Dave Albaugh

Dave Albaugh is a freelance Information Infrastructure Master Technician who consults on computer & network security for small businesses, SOHOs & entrepreneurs. He has documented loads of "knowledge nuggets" for different clients on topics such as security, understanding the technology behind the internet, and the infrastructure behind a computer network, all written in non-techie English. When he's not putting out client's fires, Dave is a roadie for his wife's Taiko group and a non-biker motorcycle enthusiast

5 Best VPNs for iPhone and iPad with great iOS apps (updated for 2018)
By in VPN & Privacy, on settembre 17, 2018 at 8:56 pm
5 Best VPNs for iPhone and iPad with great iOS apps (updated for 2018)

We’ve compiled a list of the best five VPNs for Apple devices running iOS. Whether you use an iPad, iPhone or even an iPod Touch, we’ve got you covered with these providers.

What is W2 phishing?
By in Information Security, on giugno 11, 2018 at 10:41 am
What is W2 phishing?

Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attack tries to access a company’s W2 files for all current and/or past employees.

Common phishing scams and how to recognise and avoid them
By in Information Security, on maggio 29, 2018 at 2:08 pm
Common phishing scams and how to recognise and avoid them

Phishing for data continues to be a problem, but it’s no longer restricted to the internet. Here are the major attack vectors and tactics in use today.

La guida definitiva all’utilizzo di Tor per la navigazione anonima
By in VPN e Privacy, on maggio 16, 2018 at 6:13 am
La guida definitiva all’utilizzo di Tor per la navigazione anonima

Ecco come utilizzare Tor per navigare in modo anonimo. La guida che illustra le opzioni a disposizione per rimanere protetti.

Le migliori VPN per MacOS e quelle da evitare
By in VPN e Privacy, on gennaio 11, 2018 at 6:30 pm
Le migliori VPN per MacOS e quelle da evitare

Le VPN che vi consigliamo di utilizzare se siete utenti MacOS e quelle che è meglio evitare. Ecco i consigli su come orientarvi nel mercato.

A beginner’s guide to using Tor for anonymous browsing
By in VPN & Privacy, on agosto 23, 2017 at 7:50 pm
A beginner’s guide to using Tor for anonymous browsing

Tor is a network of relays and bridges setup to allow people to surf the web anonymously. This guide introduces the reader to a whole new layer of privacy

Biggest data breaches in history
By in Information Security, on giugno 16, 2017 at 4:04 pm
Biggest data breaches in history

Just how safe is your personal information? With over five thousand reported data breaches since 2004, the odds are not in your favor.

What is Net Neutrality, why does it matter and how can you fight for it?
By in Internet providers, on giugno 15, 2017 at 10:54 am
What is Net Neutrality, why does it matter and how can you fight for it?

The big name providers of internet access have been trying to get rid of net neutrality for years. This latest effort by the new FCC chair can only succeed if we do nothing.

Common tech support scams: How to identify and avoid them
By in Information Security, on maggio 1, 2017 at 6:07 pm
Common tech support scams: How to identify and avoid them

The fake tech support scam has become even more dangerous with the introduction of ransomware packages and easily installed keyloggers. Learn the danger signs and the way these scammers manipulate actual Windows tools to make people think their computers are infected with viruses.

Blocking ads and malware with host files on Mac, Windows and Linux
By in Information Security, on febbraio 28, 2017 at 7:59 pm
Blocking ads and malware with host files on Mac, Windows and Linux

Ads and malware are served up by thousands of servers on the internet. This How-To shows you how to use your computer’s hosts file to block access to tens of thousands of these servers.

Page 1 of 2