Tag Archives: SSH

Lock it Down Part II: How to Secure Your Firmware and Access Computers Remotely

Let’s say the worst has happened and someone has stolen your laptop; you’ve basically got two major concerns here. First,… View Article

Posted in Security | Tagged , , , , , , , , , , , , , , , , , , | 11 Comments

Lock it Down: How to Use Encryption Options Already Installed to Lock Your Data Down

Encryption is the application of cryptographic techniques to encode data so only authorized users can read the information. With the ubiquity… View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , | 7 Comments