Want To Stop Google from Tracking Your Android Devices?

stop google tracking android

You go to a restaurant or shopping at the store. When you arrive home, you get a message on your phone saying "Hey, we noticed you were at (fill in the blank). Tell us about your visit." How uber-creepy is that? Your phone knows where you just were. And, more…

Read More

What Is Green Information Technology?

green information technology

So much of our global energy is now being spent on internet technology, with the majority of our industrial, business and personal work slowly being shifted online and onto electronic devices. As this IT-focused trend simply looks to be on the rise, especially with the Internet of Things being steadily…

Read More

What Happens When Proxy Servers Are Used In Kerberos Authenticated Environments?

proxy servers Kerberos Authenticated Environments

Using proxy servers is already one level more complicated than regular Internet usage. But adding a Kerberos authenticated environment into the mix just makes it even more complex. If this is something that you need to do in your organization, you may wish to know more about how it works…

Read More

What You Need To Know About Information Security Policies

information security policies

The purpose of a policy is to serve as an implementation roadmap, offer guidance for key decision makers, shape behavior, and codify guiding principles. When it comes to information security policies, they often serve as directives that define how an organization should protect its information systems, information assets, ensure compliance…

Read More

Understanding The Importance Of Having A Proxy-Based Architecture

proxy-based architecture

Proxy also means in place of. In the Information Technology world, proxy is a concept that is often associated with anonymous web browsing and private proxy servers. When it comes to online security, a proxy-based architecture is central to one's efforts of enforcing policies equally for all users, on all…

Read More