Category: Nomad Administration

The mobile office of a nomad is to be able to carry out and manage an activity from anywhere, while continuing to move freely.
Which infrastructure to choose? How to organize yourself to manage remotely? What resources to use? Below are some tips and resources…

3rd Pillar: Defending yourself

In the context of computer security, it is good to be wary and take precautions. But what if that’s not enough? … If in spite of all, the trouble sneak into your system and cross…

>>>

Plan a fallback strategy

Despite all the precautions you have taken so far, your computer is letting you down … This is official: You no longer have access to your data! … Well now what do you? What strategy…

>>>

Backup & Security

Making one or more backups of your data is a security whatever happens. No one is safe from a blow of fate. Better to be warned. The act of taking precautions is not a guarantee…

>>>

Online Payments & Security

The danger of online payment is the same as the one in the shop. Theft of money, copy of your credit card credential, theft of your codes …, the use of common sense is the…

>>>

Cloud Services & Security

When we speak of “Cloud” we think first of data storage spaces, such as Dropbox, GoogleDrive or OneDrive. We picture this as personal lockers locked. But it’s much more than that …

>>>

Social Networks: Uses & Security

Social networks have become very popular and there are plenty of them. Is it just a fashion or serious? I don’t know. Will they still exist in 10 years, I don’t know either. There is…

>>>