Linux and Unix-based operating systems are more common than you might realize. MacOS and iOS for Apple devices are built on BSD Unix, and Android, the most popular mobile operating system, is based on Linux. Linux powers the infrastructure…
Author: Ben Marolt
Should I use a VPN?
Virtual Private Networks, or VPNs, are being constantly advertised as the best way to get privacy and security online. However, there are times when using a VPN may not be the best option, and in some cases, it can actually be a hazard to privacy, and a false promise for security. One common expectation is…
Is Linux for me?
If you’re tired of Windows problems or simply don’t want to be locked into the Apple brand, Linux may be a great alternative operating system for your home computer. With a wide variety of “flavors” (known as distros) available, Linux offers something for everyone, from cutting-edge distributions like Arch Linux to beginner-friendly options like Ubuntu,…
Why You Should Make Your Website Responsive
You spent plenty of hours working on your mobile site, getting it just right, only to discover Google is penalizing both your mobile and desktop sites because of coding issues that flags duplicate content. While Google is generally good about recognizing the difference between mobile and desktop sites, it is entirely possible to encounter some…
What Your Business Should Know About Choosing a VPN
proxyMore than 600 data breaches occurred in the U.S. last year, as well as nearly 50,000 reported security incidents, according to an annual Verizon report. A large portion of those breaches were accomplished on mobile devices, and with public Wi-Fi everywhere you turn, a VPN could make or break your data security. Photo by Ludovic.ferre…
Business and Government Get Hit by Identity Theft, Too
Banks lose millions of dollars every year by having to compensate identity theft victims, and so they’re developing new ways for consumers to protect themselves. While banks, governments and corporations are working hard to lessen the impact of identity theft, the bulk of the responsibility still falls upon the consumer. Have you ever been a victim of identity theft? How did it affect you?
How Cloud Computing Is Changing Consumer Electronics
The cloud is taking over our favorite mobile devices. Apple was one of the first to jump on the cloud computing bandwagon, and if you have any of their products, from an iPhone to an iPad, you have “the cloud.” It is convenient from the standpoint that an old email from six months ago, that…