Home » Archive by category "Security" (Page 2)

Yahoo a Company with No Direction

I have had the same e-mail address since high school and I have used it for almost everything. I have been a Yahoo mail user since the peak of the internet boom when Yahoo was worth close to $125 billion dollars, now Verizon is acquiring...
Read More

Critical Analysis of Oracle Java and J2EE Products

Java in no doubt is the number one programming language and its wide use all over the world helps it sustaining its numerous position. Numerous Software is based on Java programming languages which are used in computers, mobile phones, web development and etc. Java was...
Read More

How to Clear Your Mac Before Selling It

SO it is that time again when you are planning to change your old Mac with custom feature new Mac. It requires certain precautions to be taken before you actually hand over your old system to the new user. First, it requires clearing your Mac...
Read More

Do You Use Credit Cards?

Do you use credit cards? Hackers all over the world are after your money! This is what you can do to make sure your money and you are safe: A credit card is a standout amongst the most well-known and broadly utilized budgetary items. Serving...
Read More

Home Depot confirms security breach

On Monday Home Depot confirmed they had a breach in security and that customer payment data that occur at its stores puts millions of its customers could be at risk of fraud. Customers who shopped at the home improvement chain in the U.S. and Canada...
Read More

Dairy Queen Confirms Data Breach

A Dairy Queen breach was recently revealed by Brian Krebs, who runs the website Krebs on Security. When Krebs initially uncovered evidence of the Dairy Queen breach, the company was unwilling to believe that their customers’ debit card and credit card information had been stolen....
Read More

Is Tor Traffic Secure?

In the wake of Ed Snowden’s revelations there’s been a litany of calls for the widespread adoption of online anonymity tools. One such technology is Tor, which employs a network of Internet relays to hinder the process of attribution. Though advocates openly claim that “Tor...
Read More

How to Secure Your VoIP

Several users of traditional landline phones are ready to ditch their old and cranky sets for the latest feature-rich and low rental VoIP communication systems. VoIP is not only being used by the office owners but there is also a rise in the number of...
Read More

Latest

Can Apple win the battle of best smartphones? An iPhone 8 comparison!
domain name It’s Easier Than Ever to Transfer Your Domain Name
outlook ios Add and Edit Contacts Right from Outlook on iOS and Android
Microsoft Is Now A Linux Company
facebook ai Facebooks Plans For Home Automation Domination

Tech Geek Today

Tech Geek Today

MonTueWedThuFriSatSun
 123456
78910111213
14151617181920
21222324252627
28293031   
       

Subscribe To The Technology Geek

Archives