When you connect your Apple iPhone or iPad to your computer, iTunes automatically starts and you can select to synchronise the device with your PC so that any music, emails, photographs etc that are on one device are transferred to the other. It is also possible to take a full backup of the content of […]
Password Security
A basic security requirement to attempting to ensure the security of a computer system is the user password. There are different aspects of password security that can be used in order to make the unauthorised access of a user account more difficult. Within a Windows based system, these settings are available within the Password Policy […]
Virtual Private Network – VPN
What is a VPN (Virtual Private Network)? A Virtual Private Network (VPN) provides privacy and anonymity online as it provides the user with a private network even when they are using a public internet connection. The VPN provides the online user with a screen making the online actions and activities private. The VPN also provides […]
Inaccurate Location Exif Data within an iPhone Photograph
Location Information within Photographs iPhone iOS and Android mobile phones both include location information within any photographs taken by default. When a photograph is taken, the mobile phone includes various exif information including the time and date it was taken, the make and model of the phone used, the operating system version of the phone […]
Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
What is Secure Sockets Layer (SSL) Encryption? Secure Sockets Layer Encryption was originally developed by Netscape and uses two keys to encrypt data, a public key that is known to all and a private key that is provided only to the recipient. The public key is provided within a digital certificate and this also provides […]