What are you looking for?

The Latest Episodes

What Can Happen If You Remove The CMOS Battery?
Do Not Remove Your CMOS Battery

Learn why the CMOS battery is so important to your computer.

Read more

How Vulnerable Is Two-Factor Authentication?
How Technology And End Users Render 2FA Weak

Learn why you as an End User and Technology render 2FA weaker by favoring convenience over security

Read more

Your Operating System Cannot Tell A Human or Robot Apart
Not every keyboard, is actually a keyboard

Learn how the HID poses a security risk to all operating systems.

Read more

Eco-Friendly Computer After-Life
Functioning Computer Being Replaced, What Can I Do With It?

Learn about the many ways you can repurpose your old computer instead of putting it into the trash.

Read more

The Dangers of RAT, Remote Access Trojans
How Remote Access Trojans Function

Learn about Remote Access Trojans, and all the associated dangers with them

Read more