Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Computer Security Articles

  Category: Articles » Technology » Computer Security
Results 1 - 28 of 28 [1 Pages]  
1.Say Goodbye To Adware by Josh George
There are people from all over the world that have experienced adware. As they casually surf the web or use their computers, adware will pop up advertisements on people's computers without hesitation. To help put an end to this frustration, this article will explain the five ...
[Added: 17 Jan 2007   Hits: 689   Words: 475]

2.Where to Find Free Spyware Removal by Christopher Smith
The bad news is that spyware is everywhere on the internet and you could have it on your computer right now. The good news is there are free spy ware removal tools for your computer that are easy to find. There are ...
[Added: 08 Nov 2006   Hits: 792   Words: 471]

3.Search Technologies to Solve the Problem of Information Security by Alena Siameshka
Lately the problem of securing the information contained in the enterprise's data space becomes more and more critical. It's the information hidden from common access that is most valuable. Specialists in the field of information security distinguish two types ...
[Added: 03 Nov 2006   Hits: 1589   Words: 1161]

4.Antivirus Software and Intrusion Prevention Solutions by Joe Cohen
Running Windows applications on a computer connected to the Internet without antivirus software is insanity to say the least. There are countless viruses and worms that can be introduced via the Internet to any computer. Your ...
[Added: 25 Oct 2006   Hits: 969   Words: 656]

5.Conducting Information Systems Audit by Wale Wahab
Auditing can be defined as a systematic process by which a competent, independent person objectively obtains and evaluates evidence regarding assertions about an economic entity or event for the purpose of forming an opinion about and reporting on the degree to which the assertion conforms to an identified ...
[Added: 19 Oct 2006   Hits: 2189   Words: 831]

6.How to Speed Up Your Computer: Part 2 by Nathan Segal
Q: My computer is running slowly. How do I speed it up? As I'd mentioned last time, a couple of quick fixes were to reduce the number of programs that load at startup by using msconfig from the Start menu (assuming ...
[Added: 07 Oct 2006   Hits: 764   Words: 456]

7.Spyware Remover by Greg Martinez
Spyware invades your privacy. It is generally any software that invades computer systems mainly for advertising purposes, secretly gathering information from computer users then sending it back via Internet connections without anyone quote s knowledge or permission, no less. What happens ...
[Added: 24 Sep 2006   Hits: 816   Words: 424]

8.Antivirus Software - A Must For Your Computer by Jakob Culver
With intruders everywhere one has to be really aware of the ways and means of not allowing anyone trespassing! Well you must be aware of the specialized anti-virus software's that prevent and repair the commonly ...
[Added: 25 Aug 2006   Hits: 980   Words: 445]

9.Virus Alertness Tricks by Andrew Corner
When talking about computer virus protection, anti-virus software, and firewalls, it is important to stress that no virus protection system is foolproof. Even top security computer systems have been infiltrated time and again by hackers and computer criminals simply ...
[Added: 02 Aug 2006   Hits: 916   Words: 478]

10.Viruses And Worms: Your System Needs Protection by Garry Allen
Computer systems across the world are constantly threatened by viruses and worms. These malwares are created by disgruntled or malicious programmers, who let loose their treacherous creations on unwary hosts. Oftentimes, the damage that is caused is immense. Due to the severity of the attacks a small cottage ...
[Added: 02 Aug 2006   Hits: 836   Words: 461]

11.Boost your Security with Biometry by David Casper
Fingerprinting has long been a reliable method of identifying people. This biological trait is unique to each individual. To obtain a fingerprint a dye had to be placed on the thumb and an impression had to be made. To determine ...
[Added: 25 Jul 2006   Hits: 867   Words: 688]

12.Handheld Devices: Client Security and Connectivity Issues by Joshua Feinberg
Because many handheld devices or PDAs have the ability to connect to your clients' LANs (either directly or indirectly), you need to consider PDA remote access, just as you would any other remote device, such as an employee's ...
[Added: 14 Jun 2006   Hits: 923   Words: 328]

13.Network security journal guide by Mansi gupta
The term 'Virus' has not just created havoc in life of living beings but also in the world of computers. Though the two kinds of viruses are completely different from each other yet both can prove extremely fatal. Virus in ...
[Added: 16 May 2006   Hits: 749   Words: 536]

14.TrendMicro PC-Cillin Internet Security Review by Joel Smith
Trend Micro PC-cillin Internet Security is the best Internet Security software in its market. This release combines award-winning antivirus security and a personal firewall for comprehensive protection against viruses, worms, Trojans, and hackers. It also detects and removes spyware and blocks spam. It even ...
[Added: 30 Apr 2006   Hits: 813   Words: 597]

