Skip to content
  • Start
    • Table of contents – sorted by category
    • Questions and answers
    • About me
    • Guest posts, linking, and advertising policy
    • Useful links
    • Privacy Policy
    • Uptime monitors and stats
    • GREMLIN HUB
  • Reviews
    • Hosting reviews
    • Domain registrar reviews
    • Control panel reviews
    • E-banking
    • Misc
  • WordPress
    • In general
    • Plugins
    • Themes
    • Workshop
  • Linux
    • Installations
    • Tweaking
  • Net technologies
    • In general
    • Navigation
    • Security and privacy
    • Speed and CDN
    • Storage
  • Hosting
    • Hosting in general
    • Hosting server control panels
    • Technical support
  • Web sites
    • Backup
    • Design
    • E-mails
    • Maintenance
    • Security
    • SEO
    • Speed and Optimization
  • Services
    • Consulting, help
    • Website migration
    • Domain registrar migration
    • Website optimization
    • Website security
    • Website maintenance
    • Hosting
    • Prices
  • Srpskohrvatski

I/O Gremlin

Mostly harmless ™

I/O Gremlin
Newsletter - subscribe 

Security and privacy

Security and privacy related topics

Start » Net technologies » Security and privacy

E-mail security habits

30/06/202003/03/2020 by Relja
Secure email security habits - how to stay safe when working with emails

How to stay safe when working with e-mails. How to recognize false (spoofed) e-mails. Checking e-mail headers, DKIM, SPF…

Categories Security and privacy Leave a comment
Start » Net technologies » Security and privacy

Free vs paid SSL/TLS certificates

09/03/202006/02/2020 by Relja
SSL/TLS info

The difference between the free and paid for SSL/TLS certificates. DV, OV and EV certificates explained. Is Let’s Encrypt safe etc.

Categories Security and privacy Tags encryption, security Leave a comment
Start » Net technologies » Security and privacy

Asymmetric encryption explained

09/09/202020/11/2019 by Relja
Asymmetric encryption explained - hash, private and public keys

What is asymmetric encryption? What are public and private keys? What is hash? Certificate authority? All those terms explained in plain English.

Categories Security and privacy Tags encryption, hash Leave a comment
Start » Net technologies » Security and privacy

2 Factor Authentication (2FA) explained

17/10/2019 by Relja
2 factor authentication (2FA) explained: what it is, why is it important and how it is used in practice for greater security on the Internet?

Explanation of 2 factor authentication (also known as 2FA). The basic concept, the importance and practical use for security on the Internet in general.

Categories Security and privacy Tags 2fa Leave a comment
Start » Net technologies » Security and privacy

TOR network and Onion routing explained

09/09/202003/09/2019 by Relja
TOR Network and Onion routing explained

Explanation of what TOR network and Onion routing are.

Categories Security and privacy Leave a comment

T.O.C.

Recent Posts

  • How to make a good website
  • The SEO Framework (TSF) Pro review
  • Softaculous WordPress staging and management
  • Questions and answers

Google ad:

I/O Gremlin partners:

Easy dmarc

Recent Comments

  • Relja on Fixing Yandex browser YouTube playing error in Linux
  • Relja on Altering mouse scroll speed in Linux
  • joseph cyphers on Fixing Yandex browser YouTube playing error in Linux
  • Albert Zeyer on Altering mouse scroll speed in Linux
Last 100 comments list

Google chosen content:

© 2019 - 2021 I/O Gremlin • Powered by bacon & electricity