Computer Security

View:  
Sorted by:  

When and How to Disable Antivirus Software

Sometimes an installation program requests that you disable your antivirus software. The reason is that the antivirus software has difficultly determining whether the program you’re installing is a legitimate [more…]

How to Recognize a Phishing Scam

The phishing scam is so deceptively simple that you would think for a moment it could never work. Often, it starts with a phony email message. The message looks like it’s from your bank, the government [more…]

How to Fight Phishing in Internet Explorer

Phishing is a scam. It begins with an email that compels the recipient to provide personal (e.g. Social security number) or financial information (e.g. account numbers) via email or a website. Like most [more…]

How to Block Phishing in Windows E-Mail Programs

Phishing is a scam. It begins with an email that compels the recipient to provide personal (e.g. Social security number) or financial information (e.g. account numbers) via email or a website. Your email [more…]

What is Spyware?

Spyware was designed to help customize advertising on the Internet. Based on which web pages you visited, advertising was targeted specifically for you. That sounds good. But this fresh concept quickly [more…]

How to Put Windows Defender on Your PC

If your PC is rapidly slowing down, moving so slow that you have to wait for minutes to see what you have typed on the screen, you may have spyware on your computer. One of the best ways to fight spyware [more…]

How to Put Windows Defender to Work Fighting Spyware

If your PC is rapidly slowing down, moving so slow that you have to wait for minutes to see what you have typed on the screen, you may have spyware on your computer. One of the best ways to fight spyware [more…]

How to Schedule Automatic Spyware Scans in Windows Defender

If your PC is rapidly slowing down, moving so slow that you have to wait for minutes to see what you have typed on the screen, you may have spyware on your computer. One of the best ways to fight spyware [more…]

How a Computer Firewall Works

What the firewall does is monitor both incoming and outgoing Internet traffic. When a firewall is properly configured, only the information you request from the Internet is allowed in. Outgoing information [more…]

How to Set Up a Router with a Firewall

If you are a broadband Internet user, the best way to keep malware out of your computer is to set up a hardware firewall. A hardware firewall is an electronic gizmo installed between the broadband modem [more…]

How to Use the Windows Firewall

Two types of firewall are available for your computer: hardware and software. A hardware firewall is an electronic gizmo installed between the broadband router and your computer. It’s often included as [more…]

How to Disable Windows Firewall

If you are running Windows Firewall and decide to switch to a hardware firewall, you will want to disable the Windows Firewall so the two don’t conflict. To disable the Windows Firewall, you follow unique [more…]

Tips for Successful Ethical Hacking

Whether you're performing ethical hacking against a customer's systems or your own, you must be prudent and pragmatic to succeed. These tips for ethical hacking can help you succeed as an information security [more…]

Ethical Hacking Tools You Can't Live Without

As an information security professional, your toolkit is the most critical item you can possess — other than hands-on experience and common sense. Your hacking tools should consist of the following [more…]

Common Security Weaknesses that Hackers Target

Information security professionals should know the common security weaknesses that hackers and malicious users first check for when hacking into computer systems. Security flaws, such as the following, [more…]

Commonly Hacked Ports

Common ports, such as TCP port 80 (HTTP), may be locked down — but other ports may get overlooked and be vulnerable to hackers. In your security tests, be sure to check these commonly hacked TCP and UDP [more…]

Hacking For Dummies Cheat Sheet

Not all hacking is evil. Ethical hacking reveals security weaknesses or flaws in your computing setups. This Cheat Sheet provides you with quick references to tools and tips, alerts you to commonly hacked [more…]

How to Turn the Windows 8 Firewall On and Off

After you've established your Internet connection, enabling the built-in firewall in Windows 8 can be your first (and best) line of defense against viruses and other malware. You can easily turn the Windows [more…]

How to Secure a Laptop

This video offers a number of considerations for securing your laptop and the the personal information on it, both mechanical - like buying an inconspicuous laptop case and using a hotel safe - and electronic [more…]
Listings:1-2526-44

Sign Up for RSS Feeds

Computers & Software
Great Gadget Giveaway -- Enter to Win!

Inside Dummies.com