Sydney Butler

Sydney Butler has a formal background in research psychology, with a particular focus on how technology affects us as individuals and society. He writes about technology broadly, but is an advocate for personal freedom and privacy. He has extensive experience as a digital literacy teacher and believes strongly in public education on topics such as cyber security, privacy, surveillance and freedom of speech. Contact at - contact@technadu.com
279 articles

How to Detect, Prevent and Remove Botnet Malware

Before we can talk about removing botnet malware, we have to talk about what it is in the first place. What is a Botnet? A botnet...

How To Permanently Remove Antivirus Software

Sadly, it’s not a good idea to have a computer connected to the internet without having some sort of antivirus software to protect yourself...

How to Turn Your Windows Computer into a VPN Hotspot

VPN technology has a lot of great advantages. You can spoof your location to access blocked services. Your browsing is hidden from your ISP....

#ChoosePrivacy: VPNs are Still the Best Defense

Choose Privacy Week is now half over, but the awareness its raising has been amazing for the online privacy community. This campaign is led...

#ChoosePrivacy: Why Does Privacy Matter?

At the end of Choose Privacy week 2018, we’d like to take some time to talk about why your privacy matters in the internet...

What’s Pharming and How Can You Avoid It?

At this point, just about everyone has heard of the online fraud scheme known as "phishing". In case you haven't, it's a cyber attack...

#ChoosePrivacy Explained

You might have seen the hashtag #ChoosePrivacy showing up in your Twitter feed and on Facebook since the start of May. If you’re wondering...

A Quick Guide to Adult Site Privacy for Beginners

Whether cave paintings, Greek pottery, oil paintings and today video, there’s always been a market for adult content. No matter which medium your care...

How to Teach Family Cyber Security

The security of your home network, the computers connected to it and the information stored on all those devices are only as good as...