This entry is part 4 of 4 in the series
Security Private Networks – Public Internet – What is the difference? Preface
In this series of articles, I have been
developing a plan for a low-cost video surveillance system for your home. Continue reading Tagged connected home, firewall, hackers, ip, ip address, personal data, port, port number, privacy, private network, public network, router Secure Connections I recently purchased an SSL (Secure Sockets Layer) Certificate for this (and all my websites). So, what does that mean to you, as a user? Secure connections to this site assure that any private information that you share on the site will be encrypted from your browser to … Continue reading Tagged ca, cert, certificate, contact, donation, encrypt, https, login, public wifi, secure, Secure Sockets Layer, ssl
This entry is part 3 of 4 in the series
Security Network Router Guide Network Router Functions: This network router guide describes some of the many functions of your router: It serves as the local “node” for the Wide Area Network (WAN), which is generally … Continue reading
This entry is part 2 of 4 in the series
Security Video Security Part 2 – security camera setup This is part 2. See the 1st article here. This guide is for the Foscam IP Security Camera. Mine is a Continue reading
This entry is part 1 of 4 in the series
Security Intro to Video Security This is the first article in this series. Look for additional articles in the coming days. I live in a rural area and I have been looking for a good security system that … Continue reading
The Nymi bracelet lets you use your unique cardiac rhythm to wirelessly authenticate your identity to your smartphone, car and so much more.
Continue reading Network security is ALMOST as important as physical security in today’s environment. So, what can a person do to keep snoopers from stealing their identity while they are using a public Internet hotspot? Continue reading
Advice to a friend about how to remove malicious software (specifically “Personal Security”) from their computer. Includes links to appropriate removal/protection software.