What Are WEP, WPA, TKIP, AES and PSK?
The acronyms WEP, WPA, TKIP, AES and PSK are all related to encryption used in wireless networking. This article explains their meaning in simple terms. More ...
What is Phishing and How to Safeguard Against It
Every time you open an email you may be subject to a phishing attack. Upon opening a phishing email, which you will believe came from an authentic source such as your bank or eBay or Paypal, you will be directed to a website to enter your personal information. More ...
No Software on the Market Removes All Spyware
Spyware is software that, once it's on your system, starts spying on you in various ways. Once installed on your computer spyware will record what you do and send all the information it gathers back to a marketing company. More ...
Phishing Attacks
Phishing is an attack used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. More ...
Top Eleven Tips for Safe Computing
Probably the greatest threat to the security of your computer system is ... human behavior. A majority of the viruses, bugs, spyware, spam and other nasties can be avoided or reduced by modifying our behavior on the Internet. More ...
Computer Architecture, Operation of Microprocessor, and the CISSP Exam
This article provides a review of the Computer Architecture, Hardware domain, Operation of Microprocessor of the CISSP (Certified Information Systems Security Professional) exam. More ...
A Guide to Understanding Security and Safe Windows Vista Computing
If you connect to the Internet, allow other people to use your computer, or share files with others, you should take steps to protect your computer from harm. Why? Because there are computer criminals who attack other people's computers. More ...
How Many Spyware Items Are Slowing Down Your Computer?
Spyware and other forms of malicious software are regularly infecting computers across the world. Most computers have no, or little, protection from software with the intent to harm. Most frightening is the frequency at which your computer is being infected without your knowledge. More ...
Beginner's Guide to Computer Forensics
Computer forensics is the practice of collecting, analysing and reporting on digital information. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. More ...
Firefox Security Options
Every day thousands of sociopaths spend their entire day online trying to hack into other peoples computers. The Firefox browser offers a number of quick and easy ways to increase
your online security. More ...
Types of Malicious Software
Malicious software, commonly referred to as "malware" is a term that refers to any software designed to gain access to and use without the owner's knowledge, or cause damage to a computer or a computer network. The various types of malware include adware, spyware, viruses, and rootkits. More ...
How Hackers Crack Passwords
Password cracking is one of the most enjoyable hacks for the bad guys. These methods include using social engineering techniques. To obtain a password through social engineering, you just ask for it. More ...
Four Tips to Safe Web Browsing
Everybody knows the dangers that lurk on the Internet. The proliferation of scams, spyware and viruses may make you wish to cut the broadband connection and go back to writing letters by hand. The good news, though, is that with a few simple practises, you can better safeguard your computer and yourself. More ...