Category Archives: Blog

Dumpster Diving

Dumpster Diving
Dumpster Diving Did you ever wonder what kinds of people dig through dumpsters in search of something of value? Their activity is called "dumpster diving," and although there are those who do it for such things as leftover food, furniture, and bottles, there are other people who in the last few years have turned trash [...]

4 Simple Things to Protect Yourself from the Equifax Breach

equifax breach

Understanding the Magnitude of Equifax Breach As you undoubtedly know by now, the Equifax breach affected 143 million Americans who’s personal data was compromised. Unfortunately, large-scale breaches are becoming so commonplace, people may not fully appreciate how devastating this hack was… and how much it can impact their personal lives. This article will delve into […]

Tunneling

Tunneling
What is Tunneling? In the computer networking sense, tunneling is a process of sending data – typically private communications – from one network to another through a public network such as the Internet. It is also known as port forwarding. How does tunneling work? Data is divided up into smaller fractions of information, called "packets," which [...]

Safe Internet Surfing Tips for Kids

Safe Internet Tips for Kids

Children need to be cautious on the Internet All children should be educated about a few common dangers on the Internet, and how to avoid falling prey to on-line crime and fraud. Maintain Your Privacy Be careful while signing up for a website or creating a profile. Ask an adult about what information you should divulge. […]

51 Proven Ways to Prevent College Identity Theft

identity theft in college

1. Be cautious of public computers Try to limit your usage on those computers to university-regulated sites and schoolwork. Don’t use them for anything to do with billing, and don’t forget to log off! 2. Don’t leave a paper trail Never leave any receipts behind. When you close your tab at the bar, take the […]