I think that https is necessary in ALL cases in which you care about your data being readable only by the legitimate recepient (read it...
Hi Kees1958. Looking at your wireless setup, I would like to post my opinion about it. For the use of you, and every other reader of the forum:...
Not really, if in the dictionary used for attack contains a list of internet addresses... and if it does, it is likely that it contains internet...
Actually, I have taken more time to learn about XeroBank services than I took about learning about others' services; just, nowhere on the site I...
It is a possible alternative to installing TOR and TOR button on your machine. It is probably more secure than any service that claims to give you...
There is no such thing as a "leak proof" software. Software is coded by humans, and since there is no perfect human, there is no perfect software....
Yes, WPA is secure enough. What changes from WPA to WPA2 is the encryption algorithm, from TKIP to AES. Although the second is considered more...
I am new to this forum (not to security.... just to this forum), and I am being really amused. I didn't know this XeroBank before few hours ago,...
THIS is what Bruce Schneier would call SnakeOil (http://www.schneier.com/crypto-gram-9902.html#snakeoil)... somebody should point this out to...
IMHO, the password you are providing (W/i/l/d/e/r/s/s/e/c/u/r/i/t/y), still being more secure than just "Wilderssecurity" (and not just because of...
This is my frist post on here, so HELLO to everybody! Yes, TOR will do the same. Since TOR encrypts all data between the client (your laptop...
Separate names with a comma.