Some Great Hurricane Monitoring Tools for ios

I just finished a post at my sister site vsatrends that discusses a lot of great tools for ios to use in monitoring Irma. Because this information is critical and timely, and because I have completely different followers for each site, I decided to share the link to this article with my vsatips readers too. So, here’s the link to my article on vsatrends.

Posted in Tech Tips | Leave a comment

How to Watch Apple’s iPhone 8 Live Event on September 12, 2017

Apple’s Live Event Is Tuesday September 12 at 12 Noon Central Time

Some of the new is 11 wallpapers

Above:  Some of the new ios 11 wallpapers which you can download at 9to5mac

New iPhones 7s  7s+  8 | Watch 3 | ios 11 | Are the New Product Launches Expected

Apple Live Event Announcement

Main Time is 10am PDT , 1 pm EDT, 6pm UK Time, and 12:30am IST

It’s no secret I’m a huge Apple fan…but then its no secret I love Android and Windows too. I’m a bit of an aberration within my own social realms, but that doesn’t prevent me from taking every opportunity to narrow that divide a little. Sharing Apple’s upcoming live event is one way I try. I always make the effort to watch most of Apple’s live stream events but I realized this time that maybe other’s would like to watch them too. After all..rumors surrounding the iPhone 8 being very special because it’s Apple’s 10th anniversary of the iPhone have been bouncing around the internet since shortly after the iPhone 7 was launched last year at this time.

If you’re interested in watching the livestream you’ll find that, just like anything, it’s easy if you know where to go and what tools to use.

That’s my 2nd reason for writing this short post…to include a simple set of instructions for watching the Apple Livestream.

Below:  Exactly which Apple devices can watch the livestream, live

Requirements: Live streaming uses Apple’s HTTP Live Streaming (HLS) technology. HLS requires an iPhone, iPad, or iPod touch with Safari on iOS 9.0 or later, a Mac with Safari on macOS v10.11 or later, or a PC with Microsoft Edge on Windows 10. Streaming via Apple TV requires an Apple TV (2nd or 3rd generation) with software 6.2 or later or an Apple TV (4th generation).

You Can Easily Watch Using an Apple Computer, iPad or iPhone (or iPod) or Apple TV

If you use Apple devices you’ve got it made. Apple makes it very easy for their customers to watch their livestreams as long as your device meets the requirements shown in the screenshot above. The simplest way to watch Apple’s livestream for any of their keystone events is simply by visiting the website they’ve designated for this.

This is the Link to Apple’s Website to Watch Tuesday’s Live Events

The link above will always take you to a livestream that’s already in progress. It will also take you to Apple video’s of their most recent livestream.

But What if Your Apple Device is Older or You Don’t Have One?

You can still watch it but there will need to be a little bit of preplanning involved.

One option you have is to download a little program called VLC Steam, which will enable your nonApple device to also watch the live event. You can read more about it in these articles by or HowtoGeekOr, you could watch on of the news sites that covers it like CNET’S Apple Byte’s program on YouTube.

Last, if you’re on Twitter, you could just search for the #Apple Live or #iPhone8 and more than likely you’ll find someone who’s ‘illegally’ rebroadcasting the stream. It’s not really illegal in the legal sense I suspect…but Apple doesn’t want people to rebroadcast it.

Incidentally, while writing this  I learned that when Apple publishes the video of their live events…usually later the same day that they occurred…their video footage is broadcast in full 1080p…which is a much better resolution than the one they livestream their event in. So, if you’re patient you can watch a much better version of their live video by visiting the same link as the one that I gave you for the actual live stream.

Extra Resources to Learn More Information

What May Be Announced Tomorrow

If you’re super excited and can’t wait until tomorrow here’s a video of what you can expect from CNET’S Apple Bytes broadcast. They’ll begin covering the event on YouTube 1 hour before the broadcast begins:

In this ‘Cult of Mac’ Article the new iPhone’s availability, or lack thereof is discussed as speculation about material shortages for the OLED screens abound.

And if you’re as interested as me you’ll also want to be one of the first people in the world to order the new iPhone. In which case you can read one of my first posts ever written on how I accidentally discovered the way to be one of the first people in the world to order a newly released Apple device.

