Keep Your Firefox Browsing Private
As you browse the web, Firefox saves a lot of information about your activities: phrases you've typed into search engines, sites you've visited, files you've downloaded, and more. There may be times, however, when you don't want other users of your computer to view this information. More ...
How to Stay Safe on Public Wi-Fi
More mobile phone users are using public Wi-Fi hotspots. Data sent through public Wi-Fi can easily be intercepted, many mobile device and laptop users are risking the security of their personal information, digital identity and money. More ...
DriveLock Hard Drive Protection
DriveLock is a hard disk specification that prevents unauthorized access to the contents of a hard drive. If DriveLock is enabled, at power-on the BIOS requests the user password. More ...
Phishing Attacks
Phishing is an attack used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. More ...
Smart Card
Some smart cards contain an embedded microprocessor which can be programed with applications. Some smart cards have electrical contacts, the microprocessor is under a gold contact pad on one side of the card. Many cards are contactless and use radio-frequency to operate. More ...
Computer Architecture, Main Memory, and the CISSP Exam
Main memory is the part of the computer that stores programs, instructions, and data. The two basic types of physical memory are DRAM (Dynamic RAM) and SRAM (Static RAM). More ...
Five Things You Can Do To Improve Your Company's Security
As security issues grow more and more prevalent, we CIOs need to improve our environments. Here are some quick things that can be done in short order to help improve security at your business. More ...
How Hackers Crack Passwords
Password cracking is one of the most enjoyable hacks for the bad guys. These methods include using social engineering techniques. To obtain a password through social engineering, you just ask for it. More ...
Top Features to Look for in Antivirus Software
With up to 100 new malware threats being discovered every 24 hours, it's absolutely crucial to buy antivirus software that can effectively identify and block malware. This guide will explain some of the most important features and functions that reliable antivirus software needs to have. More ...
Top Tips To Secure Your Online PC
Most of us use a PC these days, but how many of us are really serious about securing it? Well, not most of us! They just need to get their job done sitting on the PC and hence look no further. But they do find themselves in great trouble when the PC crashes, files are corrupted, login information are stolen or attacked by viruses and malwares. More ...
Beginner's Guide to Computer Forensics
Computer forensics is the practice of collecting, analysing and reporting on digital information. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. More ...
Disable Remote Access
Remote access to your computer is a way to get technical assistance, but after your problem is resolved, it allows a huge security risk. More ...
FREE Antivirus Software AVG
AVG Free Edition by Grisoft is Vb100 and ICSA certified. This means AVG will detect 100 percent of all known viruses. AVG provides both file and email protection that works with any POP3/IMAP4 email client, including Outlook and Outlook Express. More ...