Skip to content
  • Facebook
  • Twitter
  • Spotify
  • Twitch
  • Instagram
  • Snapchat
  • YouTube

The Technology Geek

Time To Talk Tech

  • Home
  • Contact
    • Write For Us
    • Advertise Here
  • Topics
    • Apple
    • Google
    • Programming
    • Internet
    • Business
    • Hardware
    • Microsoft
    • Security
    • Linux
    • Geek
    • Health
    • Podcast
    • Cord Cutting
      • Apple TV+
      • Netflix
      • HBO Max
      • Hulu
      • Paramount+
  • Books
    • Field Guide To Small Business
    • Guidebook To Computer and Smartphone Security
    • Beginners Guidebook To Using Windows 10
  • Support Us
    • Venmo
    • CashApp
    • Square Donations
  • Shop Amazon & Support

Category: Security

The Ultimate Guide To Encryption
December 13, 2017March 2, 2022

The Ultimate Guide To Encryption

Encryption is one of the most important forms of data security. It is commonly used to protect sensitive user information and to protect stored data. […]

Security by admin
10 Ways To Check If Your Gmail Account Has Been Hacked
November 20, 2017

10 Ways To Check If Your Gmail Account Has Been Hacked

Have you ever received a message from a friend asking why you were sending them random emails that didn’t sound anything like you? Or, maybe […]

Security by admin
Importance  of CISSP Certification & Training
October 25, 2017

Importance of CISSP Certification & Training

When you plan to go in for pursuing further education, especially if it has to be some certification course then you need to be very […]

Security by admin
Mega Review
September 21, 2017June 23, 2023

Mega Review

I recently have been reviewing cloud storage services and I decided to give Mega a look and see what it had to offer. Mega has […]

Security by admin
Preventing Hacking and Impersonation with Machine Learning
September 19, 2017

Preventing Hacking and Impersonation with Machine Learning

Technology has taken a giant leap since the beginning of this century allowing thousands of concurrent transactions to be taken place over the web. Zillions […]

Security by admin
Going through CISSP Certification and Training – a detailed analysis
September 18, 2017September 19, 2017

Going through CISSP Certification and Training – a detailed analysis

The government of United States and all the medium and large scale American corporate houses have been on high alert for the last couple of […]

Security by admin
4 Benefits of Bring Your Own Device (BYOD) Policies in the Classroom
August 2, 2017May 5, 2025

4 Benefits of Bring Your Own Device (BYOD) Policies in the Classroom

Bring Your Own Device (BYOD) policies arose out of a natural technological trend: Students and educators alike started to bring their own smartphones, tablets, and […]

Security by admin
Some Apt Precautions need to be taken while shopping online
July 26, 2017March 13, 2026

Some Apt Precautions need to be taken while shopping online

While commuting through the Internet including mobile devices like smart phones and other gadgets will be protected. Cybercriminals and scammers can target the shoppers too. […]

Security by admin
Successful Career tips through CEH Security+ certification
July 25, 2017June 6, 2019

Successful Career tips through CEH Security+ certification

Hacking a computer network or system in an organization can cost a lot along with the loss of confidential data. Here comes the importance of […]

Security by admin
How to Know If Your SMB Is Cyber Secure
July 24, 2017December 26, 2025

How to Know If Your SMB Is Cyber Secure

Small and medium size businesses (SMBs) like to prepare for business downturns and other contingencies that can affect their profits. Where the cost justifies the […]

Security by admin

Posts pagination

1 … 3 4 5 6 7 8 9 10 11 … 20

Recent Posts

  • Memory Integrity Enforcement (MIE) On iPhone 17
  • Browsers Effected By Google Manifest V3
  • Apple Advanced Data Protection Explained
  • Using Globaleaks To Protect Sources
  • Using Signal for Secure Messaging

New Books Now Available

Buy It Leanpub

Buy It Leanpub

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.

To find out more, including how to control cookies, see here: Cookie Policy

Copyright © 2019 | All Rights Reserved

Shark Magazine by Shark Themes