Computer and Internet Security
PC Chassis Intrusion Detection
An unauthorized person might open a PC case to temporarily remove a hard drive to copy
its contents, or to reset the system's password. Newer desktop PCs have a sensor located
inside their case that detects when the case cover is removed and sends a signal to the BIOS. More ...
Flash Animations and Videos Install Viruses
Adobe Flash is a bloated computer-choking plug-in that not only slows down your computer,
but may also install viruses. The information in this article will allow you to take control
of Flash to speed up and protect your computer. More ...
Some smart cards contain an embedded microprocessor which can be programed with
applications. Some smart cards have electrical contacts, the microprocessor is
under a gold contact pad on one side of the card. Many cards are contactless
and use radio-frequency to operate. More ...
What's a Root Kit and How Hackers Are Getting Into Your Computer With It
The key distinction between a computer virus and a root kit relates to propagation. Like a
root kit a computer virus modifies core software components of the system, inserting code
which attempts to hide the "infection" and provides some additional feature or service to the attacker. More ...
FREE Antivirus Software AVG
AVG Free Edition by Grisoft is Vb100 and ICSA certified. This means AVG will detect 100 percent
of all known viruses. AVG provides both file and email protection that works with any
POP3/IMAP4 email client, including Outlook and Outlook Express. More ...
Top Features to Look for in Antivirus Software
With up to 100 new malware threats being discovered every 24 hours, it's absolutely crucial to buy
antivirus software that can effectively identify and block malware. This guide will explain some of the
most important features and functions that reliable antivirus software needs to have. More ...
The Ransomware Epidemic and What You Can Do
Ransomware is malware that encrypts files on your computer, demanding payment from you to get them back.
Once encrypted, it's unlikely the files can be unencrypted. The victim is forced to decide, based on a
ticking clock, whether to pay the ransom or lose the data forever. More ...
What is Phishing and How to Safeguard Against It
Every time you open an email you may be subject to a phishing attack. Upon opening a phishing
email, which you will believe came from an authentic source such as your bank or eBay or Paypal,
you will be directed to a website to enter your personal information. More ...
Top Eleven Tips for Safe Computing
Probably the greatest threat to the security of your computer system is ... human behavior.
A majority of the viruses, bugs, spyware, spam and other nasties can be avoided or reduced by
modifying our behavior on the Internet. More ...
Remove Spyware with Spybot - Search & Destroy
How do you know if your PC is hosting spyware? The worst kind of spyware you may not
have any indication it's there - a key logger that will log every keystroke you make in order
to capture your passwords and credit card information. More ...
A Guide to Understanding Security and Safe Windows Vista Computing
If you connect to the Internet, allow other people to use your computer, or share files
with others, you should take steps to protect your computer from harm. Why? Because there
are computer criminals who attack other people's computers. More ...
Botnets - What Are They?
A botnet is malicious software that takes over a computer and turns it into a zombie and makes
it join a network of other zombie computers under the control of hackers for the purpose of
performing a denial of service (DOS) attack on a website. More ...