Cancer. The bastard disease of humankind that kills without hesitation, without prejudice. It is one of the most dreaded words […]
Active cybersecurity extends way beyond the companies we deal with, and right into our own homes. Take a moment right […]
Today will look at security and privacy between Apple iOS and Google Android including encryption, data privacy, and vulnerabilities.
The smell of hairspray fills the hotel room as I sit here planning what to do between dances. Little Dude […]
Little League baseball season is a special time of year. The smell of freshly cut grass, brick dust, and line […]
Apples to Androids is a new series that will help answer some questions about the switch from iOS to Android and approach the topic in an analytical way.
Social engineering remains one of the most effective tools in a hacker’s arsenal. Learn what it is and how to protect yourself.
The Essential Phone is a nice looking device, it is capable, and it is durable. But it’s nothing special. So stop the hype train, I want off.
There is a lot of time to waste and fun to be had in a Linux command terminal Here is my top 10 favorite little goodies to play with on my Linux machine.
This year, you are graduating. You have reached some kind of pinnacle of your academic career and you are soon going to be celebrating this achievement.