Dave Albaugh

Dave Albaugh is a freelance Information Infrastructure Master Technician who consults on computer & network security for small businesses, SOHOs & entrepreneurs. He has documented loads of "knowledge nuggets" for different clients on topics such as security, understanding the technology behind the internet, and the infrastructure behind a computer network, all written in non-techie English. When he's not putting out client's fires, Dave is a roadie for his wife's Taiko group and a non-biker motorcycle enthusiast

La guida definitiva all’utilizzo di Tor per la navigazione anonima
By in VPN e Privacy, on maggio 16, 2018 at 6:13 am
La guida definitiva all’utilizzo di Tor per la navigazione anonima

Ecco come utilizzare Tor per navigare in modo anonimo. La guida che illustra le opzioni a disposizione per rimanere protetti.

5 Best VPNs for iPhone and iPad with great iOS apps (updated for 2018)
By in VPN e Privacy, on marzo 11, 2018 at 2:51 pm
5 Best VPNs for iPhone and iPad with great iOS apps (updated for 2018)

We’ve compiled a list of the best five VPNs for Apple devices running iOS. Whether you use an iPad, iPhone or even an iPod Touch, we’ve got you covered with these providers.

Le migliori VPN per MacOS e quelle da evitare
By in VPN e Privacy, on gennaio 11, 2018 at 6:30 pm
Le migliori VPN per MacOS e quelle da evitare

Le VPN che vi consigliamo di utilizzare se siete utenti MacOS e quelle che è meglio evitare. Ecco i consigli su come orientarvi nel mercato.

A beginner’s guide to using Tor for anonymous browsing
By in VPN e Privacy, on agosto 23, 2017 at 7:50 pm
A beginner’s guide to using Tor for anonymous browsing

Tor is a network of relays and bridges setup to allow people to surf the web anonymously. This guide introduces the reader to a whole new layer of privacy

Biggest data breaches in history
By in Sicurezza Informatica, on giugno 16, 2017 at 4:04 pm
Biggest data breaches in history

Just how safe is your personal information? With over five thousand reported data breaches since 2004, the odds are not in your favor.

What is Net Neutrality, why does it matter and how can you fight for it?
By in Fornitori servizi Internet, on giugno 15, 2017 at 10:54 am
What is Net Neutrality, why does it matter and how can you fight for it?

The big name providers of internet access have been trying to get rid of net neutrality for years. This latest effort by the new FCC chair can only succeed if we do nothing.

Common tech support scams: How to identify and avoid them
By in Sicurezza Informatica, on maggio 1, 2017 at 6:07 pm
Common tech support scams: How to identify and avoid them

The fake tech support scam has become even more dangerous with the introduction of ransomware packages and easily installed keyloggers. Learn the danger signs and the way these scammers manipulate actual Windows tools to make people think their computers are infected with viruses.

Common phishing scams and how to recognise and avoid them
By in Sicurezza Informatica, on aprile 28, 2017 at 3:27 pm
Common phishing scams and how to recognise and avoid them

Phishing for data continues to be a problem, but it’s no longer restricted to the internet. Here are the major attack vectors and tactics in use today.

Blocking ads and malware with host files on Mac, Windows and Linux
By in Sicurezza Informatica, on febbraio 28, 2017 at 7:59 pm
Blocking ads and malware with host files on Mac, Windows and Linux

Ads and malware are served up by thousands of servers on the internet. This How-To shows you how to use your computer’s hosts file to block access to tens of thousands of these servers.

SQL injection prevention tips for web programmers
By in Sicurezza Informatica, on febbraio 13, 2017 at 7:13 pm
SQL injection prevention tips for web programmers

SQL injection attacks are becoming more prevalent. Along with the use of dynamic content on websites. This article contains suggestions and code snippets for helping coders prevent these kinds of attacks right in the programs they write.

Page 1 of 2