Quantcast
Channel: Jason Palmer - Freelance CTO / Project Management » Security
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Securing your Email – Understanding Public Key and Private Key Encryption

With Public Key Encryption, also known as asymmetric key encryption, two different keys, a Private Key and Public key are used simultaneously to both Digitally Sign and Authenticate an email message...

View Article



Image may be NSFW.
Clik here to view.

Securing your Email – Assigning and Using a Digital Certificate for Secure...

In order to use a Digital Certificate for Secure Email, you need to install the Certificate in to your specific version of Outlook and assign it to the correct profile.  This is usually the default...

View Article

Image may be NSFW.
Clik here to view.

Securing your Email – Assigning and Using a Digital Certificate for Secure...

In order to use a Digital Certificate for Secure Email, you need to install the Certificate in to Thunderbird.  Installing the Certificate is straightforward.  Unfortunately, to use PGP – Public Key...

View Article

Image may be NSFW.
Clik here to view.

Securing the Home Network – Wi-Fi® Security

Most Cable and Phone Company Internet providers are installing Routers with Wi-Fi® capability.  Unfortunately, not all Carriers take Wireless Security seriously.  Many early Carrier Wi-Fi® Router...

View Article

Image may be NSFW.
Clik here to view.

Securing the Home Network – Guest Wi-Fi® Networks

The newest Wi-Fi® Routers support both a Primary “Private” and a Secondary “Guest” Wi-Fi® network.  This allows you to have two separate SSID’s, (the names of your Wi-Fi® networks), at the same time....

View Article


Image may be NSFW.
Clik here to view.

Securing the Home Network – Show me your MAC ID please

Every network device has a MAC (Media Access Control) address.  This unique twelve hexadecimal digit identifier is similar to either a phone number or social security number for your network equipment....

View Article

Image may be NSFW.
Clik here to view.

Securing the Home Network – Wi-Fi® Protected Setup™

Almost every modern day Wi-Fi® Router and Access Point supports Wi-Fi® Protected Setup™ which is an optional hardware method for quickly enabling security on a Wi-Fi® network.  As you may recall, you...

View Article

Image may be NSFW.
Clik here to view.

Securing your Home Network – Close the Ad-Hoc Wi-Fi® Backdoor

In an effort to make data sharing easy, many Wi-Fi® devices support both Infrastructure Mode connections and Ad-Hoc peer-to-peer connections.  Infrastructure mode is most common and is when a Wi-Fi®...

View Article


Image may be NSFW.
Clik here to view.

It’s 2013 – Do you know where your sensitive corporate data is?

Data File Security There was a time in the 1970’s through about 1995, before the modern Internet, when the person who managed your Information Technology could say with absolute certainty that he or...

View Article


Image may be NSFW.
Clik here to view.

Mobile Device Management – Containing The Mobile Invasion

Mobile Devices When Dorothy in the “Wizard of Oz” was walking through the Forrest, she exclaimed, “Lions and Tigers and Bears – Oh my.”    Trust me when I say that most Information Technology Staff...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images