Latest Articles

Home > > Security
Latest Articles
Jaxx Logo Thumb

A Problem With Jaxx Cryptocurrency Wallet Security

by Rob Williams on February 19, 2018 in Editorials & Interviews, Security

Jumping into the cryptocurrency world can feel overwhelming; there’s a lot to learn, and unfortunately, some lessons come late. Sometimes, it can be due to not knowing what you’re doing, but other times, weak security is to blame. We’re going to explore an example of the latter here, with the help of our formally favorite crypto wallet.

Transcend DrivePro 520 Feature Image

A Road Trip With The Transcend DrivePro 520 Dashcam

by Robert Tanner on April 27, 2017 in Peripherals, Security

The DrivePro 520 is a full-featured dashcam that has it all. With dual cameras, low light usage, infrared, GPS, mic, and a battery, this cam targets the full range of professional drivers from commercial haulers, passenger carriers, or just business vehicles. It also offers a proper toolkit for parents, so whatever your needs, Transcend’s DrivePro 520 can probably exceed them.

Addonics CipherUSB Review – Portable Encryption Made Easy

by Brett Thomas on July 3, 2013 in Security, Storage

As important as data encryption can be for the home user, it’s even more imperative in the enterprise. The problem? The most effective measures are usually cast aside in lieu of something a little easier to deal with. With the CipherUSB, Addonics hopes to bring “simple” and “most effective” together as one. Does it succeed?

SysAdmin Corner: Introduction to Pentesting and the Pwn Plug – Part 1

by Brett Thomas on December 20, 2012 in Editorials & Interviews, Security

Many sysadmins understand how to set up and maintain a network, but the concept of auditing is an entirely different world. In the first part of a series on auditing and penetration testing (pentesting), we introduce the concepts and tools for putting all that security to the test. We’ll also talk about our pentest platform of choice, the Pwn Plug.

TrueCrypt Primer: Part 1 – What It Is & Why You Should Care

by Mario Figueiredo on November 20, 2012 in Editorials & Interviews, Security

We’ve talked a lot in the past about keeping your computer safe and data backed-up, but we haven’t delved much into keeping your data secure. In this first part to a three-part series, we’re taking a look at one of the best (and easiest-to-use) cross-platform solutions for keeping your important data encrypted: TrueCrypt.

More Articles
TitleAuthorDateCategories
A Problem With Jaxx Cryptocurrency Wallet SecurityRob WilliamsFebruary 19, 2018Editorials & Interviews, Security
A Road Trip With The Transcend DrivePro 520 DashcamRobert TannerApril 27, 2017Peripherals, Security
Addonics CipherUSB Review – Portable Encryption Made EasyBrett ThomasJuly 3, 2013Security, Storage
SysAdmin Corner: Introduction to Pentesting and the Pwn Plug – Part 1Brett ThomasDecember 20, 2012Editorials & Interviews, Security
TrueCrypt Primer: Part 1 – What It Is & Why You Should CareMario FigueiredoNovember 20, 2012Editorials & Interviews, Security
SysAdmin Corner: 7 Network Security F-Ups Small Offices MakeBrett ThomasOctober 19, 2012Editorials & Interviews, Security
VPS: What It Is and How It’s UsefulRob WilliamsDecember 3, 2010Security, Software
Super Talent SuperCrypt 32GB USB 3.0 Flash DriveRob WilliamsJune 9, 2010Security, Storage
Too TRIM? When SSD Data Recovery is ImpossibleRob WilliamsMarch 5, 2010Security, Storage
Addonics CipherChain Hard Drive EncryptionRob WilliamsDecember 9, 2009Security, Storage
Quick-Gage: Kingston 16GB DataTraveler Locker+Rob WilliamsDecember 2, 2009Security, Storage
Steganos LockNote 1.0Rob WilliamsJanuary 26, 2006Security, Software
Steganos Security Suite 2006Rob WilliamsDecember 14, 2005Security, Software
Steganos Internet Anonym 2006Rob WilliamsSeptember 16, 2005Security, Software
Internet Anonymity – Anonymizer vs SteganosRob WilliamsAugust 8, 2005Security, Software
Internet Anonymity – How you can stay safe onlineRob WilliamsAugust 3, 2005Security, Software