Posts by: Konstantin Boyandin

January 8, 2015
| Articles

Sending Email Securely: How to Avoid Blacklisting

Email was, is and will be one of primary communication means on the Net, for years to come.   (more…)
December 8, 2014
| Articles

You’ve Just Been Erased

Data can be different, talking of whether we wish to keep it, or whether we wish to have it reliably destroyed.   Both can be a challenge; at the moment, let's talk about destroying data reliably,…
December 1, 2014
| Articles

GNU Privacy Guard: Lock, Stock and Barrel of Security

Cryptography can look like rocket science: unless you wish to sacrifice reliability and real security, it's pure mathematics - well beyond whatever we all could study in school.   (more…)
November 25, 2014
| Articles

Green Light for Black Friday

Black Friday is always much anticipated – it brings advantages to both merchants and their customers. It never lasts for one day, of course; anyone who knows this frenzy will be glad to experience it again…
November 12, 2014
| Articles

Forever Public: Your Data on the Net

All data placed on the Net is extremely hard to eliminate. Access to private information and behavioral patterns tell more about us than we'd like to reveal.   (more…)
October 30, 2014
| Articles

Why Hackers are Scarier Than Zombies?

Halloween is upon us; all kind of horrors stalk the Earth. However, there's a threat much more dangerous than zombies and other creatures roaming the world. What I have in mind is... hackers. (more…)
October 21, 2014
| Articles

Common Security Pitfalls: 12 Rules to Keep Data Safe

If you ask a hundred experts about the main rules of data security, you risk to receive a hundred sets of rules. Even though they boil down to quite a few, the approaches can be…
October 9, 2014
| Articles

Steganography: Hide and Seek Games

Security is often associated with something hard to crack, extremely reliable, impenetrable. The above could relate to, for example, encryption, when talking about information security.   (more…)
September 25, 2014
| Articles, VPS Hosting

Intrusion Detection: Foresee Problems

In real life, in most cases it's hard to penetrate a secured area without leaving no traces altogether. (more…)
September 15, 2014
| Articles, VPS Hosting

Port Knocking: Unseen Security

Security through obscurity is considered weak by itself. If the only problem to find the key is to look under a nearby carpet, it's not much of a security. (more…)
August 21, 2014
| Articles, VPS Hosting

First Things First: Harden Security On Your New Linux VPS

Information security isn't rocket science: the basics can be understood and easily followed by everyone. If you embark on using your own VPS for whatever goals you wish to achieve, making your server secure is…
August 7, 2014
| Articles, VPS Hosting

Debian, Ubuntu or CentOS: Choose a Proper OS for Your Server

The choice of OS is most important choice, when planning to set up a new dedicated server, or virtual machine. Nowadays a user can choose from a variety of free OS of several versions and…