Menu
Computer and Internet Security

Six Steps to Get and Keep Your Computer Running at Full Speed
Viruses are everywhere. They run ramped across the internet and your computer just might be a virtual playground for these computer bugs. But it simply does not have to be that way. There are certain measures you can take that will stop almost all viruses, trojans, spyware, adware, and worms dead in their tracks. More ...

Root Kit - The Hackers Backdoor to Your Computer
A root kit is a trojan horse virus that modifies operating system code to allow it to grant itself system administrator authority and create a backdoor through which the hacker can access your system. A root kit usually installs utilities that allow the hacker to spawn a remote Shell, login, and start processes to open ports, intercept keystokes, collect data, sniff for usernames and passwords, and scan a network for vulnerabilities to exploit. More ...

How to Protect Yourself Against Keyloggers
Keyloggers are spyware that record every stroke that is made on the keyboard of a computer They gain access to passwords, usernames, bank details, credit card number and data. More ...

Microsoft Security Essentials
Microsoft Security Essentials (MSE) is a free antivirus program created by Microsoft for Windows XP, Windows Vista, and Windows 7, that provides protection against viruses, spyware, rootkits, and trojans. It replaces Microsoft's subscription-based Windows Live OneCare. More ...

How to Stay Safe on Public Wi-Fi
More mobile phone users are using public Wi-Fi hotspots. Data sent through public Wi-Fi can easily be intercepted, many mobile device and laptop users are risking the security of their personal information, digital identity and money. More ...

Turn On Your Browser's Phishing Filter
You click on a link in an email that takes you to your bank's website where you enter your password and account information. Unfortunately, the email and the very convincing looking webpage was a fake. Your bank account was cleaned out and your identity was stolen. More ...

Four Tips to Safe Web Browsing
Everybody knows the dangers that lurk on the Internet. The proliferation of scams, spyware and viruses may make you wish to cut the broadband connection and go back to writing letters by hand. The good news, though, is that with a few simple practises, you can better safeguard your computer and yourself. More ...

An Introduction to Forensics Data Acquisition From Android Mobile Devices
Copying a hard-drive from a desktop or laptop computer is trivial as compared to the data extraction methods needed for mobile devices. This article explains some forensic methods for mobile devices. More ...

Top Tips To Secure Your Online PC
Most of us use a PC these days, but how many of us are really serious about securing it? Well, not most of us! They just need to get their job done sitting on the PC and hence look no further. But they do find themselves in great trouble when the PC crashes, files are corrupted, login information are stolen or attacked by viruses and malwares. More ...

The Ransomware Epidemic and What You Can Do
Ransomware is malware that encrypts files on your computer, demanding payment from you to get them back. Once encrypted, it's unlikely the files can be unencrypted. The victim is forced to decide, based on a ticking clock, whether to pay the ransom or lose the data forever. More ...

How Hackers Crack Passwords
Password cracking is one of the most enjoyable hacks for the bad guys. These methods include using social engineering techniques. To obtain a password through social engineering, you just ask for it. More ...

Remove Stubborn Malware Infection With McAfee Labs Stinger
Today's malware is extremely aggressive and your regular anti-virus program may encounter a malware it can't get rid of. McAfee Labs free Stinger utility is another tool in your arsenal to detect and remove specific viruses. More ...

PC Chassis Intrusion Detection
An unauthorized person might open a PC case to temporarily remove a hard drive to copy its contents, or to reset the system's password. Newer desktop PCs have a sensor located inside their case that detects when the case cover is removed and sends a signal to the BIOS. More ...


Learn more at amazon.com

Custom Search