Computer Architecture, Hardware domain of the CISSP Exam
This article provides a review of the Computer Architecture, Hardware domain of the CISSP (Certified Information Systems Security Professional) exam. More ...
Computer Architecture, Operation of Microprocessor, and the CISSP Exam
This article provides a review of the Computer Architecture, Hardware domain, Operation of Microprocessor of the CISSP (Certified Information Systems Security Professional) exam. More ...
What is Phishing and How to Safeguard Against It
Every time you open an email you may be subject to a phishing attack. Upon opening a phishing email, which you will believe came from an authentic source such as your bank or eBay or Paypal, you will be directed to a website to enter your personal information. More ...
DriveLock Hard Drive Protection
DriveLock is a hard disk specification that prevents unauthorized access to the contents of a hard drive. If DriveLock is enabled, at power-on the BIOS requests the user password. More ...
How to Stay Safe on Public Wi-Fi
More mobile phone users are using public Wi-Fi hotspots. Data sent through public Wi-Fi can easily be intercepted, many mobile device and laptop users are risking the security of their personal information, digital identity and money. More ...
Top Eleven Tips for Safe Computing
Probably the greatest threat to the security of your computer system is ... human behavior. A majority of the viruses, bugs, spyware, spam and other nasties can be avoided or reduced by modifying our behavior on the Internet. More ...
Computer Technician's Guide to Biometric Security Devices
A biometric security device uses biological identifiers that are unique to individuals to allow access to a computer or other electronic device. Some unique biological identifiers are voice authentication, the iris of your eye, even face recognition. More ...
Microsoft Security Essentials
Microsoft Security Essentials (MSE) is a free antivirus program created by Microsoft for Windows XP, Windows Vista, and Windows 7, that provides protection against viruses, spyware, rootkits, and trojans. It replaces Microsoft's subscription-based Windows Live OneCare. More ...
What is 2-Factor Authentication?
2-Factor Authentication is when you are required to use two types of identification to log into a web site or open your email. Normally the first factor is a password. More ...
Five Things You Can Do To Improve Your Company's Security
As security issues grow more and more prevalent, we CIOs need to improve our environments. Here are some quick things that can be done in short order to help improve security at your business. More ...
Remove Stubborn Malware Infection With McAfee Labs Stinger
Today's malware is extremely aggressive and your regular anti-virus program may encounter a malware it can't get rid of. McAfee Labs free Stinger utility is another tool in your arsenal to detect and remove specific viruses. More ...
Computer Architecture, Software and Firmware, and the CISSP Exam
Software includes the operating system and programs or applications that are installed on a computer system. Firmware is a program or set of computer instructions stored in the physical circuitry of ROM memory. These types of programs are typically changed infrequently or not at all. More ...
Guide to Selecting the Right Spyware Removal Tool
Spyware refers to software that collects useful information from your personal computer and sends to another computer without your permission. If it is installed on your system it monitors your all Internet related activities and then transmits your private information to other party. You can easily remove spyware by getting all information about spyware. More ...