Dale Walker
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
29 Jul 2021
How to unroot Android
An Android smartphone laid flat on a surface beside a model of the Android mascot
Google Android

How to unroot Android

If you've rooted your Android device, here’s how to get everything back to normal
27 Jul 2021
What is SSID?
wireless router
broadband

What is SSID?

We look at what SSID is and how it is used to connect devices to the internet
26 Jul 2021
What is LTE?
LTE technology
Network & Internet

What is LTE?

A guide to the standard that helped launch the 4G revolution
23 Jul 2021
What is EU-US Privacy Shield?
Privacy Shield security concept
Privacy Shield

What is EU-US Privacy Shield?

A look at the now invalidated framework US companies relied on to transfer data to and from the European Union
16 Jul 2021
What is Strong Customer Authentication (SCA) under PSD2?
Online payment
two-factor authentication (2FA)

What is Strong Customer Authentication (SCA) under PSD2?

An in-depth look at the EU directive that aims to harmonise online payment protection
16 Jul 2021
What is Kubernetes?
Shipping containers stacked on a dock
enterprise applications

What is Kubernetes?

We take a look at the open source platform powering containerisation at scale
15 Jul 2021
What is a botnet?
Image of small robots connected to represent a botnet
botnets

What is a botnet?

An in-depth look at the evolution of this highly effective method of cyber crime
14 Jul 2021
What is Li-Fi?
Abstract image showing a lightbulb on a black background to symbolise Li-Fi
Network & Internet

What is Li-Fi?

A look at the Wi-Fi alternative that uses visible light to transfer data at staggering speeds
13 Jul 2021
What is the California Consumer Privacy Act (CCPA)?
An image of California's legislature
Network & Internet

What is the California Consumer Privacy Act (CCPA)?

We examine the groundbreaking new data law that's often referred to as "America's GDPR"
13 Jul 2021
What is a managed IT service?
IT infrastructure digital illustration
Business operations

What is a managed IT service?

With two-thirds of businesses using them, learn about what managed IT services are and how they’re being used
1 Jul 2021
IT Pro 20/20: Does cyber security's public image need a makeover?
IT Pro 20/20 Issue 18: Does cyber security's public image need a makeover?
cyber security

IT Pro 20/20: Does cyber security's public image need a makeover?

Issue 18 of IT Pro 20/20 looks at recent efforts to retire the 'hacker' stereotype, and how the threat landscape has changed over the past 20 years
30 Jun 2021
What is data processing?
Man processes data at desk
Business operations

What is data processing?

Finding the data you need - either to digest or delete - isn't always easy in an increasingly data-intensive world
23 Jun 2021
What is end-to-end encryption and why is everyone fighting over it?
Abstract image of code passing through a filter to symbolise end-to-end encryption
encryption

What is end-to-end encryption and why is everyone fighting over it?

End-to-end encryption is considered one of the best ways to protect user data, but not everyone thinks it's a good idea
21 Jun 2021
What are the responsibilities of a data controller?
Series of locks on binary code with one unlocked
Business strategy

What are the responsibilities of a data controller?

If your organisation collect people's data, you need to know how GDPR applies to your practices
11 Jun 2021
Bootmgr is missing - how do you fix it?
Windows 10 logo
Software

Bootmgr is missing - how do you fix it?

This seemingly nightmarish error is actually not as bad as it seems
8 Jun 2021
IT Pro 20/20: What the EU's new AI rules mean for business
IT Pro 20/20 Issue 17 - What the EU's new AI rules mean for business
IT regulation

IT Pro 20/20: What the EU's new AI rules mean for business

The 17th issue of IT Pro 20/20 considers the effect of new regulations on the IT industry
7 Jun 2021
What is a default gateway?
Ethernet cable in router
Network & Internet

What is a default gateway?

A look at one of the most critical components of a well-functioning network
28 May 2021
Microsoft Surface Pro review: Still worth buying?
Surface Pro
Laptops

Microsoft Surface Pro review: Still worth buying?

Microsoft's hybrid may be four years old, but it still manages to pack a punch
17 May 2021
What is bandwidth?
Data in a tunnel for analytics
broadband

What is bandwidth?

We look at how bandwidth works, and why your internet connection sometimes slows to a crawl...
13 May 2021
What is ransomware?
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

What is ransomware?

This type of malware could hit you hard in the pocket
7 May 2021
IT Pro 20/20: Understanding our complicated relationship with AI
IT Pro 20/20: Understanding our complicated relationship with AI
artificial intelligence (AI)

IT Pro 20/20: Understanding our complicated relationship with AI

The 16th issue of IT Pro 20/20 looks at the very human problems associated with artificial intelligence
4 May 2021
ITP2020 TEST
cyber security

ITP2020 TEST

Test
26 Apr 2021
What is ethical AI?
Robotic and human hands meeting
artificial intelligence (AI)

What is ethical AI?

How do we define what a 'good outcome' is when it comes to algorithms?
23 Apr 2021
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
2D clouds on a circuitboard background
cloud security

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Each of these popular cloud platforms boasts robust security - but which does it best?
13 Apr 2021
What is Bitcoin?
Abstract image of bitcoin
cryptocurrencies

What is Bitcoin?

Our guide to the world's most funded cryptocurrency
13 Apr 2021
What is the Data Protection Act 1998?
A lock behind encrypted numbers
data protection

What is the Data Protection Act 1998?

Despite GDPR coming into force businesses may still find themselves sanctioned under the 1998 act
12 Apr 2021
What is Microsoft Pluton?
Abstract image of the Microsoft logo ontop of a glowing processor
Security

What is Microsoft Pluton?

A quick look at Microsoft's new approach to CPUs that promises to revolutionise Windows security
8 Apr 2021
What is cross-site scripting (XSS)?
JavaScript
cross-site scripting (XSS)

What is cross-site scripting (XSS)?

How XSS exploits work and how to defend against them
7 Apr 2021
GDPR certification: What is it, and do you need it?
Man writing on a certificate
Policy & legislation

GDPR certification: What is it, and do you need it?

How the ICO will measure GDPR compliance, and whether a certificate means anything
7 Apr 2021
IT Pro 20/20: Meet the companies leaving the office for good
IT Pro 20/20: Leaving the office for good
Business strategy

IT Pro 20/20: Meet the companies leaving the office for good

The 15th issue of IT Pro 20/20 looks at the nature of operating a business in 2021
31 Mar 2021
What is the Data Protection Act 2018?
A padlock on a circuit board in a dark room
data protection

What is the Data Protection Act 2018?

A look at the UK's national data laws and how GDPR fits into the puzzle
24 Mar 2021
What is natural language processing?
A face profile made out of 0 and 1 numbers
machine learning

What is natural language processing?

Creating systems capable of meaningful conversation is one of the hardest tasks facing AI researchers
12 Mar 2021
How to build Android apps
Apps displayed on an Android OS smartphone
Google Android

How to build Android apps

Follow these eight steps to get your app on Google Play
3 Mar 2021
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
3 Mar 2021