Menu
Computer and Internet Security

Avoid the Indigestion of Cookies
You may have heard of cookies, a cute name for a tiny piece of code that is stored on your computer when you visit some websites. In most cases, cookies are harmless, but more aggresive companies use them to track who you are and where you go. This has obvious privacy concerns. More ...

Seven Steps to a Secure Wireless Network
The signal of a WiFi network can be picked up by any device within range. This means that anyone with a laptop in range of your network may be able to connect to it unless you take precautions. More ...

PC Chassis Intrusion Detection
An unauthorized person might open a PC case to temporarily remove a hard drive to copy its contents, or to reset the system's password. Newer desktop PCs have a sensor located inside their case that detects when the case cover is removed and sends a signal to the BIOS. More ...

Social Engineering Attack Counter Measures
Kevin Mitnick, upon questioning as to how he was able to successfully break into so many protected networks, he revealed that in many cases he simply called the company and asked for the password. More ...

Beware The Many Forms of Ransomware
Ransomware is a virus that silently encrypts the user's data on their computer. Once the intruder has encrypted the data, a message will appear demanding an amount of money be paid to regain access to the information. More ...

How to Protect Yourself Against Keyloggers
Keyloggers are spyware that record every stroke that is made on the keyboard of a computer They gain access to passwords, usernames, bank details, credit card number and data. More ...

What's a Root Kit and How Hackers Are Getting Into Your Computer With It
The key distinction between a computer virus and a root kit relates to propagation. Like a root kit a computer virus modifies core software components of the system, inserting code which attempts to hide the "infection" and provides some additional feature or service to the attacker. More ...

What Are WEP, WPA, TKIP, AES and PSK?
The acronyms WEP, WPA, TKIP, AES and PSK are all related to encryption used in wireless networking. This article explains their meaning in simple terms. More ...

Video - Protect Your Files with Free SafeHouseExplorer Encryption Application
SafeHouse Explorer is a file encryption application that is simple to use and is light weight so its executable can stored on a USB flash drive along with an encrypted volume, allowing you to access the encrypted files, without administrator privileges, using your password, on any PC. More ...

Encryption, Designed to Protect Data, is Internet Criminal's Best Tool
Encryption was designed to protect the data. Pirates now use this tool to not only encrypt your data and but also charge you to unencrypt it. They don't even have to take possession of anything. More ...

The Complete Malware Prevention, Protection, and Removal Guide
Malware is software that's designed to infiltrate or damage a computer system without your consent. Viruses, Spyware, Adware, Worms, and Trojan Horses are all Malware. This guide arms you with just about everything you need to prevent, protect, and remove Malware. More ...

Beginner's Guide to Computer Forensics
Computer forensics is the practice of collecting, analysing and reporting on digital information. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. More ...

Trusted Platform Module (TPM)
The TPM is an embedded security chip, usually installed on the motherboard, that stores encryption keys in a protected EEPROM. When the TPM stores encryption keys, it encrypts them so that they can be decrypted only by the TPM. More ...


Learn more at amazon.com

Custom Search