Computer and Internet Security
An Introduction to Forensics Data Acquisition From Android Mobile Devices
Copying a hard-drive from a desktop or laptop computer is trivial as compared to the data extraction methods needed for mobile devices. This article explains some forensic methods for mobile devices. More ...
FREE Antivirus Software Avast!
Avast! Antivirus Software Free Home Edition is Vb100 and ICSA certified. This means Avast!
will detect 100 percent of all known viruses. Avast! provides both file and email protection
that works with any POP3/IMAP4 email client. More ...
Keep Your Firefox Browsing Private
As you browse the web, Firefox saves a lot of information about your activities: phrases you've typed into search engines, sites you've visited, files you've downloaded, and more. There may be times, however, when you don't want other users of your computer to view this information. More ...
Don't Let a Ransomware Attack Hold Your Data Hostage
Internet cyber criminals are achieving greater success at holding peoples files hostage and forcing them to pay ransom. More ...
How Many Spyware Items Are Slowing Down Your Computer?
Spyware and other forms of malicious software are regularly infecting computers across the
world. Most computers have no, or little, protection from software with the intent to harm.
Most frightening is the frequency at which your computer is being infected without your knowledge. More ...
What is Spyware?
Spyware is a type of malware (MALicious softWARE) that can take over your computer, without
your knowledge or consent. Most types of spyware gather at personal information about the user,
this includes information about your surfing habits, and in extreme cases passwords to Internet bank accounts. More ...
The Complete Malware Prevention, Protection, and Removal Guide
Malware is software that's designed to infiltrate or damage a computer system without your
consent. Viruses, Spyware, Adware, Worms, and Trojan Horses are all Malware. This guide arms
you with just about everything you need to prevent, protect, and remove Malware. More ...
Five Critical Steps to Protect Your Personal Information and Computer
Computer security is vital. You can reduce the likelihood of experiencing identity theft by
making your computer as hacker-proof as you can. You need common sense and the right software.
Here are five key points in making your computer as safe as possible. More ...
Top Eleven Tips for Safe Computing
Probably the greatest threat to the security of your computer system is ... human behavior.
A majority of the viruses, bugs, spyware, spam and other nasties can be avoided or reduced by
modifying our behavior on the Internet. More ...
The Ransomware Epidemic and What You Can Do
Ransomware is malware that encrypts files on your computer, demanding payment from you to get them back. Once encrypted, it's unlikely the files can be unencrypted. The victim is forced to decide, based on a ticking clock, whether to pay the ransom or lose the data forever. More ...
DriveLock Hard Drive Protection
DriveLock is a hard disk specification that prevents unauthorized access to the contents of a hard drive. If DriveLock is enabled, at power-on the BIOS requests the user password. More ...
Firefox Security Options
Every day thousands of sociopaths spend their entire day online trying to hack into other peoples computers. The Firefox browser offers a number of quick and easy ways to increase
your online security. More ...