Above:  A few of Apple’s Recent Live Events

Don’t Forget About ios 11

Don’t forget that in addition to the new iPhones, Apple will be rolling out a brand spanking new ios too…ios 11. Every September Apple says that their new ios is a revolutionary upgrade. Almost every single time this has proven to be more a case of ‘wishful thinking’ than ‘inspired coding.’  So, let’s hope that they say it this year…because they would finally be right!

The good news here is that there are a ton of brilliant new features…like the ability to record your screen’s activity now thereby creating a video using the recording. You can learn more about that here. The bad news of course is the learning curve…which is a significant one this time around.

For some odd reason Apple’s once again mistakenly leaked something. This time it’s what they call their ‘Gold Master, or final edition of ios 11 a few days ago. You can both read and watch more about that in 9to5 Mac’s article. You can also download many of the brilliant new wallpapers that will come on the new iPhones and ios 11.

More Resources to View Previous Apple Live Events

Here’s a link to watch some of their more recent events (beginning in 2016)

Here’s a link to all of the Apple Live Events Available for streaming today via the Podcast App

Below:  Apple’s Podcast for their Keynote Events


If you’d like to read other’s comments, (assuming there are any,) leave a comment yourself, or ask a question…please do so by scrolling way down this page…past my bio, past the WordPress ads, and past the Related Posts section…to the little Comment box.

Posted in Apple, Apple Devices, Tech Tips | Tagged , , , , , , , , | Leave a comment

How to Setup Siri for Spoken Caller ID on ios 10 | How to Add or Remove Devices for WiFi Calling

At the end of this post look for a video I embedded of a favorite YouTuber ZoneofTech discussing what Apple’s September 12th Live Keynote will entail.

This is what the app looks like.

Introduction to Call Announcements ios 10

I was pretty surprised to discover today that there’s a feature of ios 10 I almost missed shortly before ios 11 is launched. Call Announcements or Talking Caller ID. This neat feature appears to have flown under the radar for a lot of iPhone users. More importantly it also applies to iPad users too as long as you’ve enabled phone calls to be routed to your iPad as well. Since I use both I’ll run through how to setup this up on both devices.

Having callers announced out loud to you can come in really handy if you usually find yourself in situations that make it difficult to drop everything instantly and answer the phone as soon as it rings. It gives you the opportunity to either answer quickly to arrange a callback in a few minutes…or to decide if you even want to talk to the caller. Regardless of the type of phone call involved…in my family, no one ever seems to actually answer a phone call immediately. I really think it’s generally just a timing thing. Because what almost always occurs is that someone calls someone else…they don’t answer so they leave a short message…and the callee calls back within 5 minutes without ever having listened to the actual message. I’ve always wondered if that’s pretty typical or not…if you can shed any light on it let me know in the comments way down at the bottom of the page.

How Answering Calls Works With Our LandLine System

At home we have a nifty little device that plugs into one of our cordless telephone bases and announces out loud who’s calling whenever our landline telephone rings. This is great for me because I’m the most time challenged member of my family! When it comes to answering phone calls it’s difficult for me to act immediately for one of 2 reasons. Either I’m in the middle of writing something and tearing myself away mid-sentence has more negative consequences than waiting until I’ve completed my thought does. 2nd, no matter how quickly I may act, I rarely can physically make it to the phone to answer the call before it’s gone to voicemail.

So, we’ve setup our answering machine to allow 6 rings before it kicks in to answer. 6 rings is a great number to use because it gives me time to get within hearing range of the talking caller ID and find out who’s calling. Also, I’ve learned that it’s a good number to use for blocking out most telemarketing calls. Most telemarketers will hang up after 4 rings (or really on the 4th ring,) I suspect because that’s the default number of rings that most answering systems are setup for out of the box.

I’ve always wished I could setup a similar arrangement for incoming cell phone calls. It turns out I can…sort of!

How to Enable Call Anouncements on iPhone

The steps are pretty simple…I’m not entirely sure why this seems to have flown completely under the radar for almost a year…and in fact just a few weeks prior to the launch of ios 11!

iPhone Setup

Go to Settings – Phone – Announce Calls – then Select either:

  • Always
  • Only While Using Headphones in your car
  • Only While Headphones period
  • Never

iPad Setup

Go to Settings – FaceTime – First Make Sure ‘Calls from iPhone‘ is Turned On – Then Drag the Right Side of the ‘Settings’ Screen Up to Go To ‘Announce Calls‘ at the Bottom of the Page –  Turn this On – Then Select Either:

  • Always
  • Only While Using Headphones in your car
  • Only While Headphones period
  • Never

That’s all there is to it! Now, whenever someone calls you you’ll have a spoken Caller ID message announcing the caller.

