Menu
Computer and Internet Security

What Are WEP, WPA, TKIP, AES and PSK?
The acronyms WEP, WPA, TKIP, AES and PSK are all related to encryption used in wireless networking. This article explains their meaning in simple terms. More ...

How to Remove Virus Without Internet Access
If you suspect that your PC has a virus, you can download an antivirus program to eliminate the virus. But what if a virus is preventing your PC from accessing the Intenet? In that case you'll need to use a PC that does have internet access to download this free Portable virus remover. More ...

Smart Card
Some smart cards contain an embedded microprocessor which can be programed with applications. Some smart cards have electrical contacts, the microprocessor is under a gold contact pad on one side of the card. Many cards are contactless and use radio-frequency to operate. More ...

Computer Architecture, Hardware domain of the CISSP Exam
This article provides a review of the Computer Architecture, Hardware domain of the CISSP (Certified Information Systems Security Professional) exam. More ...

Has Malware Turned Off Your PC's User Account Control?
The User Account Control prevents software from installing or changes being made to a PC without the user's permission. Unfortunately hackers have used Windows bugs and vulnerabilities to turn off the User Account Control. Use the steps in this article to make sure the User Account Control on your PC is not turned off. More ...

The Complete Malware Prevention, Protection, and Removal Guide
Malware is software that's designed to infiltrate or damage a computer system without your consent. Viruses, Spyware, Adware, Worms, and Trojan Horses are all Malware. This guide arms you with just about everything you need to prevent, protect, and remove Malware. More ...

FREE Antivirus Software AVG
AVG Free Edition by Grisoft is Vb100 and ICSA certified. This means AVG will detect 100 percent of all known viruses. AVG provides both file and email protection that works with any POP3/IMAP4 email client, including Outlook and Outlook Express. More ...

BIOS Security
There are several features available in modern BIOS that can be configured to help prevent malicious attacks on a PC. These include Boot Sector Virus Protection, BIOS Password, and BIOS Boot Sequence. More ...

What is Spyware?
Spyware is a type of malware (MALicious softWARE) that can take over your computer, without your knowledge or consent. Most types of spyware gather at personal information about the user, this includes information about your surfing habits, and in extreme cases passwords to Internet bank accounts. More ...

Computer Architecture, Software and Firmware, and the CISSP Exam
Software includes the operating system and programs or applications that are installed on a computer system. Firmware is a program or set of computer instructions stored in the physical circuitry of ROM memory. These types of programs are typically changed infrequently or not at all. More ...

Six Steps to Get and Keep Your Computer Running at Full Speed
Viruses are everywhere. They run ramped across the internet and your computer just might be a virtual playground for these computer bugs. But it simply does not have to be that way. There are certain measures you can take that will stop almost all viruses, trojans, spyware, adware, and worms dead in their tracks. More ...

The Windows Bootup Process
Lets take a quick look at how Windows boots up. Depending on whether the system is BIOS-based or EFI-based, the bootup process differs up to the point of passing control to the Kernel. More ...

Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes it join a network of other zombie computers under the control of hackers for the purpose of performing a denial of service (DOS) attack on a website. More ...


Learn more at amazon.com

Custom Search