Menu
Computer and Internet Security

What Are WEP, WPA, TKIP, AES and PSK?
The acronyms WEP, WPA, TKIP, AES and PSK are all related to encryption used in wireless networking. This article explains their meaning in simple terms. More ...

Phishing Attacks
Phishing is an attack used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. More ...

How Hackers Crack Passwords
Password cracking is one of the most enjoyable hacks for the bad guys. These methods include using social engineering techniques. To obtain a password through social engineering, you just ask for it. More ...

What's a Root Kit and How Hackers Are Getting Into Your Computer With It
The key distinction between a computer virus and a root kit relates to propagation. Like a root kit a computer virus modifies core software components of the system, inserting code which attempts to hide the "infection" and provides some additional feature or service to the attacker. More ...

Set Windows 10 Controlled Folder Access to Protect Against Ransomware
The best defense against ransomware is, of course, performing frequent backups. But in Windows 10 Security you can configure Ransomware protection to block unauthorized apps from making changes to files on your computer. More ...

Disable Remote Access
Remote access to your computer is a way to get technical assistance, but after your problem is resolved, it allows a huge security risk. More ...

Social Engineering Attack Counter Measures
Kevin Mitnick, upon questioning as to how he was able to successfully break into so many protected networks, he revealed that in many cases he simply called the company and asked for the password. More ...

Root Kit - The Hackers Backdoor to Your Computer
A root kit is a trojan horse virus that modifies operating system code to allow it to grant itself system administrator authority and create a backdoor through which the hacker can access your system. A root kit usually installs utilities that allow the hacker to spawn a remote Shell, login, and start processes to open ports, intercept keystokes, collect data, sniff for usernames and passwords, and scan a network for vulnerabilities to exploit. More ...

What is Spyware?
Spyware is a type of malware (MALicious softWARE) that can take over your computer, without your knowledge or consent. Most types of spyware gather at personal information about the user, this includes information about your surfing habits, and in extreme cases passwords to Internet bank accounts. More ...

Don't Let a Ransomware Attack Hold Your Data Hostage
Internet cyber criminals are achieving greater success at holding peoples files hostage and forcing them to pay ransom. More ...

DriveLock Hard Drive Protection
DriveLock is a hard disk specification that prevents unauthorized access to the contents of a hard drive. If DriveLock is enabled, at power-on the BIOS requests the user password. More ...

Keep Your Internet Browsing Private with InPrivate Browsing
InPrivate Browsing is a feature of Internet Explorer 9 that prevents your browsing history, temporary Internet files, form data, cookies, and user names and passwords from being retained by the browser. More ...

The Ransomware Epidemic and What You Can Do
Ransomware is malware that encrypts files on your computer, demanding payment from you to get them back. Once encrypted, it's unlikely the files can be unencrypted. The victim is forced to decide, based on a ticking clock, whether to pay the ransom or lose the data forever. More ...


Learn more at amazon.com

Custom Search