Skip to content
TeckLyfe

TeckLyfe

We're your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To's.

  • Home
  • InfoSec
    • Server Hardening
    • Attacks
    • Malware
    • Pentest
    • Phishing
    • Ransomware
    • Virus
    • Zero-Day
  • SysAdmin
    • Cisco
    • Linux
    • Mac
    • Windows
  • Tech
    • Apps
    • Gadgets
    • Gaming
    • Internet
    • Mobile
      • Smartphone
    • OS
    • Tech Tips
  • Follow Us
    • Facebook
    • X aka Twitter
    • LinkedIn
    • YouTube
    • Reddit
    • RSS Feed

Tag: security

  • Home
  • security
  • Page 2
Security Settings To Check In iOS 10 1
Mobile Security Server Hardening

Security Settings To Check In iOS 10

As many of us begin to upgrade to iOS 10 that was launched earlier today, we recommend that you check some of these settings to ensure your security and privacy

September 13, 2016January 16, 2017
Continue Reading...
Android Security Basics 2
Security Mobile Server Hardening

Android Security Basics

Everyone carries around their smartphones these days, and most don’t realize the amount of personal data that could be found on them if they ever made it into the wrong

September 6, 2016January 16, 2017
Continue Reading...
MacOS .ds_store
Security Mac Server Hardening

How To Secure Your Mac

If you’re a Mac user, you’ll want to make sure you’re using your computer as securely as possible. The common notion is that the MacOS is secure out-of-the-box, but the

September 5, 2016January 16, 2017
Continue Reading...
How-To Write SQL Server Audit Events To Windows Security Log 3
System Administration Tech Tips Windows

How-To Write SQL Server Audit Events To Windows Security Log

There are a few options you have if you want to enable audit logging on Microsoft SQL Server. You can write the logs to a .sqlaudit file, but you cannot

February 17, 2016October 16, 2016
Continue Reading...
Password Protect OneNote Notes 4
Apps

Password Protect OneNote Notes

If you’re a heavy OneNote user, there’s a possibility you might have some information saved that you don’t want anyone to access. Whether you have it stored locally or in

January 11, 2016October 16, 2016
Continue Reading...
Tech Tip: Enable Two-Step Authentication For Your Microsoft Account 5
Tech Tips

Tech Tip: Enable Two-Step Authentication For Your Microsoft Account

A couple of days ago Microsoft started rolling out two-step authentication for Microsoft Accounts. This small security measure can help keep your account more secure. By enabling this feature, you’ll

April 19, 2013October 16, 2016
Continue Reading...

Posts pagination

Previous 1 2
  • About Us
  • Privacy Policy
  • Advertise With Us
  • Contact Us
We’re your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To’s.

Founded in 2000, TeckLyfe is based in Chicago, IL. Reproduction without explicit permission is prohibited.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
© 2000-2025 - TeckLyfe.com - All Rights Reserved. Reproduction without explicit permission is prohibited.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}