Drew Turney
A graphic designer and web developer by trade, Drew capitalised on his knowledge of technology in the creative field to launch a freelance journalism career, also specialising in his other passions of movies and book publishing. As interested in the social impact of technology as he is the circuitry and engineering, Drew’s strength is observing and writing from the real-world perspective of everyday technology users and how computing affects the way we work and live.
5 articles written
0 comments made
Top 5 Web and Internet OSs for Enterprises in 2023
A web OS provides an accessible, secure collaboration option with low system demand. Here’s how they work, and how to pick the best one for your use case.
What Is a Computer Worm? Definition, Protection, and Recovery
Worm viruses are malicious programs that spread quickly across networks. Learn how to protect your system against worms now.
What Is Decentralized Storage? Ultimate Guide
Decentralized storage is a type of distributed storage system that is not dependent on a single storage provider. Here’s how it works—and how it can benefit your business.
7 Best Network Virtualization Software for 2023
Compare the best network virtualization software solutions. Find the right virtualization tool for your networking needs.
What Is a Rootkit? Definition, Prevention, and Removal
Rootkits are malicious software that can be difficult to detect. Learn how to prevent, find, and remove rootkits with our comprehensive guide.
What Is the OSI Model? Why It’s Still Relevant
Learn why the OSI model is still relevant in modern networking and how it can help you understand network communication.
6 Best Cloud Security Posture Management (CSPM) Tools
Find the best cloud security posture management (CSPM) tools for you. Compare features and pricing of the top CSPM vendors.
Is Red Hat Virtualization a Good Proxmox VE Alternative?
Compare Proxmox VE and Red Hat Virtualization to discover which tool fits your specific virtualization needs best.
What Are Botnets? Botnet Attacks Explained
Botnet attacks are a type of cyberattack that uses a network of compromised computers to launch malicious activities. Here’s how they work—and how to protect yourself.
14 Top IT Managed Services Providers (MSPs) for 2023
Find the best managed services provider (MSP) for your business. Compare the top solutions now.
Ransomware-as-a-Service (RaaS): Definition & Examples
Ransomware-as-a-service (RaaS) is a type of cyberattack that allows cybercriminals to rent out ransomware to other criminals—and it’s a rapidly growing business.
What Is CIDR? Subnets and CIDR Explained
CIDR is a method of allocating IP addresses and routing Internet Protocol packets. Here’s how it works — plus its history, and why it’s still in use today.