Menu
Computer and Internet Security

Social Engineering Attack Counter Measures
Kevin Mitnick, upon questioning as to how he was able to successfully break into so many protected networks, he revealed that in many cases he simply called the company and asked for the password. More ...

Video - Protect Your Files with Free SafeHouseExplorer Encryption Application
SafeHouse Explorer is a file encryption application that is simple to use and is light weight so its executable can stored on a USB flash drive along with an encrypted volume, allowing you to access the encrypted files, without administrator privileges, using your password, on any PC. More ...

The Windows Bootup Process
Lets take a quick look at how Windows boots up. Depending on whether the system is BIOS-based or EFI-based, the bootup process differs up to the point of passing control to the Kernel. More ...

What is Riskware or Grayware?
Riskware are computer programs that possess features that have the potential to be dangerous. Riskware is usually classified based on its function or behavior. The following are the common types of riskware: Spyware, Adware, Hacker tools, Joke. More ...

Keep Your Internet Browsing Private with InPrivate Browsing
InPrivate Browsing is a feature of Internet Explorer 9 that prevents your browsing history, temporary Internet files, form data, cookies, and user names and passwords from being retained by the browser. More ...

A Guide to Understanding Security and Safe Windows Vista Computing
If you connect to the Internet, allow other people to use your computer, or share files with others, you should take steps to protect your computer from harm. Why? Because there are computer criminals who attack other people's computers. More ...

What is 2-Factor Authentication?
2-Factor Authentication is when you are required to use two types of identification to log into a web site or open your email. Normally the first factor is a password. More ...

Ransomware and How To Protect Yourself
Ransomware is a term for a group of malicious software (or malware) programs that encrypt your files or lock your computer in some way and demand a ransom to decrypt your files or unlock your computer. More ...

Beginner's Guide to Computer Forensics
Computer forensics is the practice of collecting, analysing and reporting on digital information. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. More ...

Phishing Attacks
Phishing is an attack used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. More ...

PC Chassis Intrusion Detection
An unauthorized person might open a PC case to temporarily remove a hard drive to copy its contents, or to reset the system's password. Newer desktop PCs have a sensor located inside their case that detects when the case cover is removed and sends a signal to the BIOS. More ...

Firefox Security Options
Every day thousands of sociopaths spend their entire day online trying to hack into other peoples computers. The Firefox browser offers a number of quick and easy ways to increase your online security. More ...

How to Stay Safe on Public Wi-Fi
More mobile phone users are using public Wi-Fi hotspots. Data sent through public Wi-Fi can easily be intercepted, many mobile device and laptop users are risking the security of their personal information, digital identity and money. More ...


Learn more at amazon.com

Custom Search