Menu
Custom Search

Computer and Internet Security

What's a Root Kit and How Hackers Are Getting Into Your Computer With It
The key distinction between a computer virus and a root kit relates to propagation. Like a root kit a computer virus modifies core software components of the system, inserting code which attempts to hide the "infection" and provides some additional feature or service to the attacker. More ...

Video - Protect Your Files with Free SafeHouseExplorer Encryption Application
SafeHouse Explorer is a file encryption application that is simple to use and is light weight so its executable can stored on a USB flash drive along with an encrypted volume, allowing you to access the encrypted files, without administrator privileges, using your password, on any PC. More ...

Ransomware and How To Protect Yourself
Ransomware is a term for a group of malicious software (or malware) programs that encrypt your files or lock your computer in some way and demand a ransom to decrypt your files or unlock your computer. More ...

Trusted Platform Module (TPM)
The TPM is an embedded security chip, usually installed on the motherboard, that stores encryption keys in a protected EEPROM. When the TPM stores encryption keys, it encrypts them so that they can be decrypted only by the TPM. More ...

What is Riskware or Grayware?
Riskware are computer programs that possess features that have the potential to be dangerous. Riskware is usually classified based on its function or behavior. The following are the common types of riskware: Spyware, Adware, Hacker tools, Joke. More ...

The Ransomware Epidemic and What You Can Do
Ransomware is malware that encrypts files on your computer, demanding payment from you to get them back. Once encrypted, it's unlikely the files can be unencrypted. The victim is forced to decide, based on a ticking clock, whether to pay the ransom or lose the data forever. More ...

Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes it join a network of other zombie computers under the control of hackers for the purpose of performing a denial of service (DOS) attack on a website. More ...

Tips to Protect Windows Vista Operating System
Windows Vista can be considered a safe operating system but not a perfect one. In its default configuration, Vista still uncovers the possibility of leaking out the user's data to the Internet through Windows Firewall, or some bots which can change settings without letting you know. More ...

Top Tips To Secure Your Online PC
Most of us use a PC these days, but how many of us are really serious about securing it? Well, not most of us! They just need to get their job done sitting on the PC and hence look no further. But they do find themselves in great trouble when the PC crashes, files are corrupted, login information are stolen or attacked by viruses and malwares. More ...

Firefox Security Options
Every day thousands of sociopaths spend their entire day online trying to hack into other peoples computers. The Firefox browser offers a number of quick and easy ways to increase your online security. More ...

Beginner's Guide to Computer Forensics
Computer forensics is the practice of collecting, analysing and reporting on digital information. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. More ...

No Software on the Market Removes All Spyware
Spyware is software that, once it's on your system, starts spying on you in various ways. Once installed on your computer spyware will record what you do and send all the information it gathers back to a marketing company. More ...