Security Sitemap - Page 1 2016-09-26

Change Username and Password on a Router or Access Point
To secure your wireless access point or router you need to change the default username and password and change the configuration settings

Advanced Computer Security
This section is devoted to more advanced computer and network security concepts such as forensic investigation, encryption and cryptography and intrusion detection which go beyond the basic ideas of security.

Security 101: The Bare Essential Information You Need To Protect Your PC
A collection of tips, how-to's and other advice to help you understand the basics of computer and network security, such as passwords, firewalls, antivirus software and wireless network security, and protect your system

Protect Your Computer From Malware With Antivirus Software
Malware such as worms, viruses, Trojans and other malicious code can definitely impact your computer system. Find out what you need to know about malware and how to protect yourself by using antivirus software and other means.

Basic Network and Computer Security
Articles, news and editorials on computer and network security, new technology and information security legislation. Plus categorized tips and information by operating system to help you secure and protect your system.

How to Booby Trap Your Smartphone to Prevent Theft
Someone just stole your phone, little do they know that you've booby trapped it! Let's explore some smartphone booby trapping options:

Securing Your Home Network and PC After a Hack
Has your home network or computer just been hacked? Here's how to recover from a PC and/or home network compromise:

iOS 6's New Privacy and Security Features Explained
The new iOS 6 has some new privacy and security features up its sleeve. Learn all about them in our guide to iOS 6 security.

5 Types of Malicious Bots And How To Avoid Them
There are all kinds of internet-based bots out there, some good some bad. We're going to look at the bad ones and show you how to recognize and avoid them.

Why You Need a Second Opinion Malware Scanner
Your virus scanner says everything is OK, but something isn't right. It's time for a second opinion malware scanner to see what your antivirus might have missed.

Is That File You Deleted Really Gone?
That file you thought you deleted may still be on your hard drive even though you can't see it listed. Here are some tips for deleting something for good:

Knowing the Secret Port Knock Can Open Your System
Port knocking is all the rage these days. Both good guys and bad guys are discovering new ways to use port knocking. Learn all about it here:

Best Practices For Managing Your Network Firewall
Are you responsible for your organization's network firewall? Here are some general best firewall practices you may want to consider:

Review: Alarm.com Interactive Alarm Monitoring Service
Considering a home alarm system? Check out our review of alarm.com's interactive alarm monitoring service

Predators on Social Networks
Social networks are popular and fun but also pose a risk as predators and perverts stalk users. Learn how to avoid becoming a victim:

iPhone / iPod Touch Apps
iPhone and iPod Touch apps related to information security

Review: Foscam Surveillance Pro for iPhone
Foscam Surveillance Pro is a great app for keeping an eye on your home from your iPhone. Check out our review for more information.

Protect Yourself From iPhone Device Lock Ransom Scams
Worried about the new iPhone device lock ransom scams that are going around? Here's how to avoid becoming a victim:

Securing Your Computer After a Major Security Incident
Has your computer been infected or hacked to the point that it won't function any longer? It might be time to start over. Here's some security tips for reinstalling from scratch:

Configuring Windows Vista User Account Control Settings
A brief explanation of the Allow UIAccess Applications to Prompt for Elevation Without Using the Secure Desktop setting in Windows Vista

Tutorial For Configuring McAfee VirusScan Console
A step-by-step visual tutorial to help you configure and maintain McAfee antivirus in the McAfee Internet Security Suite 2005 and VirusScan console.

Making In-App Purchases Safe from Kids
Your 3-year-old is playing with your phone and just made 300 dollars worth of in-app purchases. Learn about making in-app purchases safe from kids.

5 Cool New Features on the Android Lollipop 5.0
Android's Lollipop 5.0 OS was a major step forward for security. Here are 5 cool Android features that you're going to want to check out.

What Color Is Your Hacker Hat? About Hacker Hats
What color is your hacket hat? What's the difference between a 'white hat' hacker versus a 'black hat'? Let's learn about the many different hats.

Step-By-Step Tutorial For Configuring McAfee VirusScan
Configure the Advanced Alert Options to specify when and how McAfee Internet Security Suite 2005 should alert you.

Step-By-Step Tutorial For Configuring McAfee VirusScan
WormStopper configuration in advanced options for ActiveShield on McAfee Internet Security Suite 2005

Step-By-Step Tutorial For Configuring McAfee VirusScan
Configure the Automatic Updates in McAfee Internet Security Suite 2005 to keep the virus definitions up to date and detect the latest threats.

Step-By-Step Tutorial For Configuring McAfee VirusScan
Configure E-Mail Scan portion of ActiveShield advanced options in McAfee Internet Security Suite 2005

Step-By-Step Tutorial For Configuring McAfee VirusScan
ScriptStopper configuration in advanced options for ActiveShield on McAfee Internet Security Suite 2005

Step-By-Step Tutorial For Configuring McAfee VirusScan
Configuring the Advanced options of the ActiveShield scanning for McAfee Internet Security Suite 2005 (v 7.0)

Step-By-Step Tutorial For Configuring McAfee VirusScan
Configuring McAfee Internet Security Suite 2005 (v 7.0) to anonymously submit virus information for inclusion in McAfee's tracking of worldwide infection rates.

