Network Security

  • How to use Google as a Hacking Tool - Google Hacks

    Google is a search engine everyone knows but it could be also used as a hacking tool, is not many are aware of. This is true that many hackers find Google of great help when trying hacking a site or computer. How Google could be used as a hacking tool...
    By PreciousJohnDoe August 19, 2011 

  • How to Remove Win32 PSW.OnLineGames - The Gaming Virus

    Are you an addicted gamer & facing problems running games on your computer? If yes, then you need to protect your computer system from the attack of Win32 PSW.OnLineGames virus before it steals your personal and financial information. This is...
    By PreciousJohnDoe August 19, 2011 

  • Wi-Fi Security Software: A Few Recommendations

    Are you unsure about the security of your wireless network? Do you see the need to keep your PC safe by monitoring your Wi-Fi connection? If that's the case then this article is for you. Here you'll familiarize yourself with some useful...
    By Zack Jones August 17, 2011 


  • Conduct an Audit to Secure Your Home Network

    A network security risk analysis audit aims to ensure confidentiality, integrity and availability of the network. It makes a risk assessment, to identify vulnerabilities and threats such as Trojans, malware infections and phishing. A corporate audit is...
    By N Nayab August 12, 2011 

  • Beyond CAPTCHAs – Alternatives of Discerning Humans and Bots

    Here you find text CAPTCHA alternatives discussed including, for instance, image, photo and logics CAPTCHAs. You will see that they hardly achieve more than traditional user – bot differentiation, so we will also look at identification as well as...
    By Mark Muller August 8, 2011 

  • Protecting Network Shared Folders with Passwords

    Recent Windows operating systems do not offer regular password protection for networked shared folders. However, here’s how to password protect a networked shared folder also known as network share by using the Guest account workaround.
    By Mark Muller August 8, 2011 


  • How a Hacker Can Access Your Wireless Internet

    Wireless Internet has become a fairly popular option for browsing the web on the go and for people who want a little freedom of movement in their home. Unfortunately, hacking wireless Internet is a very real possibility.
    By Aaron R. August 5, 2011 

  • The Dark Side of Telnet - Security & Hacking

    Telnet protocols and services have been around since the very beginnings of computers and the Internet, providing the basis for how we connect to the web today. But there is a dark side to using it - the potential of being a victim due to a hack using...
    By Regina Woodard July 14, 2011 

  • The Top Five Security Risks of 2009

    If you were a regular user of MySpace in 2009, or relied on Facebook or Twitter for communication, you've seen some problems this year. Granted, not being able to tweet isn't a major security risk. But for the operators of those sites, they were...
    By Lee Clemmer July 6, 2011 

  • How to Protect Data on a Home Wireless Network

    The Home Wireless Network has proved to be advantageous to many. Employees can now work from the comfort of their home and people can play games across the world. Unfortunately, various security threats rise when such networks are...
    By Regina Woodard July 6, 2011 
showing 11-20 of 169 < Previous   |   page: 1   2   3   4   5  ...   |   Next >