Dave Albaugh

Dave Albaugh is a freelance Information Infrastructure Master Technician who consults on computer & network security for small businesses, SOHOs & entrepreneurs. He has documented loads of "knowledge nuggets" for different clients on topics such as security, understanding the technology behind the internet, and the infrastructure behind a computer network, all written in non-techie English. When he's not putting out client's fires, Dave is a roadie for his wife's Taiko group and a non-biker motorcycle enthusiast

5 Best VPNs for iPhone and iPad with great iOS apps (updated for 2018)
By in VPN & Privacy, on July 16, 2018 at 2:51 pm
5 Best VPNs for iPhone and iPad with great iOS apps (updated for 2018)

We’ve compiled a list of the best five VPNs for Apple devices running iOS. Whether you use an iPad, iPhone or even an iPod Touch, we’ve got you covered with these providers.

5 Best VPNs for Mac users and some to avoid in 2018
By in VPN & Privacy, on July 12, 2018 at 5:01 pm
5 Best VPNs for Mac users and some to avoid in 2018

There is a lot of choice when it comes to VPNs for Mac users, however not all VPNs are created equal and some are just best outright avoided.

What is Tor? How to use it safely and legally (plus 5 Tor alternatives)
By in VPN & Privacy, on June 11, 2018 at 12:09 pm
What is Tor? How to use it safely and legally (plus 5 Tor alternatives)

The What is Tor, who uses it and is it legal? We take a look at how Tor works, how good it is at keeping you anonymous and what the alternatives are.

What is W2 phishing?
By in Information Security, on June 11, 2018 at 10:41 am
What is W2 phishing?

Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attack tries to access a company’s W2 files for all current and/or past employees.

Common phishing scams and how to recognise and avoid them
By in Information Security, on May 29, 2018 at 2:08 pm
Common phishing scams and how to recognise and avoid them

Phishing for data continues to be a problem, but it’s no longer restricted to the internet. Here are the major attack vectors and tactics in use today.

A beginner’s guide to using Tor for anonymous browsing
By in VPN & Privacy, on August 23, 2017 at 7:50 pm
A beginner’s guide to using Tor for anonymous browsing

Tor is a network of relays and bridges setup to allow people to surf the web anonymously. This guide introduces the reader to a whole new layer of privacy

Biggest data breaches in history
By in Information Security, on June 16, 2017 at 4:04 pm
Biggest data breaches in history

Just how safe is your personal information? With over five thousand reported data breaches since 2004, the odds are not in your favor.

What is Net Neutrality, why does it matter and how can you fight for it?
By in Internet providers, on June 15, 2017 at 10:54 am
What is Net Neutrality, why does it matter and how can you fight for it?

The big name providers of internet access have been trying to get rid of net neutrality for years. This latest effort by the new FCC chair can only succeed if we do nothing.

Common tech support scams: How to identify and avoid them
By in Information Security, on May 1, 2017 at 6:07 pm
Common tech support scams: How to identify and avoid them

The fake tech support scam has become even more dangerous with the introduction of ransomware packages and easily installed keyloggers. Learn the danger signs and the way these scammers manipulate actual Windows tools to make people think their computers are infected with viruses.

Blocking ads and malware with host files on Mac, Windows and Linux
By in Information Security, on February 28, 2017 at 7:59 pm
Blocking ads and malware with host files on Mac, Windows and Linux

Ads and malware are served up by thousands of servers on the internet. This How-To shows you how to use your computer’s hosts file to block access to tens of thousands of these servers.

Page 1 of 2