Privacy Versus Security

Lately the far left, the Democrats, certain left wing celebrities, ultra liberal newspaper reporters and editors and network news reporters and commentators have been ranting and raving about how President Bush has illegally taken away our right to privacy by signing an Executive Order allowing the National Security Agency to intercept certain communications between people of interest, in the United States, and people in certain other countries. Many of the foregoing are even saying that the President should be impeached. Some are comparing him to Richard Nixon or worse.

10 Dating Safety Tips For Online And Off

Still looking for a special someone? Just be sure to keep yourself safe. Here are ten ways to find love for your heart but keep your personal protection on your mind.

1. Watch out for someone who seems too good to be true. Begin by communicating solely by email, then look for odd behavior or inconsistencies. The person at the other end may not be who or what he says he is. Trust your instincts. If anything makes you uncomfortable, walk away for your safety and protection.

How to manage your password smartly

Web users have gotten used to signing up to dozens of websites to enjoy free services. However, the dozens of online identities are increasingly getting out of hand. Learn how to use password manager to manage your multiple online identities.

Landlords! Screen Your Tenants!

The most powerful weapon of the wise landlord is a background check. A background check of many types can be supplied by a number of firms which specialize in collecting the information which paint a valid picture of a person’s background, most specifically their
criminal background.

Fake Credit Card Numbers Mean Safer Online Shopping

Isn’t That Illegal?

Yes, using credit cards fraudulently is illegal. This article is absolutely not suggesting that you make up and use a credit card number. You should also never use credit cards belonging to other people.

Below is a summary of new services the credit card companies have created to make online credit card use more secure.

How Does It Work?

It is more appropriate to use the terms “temporary credit card numbers” or “single-use credit card numbe…

Public-Key SSH Login

SSH is a popular system allowing a remote shell (command interpreter) to be used over a secure connection. By secure, here, I mean that the connection is encrypted, authenticated and integrity checked. The encryption prevents attackers reading the contents of the data being transmitted, the