Articles by Evan Porter

Evan is a writer with over a decade of digital publishing experience. He also builds blogs, loves gadgets, and fixes tech problems around the house.

[SOLVED] Why Is My Phone Hot? (3 Reasons) in 2020
[SOLVED] Why Is My Phone Hot? (3 Reasons) in 2020

Just a few years ago, cell phones were simple machines that made calls and sent text messages.

Today, they’re sophisticated, pocket-sized computers.

And much like full-sized computers, they are prone to all sorts of problems and malfunctions — including overheating.

Evan Porter by Evan Porter January 26, 2020
What is Adware? And How to Remove It in 2020
What is Adware? And How to Remove It in 2020

In an age of ads, pop-ups, pop-overs, and video overlays, we’ve almost gotten used to being bombarded with advertising. However, this doesn’t make it any less intrusive and annoying.

Evan Porter by Evan Porter December 28, 2019
What is an SQL Injection Attack? And How to Prevent It in 2020
What is an SQL Injection Attack? And How to Prevent It in 2020

SQL is a programming language that allows programmers to “talk” to large databases using nearly-plain English.

It can access and manipulate data held in a number of tables on a server. When it comes to websites, those tables might include sensitive items like usernames, passwords, credit card numbers, and more.

Evan Porter by Evan Porter December 28, 2019
What Is a Botnet? And How to Protect Yourself in 2020
What Is a Botnet? And How to Protect Yourself in 2020

Think of the damage that one talented hacker can do. Now imagine what they can do with an army of computers at their disposal, amplifying their resources on an order of thousands or millions.

These “armies” actually exist, and they’re called botnets.

Evan Porter by Evan Porter December 28, 2019
8 Best Antivirus Programs with a VPN [That Are Both Awesome] for 2020
8 Best Antivirus Programs with a VPN [That Are Both Awesome] for 2020

If you’re considering an antivirus bundled with a VPN, you can’t risk using a VPN that isn’t actually secure. After all, why leave yourself potentially vulnerable to phishing, malware, and viruses? 

Antiviruses and VPNs go hand in hand: Antiviruses protect your device, while VPNs protect your connection, meaning no malicious threats get anywhere near your device in the first place. 

We’ve taken the time to carefully test and review a handful of proven effective antivirus programs that offer highly rated, secure VPN services in order to help you save time and money before purchasing a bundled service.

Evan Porter by Evan Porter December 28, 2019
What is a DDoS Attack and How to Prevent One in 2020
What is a DDoS Attack and How to Prevent One in 2020

If your company’s website or application suddenly goes offline due to a massive influx of suspicious traffic, you could be the target of a Distributed Denial-of-Service (DDoS) attack.

These kinds of cyber attacks are on the rise, and they can be devastating to your business and brand reputation when they cause significant website downtime.

Evan Porter by Evan Porter December 28, 2019
What Is a Trojan Horse Attack? Plus 3 Prevention Tips for 2020
What Is a Trojan Horse Attack? Plus 3 Prevention Tips for 2020

In The Aeneid, the story of the Trojan War, a group of Greek soldiers hide inside a massive wooden horse as the rest of their army sails away. The Trojan army, thinking the horse to be a gift of surrender, brings the structure inside their high walls during the celebration.

Once inside, the Greek soldiers climb out for a devastating sneak attack.

Evan Porter by Evan Porter December 28, 2019
What Is a Computer Worm? Tips to Protect Your PC in 2020
What Is a Computer Worm? Tips to Protect Your PC in 2020

There are dozens of different kinds of malware: viruses, Trojans, bots, ransomware, and plenty more. All of them can wreak absolute havoc on your computer if you’re not protected.

One of the most nefarious of the bunch is the class of malware known as computer worms.

Evan Porter by Evan Porter December 28, 2019
What is Phishing? 7 Tips to Stay Safe in 2020
What is Phishing? 7 Tips to Stay Safe in 2020

While some hackers use stealth methods like infecting your computer with malware to steal your most valuable info, others simply ask for it up front. This practice is called “phishing” and  it’s one of the most effective methods for duping unsuspecting victims.

Phishing is a type of cybercrime that enables hackers to pose as authority figures, customer service representatives, or other trusted sources, in order to steal your most valuable personal information.

Evan Porter by Evan Porter December 28, 2019
What is Hacking? Examples and Safety Tips for 2020
What is Hacking? Examples and Safety Tips for 2020

We’re all familiar with how hackers are displayed in movies. Brooding criminals in hoodies, frantically hammering lines of code into a computer in order to break through complex security systems.

We know that, in real life, too, hackers are a major threat to our safety.

But what exactly is hacking?

Evan Porter by Evan Porter December 27, 2019