Menu
Computer and Internet Security

Seven Steps to a Secure Wireless Network
The signal of a WiFi network can be picked up by any device within range. This means that anyone with a laptop in range of your network may be able to connect to it unless you take precautions. More ...

Computer Architecture, Hardware domain of the CISSP Exam
This article provides a review of the Computer Architecture, Hardware domain of the CISSP (Certified Information Systems Security Professional) exam. More ...

Root Kit - The Hackers Backdoor to Your Computer
A root kit is a trojan horse virus that modifies operating system code to allow it to grant itself system administrator authority and create a backdoor through which the hacker can access your system. A root kit usually installs utilities that allow the hacker to spawn a remote Shell, login, and start processes to open ports, intercept keystokes, collect data, sniff for usernames and passwords, and scan a network for vulnerabilities to exploit. More ...

PC Chassis Intrusion Detection
An unauthorized person might open a PC case to temporarily remove a hard drive to copy its contents, or to reset the system's password. Newer desktop PCs have a sensor located inside their case that detects when the case cover is removed and sends a signal to the BIOS. More ...

The Complete Malware Prevention, Protection, and Removal Guide
Malware is software that's designed to infiltrate or damage a computer system without your consent. Viruses, Spyware, Adware, Worms, and Trojan Horses are all Malware. This guide arms you with just about everything you need to prevent, protect, and remove Malware. More ...

Computer Technician's Guide to Biometric Security Devices
A biometric security device uses biological identifiers that are unique to individuals to allow access to a computer or other electronic device. Some unique biological identifiers are voice authentication, the iris of your eye, even face recognition. More ...

Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes it join a network of other zombie computers under the control of hackers for the purpose of performing a denial of service (DOS) attack on a website. More ...

Beware The Many Forms of Ransomware
Ransomware is a virus that silently encrypts the user's data on their computer. Once the intruder has encrypted the data, a message will appear demanding an amount of money be paid to regain access to the information. More ...

No Software on the Market Removes All Spyware
Spyware is software that, once it's on your system, starts spying on you in various ways. Once installed on your computer spyware will record what you do and send all the information it gathers back to a marketing company. More ...

Set Windows Defender to Scan Core Operating System Files
Windows Defender cannot do a complete job of scanning malware on your PC because in the GUI (Graphical User Interface) mode, some core operating system files are in use. However, you can set Windows Defender to perform a scan before it loads these core operating system files. More ...

Top Eleven Tips for Safe Computing
Probably the greatest threat to the security of your computer system is ... human behavior. A majority of the viruses, bugs, spyware, spam and other nasties can be avoided or reduced by modifying our behavior on the Internet. More ...

The Ransomware Epidemic and What You Can Do
Ransomware is malware that encrypts files on your computer, demanding payment from you to get them back. Once encrypted, it's unlikely the files can be unencrypted. The victim is forced to decide, based on a ticking clock, whether to pay the ransom or lose the data forever. More ...

An Introduction to Forensics Data Acquisition From Android Mobile Devices
Copying a hard-drive from a desktop or laptop computer is trivial as compared to the data extraction methods needed for mobile devices. This article explains some forensic methods for mobile devices. More ...


Learn more at amazon.com

Custom Search