Cryptoucan™

In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Step-by-Step macOS setup for Thunderbird

As you’re watching/reading our how-to-guides, you may get stuck because you just simply cannot find the correct option, setting, button, tab… Unfortunately, Enigmail will set up itself automatically without asking you first – sometimes you’re lucky and it’s set up correctly, sometimes it’s like you’re using a totally different software. In today’s we will share with you our step-by-step guide to setting up Enigmail.

■ ■ ■