Configuring Scheduled Scans - McAfee VirusScan
Configure McAfee Internet Security Suite 2005 (v 7.0) to automatically run a full virus scan of your PC on a scheduled basis.

Security Alerts and Advisories
This page contains security alerts and advisories affecting the operating systems and applications that you use which are rated as critical or extremely critical and also details regarding the monthly Microsoft Security Bulletins.

Step-By-Step Tutorial For Configuring McAfee VirusScan
Configuring the ActiveShield portion of the VirusScan options in the McAfee Internet Security Suite 2005 (v 7.0).

When Malware Just Won't Die - Malware Infections
Does your computer have malware on it that keeps coming back over and over again? Let's learn how to get rid of a persistent malware infection.

Secure Your Computer From Pop-Up Ads and Spyware
News, articles and information to protect your computer from intrusive pop-up advertising and potentially harmful spyware and adware.

Secure Your Wireless Device or Network
Articles and information on the various wireless protocol implementations- Bluetooth, 802.11b, 802.11g, etc.- and the vulnerabilities they present along with tips and advice to help you use your wireless device or network securely.

Online Dating Security Tips
The online dating world can be a scary place if you're not careful. Check out these online dating security tips to help keep you safe on dating sites.

How To Analyze HijackThis Logs
HijackThis is a free and powerful tool you can use to analyze your computer's registry and files on the hard drive to identify components of spyware.

Guide To Analyzing HijackThis Logs
HijackThis is a free and powerful tool you can use to analyze your computer's registry and files on the hard drive to identify components of spyware. Page 2.

What HijackThis Logs Look Like
HijackThis is a free and powerful tool you can use to analyze your computer's registry and files on the hard drive to identify components of spyware. Page 4.

How To Analyze HijackThis Logs Options 5-16
HijackThis is a free and powerful tool you can use to analyze your computer's files on the hard drive to identify components of spyware or hijackers. Page 3.

6 Wireless Router Security Features You Should Turn On
Consider turning on these wireless router security features ASAP to help make your network more secure. Learn about these router security features.

Introduction to Intrusion Detection Systems (IDS)
A brief article introducing the concepts of Intrusion Detection Systems (IDS)- how they work, what sorts of things they monitor for, what the results mean.

What Are Intrusion Detection Systems (IDS)?
A brief article introducing the concepts of Intrusion Detection Systems (IDS)- how they work, what sorts of things they monitor for, what the results mean. Page 2.

Find Quick Answers To Your Computer Security Questions
Resources and information you need to find quick answers to your computer security questions including an FAQ (frequently asked questions), Q&A section and glossary of computer and network security terms.

VPN's: IPSec vs. SSL for VPN Connectivity
IPSec vs. SSL is an article comparing and contrasting internet protocol security (IPSec) virtual private networks (VPN) with secure sockets layer (SSL).

VPN's: IPSec vs. SSL - Learn the Difference
VPN's: IPSec vs. SSL is an article comparing and contrasting internet protocol security (IPSec) virtual private networks (VPN) with (SSL). Page 2.

What Not to Post on Facebook and Social Media
For your safety and the safety of your family and friends, avoid posting these 10 things on any social networks. Here's what not to post on Facebook.

What Is Internet Explorer 'Do Not Track'?
Do you want to let websites know that you don't want to be tracked? Let's learn about Internet Explorer 'Do Not Track' and how to enable this feature.

How Do I Report Internet Scams / Fraud?
Are you a victim of an Internet-based fraud or scam? Let's look at things you can do to take action and report internet scams to people who might help.

How to Hide Your Likes on Facebook
Do you want to keep people from seeing which pages you like on Facebook? Here's how to hide your liked pages on Facebook from other people.

What You Should Know About Facebook's Nearby Friends
Are you considering using Facebook's new Nearby Friends feature? Here are some things you should know about it before you decide to turn it on.

5 Creepy Cyberstalker Tricks and How to Counter Them
Cyberstalkers have some nasty tricks up their sleeves. Learn what some of those tricks are and how you can counter them with some privacy precautions.

How to Erase Your iPhone's Data Before You Sell It
Know how to erase your iPhone when you sell it? There are a couple of steps you need to take to erase the data on your iPhone before you sell it.

4 Security Settings iPhone Thieves Hate
iPhone theft is on the decline in some cities and these security settings might be the reason. Let's look at which iPhone security settings thieves hate.

Packet Sniffing (Network Monitor / Analyzer) Definition
Learn about the concepts of packet sniffing- how it works, what information can be gathered, what you can do to protect yourself using packet sniffing.

How to Change Your WFfi Password
It's probably been a long time since you changed your Wi-Fi password? Changing your network password is easy and takes just a minute. Let's learn how.

4 Tips for Recognizing a Social Engineering Attack
Are you about to be duped by a social engineer? Here are 4 tips for avoiding a social engineering attack including tech support calling you.

Where Does Microsoft EFS Fit into your Security Plan?
An article by Deb Shinder on WindowSecurity.com regarding using the Windows Encrypted File System (Microsoft EFS) to encrypt and protect your data.

CISSP Self Study Exam Preparation Tips
Tips and advice for preparing for the Certified Information Systems Security Professional (CISSP) exam. Learn CISSP self study preparation tips.