How to Enable WiFi Calling

In some of the screenshots above the purple arrows show you were to find WiFi Calling Settings on your iPhone. When you enable WiFi Calling your iPhone will use any WiFi it’s connected to to improve the quality of the phone call if you happen to not have a great cell phone signal wherever you may be.

Here’s a link to Apple’s instructions for setting up WiFi Calling.

I also made a PDF of the steps you can download here.

How to Remove A Device to Free Up Space for ios WiFi Calling

If you happen to get a new device that you want to setup WiFi Calling for and you get an error message telling you that you’ve registered the maximum number of devices allowed to you for WiFi Calling…follow the instructions in the screenshot below.

ZoneofTech’s Video Discusses


If you’d like to read other’s comments, or leave a comment yourself, please do so by scrolling way down this page…past my bio, past the WordPress ads, and past the Related Posts section…to the little Comments box.

Look for something that resembles this:

Posted in Apple apps, iPhone Tips, Tech Tips | Tagged , , , , , , , , , | Leave a comment

What Hacker’s Don’t Want You to Know About Firewalls

Firewall Series: Part 1

A Beginner's Guide to Firewalls Graphic

Introduction to My Firewall Series

This post begins a new series of articles in which I discuss pretty much every aspect of Firewalls there is to discuss. What firewalls are, who should use them (spoiler alert: the answer is EVERYONE,) and how one should go about finding a good one. In the final analysis there will be a lot of information and advice conveyed in this series. Including information about protecting your home (or your small business) computer network, your data, your family members or employees, your communications…pretty much all information pertaining to you and your life.

Please feel free to republish or share this content with others…as long as you make sure to include where you got it from :-) because it’s such an important topic. I embarked upon writing it when I discovered that not very many people really understand firewalls at all…much less understand how they should go about utilizing them to protect themselves.

My word clouds using firewall terms didn't prove to be my primary procrastinational deterrent...but they really didn't help much either :-/

My word clouds using firewall terms didn’t prove to be my primary procrastinational deterrent…but they really didn’t help much either :-/

Why I Decided to Write This Beginner’s Guide to Firewalls

I originally began vsatips for one reason…to keep friends and family up-to-date and knowledgeable about threats to their computers and their networks. Since the inception of vsatips, and it’s predecessor, my HubPages blog, the cyber world has changed drastically. I rarely touch a computer these days because my own has been unbootable for over a year (don’t ask, it’s a long story…but the short answer is that I just need to spend some time working on it.)

What I mean by my statement above is that the cyber world has changed so much that now, in 2017, pretty much everyone from teenagers on up age-wise carries a tiny computer around with them in either their pocket or their purse. I really love the fact that anyone can Google almost anything…anyplace or anytime. I believe this is making us smarter and more capable as a society, because I know that’s what the effect of this has been on me personally.

But, along with this ‘instant access to knowledge’ comes greater risks too. Never before in our world’s history have individuals been so exposed and to such a high degree because the sheer number of risks has increased so dramatically. Although the risks I’m talking about haven’t been of the fatal variety more common in historic times, that fact is rapidly changing as the Internet of Things is gaining a foothold on our lives…making these risks undeniably significant.

To date, they’ve primarily taken their toll in 2 ways: monetary risks or emotional risks…frequently both occur simultaneously. I’ve become a passionate advocate for internet safety because I learned the hard way what happens when networks aren’t well protected. You can read more about that in a post I wrote as an addendum to the ‘about me’ page on my site. This story recounts my family’s experiences when our home network was taken over by a botnet.

For about a year and a half's timeframe the botnet that took over my family's network wreaked utter havoc and dischord.

For about a year and a half’s timeframe the botnet that took-over
my family’s network wreaked utter havoc and dischord.

 I think it bears repeating that since the time when our botnet invasion occurred the sheer volume of risks our society faces has grown and continues to grow exponentially. This is a frightening thought all on its own. Yet despite those sky-rocketing risks, our own dependence upon all of the interconnected benefits that the World Wide Web brings us continues to grow at an equal if not faster rate.

