Avoid the Indigestion of Cookies
You may have heard of cookies, a cute name for a tiny piece of code that is stored on your computer when you visit some websites. In most cases, cookies are harmless, but more aggresive companies use them to track who you are and where you go. This has obvious privacy concerns. More ...
Seven Steps to a Secure Wireless Network
The signal of a WiFi network can be picked up by any device within range. This means that anyone with a laptop in range of your network may be able to connect to it unless you take precautions. More ...
BIOS Security
There are several features available in modern BIOS that can be configured to help prevent malicious attacks on a PC. These include Boot Sector Virus Protection, BIOS Password, and BIOS Boot Sequence. More ...
How to Stay Safe on Public Wi-Fi
More mobile phone users are using public Wi-Fi hotspots. Data sent through public Wi-Fi can easily be intercepted, many mobile device and laptop users are risking the security of their personal information, digital identity and money. More ...
Video - Protect Your Files with Free SafeHouseExplorer Encryption Application
SafeHouse Explorer is a file encryption application that is simple to use and is light weight so its executable can stored on a USB flash drive along with an encrypted volume, allowing you to access the encrypted files, without administrator privileges, using your password, on any PC. More ...
Social Engineering Attack Counter Measures
Kevin Mitnick, upon questioning as to how he was able to successfully break into so many protected networks, he revealed that in many cases he simply called the company and asked for the password. More ...
Tips to Protect Windows Vista Operating System
Windows Vista can be considered a safe operating system but not a perfect one. In its default configuration, Vista still uncovers the possibility of leaking out the user's data to the Internet through Windows Firewall, or some bots which can change settings without letting you know. More ...
Types of Malicious Software
Malicious software, commonly referred to as "malware" is a term that refers to any software designed to gain access to and use without the owner's knowledge, or cause damage to a computer or a computer network. The various types of malware include adware, spyware, viruses, and rootkits. More ...
Computer Technician's Guide to Biometric Security Devices
A biometric security device uses biological identifiers that are unique to individuals to allow access to a computer or other electronic device. Some unique biological identifiers are voice authentication, the iris of your eye, even face recognition. More ...
Beware The Many Forms of Ransomware
Ransomware is a virus that silently encrypts the user's data on their computer. Once the intruder has encrypted the data, a message will appear demanding an amount of money be paid to regain access to the information. More ...
What Are WEP, WPA, TKIP, AES and PSK?
The acronyms WEP, WPA, TKIP, AES and PSK are all related to encryption used in wireless networking. This article explains their meaning in simple terms. More ...
Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes it join a network of other zombie computers under the control of hackers for the purpose of performing a denial of service (DOS) attack on a website. More ...
Guide to Selecting the Right Spyware Removal Tool
Spyware refers to software that collects useful information from your personal computer and sends to another computer without your permission. If it is installed on your system it monitors your all Internet related activities and then transmits your private information to other party. You can easily remove spyware by getting all information about spyware. More ...