This Is How to Spot a Scam Online
Do you have a sixth sense when it comes to detecting online scams? If not, then you should check out how to spot a scam online when you're confronted.

What is a Bot Network and Hacking?
Is your computer part of a bot network? If you've had a computer virus or had malicious software installed on your PC, then there's a chance.

Review: McGruff SafeGuard Browser for iPad
Often give your iPad to your kids so they can play unattended? Want parental controls? Here's an in-depth review of the McGruff SafeGuard Browser for iPad.

The Creepy Side of Facebook's Graph Search
Facebook Graph Search might seem like a cool social search tool, but it has a creepy side. Learn about how Graph Search might be abused by scammers.

Google Hiding Search Results
Is your personal information appearing in search results? Would you like to learn about hiding search results on Google? Learn how to get some privacy.

iPhone Lock Screen and Privacy Settings
Your iPhone lock screen can be a billboard for personal information of all sorts. Your friends and nosy co-workers might see more than you want them.

Securing the New Wireless Router
Got a shiny new wireless router? Follow these tips to help make it more secure. Here's a step-by-step guide to securing your new wireless router.

Build an iPhone Accessible Pet Cam for Less Than $100
We all hate leaving our pets at home while we're at work. What if you could check in on them whenever your wanted from you iPhone or Android? I'll show you how to make a low-cost Pet Cam for less than $100

iPhone Controlled Home Security for Less Than $75
How to setup a iPhone controlled home security camera system for under $100.

4 Steps to Ensure You're Safe on Peer-to-Peer (P2P)
A tutorial article providing tips to use peer-to-peer (p2p) networking sites such as BitTorrent or eMule safely and securely.

Popular Myths about Copying and Sharing MP3s and CDs Debunked
There is much confusion about where the legal and ethical line is for buying, downloading, sharing, or copying music. This article addresses some common myths.

BackTrack Security Audit - Hackers' Tools
BackTrack is a free security audit toolkit comprised of hundreds of open-source security tools used by both security professionals as well as hackers. Did I mention that it's free?

Removing Geotags From Pictures Taken With Your iPhone
If you don't like the idea of advertising the location where you took a picture with your iPhone, follow theses steps to remove geotags from your images:

Review: 2GIG Technologies Go!Control Security System
Are you considering installing a security system? Learn why the 2GIG Go!Control Wireless Home Security system might just be considered the iPhone of Home Security Systems.

10 Facebook Safety and Security Tips for Teens
Are you a teen or parent of a teen who just joined Facebook? Let's learn how to protect your Facebook account and keep it from getting hacked:

5 Ways Your Dirty Photos Might End up on The Internet
Why is your grandmother calling you into the living room to tell you that there is a nude picture of you on your Apple TV? Let's look at ways your dirty photos might make it onto the Internet:

Do You Have a Disaster Recovery Plan (DRP)?
Do you have a Disaster Recovery Plan (DRP)? Check out these tips for creating a DRP for your home or business network, and your computers as well:

Protect Your Email and Avoid Phishing Attacks, Hoaxes and Spam
News, articles and information to help you use email more securely and protect yourself from phishing attacks, email hoax scams and intrusive spam.

How to Tell a Facebook Friend From a Facebook Hacker
Did your grandmother just post a Facebook link to Shocking Sexy Pics of Britney Spears? Maybe that's just how your grandma rolls, but chances are it's a hacker

Why You Need a Disposable Email Account
Are you tired of SPAM. You should consider getting yourself a disposable email account. Let's look at some other uses for disposable email accounts.

The Shadowy World of Malware Affiliate Marketing
Right now, hundreds of thousands of infected computers are being sold into slavery without their owners or their anti-virus software knowing it:

Computer and Network Security Book Reviews
Book reviews of all kinds of computer and network security books as well as other computer, networking and programming books and books about privacy and national security as well.

Network and Computer Security Product Reviews
Read reviews, profiles and lab tests of the latest computer and network security products to help you decide between products and tools available to help provide yourself with the most secure computer or network environment possible.

Netsecurity Product and Book Reviews
Reviews of computer and network security products and books to help you learn more about computer and network security.

Product Review: FLIR FX Modular Security Camera System
Is it an Indoor Security Camera? Outdoor Security Camera? Dash Cam? Action Cam? FLIR FX claims to be all of these, but does it deliver? Here's our review of the FLIR FX Security Camera System:

What Makes a Password Weak or Strong?
Is your password strong enough? Too short? Not complex? What makes a password weak or strong. Learn more here:

Web Browser Security
The Web browser is one of the most used, and most exploited, applications used by most people. This section is devoted to helping you understand the flaws and vulnerabilities of Web browser software and to help you use your Web browser securely.

The Dangers of Short Links
Short links are all the rage these days. Let's learn why you should think twice before you click on a short link:

13 Tips For Keeping Your Kids On The Right Path Online
Are your kids online? Have you taught them the rules of the online world? Here are some tips for preparing your kids for their Internet journey.

The Truth About Facebook Chain Status Updates
Are you tired of status updates that say

How to Zombie-Proof Your Home
Are you prepared if the walking dead come knocking at your door during a zombie apocalypse? Follow these perimeter security tips.

