Categories
tech user security

A Novice’s Guide To Selecting Good Email Encryption

What Are The Main Things You Want From Email Encryption? Well the list will be different I guess for everyone, but what I intend to provide here is a basic set of requirements for novices to email encryption and where you might obtain them from. Happy? Read on! You’re an expert and know it all? […]

Categories
daily geeky Systems Administration tech user security

Self Signed Certificates in Exchange 2010

My certificates expired recently on my Exchange server and I had to set about renewing them. Not fun, more on that later. I was going to make a long how to on this but Microsoft has a wiki post on TechNet about this very subject with pictures and explanations. How to use a self signed […]

Categories
tech user security

PGP Encryption – A very basic overview.

As an IT guy I get a lot of questions about all kinds of topics, and lately security is pretty high on people’s minds. One of the biggest questions I get is secure communication and how it works. So here’s a very basic overview on PGP encryption which will tie into e-mail communication. What is […]

Categories
Home Technology tech user security

How to Set up A Router for Home WiFi

People ask me occasionally about how to set up WiFi and make sure it’s secure. It’s not something that is easy to explain in person, it takes illustrations. So I’ve compiled it here. First off, I suggest Linksys routers. If you don’t have one, go get a Linksys E2000 router. You can find them at […]

Categories
cyberoam daily firewall tech user security

Create Facebook Schedule With Cyberoam

I’ve noticed a lot of people asking about how to schedule when a user can or can’t use Facebook. This is pretty easy to do in Cyberoam, you can either do it globally, or on a per user basis. I’ll show you how to do this on a global basis. If you want to do this […]