Computer and Internet Security
Six Steps to Get and Keep Your Computer Running at Full Speed
Viruses are everywhere. They run ramped across the internet and your computer just might be
a virtual playground for these computer bugs. But it simply does not have to be that way.
There are certain measures you can take that will stop almost all viruses, trojans, spyware,
adware, and worms dead in their tracks. More ...
How to Remove Virus Without Internet Access
If you suspect that your PC has a virus, you can download an antivirus program
to eliminate the virus. But what if a virus is preventing your PC from accessing
the Intenet? In that case you'll need to use a PC that does have internet access
to download this free Portable virus remover. More ...
Firefox Security Options
Every day thousands of sociopaths spend their entire day online trying to hack into other
peoples computers. The Firefox browser offers a number of quick and easy ways to increase
your online security. More ...
Five Critical Steps to Protect Your Personal Information and Computer
Computer security is vital. You can reduce the likelihood of experiencing identity theft by
making your computer as hacker-proof as you can. You need common sense and the right software.
Here are five key points in making your computer as safe as possible. More ...
Top Eleven Tips for Safe Computing
Probably the greatest threat to the security of your computer system is ... human behavior.
A majority of the viruses, bugs, spyware, spam and other nasties can be avoided or reduced by
modifying our behavior on the Internet. More ...
Turn On Your Browser's Phishing Filter
You click on a link in an email that takes you to your bank's website where you enter your password
and account information. Unfortunately, the email and the very convincing looking webpage was a fake.
Your bank account was cleaned out and your identity was stolen. More ...
What is Spyware?
Spyware is a type of malware (MALicious softWARE) that can take over your computer, without
your knowledge or consent. Most types of spyware gather at personal information about the user,
this includes information about your surfing habits, and in extreme cases passwords to Internet bank accounts. More ...
Top Features to Look for in Antivirus Software
With up to 100 new malware threats being discovered every 24 hours, it's absolutely crucial to buy
antivirus software that can effectively identify and block malware. This guide will explain some of the
most important features and functions that reliable antivirus software needs to have. More ...
There are several features available in modern BIOS that can be configured to help
prevent malicious attacks on a PC. These include Boot Sector Virus Protection,
BIOS Password, and BIOS Boot Sequence. More ...
Avoid the Indigestion of Cookies
You may have heard of cookies, a cute name for a tiny piece of code that is stored
on your computer when you visit some websites. In most cases, cookies are harmless,
but more aggresive companies use them to track who you are and where you go. This
has obvious privacy concerns. More ...
Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes
it join a network of other zombie computers under the control of hackers for the purpose of
performing a denial of service (DOS) attack on a website. More ...
Root Kit - The Hackers Backdoor to Your Computer
A root kit is a trojan horse virus that modifies operating system code to allow it to grant
itself system administrator authority and create a backdoor through which the hacker can
access your system. A root kit usually installs utilities that allow the hacker to spawn
a remote Shell, login, and start processes to open ports, intercept keystokes, collect data,
sniff for usernames and passwords, and scan a network for vulnerabilities to exploit. More ...