10 Tips to Prevent Identity Theft
Was your wallet stolen or was your personal information part of a data breach? These ten tips will help you protect yourself from identity theft:

Ten Tips to Prevent Identity Theft
Was your wallet stolen or was your personal information part of a data breach? These ten tips will help you protect yourself from identity theft:. Page 2.

How to Start a High-tech Neighborhood Watch
Are burglars treating your neighborhood like it's an all-you can-steal buffet? It's time to upgrade your neighborhood watch to version 2.0.

5 MacBook Security Tips - Internet / Network Security
5 quick and easy MacBook security tips you can use to make your MacBook an impenetrable and unstealable mobile data fortress:

How to Make Google Safer for Your kids
Are you worried about your kids Googling something bad? Check out these tips on how to make Google a little safer for your kids to search:

Tips for Becoming More Invisible Online
Make yourself virtually invisible online so you can be anonymous, avoid advertising, evade hackers, deter stalkers, and prevent invasions of privacy.

The Dangers of Facebook Oversharing
When does oversharing on Facebook become dangerous? Learn about the perils of oversharing and what you should keep in mind before you share too much.

How to Encrypt Your Wireless Network
Is your wireless network traffic safe from hackers ? Learn why your current wireless encryption might not be adequate and what you can do to fix it:

How to Enable Your Wireless Router's Built-in Firewall
Did you know your wireless router may have a built-in firewall hidden within its settings? Let's learn how to enable your wireless router's firewall:

Is Ransomware Holding Your Computer Hostage?
Did your computer just pop up a message that won't go away? Is it demanding that you pay a fine? You've just become a victim of Ransomware.

What Is a Packet Sniffer? - Network Traffic Protocols
Do you know what a packet sniffer? Let's learn how packet sniffers can be both a great diagnostic tools and a dangerous weapon in the hands of hackers.

How to Hack-proof Your Wireless Router
Is your wireless router a target for hackers? The answer is yes. We'll show you the steps you need to take to hack-proof your wireless router.

Beef up Your iPad's Security With These Tips
Are you worried about your iPad's security? Follow these security tips to help turn your iPad into a mobile information fortress.

Product Review – August Smart Lock with HomeKit
The new August Smart Lock with HomeKit will give your Siri assistant the power to lock and unlock your doors. Learn all about it in our review:

Network Security Tools & Utilities
These are free and commercial firewalls, antivirus, spyware removal and other network and computer security tools. Most also have versions with more features available for purchase if you find the free product meets your needs.

How to Test a Suspicious Link Without Clicking it
Does that link look infected? Want to find out how to check the safety of a link without actually clicking on it? Here's how:

How to Secure Your Webcam in One Minute or Less
Are you worried that someone is spying on you via your webcam? Here are some tips for securing your webcam:

What Not to Post on Facebook While You're on Vacation
Are you on vacation and about to post a picture of your delicious meal to Facebook? If you do, you might come home to an empty house, here's why:

Privacy and Security Tips for LinkedIn
LinkedIn can be a great resource for professional networking but if you're not careful you might give out too much information. Here are some tips for staying safe on LinkedIn.

How to Safely Unfriend a Facebook Creeper
Are you trying to distance yourself from a Facebook creeper without hurting their feelings? Here is a kinder, gentler way to unfriend a creeper.

The Top 5 Facebook Scams / Myths Watch out for
Your friend says he just added the dislike button and you can too! All you have to do is install this sketchy-looking app. Let's about this and other popular Facebook scams / myths.

How to Erase Your iPad Before You Sell it
Before you sell or trade your iPad make sure you wipe it clean of your personal data. Learn how in this article:

Become a Human Lie Detector with F.A.C.E. Training
Check out our review of Dr. Ekman's online course on recognizing Micro Expressions and learn how it could help fend off social engineering attacks.

How to Secure Your iPhone's Siri Assistant
Is your iPhone's Siri telling all your secrets? There is a potential Siri-related security hole that a simple settings change can fix.

How Hackers Break Into Your Voicemail
Has your voicemail been hacked? Learn how hackers break into voicemail boxes and find out how you can prevent your own voicemail from getting hacked.

Use Google Voice As A Private Bouncer / Receptionist
Let's learn how to use Google Voice as your very own personal bouncer and receptionist.

Tamper Data: The Firefox Add-on
Tamper Data might just be one of the best kept hacker secrets. Learn what this innocent-looking browser plug-in can do and why web application developers should worry.

Setup Parental Controls on iPad, iPod Touch, or iPhone
This article explains all the steps necessary to enable parental controls (restrictions) on your child's iPad, iPhone, or iPod Touch.

Understanding Encryption
What the heck is encryption and why should I care about it. Check out this hands-on encryption lesson for those of us who aren't good at math.

- By Category
An index of categories in the

Product Review: Canary All-in-One Security Device
Check out our product review of The Canary All-in-one Multi-function security device and find out why it's such an interesting bird:

Secure Your Android-based device
Security tips for securing your Android-based device (phone, tablet, etc)

Beware of the 'Ammyy' Security Patch Phone Scam
Did you get a call from someone wanting to

Protect Your Data Using Encryption
Articles and information about encryption and various forms of cryptography including coverage of public key infrastructure (PKI) and steganography.