One Example of How the Internet has Become So Completely Intertwined in Our Daily Lives in a Way That’s Not So Obvious

I’ve been writing a primer for ‘cutting the cord‘ to expensive television programming services during the last several months. It’s the 2nd part in a series of what will probably be 3 articles. If you’re interested you can read Part I which discusses the financial reasons we decided to ‘cut the cord.’ Part II frankly has grown so long that I considered publishing it as an ebook. It describes the nuts and bolts of the whole cord cutting process. As Part II neared completion I continued to tweak certain sections…especially those related to home networks.

Ultimately I wrote a shorter…very brief overview of the exact same content because several people I know asked me to finish it…and I didn’t feel it was ready for prime time yet. Here’s a link to that if you’re interested…it basically describes our setup and the hardware we decided upon. But really, successful ‘cord cutting’ relies very heavily upon the internet. Which means that having a network that functions well and is fortified against threats is of the utmost importance. But…ours wasn’t (and sadly, still isn’t) really functioning all that well…despite my having spent significant time and money addressing it’s needs…although frankly, our ‘Cord Cutting’ experience hasn’t suffered as much as I feared it may.

The Decision I Made Today to Publish This Topic Broken Down into Smaller Parts

This Firewall post was originally titled ‘The Complete Beginner’s Guide to Firewall Hardware & Cyber Threats in 2017.’ While that’s a fairly ambitious title…the article’s content does rise to the challenge. But getting such a long post into it’s grammatically correct and ‘perfect’ final form has proven to be a major stumbling block for me. One problem I had was simply proofreading it enough times. It took several hours for one reading straight through…and longer if I was making corrections…which I was making a ton of! I tried 2 or 3 times, spending 12-14 hours each time…but didn’t finish. And when I went to sleep it seemed I had to do a lot of back pedaling the next day because my brains RAM just isn’t as functional as it used to be. It was beginning to look like I might not get this published at all.

Another complicating factor was that I felt the length of this post would be problematic for reader’s. I thought that I really should have something making it easier to navigate through the material. At a minimum I thought that a Table of Contents would be necessary.  A TOC would help readers’ both to navigate and to find just the information that they were most interested in. Sadly,, while quite amazing overall, just isn’t up to that task.

This is one of the few areas in fact that isn’t up to par with most of the other website services out there. When it comes to creating something like a Table of Contents here…there are simply no tools at my disposal. If you know much about WordPress and or web building you’re probably thinking to yourself…hey, what about jumplinks?

Flickr & Visual Hunt Photo: Botnet by Tom B from Sau Paulo Brazil

Flickr & Visual Hunt Photo: Botnet by Tom B from Sau Paulo Brazil

Jumplinks, for nonweb-builders…are a way of creating links right within posts to somewhere else right within that same post.

The concept of jumplinks was new to me. I did learn everything there was to learn about them…I think. But, that would have ended up being a slow, manual and very cumbersome process…especially to create them all at the outset whilst I was trying to proofread and prettify everything for final publication. So, while jumplinks theoretically might have worked, in the bigger picture, they just weren’t the answer for me in my present dilemma. They would actually have acted as even more of a deterrent to me for finally getting this long article (and 2 others that I’m in the same boat with) published rather than aiding me in that process. Just getting this information published in a usable form…is really my end goal. Especially getting it published before it loses all relevance or accuracy!

So, this one relatively minor deficiency of has had a major impact on my blog in recent months…because it’s not just my Firewall guide that really needs this kind of navigational tool. As I mentioned above, my Part II for the Cord Cutting Guide also would benefit a lot from the inclusion of a Table of Contents. A 3rd extremely long post I wrote about Apple’s newest ‘standard’ iPad…what I call the iPad 5, as opposed to the even newer iPad Pros…also really needs something like this too! I put in a request for this and my request even garnered quite a bit of support…but as of August, 2017…there’s no positive indication that a Table of Contents feature will be forthcoming. So, I decided to take matters into my own hands and figure out a solution.

I could publish this information as ebooks…but since I’ve never written an eBook before, there would be a definite learning curve. I’m not ruling out that possibility however. I’m thinking that maybe once I’ve published all of the sections for all of these topics…then maybe that will be the right time to combine it all into a few eBooks.

The advantage of my decision to publish this in a smaller sections actually helps me much more than you might appreciate. Because the final editing phase won’t be so daunting now. Also, my approach will sort-of solve the ’Table of Contents‘ problem too. Because once everything is published…I can then create a Table of Contents quickly and easily using the links for each section!

