Quantcast
Channel: security tips – Computer Borders
Browsing all 42 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Join the first Spy Week by Lifehacker!

The first Spy Week starts today @Lifehacker with a bunch of interesting stories about topics related to the spy world. During the next days we will have the opportunity to improve our knowledge on...

View Article



Image may be NSFW.
Clik here to view.

Spring Time! Now you are ready to protect your Ubuntu – Debian system from...

It’s Spring Time and after a long Winter surfing the web and testing new programs, it’s time to give a short rest to your computer, delete old files and scan the OS looking for possible rootkits or...

View Article

Image may be NSFW.
Clik here to view.

Converting an existing installation

Converting an existing installation to LUKS using luksipc

View Article

Image may be NSFW.
Clik here to view.

Converting an existing installation

Converting an existing installation to LUKS using luksipc

View Article

Image may be NSFW.
Clik here to view.

How To See Everything Google Knows About You

How To See Everything Google Knows About You by Cadie Thompson via  Courtesy of appsglossy.com

View Article


Image may be NSFW.
Clik here to view.

Is Computer Security Becoming a Hardware Problem?

Is Computer Security Becoming a Hardware Problem? by Michael Byrne via

View Article

Image may be NSFW.
Clik here to view.

Faking Your Death Online Is a Lot Harder Than It Used to Be

Faking Your Death Online Is a Lot Harder Than It Used to Be by Roisin Kiberd via “…But pseudocides are rarer in recent times. “Vanishing” oneself is more difficult; the world is simply too small a...

View Article

Image may be NSFW.
Clik here to view.

The Power of Privacy

Charming animated short on The Power of Privacy by Andrea James via  The Power of Privacy from Matthias Hoegg on Vimeo.

View Article


Image may be NSFW.
Clik here to view.

Crossing the Border? Here’s How to Safeguard Your Data From Searches by...

Travelers, beware: When you take your gadgets abroad, maintaining the security of the data on your devices is just as important as protecting yourself from muggers. from http://nyti.ms/2nnTaav...

View Article


Image may be NSFW.
Clik here to view.

How to set up a VPN in 10 minutes for free (and why you urgently need one) by...

Soon every mistake you’ve ever made online will not only be available to your internet service provider (ISP) — it will be available to any corporation or foreign government who wants to see those...

View Article

Image may be NSFW.
Clik here to view.

LastPass Exploit Shows That Last Password You Made Probably Wasn’t Your Last...

LastPass is one of the most prominent password managers around. It’s extremely convenient but if it were hacked, it would be quite the pain in the arse for users. In a blog post, the company has...

View Article

Image may be NSFW.
Clik here to view.

How to delete cookies in Chrome, Firefox, Safari, and IE by https://is.gd/Z745PT

Cookies, small data files used by websites to track your internet usage, pose no threat to your computer. Some cookies can, however, compromise your privacy. They can also take up space–albeit a small...

View Article

Image may be NSFW.
Clik here to view.

How To Anonymise Your Browsing With A Tor-Powered Raspberry Pi by...

If you’ve been thinking about trying out Tor to anonymise all your web browsing, you could just download a browser and give that a spin, but it’s much more fun to make your own highly portable proxy...

View Article


Image may be NSFW.
Clik here to view.

Tech Underestimates Future Demand for Privacy by https://is.gd/dDYPOL

Your browser is no longer supported. You can still use the site, but some features may not work as expected. Please consider upgrading to one of the following browsers. Chrome, Firefox, Safari, Opera...

View Article

Image may be NSFW.
Clik here to view.

USB Canary Sends An SMS When Someone Tinkers With Your USB Ports on Linux by...

An anonymous reader quotes a report from BleepingComputer: A new tool released on GitHub last week can help paranoid sysadmins keep track of whenever someone plugs in or disconnects an USB-based...

View Article


Image may be NSFW.
Clik here to view.

Build your own DNS name server on Linux by https://is.gd/taDLb5

In the previous article in this two-part series, Introduction to the DNS (Domain Name System), I described how the DNS database is structured and how to configure name services on a client. from...

View Article

Image may be NSFW.
Clik here to view.

How To Choose A VPN (That’s Safe And Reliable) by https://is.gd/IUN1JA

From today, the Federal Government’s Metadata Retention Scheme becomes compulsory for telcos and internet service providers in Australia. This means your metadata – including text messages, location...

View Article


Image may be NSFW.
Clik here to view.

Blackhat EU: Breaking Big Data by https://is.gd/fvOE3d

David Venable spent time as an employee of the National Security Agency”Privacy as we know it is dead”, said David Venable of Masergy Communications, as he began his talk, Breaking Big Data: Evading...

View Article

Image may be NSFW.
Clik here to view.

Why can’t Karen Sandler get the source code for her pacemaker? by...

Last week, the U.S. Food and Drug Administration threatened legal action against Abbott Laboratories after researchers demonstrated that some of its heart-monitoring devices were insecure and could be...

View Article

Image may be NSFW.
Clik here to view.

Phishing with Unicode Domains by http://bit.ly/2pk366O

If I told you this could be a phishing site, would you believed me? tl;dr: check out the proof-of-concept Punycode makes it possible to register domains with foreign characters. It works by converting...

View Article
Browsing all 42 articles
Browse latest View live




Latest Images