Menu
Computer and Internet Security

The Windows Bootup Process
Lets take a quick look at how Windows boots up. Depending on whether the system is BIOS-based or EFI-based, the bootup process differs up to the point of passing control to the Kernel. More ...

How to Protect Yourself Against Keyloggers
Keyloggers are spyware that record every stroke that is made on the keyboard of a computer They gain access to passwords, usernames, bank details, credit card number and data. More ...

Computer Architecture, Software and Firmware, and the CISSP Exam
Software includes the operating system and programs or applications that are installed on a computer system. Firmware is a program or set of computer instructions stored in the physical circuitry of ROM memory. These types of programs are typically changed infrequently or not at all. More ...

Beware The Many Forms of Ransomware
Ransomware is a virus that silently encrypts the user's data on their computer. Once the intruder has encrypted the data, a message will appear demanding an amount of money be paid to regain access to the information. More ...

Set Windows 10 Controlled Folder Access to Protect Against Ransomware
The best defense against ransomware is, of course, performing frequent backups. But in Windows 10 Security you can configure Ransomware protection to block unauthorized apps from making changes to files on your computer. More ...

How Many Spyware Items Are Slowing Down Your Computer?
Spyware and other forms of malicious software are regularly infecting computers across the world. Most computers have no, or little, protection from software with the intent to harm. Most frightening is the frequency at which your computer is being infected without your knowledge. More ...

FREE Antivirus Software AVG
AVG Free Edition by Grisoft is Vb100 and ICSA certified. This means AVG will detect 100 percent of all known viruses. AVG provides both file and email protection that works with any POP3/IMAP4 email client, including Outlook and Outlook Express. More ...

The Complete Malware Prevention, Protection, and Removal Guide
Malware is software that's designed to infiltrate or damage a computer system without your consent. Viruses, Spyware, Adware, Worms, and Trojan Horses are all Malware. This guide arms you with just about everything you need to prevent, protect, and remove Malware. More ...

Root Kit - The Hackers Backdoor to Your Computer
A root kit is a trojan horse virus that modifies operating system code to allow it to grant itself system administrator authority and create a backdoor through which the hacker can access your system. A root kit usually installs utilities that allow the hacker to spawn a remote Shell, login, and start processes to open ports, intercept keystokes, collect data, sniff for usernames and passwords, and scan a network for vulnerabilities to exploit. More ...

The Seven Most Common Methods of Cyber Attacks
Cyber attacks, which range from stealing individual or corporate data to creating multimillion-dollar scams, are reported with increasing frequency. Cyber thieves either secretly assume control of the user's system or steal the user's credentials. Let's take a look at the seven most common ways an attacker makes his way into a system. More ...

Smart Card
Some smart cards contain an embedded microprocessor which can be programed with applications. Some smart cards have electrical contacts, the microprocessor is under a gold contact pad on one side of the card. Many cards are contactless and use radio-frequency to operate. More ...

What is Spyware?
Spyware is a type of malware (MALicious softWARE) that can take over your computer, without your knowledge or consent. Most types of spyware gather at personal information about the user, this includes information about your surfing habits, and in extreme cases passwords to Internet bank accounts. More ...

Computer Architecture, Operation of Microprocessor, and the CISSP Exam
This article provides a review of the Computer Architecture, Hardware domain, Operation of Microprocessor of the CISSP (Certified Information Systems Security Professional) exam. More ...


Learn more at amazon.com

Custom Search