Tom Olzak, CISSP

Keylogger Defense and Removal

Probably the most insidious malware, keyloggers collect everything you type on your keyboard and make it available to cyber-criminals. This article examines how keyloggers work, two types of keyloggers, and what you can do to protect your privacy.

Gain Remote Access through Firewalls

Small and home office (SOHO) users often want to access a server or desktop computer while on the road. This article describes safe free and fee-based remote access solutions, which are also useful for remote access to your home desktop from the office or other remote location.

What is Network Access Control?

Black hat hackers seem to have innumerable ways to compromise your network once connected–connected in any way. Further, users will connect anything you allow to snatch an IP address. So, security control all organizations should begin considering is network access control.

How Does Network Security Work?

How does network security work? This is a complicated question, but in this article I break the concept of network security into its major components. By the time you finish reading, you will have a high-level understanding of the what’s and how’s of network security.

How to Detect Spyware on Your Computer

Detecting spyware is easy if there is a lot of it on your computer. If only one or two instances exist, it isn’t so easy to realize someone is collecting your information. In this article, we examine ways to detect spyware on a computer, no matter how much you’ve downloaded and installed.

What is the Definition of Spyware?

One of the many classes of things you don’t want to find its way to your computer is spyware. Spyware, and its near cousin adware, are unwanted guests which frustrate, and sometimes violate the privacy of, users. In this article, spyware is defined.

Free Malware Removal: How Do I Remove Malware?

How do I remove malware? Can I use free malware removal tools? It depends on how well you protect your home or business using security best practices such as router configuration and a firewall. Once basic protection is in place, a free anti-virus solution may be the best choice.

How Malware Works

In the first installment in this series we examined the nature of malware–what it is and the various types. In this article, I dig deeper into how malware works. I specifically examine the behavior of virues, worms, keyloggers and rootkits.

How To Lock Down The Network With Access Controls

Once your network is configured, you and your employees will start using it in a way which results in sensitive information residing on servers and workstations. The best way to protect this information is to control who can see or change it. This is where access control comes in.