background preloader

Net Security

Facebook Twitter

Ethical hking. Qui accède à votre Google Drive, WhoHasAccess. Avec les services de travail en ligne et de partage de documents, il est aisé de donner accès à des fichiers à des personnes avec lesquelles on est en contact que ce soit à titre personnel ou professionnel.

Qui accède à votre Google Drive, WhoHasAccess

Google Drive comprend des fonctionnalités de partage assez étendues qui si on n'y prend pas garde peuvent engendrer des situations embarrassantes pour peu que la mauvaise personne accède à un document qui ne la concerne pas.WhoHasAccess est une application en ligne gratuite qui va examiner votre espace de stockage sur Google Drive pour produire un rapport complet qui va vous montrer qui accède précisément à quoi. Après avoir donné accès à l'application, l'analyse sur Google Drive débute. Selon le nombre de documents en ligne sur votre espace de travail, le processus est plus ou moins long. Un mail est envoyé pour signaler que l'analyse est terminée. 7 Reasons to Use a Third-Party DNS Service. Browser Slow? How to Make Google Chrome Fast Again. Have you noticed your usually speedy Google Chrome browser slowing down, or even crashing on you?

Browser Slow? How to Make Google Chrome Fast Again

Unnecessary plugins, extensions, and even browsing data can slow your browser down to a crawl, or make it crash. Here’s how to fix it. In this article, we’ll show you how to disable plugins and extensions and clear browsing data to speed up Chrome and prevent it from crashing on you. Disable Plugins By default, when you install Google Chrome, many unnecessary plugins are installed and enabled.

NOTE: You can safely disable every single plugin, but you may want to keep Flash enabled, as a lot of sites use Flash to display menus, show videos, etc. A list of installed plugins displays on the current tab. NOTE: Plugins cannot be deleted or uninstalled, only disabled. Disabled plugins turn gray in the list, and the Disable link for each disabled plugin becomes an Enable link, allowing you to enable the plugin again, if desired.

HTG Explains: Why You Don’t Need a Full Internet Security Suite. Internet security suites are big business.

HTG Explains: Why You Don’t Need a Full Internet Security Suite

Trial versions packed full of features come with most new Windows computers. They typically include powerful two-way firewalls, phishing filters, and cookie-scanning technology. But you don’t really need all these features. Internet security suites aren’t useless. Their antivirus protection is generally good, and they may have a few handy features. HTG Explains: Why You Shouldn’t Host an Open Wi-Fi Network. Open home Wi-Fi networks are still too common.

HTG Explains: Why You Shouldn’t Host an Open Wi-Fi Network

The situation has improved as wireless router manufacturers began shipping with wireless passwords enabled by default, but there are still too many unsecured Wi-Fi networks out there. Hosting an open Wi-Fi network can cause a number of problems for you, whether you’re trying to do a good deed by sharing your connection or just haven’t set up a password yet. Image Credit: Matt J Newman on Flickr Legal Problems Legal problems are probably the scariest possible consequence of hosting an open wireless network. Arrests: In 2011, a man was arrested for downloading child pornography. Neither of these is likely to happen, but they can happen.

Image Credit: Michael Whitney on Flickr Internet Connection Consequences. Lock Down Your Wi-Fi Network With Your Router’s Wireless Isolation Option. Some routers have a Wireless isolation, AP Isolation, Station Isolation, or Client Isolation feature that allows you to lock down your Wi-Fi network.

Lock Down Your Wi-Fi Network With Your Router’s Wireless Isolation Option

This feature is ideal for businesses with public Wi-Fi networks or anyone who’s just a bit paranoid. This feature confines and restricts clients connected to the Wi-Fi network. They can’t interact with devices connected to the more secure wired network, nor can they communicate with each other. They can only access the Internet. What This Feature Does On standard home routers with standard settings, every device connected to the router is considered part of the same local network and can communicate with each other device on that network. Lock Down Your Wi-Fi Network With Your Router’s Wireless Isolation Option. Silent Circle showcases new smartphone, tablet and enterprise-minded privacy platform. Silent Circle, makers of the security-minded Blackphone, has come to Mobile World Congress with a pair of new mobile devices and an update to PrivatOS.

Silent Circle showcases new smartphone, tablet and enterprise-minded privacy platform

The Blackphone 2 consists of a 5.5-inch, 1080p display that’s powered by an octa-core CPU and 3GB of RAM. There’s also 32GB of onboard storage, a microSD card slot and a larger battery. Pricing will likely be around the same as the current Blackphone, $629. The other device, known as Blackphone+, is a tablet that’ll feature a 7-inch display and a Qualcomm processor. It’s set to arrive during the second half of this year.

The bigger takeaway here is the enterprise focus. Silent Circle also introduced the first major update to its Android-based operating system. There’s also Silent Meeting, described as secure conference calling for multiple participants. HTG Explains: When Do You Need to Update Your Drivers? Talk to any tech person, read any forum, and at some point you’re sure to be told to update your drivers… but what does that really mean?

HTG Explains: When Do You Need to Update Your Drivers?

And is it necessary to compulsively update your drivers? Here’s our take.