IT Specialist Blogs


News, Topics and Opinions on Information Technology

Specify Alternate Text

As the scandal over NSA spying has unfolded, like a drip coffee pot, one revelation after another has come out revealing the extent to which the NSA possesses the power to pry into our private lives. In the latest NSA hack to emerge, we’ve discovered that the agency – ...

In a previous article on the explosive revelations on the NSA's spying program, I outlined how the Tor browser can allow you to surf the internet anonymously. Tor is much safer then the commonly used browsers such as Chrome or Internet Explorer, as Tor uses both encryption as well as as ...

As the revelations of widespread spying by the US National Security Agency (NSA) continue to emerge, everyone from IT professionals to ordinary people are asking one basic question: Is it possible in the internet age to retain some level of anonymity, or is it true that, as Sun Founder ...

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on the IT Specialist Network, you can quickly gain exposure as an opinion leader or subject matter expert in information technology by informing a large audience of technical professionals. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated throughout the IT Specialist Network.

Click here to contact us.