IT Nota

  • Home
  • How To
  • .NET
  • WordPress
  • Contact

How to Create Key Pair Using Kleopatra (GnuPG)

If you need to find a free solution to encrypt file or email, Gpg4win (GNU Privacy Guard for Windows) may be more than enough encryption than what you need. It is a free software and pretty straightforward to install. Before you can use it though, you need to create a key pair first and this may be confusing to beginners. Here are the steps to generate a key pair in GPG4Win Kleopatra: Launch … [Read more...]

October 1, 2018 Filed Under: How To Tagged With: Information Security, Internet, Windows

Live Cyber Attacks Map

A live cyber attacks map from various companies may give you a different outlook on Internet security. Fire Eye Cyber Threat Map No longer available The explanation from Norse Security's website: "Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows … [Read more...]

July 7, 2014 Filed Under: Internet Tagged With: Information Security

Heartbleed Bug, What You Need to Do

For the past two years (since March 2012), millions of websites may have been leaking sensitive data due to a major flaw in the OpenSSL software that are used to encrypt and transmit Internet data. The Heartbleed bug as called by the researchers who discovered it, would enable hackers to obtain a compromised site's encryption keys, which makes all passing data basically available for them to … [Read more...]

April 10, 2014 Filed Under: Internet Tagged With: Information Security

How to Activate Google 2-Step Verification

With a huge increase in email accounts getting hacked, you need more than just a strong password to protect them. Fortunately for Gmail users, Google provides a "2-step verification" that will tell you by either sending a text message to your registered cell phone if someone tries to gain access to your email. This feature has been out for a while but many people are still not aware about it. … [Read more...]

May 26, 2012 Filed Under: How To Tagged With: Google, Information Security

  • « Previous Page
  • 1
  • 2
Buy me a coffee Support this site
Buy Me a Coffee?

Categories

  • .NET
  • Coding
  • Cybersecurity
  • Database
  • How To
  • Internet
  • Multimedia
  • Photography
  • Programming
  • Resources
  • Review
  • Tips and Tricks
  • Use Case
  • WordPress
  • Writing

Recent Posts

  • How to Check Installed .NET Framework Version
  • How to Remove .NET Runtime and SDK on Mac
  • How to Solve Intermittent 403 Error in IIS
  • How to Show Hidden Folders and Files in Mac Finder
  • How to Solve MS Office VBA Compile Error UserAuthentication

Recent Posts

  • How to Check Installed .NET Framework Version
  • How to Remove .NET Runtime and SDK on Mac
  • How to Solve Intermittent 403 Error in IIS
  • How to Show Hidden Folders and Files in Mac Finder
  • How to Solve MS Office VBA Compile Error UserAuthentication
  • RSS

Tags

.NET Access AdSense ASP.NET Cdonts Dll Classic ASP Code Editor ETL FSharp Genesis Framework Git Google HP Asset Manager HTML HTML5 Hugo IIS Information Security Internet Internet Information Services iOS JAMStack Linux macOS Microsoft Microsoft SQL Server MVC PHP Python Simple Mail Transfer Protocol Smtp Server Social Media SQL SQL Server SSIS SSMS SSRS Sublime Text Visual Studio Visual Studio Code VPN Windows Windows 8 Windows 10 Windows Server

Copyright © 2011-2022 IT Nota. All rights reserved. Terms of Use | Privacy Policy | Disclosure