Basic Computer Security

  1. Backup Your Data
    A copy can be restored much quicker than recreating everything from scratch.
  2. Antivirus
    Block viruses before they get onto your system.
  3. Antispyware
    Don't allow others to spy on your computer use.
  4. Firewalls
    Stop unwanted access between your computer and the internet using a firewall.
  5. AntiSpam
    Identify and remove unwanted emails.

  6. Program Patches
    Keep your software up to date.
  7. Passwords
    Protect your data with secure passwords.
  8. Monitoring Software
    Track what your children are doing.
  9. Adware and Spyware
    What is the difference between these.
  10. Ransomeware
    One of the nastiest security issues - first they steal your data and then they ask for your bank account details.
  11. Missing Security Option
    The one useful feature that security software doesn't have.
  12. Old Computer
    Protecting your data when disposing of a computer.
  13. Infected DLLs
    Antivirus has deleted infected DLLs, what do I need to reinstall?
  14. Expired Certificates
    How to stop these messages.
  15. Replacement Security Suite
    What are the choices.
  16. Reasons to NOT Use a Security Suite
    Why you may be better off using separate programs rather than a suite.
  17. Hacker's Challenge 3
    A review of this book which shows real world examples of how security staff investigate and resolve security issues.
  18. Network Security Hacks
    A review a book for advanced security staff to provide them with detailed info to perform specific tasks.
  19. Essential Computer Security
    This beginners book on security is reviewed by Al Lukaszewski.
  20. Essential Computer Security
    I have also reviewed the book. See how my opinion on the book differs from Al's.
  21. Alexa Related Links
    Many spyware programs can't distinguish this from the Alexa toolbar.
  22. Security Power Tools
    A huge book giving lots of info on how to use many of the tools that are available to build and test your system security.
  23. Hacking - The Art of Exploitation
    This book demonstrates how a number of hacks actually work.
  24. Folder Castle
    Software to hide your files and folders from others who share the same computer.
  25. "The Myth of Security"
    Just what security works and what "security" can make your system less secure.
  26. "Hacking the Next Generation"
    A look at some of the newer approaches taken to try to break into computer systems..
  27. Is Your Money Safe?
    The biggest risk of using internet banking is flaws in the site itself.
  28. Data Recovery Techniques
    This guest article looks at ways that you might lose data from your hard drive and how to go about trying to get it back.
  29. Free Online Backup "Cloud" Storage
    This guest article looks at online storage options and how you can get started without it costing you anything.
  30. VirtaPay Scam
    Some scams are more obvious than others. This article discusses some of the clues that identify a scam.
  31. "A Bug Hunter's Diary"
    It is scary how easily the author of this book found security holes in popular software.
  32. TunnelBear VPN
    This VPN claims to be simple to use.
  33. "AEOMI Partition Assistant Standard"
    Everything a home computer needs to properly manage the hard drives.
  34. Programs with Poor Security
    Some poorly written programs ask for a higher level of access to your computer than they ought to need - you should NEVER give it to them as if they are that poorly written they will probably contain malware.
  35. Tainted
    If you are writing programs (or web pages) then the first thing you need to consider is distinguishing tainted variables from those known to contain valid values - the article mentions PHP but is applicable to all programming languages.
  36. GET and POST Security Differences
    Which of these is actually more secure when used properly is not what many expect.

go to top

FaceBook Follow
Twitter Follow