Computer Security Information

  • Understanding Data Encryption - Differences Between Methods

    There have been different types of data encryption techniques used to protect sensitive and personal information. Briefly discussed are some of the past, current and future encryption methods used in the United States.
    By Sheila Robinson July 30, 2011 

  • Steel Keylogger Removal Techniques

    Steel Keylogger is one of the most devastating virus spyware on the market. Because of its harmful effects and data-saving functions, a keylogger can steal all of your information, from social security numbers to email passwords. Removing it is essential...
    By Cameron Burry July 19, 2011 

  • How to Remove and Avoid Keyloggers

    Keyloggers can come in two different varieties - legitimate and malicious. It's the malicious ones that are a real danger to you and everything you type on your computer. Having a keylogger on your PC is like handing your house keys to a burglar.
    By Regina Woodard July 15, 2011 

  • Where to Find Computer Security Training on the Internet

    When searching for computer or IT security courses, Internet providers offer a wide array of options. Varied by target audiences, network security training is useful for the professional, the company employee, and also the private household or home office...
    By Sylvia Cochran July 6, 2011 

  • Removing Antivirus Plus in Windows

    Antivirus Plus is a rogue security program that is installed without user consent. Like many scareware and rogue security programs, Antivirus Plus is distributed when you visited fake scanner websites or websites that re-direct to fake scanners.
    By Donna Buenaventura July 6, 2011 

  • The Top Scams and Hoaxes of 2009

    The Internet is known to be a wealth of information on the one hand, and a seemingly bottomless pit of scams and hoaxes on the other. Since almost anyone with a computer and access to the Internet can create a website, blog, or edit Wikipedia, bogus information...
    By Lee Clemmer July 6, 2011 

  • How to Protect your Computer When Connected to Unsecured WiFi

    In today's Internet culture, many businesses are providing free wireless hotspots. The service may not cost you a dime, but it may cost you your identity if you don't know how to protect your computer or watch what you do at these free hotspots...
    By J. Forlanda June 27, 2011 

  • Virtual Bumps in the Night: Was That a Hacker?

    What can we do to detect and prevent our computers being hacked?
    By Christian Cawley June 17, 2011 

  • What you really need to know about email BCC

    This article explains what BCC means, and why and when you should be using it. Also find here valuable tips and tricks for your email security and privacy related to Bind Carbon Copy.
    By Mark Muller June 14, 2011 

  • Disabling AutoRun for Safe Computing

    AutoRun is an entry point to infect Windows computers with potentially unwanted and malicious software including viruses, Trojans, rootkits etc. Find here how to disable AutoRun in Windows for your computer security.
    By Mark Muller June 14, 2011 
showing 21-30 of 203    < Previous  |  page: 1 2 3 4 5 ...  |  Next >