By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer...
Search Results
AT&T Data Breach and Hack: What Does it Mean to Me?
AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers...
Computer Forensics Glossary
Computer Forensics GlossaryNote: The terms in this glossary may have other uses in other fields. The uses discussed here are for general use in...
Printers and Copiers Left Out the FBI’s Search of Trump’s Mar-A-Lago
Printers and Copiers Left Out of the FBI’s Search of Trump’s Mar-A-Lago copyright, 2022, Steve Burgess We’ve only recently learned the content of...
Email spoofing, scamming, and hacking
Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at...
Can You Browse the Internet in Secrecy? Part 2: The Experiment
By Jessica Riccio In part one, we defined private browsing and discussed its history. We covered places where various browsers store browsing...
Curriculum Vitae
Curriculum Vitae Expert in most computer hardware, peripherals and operating systems and many applications. Specialist in digital, mobile, &...
How to Avoid Being Hacked, Part 1 – Email
How to Avoid Being Hacked, Part 1 - Email Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically...
Cybersecurity & Covid-19: Vulnerability and What to Do About It
Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of...
Computer Hoaxes for the Beginner
Can you say, "hoax?" With the advent of email, one person can send millions of messages. With the help of willing accomplice friends, a single hoax...