Wednesday, 4 May 2011

Deleting your personal information before selling your computer

So you’ve decided to sell your computer, I guess you’ll be wanting to erase all your personal information before you let it out of your hands then?!

I'm going to assume that most of you are Windows users so this guide is tailored to it. Now you have two main options before you sell your computer, one is to completely erase the hard drive, the other is to only erase specific personal files securely. Both methods use free software available to download from the internet.....

Thursday, 13 January 2011

How to generate, use and remember a strong password or passphrase

We use passwords every day and on lots of different systems, so its not surprising that it’s a bit confusing trying to choose unique, strong passwords that can be easily remembered. In this post we’ll first deal with the criteria of a fairly good password then we’ll look at a few tips to help you choose good passwords that you can easily remember....

Wednesday, 29 December 2010

Getting Started with Computer Hacking

I often get asked questions around how I became an Ethical Hacker & Penetration Tester and I usually bore the person that asks by explaining how I made a transition from a more traditional role of the systems analysis through to information security by a combination of luck, judgement, self teaching and of course some qualifications along the way.
Now I’m sure that my short bio is absolutely entrancing but I’m guessing that when people really ask that question they are in fact asking ‘How do I learn to hack computers?’ or ‘How do I become a hacker?’

Thursday, 10 December 2009

Mobile Phone Security – Yes, phones can get viruses too...

So we've already looked at WiFi security and securing your home computer, now we'll get around to something that pretty much everyone has only a few feet away from them at most times, your mobile phone. This does not offer any guarantee and accepts no liability - Its free impartial advice, because I'm nice like that !

Wednesday, 9 December 2009

Securing Your Home Computer – Antivirus, Firewalls... What do I need & why?

Today we'll look at keeping your computer as secure as possible.
We've already looked briefly at securing your WiFi connection to the internet, so now we need to know how to secure the devices that are connected to it. These devices will typically be computers, games consoles and mobile phones.  This does not offer any guarantee and accepts no liability - Its free impartial advice, because I'm nice like that !

Monday, 7 December 2009

WiFi - Do you want your neighbors to see what your doing?!

Wireless routers are very common and allow you to connect your laptop, mobile phones and various other devices to your internet connection. Wireless networking (WiFi) works using a radio signal which means that anyone can 'tune in' and listen to the data, such as your email, traveling across the airwaves.
Most home WiFi routers have a range of up to about 120 feet, so the signal could easily reach as far as your neighbours and the street outside your house. This means that unless you have encryption and a password on your wireless internet connection ANYONE could potentially be watching your every move on-line without you ever knowing about it.