Five Things You Can Do To Improve Your Company's Security
As security issues grow more and more prevalent, we CIOs need to improve our environments. Here are some quick things that can be done in short order to help improve security at your business. More ...
Smart Card
Some smart cards contain an embedded microprocessor which can be programed with applications. Some smart cards have electrical contacts, the microprocessor is under a gold contact pad on one side of the card. Many cards are contactless and use radio-frequency to operate. More ...
Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes it join a network of other zombie computers under the control of hackers for the purpose of performing a denial of service (DOS) attack on a website. More ...
How to Protect Yourself Against Keyloggers
Keyloggers are spyware that record every stroke that is made on the keyboard of a computer They gain access to passwords, usernames, bank details, credit card number and data. More ...
Computer Technician's Guide to Biometric Security Devices
A biometric security device uses biological identifiers that are unique to individuals to allow access to a computer or other electronic device. Some unique biological identifiers are voice authentication, the iris of your eye, even face recognition. More ...
FREE Antivirus Software Avast!
Avast! Antivirus Software Free Home Edition is Vb100 and ICSA certified. This means Avast! will detect 100 percent of all known viruses. Avast! provides both file and email protection that works with any POP3/IMAP4 email client. More ...
What Are WEP, WPA, TKIP, AES and PSK?
The acronyms WEP, WPA, TKIP, AES and PSK are all related to encryption used in wireless networking. This article explains their meaning in simple terms. More ...
Has Malware Turned Off Your PC's User Account Control?
The User Account Control prevents software from installing or changes being made to a PC without the user's permission. Unfortunately hackers have used Windows bugs and vulnerabilities to turn off the User Account Control. Use the steps in this article to make sure the User Account Control on your PC is not turned off. More ...
Beginner's Guide to Computer Forensics
Computer forensics is the practice of collecting, analysing and reporting on digital information. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. More ...
An Introduction to Forensics Data Acquisition From Android Mobile Devices
Copying a hard-drive from a desktop or laptop computer is trivial as compared to the data extraction methods needed for mobile devices. This article explains some forensic methods for mobile devices. More ...
Four Tips to Safe Web Browsing
Everybody knows the dangers that lurk on the Internet. The proliferation of scams, spyware and viruses may make you wish to cut the broadband connection and go back to writing letters by hand. The good news, though, is that with a few simple practises, you can better safeguard your computer and yourself. More ...
What is Phishing and How to Safeguard Against It
Every time you open an email you may be subject to a phishing attack. Upon opening a phishing email, which you will believe came from an authentic source such as your bank or eBay or Paypal, you will be directed to a website to enter your personal information. More ...
The Complete Malware Prevention, Protection, and Removal Guide
Malware is software that's designed to infiltrate or damage a computer system without your consent. Viruses, Spyware, Adware, Worms, and Trojan Horses are all Malware. This guide arms you with just about everything you need to prevent, protect, and remove Malware. More ...