Computer and Internet Security
Six Steps to Get and Keep Your Computer Running at Full Speed
Viruses are everywhere. They run ramped across the internet and your computer just might be
a virtual playground for these computer bugs. But it simply does not have to be that way.
There are certain measures you can take that will stop almost all viruses, trojans, spyware,
adware, and worms dead in their tracks. More ...
The Windows Bootup Process
Lets take a quick look at how Windows boots up. Depending on whether the system is BIOS-based or EFI-based, the bootup process differs up to the point of passing control to the Kernel. More ...
Turn On Your Browser's Phishing Filter
You click on a link in an email that takes you to your bank's website where you enter your password
and account information. Unfortunately, the email and the very convincing looking webpage was a fake.
Your bank account was cleaned out and your identity was stolen. More ...
How Many Spyware Items Are Slowing Down Your Computer?
Spyware and other forms of malicious software are regularly infecting computers across the
world. Most computers have no, or little, protection from software with the intent to harm.
Most frightening is the frequency at which your computer is being infected without your knowledge. More ...
Five Critical Steps to Protect Your Personal Information and Computer
Computer security is vital. You can reduce the likelihood of experiencing identity theft by
making your computer as hacker-proof as you can. You need common sense and the right software.
Here are five key points in making your computer as safe as possible. More ...
Tips to Protect Windows Vista Operating System
Windows Vista can be considered a safe operating system but not a perfect one. In its
default configuration, Vista still uncovers the possibility of leaking out the user's
data to the Internet through Windows Firewall, or some bots which can change settings
without letting you know. More ...
Root Kit - The Hackers Backdoor to Your Computer
A root kit is a trojan horse virus that modifies operating system code to allow it to grant
itself system administrator authority and create a backdoor through which the hacker can
access your system. A root kit usually installs utilities that allow the hacker to spawn
a remote Shell, login, and start processes to open ports, intercept keystokes, collect data,
sniff for usernames and passwords, and scan a network for vulnerabilities to exploit. More ...
Keep Your Firefox Browsing Private
As you browse the web, Firefox saves a lot of information about your activities: phrases
you've typed into search engines, sites you've visited, files you've downloaded, and more.
There may be times, however, when you don't want other users of your computer to view this information. More ...
Avoid the Indigestion of Cookies
You may have heard of cookies, a cute name for a tiny piece of code that is stored
on your computer when you visit some websites. In most cases, cookies are harmless,
but more aggresive companies use them to track who you are and where you go. This
has obvious privacy concerns. More ...
Types of Malicious Software
Malicious software, commonly referred to as "malware" is a term that refers to any
software designed to gain access to and use without the owner's knowledge, or cause
damage to a computer or a computer network. The various types of malware include
adware, spyware, viruses, and rootkits. More ...
No Software on the Market Removes All Spyware
Spyware is software that, once it's on your system, starts spying on you in various ways. Once
installed on your computer spyware will record what you do and send all the information it
gathers back to a marketing company. More ...
A Guide to Understanding Security and Safe Windows Vista Computing
If you connect to the Internet, allow other people to use your computer, or share files
with others, you should take steps to protect your computer from harm. Why? Because there
are computer criminals who attack other people's computers. More ...