Latest Articles

Home > > Security
Latest Articles
Transcend DrivePro 520 Feature Image

A Road Trip With The Transcend DrivePro 520 Dashcam

by Robert Tanner on April 27, 2017 in Peripherals, Security

The DrivePro 520 is a full-featured dashcam that has it all. With dual cameras, low light usage, infrared, GPS, mic, and a battery, this cam targets the full range of professional drivers from commercial haulers, passenger carriers, or just business vehicles. It also offers a proper toolkit for parents, so whatever your needs, Transcend’s DrivePro 520 can probably exceed them.

Addonics CipherUSB Review – Portable Encryption Made Easy

by Brett Thomas on July 3, 2013 in Security, Storage

As important as data encryption can be for the home user, it’s even more imperative in the enterprise. The problem? The most effective measures are usually cast aside in lieu of something a little easier to deal with. With the CipherUSB, Addonics hopes to bring “simple” and “most effective” together as one. Does it succeed?

SysAdmin Corner: Introduction to Pentesting and the Pwn Plug – Part 1

by Brett Thomas on December 20, 2012 in Editorials & Interviews, Security

Many sysadmins understand how to set up and maintain a network, but the concept of auditing is an entirely different world. In the first part of a series on auditing and penetration testing (pentesting), we introduce the concepts and tools for putting all that security to the test. We’ll also talk about our pentest platform of choice, the Pwn Plug.

TrueCrypt Primer: Part 1 – What It Is & Why You Should Care

by Mario Figueiredo on November 20, 2012 in Editorials & Interviews, Security

We’ve talked a lot in the past about keeping your computer safe and data backed-up, but we haven’t delved much into keeping your data secure. In this first part to a three-part series, we’re taking a look at one of the best (and easiest-to-use) cross-platform solutions for keeping your important data encrypted: TrueCrypt.

SysAdmin Corner: 7 Network Security F-Ups Small Offices Make

by Brett Thomas on October 19, 2012 in Editorials & Interviews, Security

It’s easy to overlook that huge corporations are far less dangerous than the small business you deal with each and every day with regards to information theft. Some institutions have treasure troves of info on you that can far exceed the “big fish”. If you work in a SMB, you can’t afford to have your info stolen, so read on for some important tips.

More Articles
TitleAuthorDateCategories
A Road Trip With The Transcend DrivePro 520 DashcamRobert TannerApril 27, 2017Peripherals, Security
Addonics CipherUSB Review – Portable Encryption Made EasyBrett ThomasJuly 3, 2013Security, Storage
SysAdmin Corner: Introduction to Pentesting and the Pwn Plug – Part 1Brett ThomasDecember 20, 2012Editorials & Interviews, Security
TrueCrypt Primer: Part 1 – What It Is & Why You Should CareMario FigueiredoNovember 20, 2012Editorials & Interviews, Security
SysAdmin Corner: 7 Network Security F-Ups Small Offices MakeBrett ThomasOctober 19, 2012Editorials & Interviews, Security
VPS: What It Is and How It’s UsefulRob WilliamsDecember 3, 2010Security, Software
Super Talent SuperCrypt 32GB USB 3.0 Flash DriveRob WilliamsJune 9, 2010Security, Storage
Too TRIM? When SSD Data Recovery is ImpossibleRob WilliamsMarch 5, 2010Security, Storage
Addonics CipherChain Hard Drive EncryptionRob WilliamsDecember 9, 2009Security, Storage
Quick-Gage: Kingston 16GB DataTraveler Locker+Rob WilliamsDecember 2, 2009Security, Storage
Steganos LockNote 1.0Rob WilliamsJanuary 26, 2006Security, Software
Steganos Security Suite 2006Rob WilliamsDecember 14, 2005Security, Software
Steganos Internet Anonym 2006Rob WilliamsSeptember 16, 2005Security, Software
Internet Anonymity – Anonymizer vs SteganosRob WilliamsAugust 8, 2005Security, Software
Internet Anonymity – How you can stay safe onlineRob WilliamsAugust 3, 2005Security, Software