Source
A collection of tips, how-to's and other advice to help you understand the basics of computer and network security and protect your system.
Phishing scams have spiked recently and have become more of a concern. This article talks about what phishing scams are and illustrates five steps users and companies can take to keep from being victimized by phishing scams.
5 quick and easy steps you can follow to proactively protect yourself from spyware and adware as well as how to detect and remove it once it's on your system.
Windows XP Home is more secure than previous home operating systems from Microsoft such as Windows 98 or Windows Me, but it still has a long way to go. Here are 5 steps you can follow to make your Windows XP Home machine more secure.
A password is the main line of defense used by most people to secure and protect their computer systems and data. This article will teach you how to choose passwords that provide solid protection.
A free course to teach you the basics of computer networking and how to use the computer and the Internet safely and securely.
A free course via email to teach you the basics of wireless networking and, more importantly, wireless network security.
An introduction to the major security issues and vulnerabilities for various Windows-based operating systems and servers.
One of the main tips when creating passwords is to not use any real words, or close approximations of real words, because they are more easily guessed or cracked by password cracking tools.
A tutorial article providing tips to use peer-to-peer (p2p) networking sites such as BitTorrent or eMule safely and securely.
Phishing scams have spiked recently and have become more of a concern. This article talks about what phishing scams are and illustrates five steps users and companies can take to keep from being victimized by phishing scams.
It seems like almost weekly a major security breach is announced involving the compromise of hundreds of thousands or even millions of customer's personal information. The reality is that most identity theft is actually very low-tech and it is up to you to guard your own identity. These ten tips will help you protect yourself from identity theft.
If antivirus, firewalls, anti-spyware and other protective measures don't work, you can simply go back in time to a point before your computer had problems by using System Restore.
Users fall victim frequently to virus hoaxes and spam chain letters imploring them to share the information with everyone they know as quickly as possible. This article illustrates why you shouldn't fall for these ridiculous claims.
An article on how to configure the various security features of wireless access points and routers to ensure that neighbors and hackers can't easily access your home wireless network.
No comments:
Post a Comment