Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Security & Encryption Articles

  Category: Articles » Internet & Online Businesses » Security & Encryption
Results 1 - 18 of 18 [1 Pages]  
1.Thwart the Three Biggest Internet Threats of 2007 by Cher K Markov
The same Internet connection that lets you reach out and touch millions of Web servers, e-mail addresses, and other digital entities across the globe also endangers your PC and the information it contains about you. Here's how to stymie the ...
[Added: 01 Jun 2007   Hits: 3962   Words: 1096]

2.Incorporate a disaster recovery plan by Alexander Eiriksson
Nordural ehf's backup system needed to incorporate a Disaster Recovery plan that would reduce the backup window from ten hours to two-three hours. A Disaster Recovery Plan is a coordinated activity to enable the recovery of IT/business systems due to a disruption. Disaster Recovery can be achieved ...
[Added: 10 May 2007   Hits: 1303   Words: 468]

3.The Shocking Truth About Wireless Networks by Drew Pilton
A couple of months ago I purchased my first wireless enabled laptop. As I switched it on and began setting it up I was shocked when I realized that my laptop had found and connected to my neighbours ...
[Added: 16 Feb 2007   Hits: 1267   Words: 896]

4.Goldilocks and the three Anti Spyware Products by Doug Woodall
Once apon a time, there was a young lady who became lost while traveling. She decided to pull over at a rest stop and get online with her laptop to find directions. As she ...
[Added: 10 Feb 2007   Hits: 1098   Words: 542]

5.How To Choose The Correct Adware Removal Program by Tony Pescatore
Today there is about 90% of all PC's infected with spyware and adware. Spyware and adware programs slow down the speed of your PC by cluttering up your hard drive with many of those annoying programs. Have ...
[Added: 23 Jan 2007   Hits: 994   Words: 355]

6.Passport Cards To Go Hi-Tech In United States by James Marriot
Fire has been drawn from some quarters as the US govt. plans to use RFID (Radio Frequency Identification) chips in the proposed program of passport cards for U.S. citizens. These ID cards will be mandatory for ...
[Added: 10 Jan 2007   Hits: 984   Words: 337]

7.Patch Managment For Home Users by Jake Forrester
For server administrators, patch management can be a way of life. But for home users, patch management is a distant thought in most home computer users. Knowing when to patch products and how often patches need to be applied are some of the ...
[Added: 11 Dec 2006   Hits: 904   Words: 596]

8.Psychological Internet Security: There is More to Downloads than Meets the Eye by Josh George
Internet downloads offer unlimited potential; if you want something, chances are there is a download for it.  Because of the history of downloads and the uses they have provided, most people have developed a mindset that with proper computer security and internet security, downloads are harmless.  Unfortunately, ...
[Added: 08 Dec 2006   Hits: 899   Words: 557]

9.Want to know how McAfee "SiteAdvisor" makes money on you? See if you are one of the targets! by Alexander Rodichev
The company "Smart PC Solutions", a developer of easy to use solutions for the optimization of your PC, has become the victim of a negative rating on Mcafee's "SiteAdvisor" just like many other sites, most having no idea that they have received a ...
[Added: 28 Oct 2006   Hits: 1331   Words: 1524]

10.Why has my PC become slower ? by Aage Kold Jensen
The short answer is that a PC cannot "become slower". However, the PC's workload can most certainly have increased without you even knowing about it! How could that have happened, when I haven't ...
[Added: 23 Oct 2006   Hits: 784   Words: 989]

11.Save Your Computer With Antivirus Programs by Erik Nielsen
Specially designed softwares affect stability of the systems, and these software programmes may be malwares. Antivirusprograms consist of computer programs that aim to identify and reduce computer viruses and other harmful softwares or malwares. An infected system ...
[Added: 19 Oct 2006   Hits: 748   Words: 485]

12.Spyware - Why You Need to Know About It by Paul McGillivary
Cost: Enterprises spend an average of $130,000 a month in IT time fighting spyware related issues.(Source:NewDiligence) Dell estimates that twelve percent of its support calls involve spyware issues. And that doesn't even take into account the lost time of the employee ...
[Added: 04 Oct 2006   Hits: 744   Words: 317]

13.What Is A Computer Virus? by Mark Allen
A computer virus gets it's name based on the fact that it's actions are not all that different from real life biological virus. A virus is a program designed to cause harm to a computer or network of computers. The ...
[Added: 03 Oct 2006   Hits: 704   Words: 353]

14.Laptop Security: Don't Leave Home Without It by Linda Marklund
Hundreds of thousands of laptops are lost or stolen each year. What if it happened to you? Think about all the valuable information stored in your laptop and the chaos that would enter your life should it become lost or stolen. Hours and hours of hard work on ...
[Added: 18 Sep 2006   Hits: 770   Words: 1289]

15.HOW TO PROTECT INFORMATION TECHNOLOGY SYSTEMS - Rootkits by daynne darryl
Many defensive technologies have been developed to combat the spread of Internet worms. Unfortunately, there is no single technology that protects against all types of mobile malicious code. Many enterprises rely on only a small set of protective technologies to protect their assets, such as firewalls and ...
[Added: 08 Sep 2006   Hits: 669   Words: 490]

16.Computer Viruses, Worms And Trojans Explained by Paul Wilcox
Fighting viruses and getting rid of them is big business right now. The first step is knowing just what the enemy is. THE ENEMY - Hackers and Crackers Computer geeks say that there is a difference between hackers and crackers. Crackers do damage to systems ...
[Added: 27 Aug 2006   Hits: 732   Words: 657]

17.Internet Security A Beginners Guide by Steve Holloway
The quest for convenience is a two edged sword. In our quest for speed, efficiency and walking as little as possible, we strive to make life as simple as possible. It was not so log ago that business was done face to face; meetings and paper letters were how ...
[Added: 15 Apr 2006   Hits: 719   Words: 456]

18.Basic Steps To Optimize Your Internet Security by Popescu Alexandru
After seeing many people complain about their weak Internet security I decided to write down some things that will help you for your Internet security. First, here are some tips to make windows safer : For basic security and update patches install Service Pack 2 ...
[Added: 25 Apr 2005   Hits: 705   Words: 464]