In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.

■ ■ ■

Security auditing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

■ ■ ■

Latest posts

Step-by-step Ubuntu personalization for Thunderbird

In this blog post we will show you what personal information is stored on Cryptoucan™ and how you can modify it using Thunderbird on Ubuntu. We’ve already published a video on this topic but we also wanted to provide a step-by-step guide in text form accompanied by pictures of each step.

■ ■ ■