Bienvenido! - Willkommen! - Welcome!

Bitácora Técnica de Tux&Cía., Santa Cruz de la Sierra, BO
Bitácora Central: Tux&Cía.
Bitácora de Información Avanzada: Tux&Cía.-Información
May the source be with you!

Saturday, April 18, 2009

Security 101

Source
A collection of tips, how-to's and other advice to help you understand the basics of computer and network security and protect your system.
Protect Yourself From Phishing Scams
Phishing scams have spiked recently and have become more of a concern. This article talks about what phishing scams are and illustrates five steps users and companies can take to keep from being victimized by phishing scams.
5 Steps To Protect Yourself From Spyware
5 quick and easy steps you can follow to proactively protect yourself from spyware and adware as well as how to detect and remove it once it's on your system.
5 Steps To Secure Windows XP Home
Windows XP Home is more secure than previous home operating systems from Microsoft such as Windows 98 or Windows Me, but it still has a long way to go. Here are 5 steps you can follow to make your Windows XP Home machine more secure.
Creating Secure Passwords
A password is the main line of defense used by most people to secure and protect their computer systems and data. This article will teach you how to choose passwords that provide solid protection.
Free Computer Security 101 Course
A free course to teach you the basics of computer networking and how to use the computer and the Internet safely and securely.
Free WiFi Security 101 Course
A free course via email to teach you the basics of wireless networking and, more importantly, wireless network security.
How To Configure Internet Explorer Security
Microsoft Windows Security 101
An introduction to the major security issues and vulnerabilities for various Windows-based operating systems and servers.
Passwords: Do Not Use Real Words
One of the main tips when creating passwords is to not use any real words, or close approximations of real words, because they are more easily guessed or cracked by password cracking tools.
Peer-to-Peer (P2P) Networking Security
A tutorial article providing tips to use peer-to-peer (p2p) networking sites such as BitTorrent or eMule safely and securely.
Protect Yourself From Phishing Scams
Phishing scams have spiked recently and have become more of a concern. This article talks about what phishing scams are and illustrates five steps users and companies can take to keep from being victimized by phishing scams.
Ten Tips to Prevent Identity Theft
It seems like almost weekly a major security breach is announced involving the compromise of hundreds of thousands or even millions of customer's personal information. The reality is that most identity theft is actually very low-tech and it is up to you to guard your own identity. These ten tips will help you protect yourself from identity theft.
Undo Malware With System Restore
If antivirus, firewalls, anti-spyware and other protective measures don't work, you can simply go back in time to a point before your computer had problems by using System Restore.
Virus Hoaxes and Chain Letters
Users fall victim frequently to virus hoaxes and spam chain letters imploring them to share the information with everyone they know as quickly as possible. This article illustrates why you shouldn't fall for these ridiculous claims.
Wireless Network Security for the Home
An article on how to configure the various security features of wireless access points and routers to ensure that neighbors and hackers can't easily access your home wireless network.

No comments: