Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Articles

  Category: Articles » Articles by Author » Author: Richard Rogers
Results 1 - 6 of 6 [1 Pages]  
1.5 Steps to Securing Your Windows XP Home Computer
Most people are aware that there are continuous security issues with Microsoft's Windows operating system and other programs. However, what most people do not realize is how easy it is to significantly improve your computer's security and reduce the likelihood ...
[Added: 20 Jun 2006   Hits: 352   Words: 626]

2.The Web Browser is Essential to Your Computer's Security
For most people, the web browser is central to what you do on your computer. Companies are increasingly putting more and more services on the web and are encouraging their customers online. Securing your web browser is a vital part of surfing the web safely and keeping ...
[Added: 07 Jun 2006   Hits: 393   Words: 568]

3.How Profits Motivates Virus Creators
The motivation behind hackers has evolved noticeably over the last couple of years. Developing harmful viruses is less about "bragging rights" or satisfying the creator's ego and is becoming more and more about generating profit or commercial return. ...
[Added: 03 May 2006   Hits: 357   Words: 537]

4.Protect Your Privacy by Erasing Tracks Left on Your Computer
When you browse the web information is continuously collected by the websites you visit and by your own computer. For example, websites at a minimum collect information about the web browser you use the operating system of your computer and the geography you reside from. However, what ...
[Added: 19 Apr 2006   Hits: 322   Words: 547]

5.How to Reduce Spam in Your Inbox and Enhance Your Email Security
Spam is the internet's equivalent of junk mail. Spam is defined as an e-mail message sent to people without their consent or permission. Addresses of recipients are often harvested from Usenet postings or web pages, obtained from databases, or simply guessed by using common names and domains. ...
[Added: 23 Mar 2006   Hits: 796   Words: 436]

6.How a Personal Firewall Helps to Protect Your Home Computer From Hackers
There are two types of firewall available to the home computer user. A hardware firewall is a device which sits between your computer and the internet. At home for example it could reside on a broadband router which is ...
[Added: 16 Mar 2006   Hits: 320   Words: 558]