Computer Architecture, Software and Firmware, and the CISSP Exam
Software includes the operating system and programs or applications that are installed on a computer system. Firmware is a program or set of computer instructions stored in the physical circuitry of ROM memory. These types of programs are typically changed infrequently or not at all. More ...
Types of Malicious Software
Malicious software, commonly referred to as "malware" is a term that refers to any software designed to gain access to and use without the owner's knowledge, or cause damage to a computer or a computer network. The various types of malware include adware, spyware, viruses, and rootkits. More ...
Microsoft Security Essentials
Microsoft Security Essentials (MSE) is a free antivirus program created by Microsoft for Windows XP, Windows Vista, and Windows 7, that provides protection against viruses, spyware, rootkits, and trojans. It replaces Microsoft's subscription-based Windows Live OneCare. More ...
Ransomware and How To Protect Yourself
Ransomware is a term for a group of malicious software (or malware) programs that encrypt your files or lock your computer in some way and demand a ransom to decrypt your files or unlock your computer. More ...
The Seven Most Common Methods of Cyber Attacks
Cyber attacks, which range from stealing individual or corporate data to creating multimillion-dollar scams, are reported with increasing frequency. Cyber thieves either secretly assume control of the user's system or steal the user's credentials. Let's take a look at the seven most common ways an attacker makes his way into a system. More ...
Video - Protect Your Files with Free SafeHouseExplorer Encryption Application
SafeHouse Explorer is a file encryption application that is simple to use and is light weight so its executable can stored on a USB flash drive along with an encrypted volume, allowing you to access the encrypted files, without administrator privileges, using your password, on any PC. More ...
The Windows Bootup Process
Lets take a quick look at how Windows boots up. Depending on whether the system is BIOS-based or EFI-based, the bootup process differs up to the point of passing control to the Kernel. More ...
Smart Card
Some smart cards contain an embedded microprocessor which can be programed with applications. Some smart cards have electrical contacts, the microprocessor is under a gold contact pad on one side of the card. Many cards are contactless and use radio-frequency to operate. More ...
Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes it join a network of other zombie computers under the control of hackers for the purpose of performing a denial of service (DOS) attack on a website. More ...
What is 2-Factor Authentication?
2-Factor Authentication is when you are required to use two types of identification to log into a web site or open your email. Normally the first factor is a password. More ...
Remove Spyware with Spybot - Search & Destroy
How do you know if your PC is hosting spyware? The worst kind of spyware you may not have any indication it's there - a key logger that will log every keystroke you make in order to capture your passwords and credit card information. More ...
Top Features to Look for in Antivirus Software
With up to 100 new malware threats being discovered every 24 hours, it's absolutely crucial to buy antivirus software that can effectively identify and block malware. This guide will explain some of the most important features and functions that reliable antivirus software needs to have. More ...
The Ransomware Epidemic and What You Can Do
Ransomware is malware that encrypts files on your computer, demanding payment from you to get them back. Once encrypted, it's unlikely the files can be unencrypted. The victim is forced to decide, based on a ticking clock, whether to pay the ransom or lose the data forever. More ...