Computer Security Incident Response and Computer Forensics
Articles, information and advice you can use for computer security incident response and computer forensics- what you should and shouldn't do and the tools you need to do it.

Tutorials and Classes on Computer and Network Security
Tutorials and classes as well as quizzes and polls to help you learn various aspects of computer and network security and how to properly configure your system to be as secure as possible.

Information Security News and Editorials
Breaking news, editorials and opinion pieces regarding current events in information security

Secure and Protect Your Network Perimeter
Articles and tips to help you learn what you need to know about firewalls, intrusion detection systems (IDS) and other security tools to protect the perimeter of your network.

How to Spot a Fake Friend Request
Let's learn why some people send out fake friend requests and how you can spot a false or malicious one:

How to Secure Your Facebook Timeline
Your Facebook's timeline is like a scrapbook for stalkers. Learn what you can do to secure it and make it safer.

Keep Track of Your Kids With Geofences
Geofence Technology: Parental control on steroids and likely your child's worse nightmare. Check out our article on how geofences can help you keep up with your kids' current location:

Foscam FI8905W Outdoor IP Security Camera Review
Looking for a network-connected security camera? Check out our review of the Foscam FI8905W Outdoor IP Security Camera

Help! My Password Has Been Cracked
You just came to the realization that one of your account passwords has been cracked. Here are the first steps you should take to regain control of your account:

Is Your Wireless Network's Name a Security Risk?
Can something as simple as your choice of wireless network name make you a more appealing target for hackers? The answer is yes and here's why:

5 Tips to Help You Land a Cybersecurity Job
5 tips to help you get your foot in the door in the Cybersecurity field.

How to Detect and Remove Wi-Fi Freeloaders on Your Network
How can you tell if someone is using your wireless connection without your permission? Let's take a look at what you can do to detect and remove wireless freeloaders from your network.

5 Things You Should Never Post on Facebook
For the safety of you and your family, there is some information you should never post on Facebook. Here are 5 things to avoid posting on Facebook:

What to Do After Being Scammed Online
Have you just been scammed online? Here are some tips to help you stop the scammers before they make off with more of your money or use your identity:

10 Things You Need to Do After Being Hacked
You opened an e-mail attachment that you probably shouldn't have and now your computer has slowed to a crawl and other strange things are happening: What's going on?

How to Kid-proof your Internet Parental Controls
Let's find out how to keep your Internet Parental Controls from being circumvented by your curious kids:

Is Your Cordless Phone Being Hacked?
Are hackers listening in to your cordless phone conversations or is it just your nosy neighbor? Learn how to protect yourself from cordless phone eavesdroppers.

How to Secure Your Portable Wi-Fi Hotspot
Are you afraid of freeloaders connecting to your hotspot and racking up data overages on your dime? Learn how to keep Wi-Fi leeches from stealing your Gigs:

10 Signs Your Computer Might Have a Malware Infection
Do you think your computer might be ill? Could it possibly have a malware infection? Here are 10 symptoms to look for:

How to Upgrade Your Wireless Router's Firmware And Why You Should
Is your router still running the same firmware it had installed on it when you bought it? If so, you might be missing out on a lot of security and performance improvements. Let’s learn how to upgrade your router’s firmware and why you might want to:

How Can I Avoid Credit Card Skimmers?
Check out these tips on how to avoid credit card skimming before you swipe your card at the ATM or the gas pump.

How to Test Your Firewall
Is your firewall working? Learn how to test your network firewall to see if it is doing its job?

Why You Should Encrypt Your Email and How to Do It
Let's Why you should encrypt your email communications and some tips on how to do it

Wireless Security Book Reviews
Book reviews of books related to wireless networks and wireless network security.

The Dangers of Out-of-Office Auto-Reply Messages
Think twice before you set your out-of-office auto-reply, you might reveal information that is useful to scammers and spammers.

How To Hide Your Wireless Network From Your Neighbors
Is something slowing your internet browsing to a crawl? It could be your Internet-leeching neighbor freeloading off your connection!

How to Secure Your HomePlug Powerline Network
How secure is your HomePlug Powerline Network? Let's learn how you can implement the security features of your HomePlug Powerline Network.

Rainbow Tables: Your Password's Worst Nightmare
Rainbow Tables may not sound like something sinister, but they are your password's worst nightmare. Don't let their cute name fool you, these things are scary.

Protect Yourself From SMS Phishing Attacks
Smishing is basically phishing scams that are sent over Short Message Service (SMS) text messages. Here are a few tips to help you tell spot SMiShing.

How to Protect Yourself from Premium SMS Text Message Scams
Did you just get a text that says you signed up for

How to Buy and Sell Safely on Craigslist
Craigslist can be a great resource for buying and selling things. Follow these tips to make your Craigslist experience a safe and profitable one.

Quick Tips To Secure Your Computer or Network
Quick tips categorized by operating system to illustrate or demonstrate short, simple tasks you can do to secure and protect your computer or network.

Glossary of Computer and Network Security Terms
A glossary of terms and definitions to help you understand the words and acronyms that make up the foreign language known as computer and network security.

Frequently Asked Questions
Links and information related to frequently asked questions (FAQ) on various computer and network security topics.

