Isaiah SarjuinHackerNoon.comWhat is malware?Let’s demystify malware and understand how we can avoid itJun 11, 20181Jun 11, 20181
Isaiah SarjuinHackerNoon.comThe Best Password Manager for YouThis isn’t a personality test but it can help you find the right oneMay 17, 20183May 17, 20183
Isaiah SarjuWeak Two Factor is Better Than No Two FactorBut seriously, stop using SMS based 2FAApr 18, 2018Apr 18, 2018
Isaiah SarjuinHackerNoon.comDo I Need a VPN if I Have Nothing to Hide?VPNs are for everyone. This is why.Apr 17, 20183Apr 17, 20183
Isaiah SarjuTrouble with VirtualBox Mounted Shared FoldersApplies to Mac OSX 10.13, VirtualBox 5.2.8, Ubuntu 16.04Apr 4, 2018Apr 4, 2018
Isaiah SarjuinHackerNoon.comHow to Securely Configure Google Drive to Share with a Distributed Non-G Suite TeamSetting up permissions for many different people can get out of hand in Google Drive. Here’s how to solve it.Mar 22, 2018Mar 22, 2018
Isaiah SarjuinHackerNoon.comA Guide to Cryptocurrency SecurityCryptocurrency is stressful enough. Follow this guide to make sure that your hard earned coins don’t get hacked.Feb 22, 20181Feb 22, 20181
Isaiah SarjuinRevis Solutions BlogFacebook & Onavo, Privacy & SecurityFacebook’s VPN product Onavo might be secure, but it’s not private. For some people, that’s ok. Let’s understand the difference between…Feb 20, 2018Feb 20, 2018
Isaiah SarjuinRevis Solutions BlogThe Startup Security ChecklistLive your best (security) life now!Feb 11, 2018Feb 11, 2018
Isaiah SarjuinHackerNoon.comSpectre & Meltdown Processor Vulnerabilities: A Technical IntroductionThe important technical aspects of Spectre and MeltdownFeb 3, 20181Feb 3, 20181