Menu
Computer and Internet Security

PC Chassis Intrusion Detection
An unauthorized person might open a PC case to temporarily remove a hard drive to copy its contents, or to reset the system's password. Newer desktop PCs have a sensor located inside their case that detects when the case cover is removed and sends a signal to the BIOS. More ...

How to Stay Safe on Public Wi-Fi
More mobile phone users are using public Wi-Fi hotspots. Data sent through public Wi-Fi can easily be intercepted, many mobile device and laptop users are risking the security of their personal information, digital identity and money. More ...

FREE Antivirus Software Avast!
Avast! Antivirus Software Free Home Edition is Vb100 and ICSA certified. This means Avast! will detect 100 percent of all known viruses. Avast! provides both file and email protection that works with any POP3/IMAP4 email client. More ...

Root Kit - The Hackers Backdoor to Your Computer
A root kit is a trojan horse virus that modifies operating system code to allow it to grant itself system administrator authority and create a backdoor through which the hacker can access your system. A root kit usually installs utilities that allow the hacker to spawn a remote Shell, login, and start processes to open ports, intercept keystokes, collect data, sniff for usernames and passwords, and scan a network for vulnerabilities to exploit. More ...

Guide to Selecting the Right Spyware Removal Tool
Spyware refers to software that collects useful information from your personal computer and sends to another computer without your permission. If it is installed on your system it monitors your all Internet related activities and then transmits your private information to other party. You can easily remove spyware by getting all information about spyware. More ...

Social Engineering Attack Counter Measures
Kevin Mitnick, upon questioning as to how he was able to successfully break into so many protected networks, he revealed that in many cases he simply called the company and asked for the password. More ...

Phishing Attacks
Phishing is an attack used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. More ...

Keep Your Firefox Browsing Private
As you browse the web, Firefox saves a lot of information about your activities: phrases you've typed into search engines, sites you've visited, files you've downloaded, and more. There may be times, however, when you don't want other users of your computer to view this information. More ...

Set Windows Defender to Scan Core Operating System Files
Windows Defender cannot do a complete job of scanning malware on your PC because in the GUI (Graphical User Interface) mode, some core operating system files are in use. However, you can set Windows Defender to perform a scan before it loads these core operating system files. More ...

Beginner's Guide to Computer Forensics
Computer forensics is the practice of collecting, analysing and reporting on digital information. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. More ...

Beware The Many Forms of Ransomware
Ransomware is a virus that silently encrypts the user's data on their computer. Once the intruder has encrypted the data, a message will appear demanding an amount of money be paid to regain access to the information. More ...

Don't Let a Ransomware Attack Hold Your Data Hostage
Internet cyber criminals are achieving greater success at holding peoples files hostage and forcing them to pay ransom. More ...

Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This information is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...


Learn more at amazon.com

Custom Search