The Western intellectual tradition establishes a set of individual rights and duties in society. It focuses on an individual and his or her society’s ends. […]
Digital Payment Privacy: Secure Methods for Online Transactions
The relationship between money and privacy has been fundamental to human commerce since the earliest civilizations. This essential connection between financial privacy and personal liberty […]
Smartphone Privacy: Essential Settings and Apps for Protection
The concept of personal privacy has evolved dramatically since its initial legal recognition in American jurisprudence during the late 19th century. What was once simply […]
IoT Security: Protecting Your Smart Home Devices
The concept of a connected home, while seemingly modern, has roots in early 20th-century futurism. The dream of automated, intelligent living spaces captured the imagination […]
USENET (Newsgroups)
Seeking refuge from commercialism on the Web, more people are turning back the technological clock to rediscover the Internet’s once-vibrant spirit of community. They’re going […]
Tools For Trouble-Free Computing
From the May 2002 issue of PC World magazine Maintaining a computer is much like maintaining a marriage–healthy ones require both regular attention and occasional […]
The Right To Privacy
The evolution of a right to privacy parallels the development of the humanist tradition. A right of privacy is predicated on the belief that each […]
Instant Messaging
In our fast-paced world, sometimes even the rapid response of e-mail is not fast enough. You have no way of knowing if the person you […]
Hard Drive Encryption
What is encryption? Encryption garbles your data by using irreversible mathematical functions. It is simply the encoding of data so that it cannot be read […]
Email Protection
You should encrypt your e-mail for the same reason that you don’t write all of your correspondence on the back of a post card. E-mail […]
Email Antivirus
ICSA Labs Virus Prevalence Survey 2001 found that 83% of viruses are transmitted via e-mail. Email borne viruses pose an extreme threat to you or […]