The Straight Man's Guide to Avoiding Online Dating Scams
Thinking of entering the online dating world to look for that special lady? Before you start your quest for love, check out these safety tips:

Secure Your Windows Operating System Computer
Articles and information to help you understand the holes and vulnerabilities in the Windows operating system and how to configure your computer to make it as secure as possible.

Secure Your Apple Mac Computer
Articles and information on security issues in the Apple Macintosh operating systems and advice and tips for you to use to make your system as secure as possible.

Secure Your Unix / Linux Operating System
Articles and information to help you understand the holes and vulnerabilities that might be present in a Unix or Linux operating system and the tools and utilities commonly used with them as well as how you can configure your system to be as secure as possible.

Tips For Blocking Those Stupid Robocalls!
You've just won a trip to....AH CRAP! ANOTHER ROBOCALL!! Are you tired of constantly being bothered by robocalls? It's time to FIGHT BACK!! Check out these tips for blocking those stupid robocalls:

Profile: Sub7 / Backdoor-G RAT (Remote Access Trojan)
While there are slicker and more expensive backdoor or Trojan programs that can be used to monitor and control remote systems, Sub7, a.k.a. Backdoor-G, remains one of the most powerful and widely used. This profile offers a look at some of the functionality built into this tool.

Microsoft Security Bulletins
Summaries of the monthly Microsoft Security Bulletins with links to the related patches and updates.

Get Certified: Information and Resources For Security Certifications
Information and resources pertaining to computer and network security certifications including details of different certifications, the exam and certification process and resources to help you prepare for and pass the exam.

What You Need To Know About Information Security Legislation
News, articles and information regarding information security laws and legislation such as Sarbanes-Oxley, Gramm-Leach-Bliley Act (GLBA), HIPAA, the Digital Millenium Copyright Act (DMCA), PATRIOT Act and more.

How to Prevent Strangers From Following You on Twitter
Are there sketchy people following you on Twitter? Learn how to get rid of unwanted followers and prevent them from following you in the first place.

How to Disable Facebook Places Location Tracking
If you're a little freaked out that you can click the Facebook Places map and see everywhere you've taken a picture or checked in, you're not alone:

B: Network Security Books Starting With The Letter "B"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

Book reviews of cyber-thrillers and other computer and network security fiction
All work and no play makes Tony a dull boy. Sometimes its nice to take a break from reading instructional, educational or informative books and delve into the imaginary world of fiction. These books are fictitious or cyber-thrillers which are novels that relate to computer or network security in some way.

Netsecurity Encryption / Cryptography Books
Books on encryption and cryptography- what it means and how to use it effectively.

Book reviews regarding national and homeland security as well as privacy issues
An integral part of Homeland and national security revolves around computer security including the privacy and Constitutional implications of law enforcement or the government gaining the ability to monitor computer activities. The books reviewed in this section relate to issues of national or homeland security as well as privacy and civil rights issues.

Book reviews on computer and network security certification preparation and exams
There are a vast number of certifications one can pursue to validate or prove expertise in an area of computer security. Whether you are pursuing a CISSP, SSCP, TICSA, Security+ or any other security certification a book is often a good way to study and prepare to pass the exam. This page contains books to help you obtain computer or network security certifications.

Top Picks for Computer and Network Security Books
To add to the value of the book reviews section this categorized collection of Top Picks will help point you to the best of the best for the various computer and network security subjects available.

Windows Books
Reviews of books to help you use and secure your Windows operating system.

Wireless Network Security Book Reviews
Reviews of books regarding wireless networks and wireless network security. Concepts such as the various protocols- 802.11b, 802.11a, 802.11g and others- as well as encryption schemes such as WEP and WPA are discussed in addition to other security issues such as VPN, SSID and more.

K: Network Security Books Starting With The Letter "K"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

L: Network Security Books Starting With The Letter "L"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

M: Network Security Books Starting With The Letter "M"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

N: Network Security Books Starting With The Letter "N"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

P: Network Security Books Starting With The Letter "P"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

R: Network Security Books Starting With The Letter "R"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

S: Network Security Books Starting With The Letter "S"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

T: Network Security Books Starting With The Letter "T"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

W: Network Security Books Starting With The Letter "W"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

C: Network Security Books Starting With The Letter "C"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

D: Network Security Books Starting With The Letter "D"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

E: Network Security Books Starting With The Letter "E"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

F: Network Security Books Starting With The Letter "F"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

G: Network Security Books Starting With The Letter "G"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

H: Network Security Books Starting With The Letter "H"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

I: Network Security Books Starting With The Letter "I"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

Apple / Mac Book Reviews
Book reviews related to Apple Computers or the Mac OS X operating system

Software Security Books
Books related to programming securely and writing secure software

Email Security Books
Book reviews of books related to email and email security including spam, phishing and other email-borne threats.

Book reviews of books about network and computer incident response and forensic investigations
Book reviews of books regarding computer and network incident response and computer forensic investigations and discovery.

Linux / Unix Books
Book reviews of books related to the Linux and Unix operating systems and how to configure and administer them securely.