15.TrendMicro PC-Cillin Internet Security by Ben Sikes
The original PC-Cillin was an antivirus application. In 2006 it's grown into a full Internet security suite with firewall, spam filter and parental controls. Computer security is essential to prevent PC performance loss and identity theft. Spyware clogs system resources, taking up disk space and slowing down ...
[Added: 29 Apr 2006   Hits: 780   Words: 529]

16.How to Reduce Spam in Your Inbox and Enhance Your Email Security by Richard Rogers
Spam is the internet's equivalent of junk mail. Spam is defined as an e-mail message sent to people without their consent or permission. Addresses of recipients are often harvested from Usenet postings or web pages, obtained ...
[Added: 23 Mar 2006   Hits: 795   Words: 436]

17.A Third Frontier of Your Security by Alexander Styopkin
The first obstacle for harmful programs on the way to your computer is a firewall, which prevents it from penetration. The second frontier is an antivirus program, which accomplishes scanning of all files on your computer searching for known viruses. Keylogger ...
[Added: 15 Mar 2006   Hits: 801   Words: 453]

18.XCACLS, SUNINACL, And Other Permissions Security Recovery Tools by Darren Miller
Title ----- XCACLS And Other Permissions Security Recovery Tools You Have 50GB Of Data To Move Along With Permissions Security ---------------------------- This article is about several tools that can save a Windows administrators you know what in ...
[Added: 14 Feb 2006   Hits: 723   Words: 1040]

19.Defining the World of Security Cameras by Sidra Rasheed
Finding the right security camera is difficult enough without having to wade through the terms and figure what the abbreviations and words actually mean. If you're trying to do research on a security camera and frustrated with the multitude of terms that ...
[Added: 12 Feb 2006   Hits: 733   Words: 891]

20.Computer Security: The Essential Components for A Safe Computer by Sara Chambers
These days, computers are almost as common in households as telephones. Computers themselves do not cause any threat to individual security. When connected with networks and the chaos that is the World Wide Web, computers have become the tools that identity thieves and hackers use to extrapolate this chaos. ...
[Added: 10 Jan 2006   Hits: 711   Words: 390]

21.RSS Security by Sharon Housley
Copyright 2005 Sharon Housley RSS Security RSS is growing at a lightening speed. What was once only known as a "techie tool", RSS is becoming a tool that is continuously being used by the general ...
[Added: 12 Oct 2005   Hits: 800   Words: 554]

22.Seecrets On Security: A Gentle Introduction On Cryptography Part 2 by Stan Seecrets
The recent explosive growth of PC's and Internet-based commerce has significantly increased the need for a wide variety of computer security mechanisms. This article, the second of a three-part series, lays the underlying foundation in plain language. A slightly longer series of articles ...
[Added: 15 Sep 2005   Hits: 749   Words: 926]

23.Microsoft CRM for Large Corporation - Security by Andrew Karasev
Microsoft Business Solutions CRM proved to be reliable solution in the whole spectrum of industries and market niches: transportation & logistics, education, recruiting & placement, supply chain management, pharmaceutical, oil & gas, aerospace & defense, manufacturing, wholesale & retail. When corporation is looking ...
[Added: 03 Aug 2005   Hits: 610   Words: 472]

24.5 Mac Security Tips You Can't Live Without by Paulo Fretowski
So, you’ve bought a new Macintosh, and now you may be wondering how to make it safer. There are several things that you can do which will protect your Mac from viruses and hackers. Macs are already ...
[Added: 16 Jun 2005   Hits: 685   Words: 523]

25.More Free Tools Increase Security For Your PC by Jim Edwards
- by Jim Edwards (c) Jim Edwards - All Rights reserved http://www.thenetreporter.com ===================================== A recent article about preventing hackers from breaking into your computer caused an overwhelming response by readers. It seems everyone has an opinion about the best software ...
[Added: 12 May 2005   Hits: 797   Words: 521]

26.Seecrets on Security: A gentle introduction to cryptography by Stan Seecrets
With the increasing incidence of identity thefts, credit card frauds, social engineering attacks, the digital world is facing challenges in the years ahead. Obviously, cryptography, a young science, will play a prominent role in the security of protecting digital assets. This article tries to explain the ...
[Added: 06 May 2005   Hits: 727   Words: 1296]

27.Computer Security - What Exactly Is It? by Ciontescu Molie
Although the term 'computer security' is used a lot, the content of a computer is actually vulnerable to only a few risks unless the computer is connected to others on a network. As the use of computer networks ...
[Added: 25 Apr 2005   Hits: 611   Words: 422]

28.Microsoft Great Plains security setup - overview for consultant by Andrew Karasev
Microsoft Business Solutions Great Plains is very good fit for mid-size company and probably good budget solutions for large corporation. Former product name was Great Plains Dynamics / eEnterprise. Both versions: old and new are Great Plains Dexterity written ...
[Added: 12 Apr 2005   Hits: 637   Words: 629]