Dave Albaugh

Dave Albaugh is a freelance Information Infrastructure Master Technician who consults on computer & network security for small businesses, SOHOs & entrepreneurs. He has documented loads of "knowledge nuggets" for different clients on topics such as security, understanding the technology behind the internet, and the infrastructure behind a computer network, all written in non-techie English. When he's not putting out client's fires, Dave is a roadie for his wife's Taiko group and a non-biker motorcycle enthusiast

5 Best VPNs for iPhone and iPad with great iOS apps (updated for 2018)
By in VPN & Privacy, on septiembre 17, 2018 at 8:56 pm
5 Best VPNs for iPhone and iPad with great iOS apps (updated for 2018)

We’ve compiled a list of the best five VPNs for Apple devices running iOS. Whether you use an iPad, iPhone or even an iPod Touch, we’ve got you covered with these providers.

La guía definitiva para la navegación anónima con Tor
By in VPN y Privacidad, on agosto 16, 2018 at 5:14 pm
La guía definitiva para la navegación anónima con Tor

¿Qué es Tor, quién lo utiliza y, es legal? Damos un vistazo a cómo funciona Tor, qué tan bueno es para mantener tu anonimato y cuáles son sus alternativas.

Las 5 mejores VPN para usuarios de Mac y algunas a evitar
By in VPN y Privacidad, on agosto 15, 2018 at 4:02 pm
Las 5 mejores VPN para usuarios de Mac y algunas a evitar

Los usuarios de Mac tienen muchas opciones de VPN para elegir. pero no todas las VPN son iguales y algunas es mejor evitarlas.

What is W2 phishing?
By in Information Security, on junio 11, 2018 at 10:41 am
What is W2 phishing?

Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attack tries to access a company’s W2 files for all current and/or past employees.

Common phishing scams and how to recognise and avoid them
By in Information Security, on mayo 29, 2018 at 2:08 pm
Common phishing scams and how to recognise and avoid them

Phishing for data continues to be a problem, but it’s no longer restricted to the internet. Here are the major attack vectors and tactics in use today.

A beginner’s guide to using Tor for anonymous browsing
By in VPN & Privacy, on agosto 23, 2017 at 7:50 pm
A beginner’s guide to using Tor for anonymous browsing

Tor is a network of relays and bridges setup to allow people to surf the web anonymously. This guide introduces the reader to a whole new layer of privacy

Biggest data breaches in history
By in Information Security, on junio 16, 2017 at 4:04 pm
Biggest data breaches in history

Just how safe is your personal information? With over five thousand reported data breaches since 2004, the odds are not in your favor.

What is Net Neutrality, why does it matter and how can you fight for it?
By in Internet providers, on junio 15, 2017 at 10:54 am
What is Net Neutrality, why does it matter and how can you fight for it?

The big name providers of internet access have been trying to get rid of net neutrality for years. This latest effort by the new FCC chair can only succeed if we do nothing.

Common tech support scams: How to identify and avoid them
By in Information Security, on mayo 1, 2017 at 6:07 pm
Common tech support scams: How to identify and avoid them

The fake tech support scam has become even more dangerous with the introduction of ransomware packages and easily installed keyloggers. Learn the danger signs and the way these scammers manipulate actual Windows tools to make people think their computers are infected with viruses.

Blocking ads and malware with host files on Mac, Windows and Linux
By in Information Security, on febrero 28, 2017 at 7:59 pm
Blocking ads and malware with host files on Mac, Windows and Linux

Ads and malware are served up by thousands of servers on the internet. This How-To shows you how to use your computer’s hosts file to block access to tens of thousands of these servers.

Page 1 of 2