Tag Archives: technology/software/security

Link: Lavabit, the encrypted email once used by Snowden, returns to operation – SlashGear

Lavabit, the encrypted email once used by Snowden, returns to operation – SlashGear Back in 2013, when Edward Snowden blew the whistle on the US government’s mass surveillance programs, it was discovered that his preferred email provider was the encrypted … Continue reading

Posted in Delicious | Tagged , , , , , , , , , , | Leave a comment

Link: Lavabit, the encrypted email once used by Snowden, returns to operation – SlashGear

Lavabit, the encrypted email once used by Snowden, returns to operation – SlashGear Back in 2013, when Edward Snowden blew the whistle on the US government’s mass surveillance programs, it was discovered that his preferred email provider was the encrypted … Continue reading

Posted in Delicious | Tagged , , , , , , , , , , | Leave a comment

Link: Antivirus Firewall Software and SSL Certificate – Internet Security Software from Comodo

Antivirus Firewall Software and SSL Certificate – Internet Security Software from Comodo Comodo, the leading SSL Provider offers Free Antivirus, Internet Security, Firewall, Endpoint Security and other PC Security software for Windows & all OS

Posted in Delicious | Tagged , , , , , , , , | Leave a comment

Link: Download Free Security Software for Your Home Computer.

Download Free Security Software for Your Home Computer. Stay Secure by Updating Insecure Programs on Your Computer. Flexera Software Personal Software Inspector is a free computer security solution that identifies vulnerabilities in applications on private PCs

Posted in Delicious | Tagged , , , , , , | Leave a comment

Link: Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)

Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) Download the Enhanced Mitigation Experience Toolkit (EMET) from Microsoft and install it. Select the Use Recommended Settings option to enable recommended settings to protect commonly exploited programs like Internet … Continue reading

Posted in Delicious | Tagged , , , , , , , | Leave a comment