Google+ Security and Privacy Settings
Here are some tips on how you can use Google+'s security and privacy options to make your Google+ experience a safe one:

How to Secure Your IP Security Cameras
Are your IP security cameras safe from Internet voyeurs and hackers? Check out these tips to help you secure your IP Security cameras:

How to Hack Your Way into Your Own Computer
Did you lock yourself out of your own computer and are trying to hack your way back in? Follow these tips to get your virtual house keys back so you don't have to start over from scratch.

Storing and Remembering Passwords Securely
This article examines the challenge of trying to remember the passwords and usernames to a wide variety of sites and applications and discusses the tools available to help users securely store and remember their passwords

Review: Logitech 700n Indoor Security Camera
Review of the Logitech Alert 700n Indoor Add-on Security Camera. An IP camera with some unique features and Mac compatibility

SCAP - Security Content Automation Protocol (SCAP) Tools and Resources
Are your familiar with Security Content Automation Protocol (SCAP)? Check out these SCAP-related resources for security professionals:

Wireless Networking Protocols Explained
Quick Tip covering wireless networking protocols such as bluetooth, 802.11b, 802.11a, 802.11g and more

How to Use Windows XP System Restore to Undo Malware
If antivirus, firewalls, anti-spyware and other protective measures don't work, you can simply go back in time to a point before your computer had problems by using System Restore.

Computer and Network Security Book Chapter Excerpts
Sample chapters and chapter excerpts from computer and network security books.

How to Configure Windows Vista Password Policy
A step-by-step tutorial for configuring Password Policy in Windows Vista Local Security Policy - Account Policy settings.

Configure Minimum Password Length Policy Setting
A step-by-step tutorial for configuring Password Policy in Windows Vista Local Security Policy - Account Policy settings.

Configure Password Must Meet Complexity Requirements Policy Setting
A step-by-step tutorial for configuring Password Policy in Windows Vista Local Security Policy - Account Policy settings.

Configure Store Passwords Using Reversible Encryption Policy Setting
A step-by-step tutorial for configuring Password Policy in Windows Vista Local Security Policy - Account Policy settings.

Verify Password Policy Settings
A step-by-step tutorial for configuring Password Policy in Windows Vista Local Security Policy - Account Policy settings.

Configure Minimum Password Age Policy Setting
A step-by-step tutorial for configuring Password Policy in Windows Vista Local Security Policy - Account Policy settings.

Configure Maximum Password Age Policy Setting
A step-by-step tutorial for configuring Password Policy in Windows Vista Local Security Policy - Account Policy settings.

Configure Enforce Password History Policy Setting
A step-by-step tutorial for configuring Password Policy in Windows Vista Local Security Policy - Account Policy settings.

Top Hacker Technique and Defense Security Books
top picks for books about hacker and cracker tools, techniques, tricks and tips and how to protect and secure your computers or network to defend it from being vulnerable to attack

Can The Government Hack Your iPhone?
The stories in the news about the FBI vs. Apple has got a lot of people wondering: Can the government hack my iPhone? We'll attempt to answer that question and others:

How to Block Political Robocalls
It's election season and here come the annoying political robocalls. If you're tired of having your dinner interrupted, check out our tips for avoiding robocalls from politicians:

How Google's Safety Center Tools Can Help Protect Your Kids Online
Are you worried about your kids taking a wrong turn on the Internet? Let's learn how Google's Safety Center tools can help you keep your kids on the right path:

4 Secrets Wireless Hackers Don't Want You to Know
Are you afraid of becoming the next victim of a wireless hack attack? Here are 4 secrets that wireless hackers don't want you to know about wireless security. Learn the facts so you won't become their next victim.

How to Prevent Browser Hijacking
Ever had your browser hijacked? Here are 4 things you can do to help prevent it from happening again:

Is Your Brand New Computer Pre-infected with Malware?
Could your brand new computer already be infected with malware before you even get it out of the box? The answer may be yes. Learn what you can do to detect an infection on your new computer.

5 Gift Ideas for IT Security Geeks
Are you trying to find something special for the IT security person on your list? Well, you've come to the right place. Check out these gift ideas for IT security geeks.

How to Configure Internet Explorer Security
How-to configure Internet Explorer Security will walk through a tutorial of basic steps required to configure security settings in the Internet Explorer web browser

How to Change Your Wireless Router Password
Have you lost the admin password to your wireless router or need to change your wireless router password because you never changed it from the factory default. Here are some tips on how to reset / change your wireless router's admin password.

Caller ID Spoofing - How to Protect Yourself
Is that really the president calling you at home or have you just been Caller ID spoofed?

Hacked Facebook Account - Immediate Recovery Steps
Was your Facebook account just hacked? Here is what you need to do to get things back to normal if you believe your Facebook account has been compromised by hackers and / or scammers:

Configure or Disable UAC in Windows Vista Home
Configure or disable UAC (User Account Control) in Vista Home or Vista Home Premium. The home versions lack the Local Security Policy console for configuring these settings, so users of these operating systems have to dig deeper and edit the registry to make changes.

Windows Policy Setting Minimum Password Age
A brief explanation of the Minimum Password Age setting in Windows Vista Local Security Policy - Account Policy - Password Policy settings.

Stop Pop-Ups In Your Web browser
Tips and tools to help you block pop-up ads while browsing the Web. Using these techniques can help you to reduce or eliminate pop-up ads and other Web-surfing annoyances.

