Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking


  Category: Articles » Articles by Author » Author: Darren Miller
Results 1 - 12 of 12 [1 Pages]  
1.My Identity Was Stolen Because Of Someone Else's Mistake
Giving Total Strangers Your Personal Information ---------------------------- How often would you say you trust total strangers with some of your most confidential information? I think I can answer this question for just about everyone. The answer is, nearly everyday. To illustrate this, ...
[Added: 07 Jun 2006   Hits: 321   Words: 1117]

2.Step Away From The Computer Before You Have A Mental Meltdown
Do I Read A Technical Manual Tonight, or The Lord Of The Rings? ---------------------------- Just out of courtesy, I think I should tell you that the following article is about as far from my typical writings as I can get. Quite frankly, it ...
[Added: 26 Mar 2006   Hits: 303   Words: 763]

3.Finding Your MAC Address On Wired And Wireless Network Cards
The Answer To The Media Access Control Question ---------------------------- Over the past few weeks I have received quite a few e-mails about Ethernet cards, both wired and wireless, and more specifically, about Media Access Control (MAC) addresses. I think the main ...
[Added: 22 Mar 2006   Hits: 374   Words: 2228]

4.What Are Survivable Computer Systems
Definition Of A Survivable Computer System ---------------------------- A computer system, which may be made up of multiple individual systems and components, designed to provide mission critical services must be able to perform in a consistent and timely manner under ...
[Added: 04 Mar 2006   Hits: 293   Words: 1242]

5.Is Your Data Encryption Really Secure
How Do You Know Your Data Encryption is Really Secure ---------------------------- There are various types and methods of data encryption. Some of the most popular forms of data encryption include single file encryption, folder encryption, volume encryption, whole disk encryption, and of course email encryption. The Windows ...
[Added: 01 Mar 2006   Hits: 312   Words: 1542]

6.Why Easy To Use Software Is Putting You At Risk
Can Easy To Use Software Also Be Secure ---------------------------- Anyone who has been working with computers for a long time will have noticed that mainstream operating systems and applications have become easier to use over the years (supposedly). Tasks that use to be complex procedures and required experienced ...
[Added: 21 Feb 2006   Hits: 317   Words: 1135]

7.XCACLS, SUNINACL, And Other Permissions Security Recovery Tools
Title ----- XCACLS And Other Permissions Security Recovery Tools You Have 50GB Of Data To Move Along With Permissions Security ---------------------------- This article is about several tools that can save a Windows administrators you know what in the event of a ...
[Added: 14 Feb 2006   Hits: 724   Words: 1040]

8.Is That Your Check Book Driving Away
Title ----- Is That Your Check Book Driving Away Is Your Check Book On The Curb ---------------------------- This is an article about people throwing away their home computers with all their financial and banking information on them and easily accessible. A very simple ...
[Added: 12 Feb 2006   Hits: 310   Words: 1026]

9.Worm_Grew.A Threat, Hype, or Dud?
Title ----- WORM_GREW.A: Threat, Hype, or Dud? The Worm_Grew.A Virus Got Allot Of Attention ---------------------------- The 3rd has come and gone. What has been the real effect or impact of the "WORM_GREW.A (Also know as Nyxem, BlackMal, MyWife, and so on)" virus? For weeks there ...
[Added: 08 Feb 2006   Hits: 292   Words: 605]

10.Trojan Horse Delivered In Automatic Update
Trojan Horse - One Mans "Worse Case Scenario" Prediction ---------------------------- This is a fictional article about a Trojan Horse Virus, or you could say it is one mans prediction of a "worse case scenario". Because of the field I'm in, ...
[Added: 03 Feb 2006   Hits: 287   Words: 1150]

11.Video On How To Hack A PC
Title ----- Video On How To Hack A PC Hacking Video - Education Or Marketing Tool? ---------------------------- I sat in my office for about thirty minutes trying to decide if I was going to write this article. ...
[Added: 24 Jan 2006   Hits: 380   Words: 661]

12.Hacking With The Google Search Engine
Title ----- Hacking With The Google Search Engine Google: Yes, You Can Find Just About Anything ---------------------------- Hackers and security experts use various custom and open source tools to complete their tasks. In fact, one of the tools they use you probably use every time you ...
[Added: 19 Jan 2006   Hits: 388   Words: 903]