The Typical Kinds of Protection That Are Primarily Used in Small Networks Today

In 2017 the rapidly increasing number of malicious threats truly makes it mandatory for people to actively employ as many measures as they can to stay safe. In the computer realm, this means that Window’s users cannot stray from using antivirus software and firewall applications (which are often combined in good anti-virus solutions.) But these shouldn’t be their only protective mechanisms. Even Mac users should consider protecting their machine’s with these basic measures now, because in recent years we’ve seen that Apple computers aren’t immune from these threats anymore either. But it is still true that Window’s users’ continue to need greater and more protection. This added protection should be in the form of anti-malware and anti-exploits applications which are run on individual computers.

Mobile devices too need additional measures in today’s world. While iPhones and iPads are still safer overall from malicious threats than Android devices are, the are far from immune. With ios 10, Apple recently gave users the ability to add their own ad blocking plugins to Safari. This makes good sense and it does add a protective layer to web surfing activities. But Apple also gave users the ability to finally install apps from somewhere else that isn’t their ios App Store too. This move, while greatly needed and widely applauded by most people, significantly increases a user’s chances of contracting a virus or malware. Android users too need stronger and better options for protection, because the open nature of the Android operating system goes hand in hand with those devices acting as more of a magnet to attract hackers as well.

There’s one last category of devices that few people tend to recognize which also act to increase vulnerability significantly. I’m grouping these devices collectively under the moniker of smart-home or Internet of Things (IoT) devices. For reasons that I’ll delve into much more a little later on, the vulnerabilities that these devices create are much harder to address than those more readily recognized ones I mentioned above.

Not many people outside of those working in the tech industry are aware of one newer safety measure that works to protect all of the aforementioned devices collectively. I’m referring to the use of a separate piece of hardware called a firewall appliance. Hardware firewalls are the primary focus of this guide.

Sonicwall’s 2017 Cyber Threat Report

This periodic newsletter from Sonicwall is one of my favorites. It contains really great information about the worst threats that we should all know about today. They can be loosely categorized into threats against our identities and financial resources, our computers, our mobile devices (such as cell phones and tablets,) and our smart home or IoT devices. I’ve included a link to Sonicwall’s 2017 Threat Assessment Report.  If you’re asked to fill out a form and submit your email address to get the report and don’t want to do that you can download it in the form of a PDF that I created just to make sure everyone could actually read it…using this link.

Sonicwall 2017 Threat Assessment Report

Sonicwall 2017 Threat Assessment Report

You may be wondering who or what Sonicwall is and what makes them an expert when it comes to data security threats. Sonicwall is the company we use and rely upon daily to protect our home and office networks. Sonicwall was, up until very recently, a division of Dell computers. They were one of the first companies to develop hardware firewall appliances…which (in case you forgot) is the main focus of this article. I’ve wanted to write about firewalls for several years, because every time that I happen to mention them in a conversation, I’m met with either a blank or a questioning stare..and then usually silence.

I’ve finally decided that now is the right time to introduce this topic because, in addition to the reasons mentioned above in the introduction, when I began this, we were conducting our own research into upgrading our home firewall hardware following a long-awaited and sorely needed huge upgrade to our network bandwidth speed. We recently increased our internet service from 50 Mbps down & 5 up to a whopping 300 down & 20 up…but we couldn’t utilize the upgrade in capacity until we upgraded our firewall. As I began this dreaded research project (dreaded because firewalls are so complexly confusing!) I realized that there are finally firewalls that are really designed for small networks like homes and small businesses…thus there are much better solutions than the last 2 times I had to undertake this research task.

I was also pleasantly surprised to discover that there are several small niches which have been identified as prone to higher risks.Several new classes of security devices are appearing on the market which are aimed at those focused needs.

Introduction to Hardware Firewalls

I’ll close this introduction to Firewalls with a better description of what the phrase ‘hardware firewall’ really means.

Hardware firewalls are somewhat similar to software ones in that they are designed to protect users from malware, viruses, ransomware and botnets. The way that they differ is that rather than affording protection to just one machine…they are designed to protect a complete network of devices.

I’ll delve a little deeper into the way that they differ from the software-based firewalls most people are familiar with…those like Window’s firewall for example. Or firewalls that come bundled with anti-virus software that are also made to protect a single device…most often a Window’s computer. Almost every Window’s user out there has heard of software firewalls because of Window’s firewall. Fewer people may know that Apple also includes firewall software in each and every computing machine they sell (machines that aren’t mobile devices that is.) Software firewalls aim to accomplish pretty much the same things as their hardware firewall counterparts do…the only real difference is in their scope.

