By Benny CzarnyOne of the main reasons to have a NAC (Network Access Control) system in place is to keep risky devices…
Tag: encryption
What’s in your travel bag?A laptop filled with data? An external HDD filled with even more data? There’s bound to be…
Do you want a phone that is privacy centric?Would you like a handset that genuinely tries to transmit and receive your data…
In a previous post, I showcased the PirateBox, an anonymous offline mobile file sharing and communication system.While it was a fascinating project…
If you want to anonymize your Internet traffic, one of the most common solutions available is to use a commercial VPN…
Bram Cohen, better known for bringing us the BitTorrent protocol, much maligned as public opinion more often than not associates it with piracy,…
Seems like the interest in computer communication via sound is taking another peak in interest now that researchers discovered a way…
The past year turned out to be an interesting introduction into the new types of threats users are facing as well…
Update 06/02/2014: Today the US Department of Justice (DOJ) announced an effort to disrupt the Gameover Zeus Botnet. In addition to this…
Sometimes it is necessary to use random numbers in programs. Depending on the need, it can be important how random the…