Author: Aleksey

1 2 3 10 / 21 POSTS
How to Prevent Mobile Malware

How to Prevent Mobile Malware

Malware is short for Malicious softWare, which is designed to damage or even disrupt the computer. The array of malware ranges from spyware to key log [...]
A parental guide to cyber bullying, and just bullying

A parental guide to cyber bullying, and just bullying

Bullying is just that; it's only in more recent years that 'cyber bullying' has become prevalent. Bullying is bullying, irrespective of age it's been [...]
Darkest web – TOR and THS (Tor Hidden Services)

Darkest web – TOR and THS (Tor Hidden Services)

As part of my ongoing research on the internet, its content and the varied ways that people will go to. In itself is a reflection of how humanity has [...]
How to Secure Your Computer or Laptop

How to Secure Your Computer or Laptop

No doubt, computer has become an essential part of our daily lives. You get almost everything done online (or wish to do even when can't) via your com [...]
What is Dark Web, how to access it and what’s the difference between Dark and Deep Web?

What is Dark Web, how to access it and what’s the difference between Dark and Deep Web?

Three "deep" questions you may wish to ponder yourself on, what are these and maybe what is the relationship? For me, something dark always conjure [...]
Secure communication with ultimate tips from experts

Secure communication with ultimate tips from experts

Given the explosion and pace of technology, ensuring your privacy is underlined by integrity could make you feel 'paranoid'. However what's paramount [...]
10 best SSL certificate providers

10 best SSL certificate providers

You are on lookup of the top SSL providers, right? Well, I surely will get you there but let's cover some basics together first. So, what does the acr [...]
LinkedIn scams to look out and how to avoid them

LinkedIn scams to look out and how to avoid them

Long before we had the internet and email, and the word 'Scam' came into use, we weren't  aware of what it was known then. Certainly going back many y [...]
10 critical computer security changes that took place in last 10 years

10 critical computer security changes that took place in last 10 years

A strange way to start an article, with a quick precis on history, bear with me and all will be revealed… What does history tell us: Genghis Khan [...]
Ways how one can get arrested while using the Internet

Ways how one can get arrested while using the Internet

Considering the title for this article, it evokes many ways this could be possible. However, as with all articles, you need a starting point, so I've [...]
1 2 3 10 / 21 POSTS