What I’ll call traditional hardware firewalls have a much broader scope than software ones do. They are designed to protect complete networks. This segment of the market is really big, consequently there is a huge variance in both size and the degree of protection afforded between the different ones available.

There are a lot of different companies making traditional, enterprise level hardware firewalls today, including Sonicwall, Cisco, Juniper and Fortinet to name a few of the most popular brands. Originally these were developed solely for business use, which is also called the Enterprise market. As their use has become mandatory for most businesses, many people who’ve seen the benefits of that kind of protection at work have begun seeking out similar solutions for their own personal needs. This has led to the development of several smaller, less expensive and sometimes more focused device types…many which are just entering the marketplace now.

Some of the Key Security Threats in 2016

Some of the Key Security Threats in 2016

Even within this new market there are several subcategories of device types.

One popular new breed of hardware firewall is firewalls which are bundled together with other network gear like routers. A couple great examples of these are Ubiquiti’s EdgeRouter Lite product line and Cisco’s RV product line. Another bundled alternative are devices which provide WiFi networks which include firewall features too. Then there’s a 3rd category of standalone firewalls which operate somewhat like their enterprise big brothers do but which also include some unique features like cloud threat intelligence and crowd sourced threat updates.

Regardless of the type…standalone, full-featured firewalls for enterprises which I’ll refer to as traditional firewalls, firewalls which are bundled together with routers or WiFi network gear, or firewalls which focus on one specific purpose…all of these device’s primary purpose is the same…protecting a family or a business network from cyber threats and malicious attacks. This includes protecting all of the devices within that network and it also includes protection for both the wired LAN network and the wireless WLAN network.

With the addition of a hardware firewall, all the devices within a network are protected at a significantly higher level than would be the case if they only relied upon each individual device’s security measures, which we’ve seen can vary greatly.

Computers can and hopefully do reside at the most secure end of the spectrum by incorporating a protection trifecta which should include antivirus, anti-malware and anti-exploit applications. Mobile devices tend to fall into the middle range with some built-in and some add-on protection. IoT and smart-home technology usually falls into the lowest range with minimal to no protection. Yet because this is probably the market that’s growing the fastest, it’s also the one which has been most overlooked to date. That fact hasn’t escaped security conscious manufacturers, and new breeds of devices are rapidly stepping up to address this need.

Future Segments in the Firewall Series

Future parts in this Firewall series of posts will discuss small network architecture and where Firewalls fit into these existing structures. I’ll also examine in much greater detail the various types of firewalls that are beginning to enter the market as well as cover what you need to know to discuss the pros and cons of a firewall with someone like a sales person knowledgeably. I’ll also spend some time on a more detailed examination of the differences between enterprise firewalls and these newer standalone versions which are meant to replicate many of the larger versions tasks. Last I’ll hopefully leave Readers in a position to fully understand the line of hardware and to determine if it’s something they should consider using personally. If that answer ends up being yes, Readers should know where to go too find more information about what they are looking for.

Since most of these sections are already written and just need final proofing as well as a few checks into hardware  availability, expect the next parts to appear here within a few days.

Additional Resources

Recent Malware & Virus News

Sonicwall’s August 28th alert about ransomware that hides behind an image file.

Sonicwall’s recent report about attackers targeting websites with ransomware by uploading PHP files to websites which are then locked to their owners until a ransom is paid.

Mac, Android devices increasingly at risk for malware

Malwarebytes Introduces Malwarebytes for Mac to Protect Against Rising Levels of Mac Malware

Previous Posts with More Detailed Information

The Danger’s of Torrent & P2P or Media Sharing Websites Were Responsible for Allowing a Botnet to Take Over Our Home Network

Why You Should Never Use Public WiFi’s & My Tiny Hardware Firewall Review

How to Secure Your Home Network


If there are any aspects of Firewalls that you know for sure you’d like to make sure I include in my coverage please let me know in the comments and I’ll try to include it in future parts to this series.

If you’d like to read other reader’s comments (assuming there are any,) or if you’d like to leave your own comment, please scroll way down past the ‘WordPress ads‘, the ‘About me‘ and ‘Related Posts‘ sections, and look for the little ‘Comment Box.’

Posted in Computer & network security, Security | Tagged , , , , , , , , | 2 Comments