Home » Archive by category "Security"

Microsoft BitLocker Securing Your Hard Drive

bitlocker
BitLocker is a disk encryption tool feature in Windows 7 and newer versions of Microsoft Windows. BitLocker Drive Encryption is available on Windows 10 Pro and Windows 10 Enterprise with the release of the latest version of Microsoft Windows. Windows 7 offers Bitlocker on Enterprise...
Read More

Yahoo a Company with No Direction

I have had the same e-mail address since high school and I have used it for almost everything. I have been a Yahoo mail user since the peak of the internet boom when Yahoo was worth close to $125 billion dollars, now Verizon is acquiring...
Read More

Critical Analysis of Oracle Java and J2EE Products

Java in no doubt is the number one programming language and its wide use all over the world helps it sustaining its numerous position. Numerous Software is based on Java programming languages which are used in computers, mobile phones, web development and etc. Java was...
Read More

How to Clear Your Mac Before Selling It

SO it is that time again when you are planning to change your old Mac with custom feature new Mac. It requires certain precautions to be taken before you actually hand over your old system to the new user. First, it requires clearing your Mac...
Read More

Do You Use Credit Cards?

Do you use credit cards? Hackers all over the world are after your money! This is what you can do to make sure your money and you are safe: A credit card is a standout amongst the most well-known and broadly utilized budgetary items. Serving...
Read More

Home Depot confirms security breach

On Monday Home Depot confirmed they had a breach in security and that customer payment data that occur at its stores puts millions of its customers could be at risk of fraud. Customers who shopped at the home improvement chain in the U.S. and Canada...
Read More

Dairy Queen Confirms Data Breach

A Dairy Queen breach was recently revealed by Brian Krebs, who runs the website Krebs on Security. When Krebs initially uncovered evidence of the Dairy Queen breach, the company was unwilling to believe that their customers’ debit card and credit card information had been stolen....
Read More

Is Tor Traffic Secure?

In the wake of Ed Snowden’s revelations there’s been a litany of calls for the widespread adoption of online anonymity tools. One such technology is Tor, which employs a network of Internet relays to hinder the process of attribution. Though advocates openly claim that “Tor...
Read More

Latest

sesame Sesame Door Lock Review
data recovery Recover your data using EaseUS Data Recovery, Easily!
windows 10 Windows 10 and Office 365 Feature Release Schedule
filesharing Top 5 File Sharing Apps for 2017
cortana Cortana For The Business Desktop

Follow Us

Visit Us On TwitterVisit Us On FacebookVisit Us On GooglePlusVisit Us On PinterestVisit Us On YoutubeCheck Our Feed

Join Premium

Enjoy All The Benefits Of Premium

  • Access To Premium Content Only Available To Members
  • Digital Copy Of My Book The Pangram Killer
  • Coupons for quality sites affiliated with us
  • Access To All Short Stories
  • Free Plug On Podcast
  • Get first notice and exclusive access to events and meetups
$19.99

Subscribe To The Technology Geek

Sponsors

Sponsors

Archives