pixel
Secure Your Communications NOW!

Secure Your Communications NOW!

I receive at least one question every day regarding how to secure email communications. People are legitimately concerned that their email may be seen by crazy ex-boyfriend/girlfriend/gender-neutral lover, boss, rivals, or government. Let me put your minds at rest....

read more
iOS 12 Security Essentials

iOS 12 Security Essentials

Live Versions are updated in real time.
The best-selling, easiest, step-by-step, most comprehensive guide to securing your home or business iPhones and iPads. Completely revised and updated for iOS 12.

read more
Q: Why can’t you trust people with your phone?

Q: Why can’t you trust people with your phone?

A: Your phone contains your private data, possibly sensitive business information, passwords, credit card information, banking information, a record of all calls, website visits, very possibly a map of your movement/travels over the past x months.

read more
Q: Firewall Question Answered

Q: Firewall Question Answered

A: A firewall can be located on your computer (part of the OS), or between your local area network and the internet. It is typically built into the modem/router provided by your broadband provider.

read more
Q: Is my ISP spying on me?

Q: Is my ISP spying on me?

A: It is almost certain that they are.

Not like they have a person on the payroll to spy on your activities specifically, but virtually all ISP’s (ALL in the USA) log your activity, and most (if not all) sell this to marketing firms.

read more
macOS 10.14 Mojave Security Essentials

macOS 10.14 Mojave Security Essentials

Official workbook for the Practical Paranoia: Security Essentials Workshop. Designed for classroom, workshop, and self-study. The entire workshop is contained within the book. Includes all instructor presentations, hands-on assignments, links to all software, and security checklist.

read more
Q: How effective is a ClamAV…

Q: How effective is a ClamAV…

So, without testing and validation, it’s not possible to know how well it works, and what performance degradation it introduces. why would one use something so important to security and privacy?

read more