You can use a cache server for a small to medium-sized business no matter the industry or for whatever you would like. A DNS cache doesn’t have to be high maintenance or a menace to other people and organizations as long as you take certain precautions in the configuration. My reasons for creating a DNS... Continue reading Reduce Web Page Load Times and Improve Privacy Control
Browsers give you the option of auto-filling your username and password as a convenience, but convenience usually comes with vulnerability in the cyber world, and this is no exception. There are two scripts used by over one thousand websites to steal your email address and other user identifiers to send to third-party servers to track... Continue reading Web Trackers Exploit Your Browser Credential Manager
Recently there has been a massive data breach that exposed millions of people. Upon installing the Ai.Type keyboard the application requested full access to your phone which recorded every letter or number you typed. Why would a keyboard and emoji application need to gather the entire data of the user’s phone or tablet? Great question.
The Deep Web The deep web is commonly known as the invisible web or the hidden web. The deep web is surprisingly large taking up 90% of the internet which is estimated to be 7.5 petabytes which most of that is made up of innocent content such as emails, logins, and subscription websites; generally, anything... Continue reading The Deep Web vs. The Dark Web
Email might seem trivial to some people, but if you are active in using the internet to bank, shop, conduct research, ship items, sell items at auction, and a myriad of other activities your life revolves around email. If a hacker were able to take over your email account they could reset passwords to all... Continue reading What Can a Hacker Do With Your Email Address?