScraperWiki

If you’ve got the mental chops, a flair for programming and storytelling, and an eye for design, you can do worse than getting into data science. It’s the new big thing in technology; highly trendy and highly paid, with data scientists being sought by some of the largest companies in the world. ScraperWiki is a company…

Darknet Market Takedowns Show Why Extra Tor Security Is Needed

The Tor network has a reputation for hosting some disturbing content. Then, there are the darknet marketplaces that deal in stolen credit cards, PayPal accounts, weapons, drugs, and in some dark corners, worse. So, when the news hits that the authorities have outsmarted the shady criminals that run the darknet markets, you must wonder, what…

ArabicChinese (Simplified)DutchEnglishFrenchHindiPortugueseRussianSinhalaTamil