Press "Enter" to skip to content

Posts published in “Security”

Securing Email

Email communication is one of the increasingly popular means of passing information and messages from one party to another over the internet and is known…

Securing Distributed Information Systems

Distributed information systems are the systems that do not reside on a single server but instead run on several connected servers which are arranged in…

Securing Browser Sessions

Any browser session that you establish between your internet browser and a website online has to stay secure and keeping it secure requires that you…

Securing Databases

Databases are sensitive applications that are used to store information and act as a point for reference for huge applications such as modern eCommerce applications…

Securing Cyberspace

Cyberspace is where information is always moving around and it does so at a huge rate and this means that there is always tons of…

Securing Android Devices

Android devices are small handheld devices that are used on a daily basis by users who interact with information from the internet and other applications…

Secure your Smart Home from your Device

Your device is a powerful tool to use in the securing of your smart home. For instance, you can use it to change the codes…

Secure Web Browsing

Secure web browsing is important to ensure that the user gets to have a secure session in which to exchange information with a web server…

Secure vs. Unsecure Browsing Sessions

An internet user usually needs to establish a session in order to be able to share information with the webserver that hosts the website they…

Secure Mail

Mail that is secure has got a number of properties that are so much different from the general mail that has not been secured. For…