Secure Your Wireless Network From Threats
Secure Your Wireless Network: Understanding the threats and how to protect your network against them

How to Secure Your Wireless Network
Secure Your Wireless Network: Understanding the threats and how to protect your network against them. Page 2.

Why You Might Already be a Victim Of Cell Phone Cramming
Did your cell phone bill suddenly go up even though you didn’t have any overages? This might be a sign of a cell phone cramming scam. Let’s learn how to spot these types of scams and what you can do about the bogus charges that got added to your cell phone bill:

Free Intrusion Detection (IDS) and Prevention (IPS) Software
Free intrusion detection (IDS) and prevention (IPS) software to help you identify and respond to malicious or suspicious network activity on your network and stop any hackers, viruses, trojans or other malware from spreading

Links to Free Port Scanner Software
Links to free port scanner software to analyze your system for open ports to help you secure it

How to Prevent Facebook From Giving Up Your Location
Is Facebook giving out your location without you knowing about it? Here are some tips to help protect your location privacy:

Why Stalkers Love Your Geotags - Geo-Stalkers
Are you being geo-stalked? Is someone using your location tags to hunt you down? Learn how to protect yourself from Geo-stalkers.

5 Tips for Staying Safe On Twitter
Learn what you need to do to help make your twitter experience a safe one

How to Find a Lost Bluetooth Device
Have you lost a Bluetooth headset, a Fitbit, or some other Bluetooth-enabled device? All is not lost, there may be hope. You may still be able to locate it. Let us show you how:

Review: Logitech Alert 750e Outdoor Master System
A review of the Logitech 750e Outdoor Security Camera Master System from a Mac user's perspective.

How to Backup Your Photos With Google Photos
Are you looking for an easy way to backup your massive library of digital photos to the cloud, but you don't want to spend an arm and a leg doing it? Google Photos might be just what you're looking for. Check out our article on how to use Google Photos to backup your photos from both your mobile device and your computer:

Tips for Avoiding Cyber Monday Scams
If you're skipping Black Friday in favor of Cyber Monday then you'll want to check out these tips on how to avoid getting scammed during your Cyber Monday virtual shopping trip.

How to Protect Yourself From the Worst Android Hack Ever: Stagefright
Stagefright, the worst mobile phone hack ever, is here. If you have an Android-based phone, the chances are pretty good that you might be vulnerable. Learn why this hack is the mother of all Android vulnerabilities and what you can do to prevent your phone from being affected.

Free Spyware and Adware Detection and Removal Tools
Free spyware removal tools and utilities to help you block, or at least detect and remove spyware and adware that can infest your computer and bog it down severely and may even perform malicious functions like capturing your passwords.

How to Protect Yourself From Malicious QR Codes
Those little black and white boxes are everywhere. QR codes are the latest marketing fad and are also a new avenue of attack for cybercriminals trying to scam you. Learn how to protect yourself from malicious QR codes.

Improve Web Browsing Security and Speed by Using Alternative DNS Servers
Did you know that one simple change to the DNS settings on your router and/or computer might improve both your web browsing security and speed? In this article, we'll show you how to make the change to an Alternative (and free) DNS provider.

Metasploit: The Fine Line Between Security Tool and Security Weapon
On April 7 the Metasploit Project released version 2 of the Metasploit Framework. Ostensibly designed for penetration testing to help administrators secure their systems and networks, the Metasploit Framework provides working active exploits for a variety of vulnerabilities. In the wrong hands it is a fairly powerful weapon rather than a useful security tool.

Desktop Search Tools are Safe to Use
Google recently released a desktop search utility similar to the X1 desktop search tool I reviewed a few months ago. Microsoft and Yahoo are promising similar tools coming soon. These tools are very handy and make searching for information much more efficient, but they also pose some security concerns that users should be aware of. Page 2.

Desktop Search Tools Don't Pose Real Security Risk
Google recently released a desktop search utility similar to the X1 desktop search tool I reviewed a few months ago. Microsoft and Yahoo are promising similar tools coming soon. These tools are very handy and make searching for information much more efficient, but they also pose some minor security concerns that users should be aware of.

Configure or Disable UAC in Windows Vista Home (or Home Premium)
Configure or disable UAC (User Account Control) in Vista Home or Vista Home Premium. The home versions lack the Local Security Policy console for configuring these settings, so users of these operating systems have to dig deeper and edit the registry to make changes.

The Dangers of Evil Twin Wi-Fi Hotspots
Is the free wireless hotspot you just connected to a legitimate one, or is it an Evil Twin hotspot setup to steal your passwords and other personal information? Let's learn about Evil Twin hotspots and how to guard against them.

How to Protect Your Computer From Flame and Other Types of 'Super Malware'
There is a new class of 'super malware' on the rise: Flame, Stuxnet, and others are making themselves known for their complexity and motives. Let's find out what you can do to protect your computer from super malware attacks.

Creating Secure Passwords - Simple Steps and Tips
Article on password security. Passwords need to be long enough and complicated enough to protect you, but not so complicated you forget them. Also, due to password cracking algorithms and the format of the encrypted password hash, sometimes a shorter password can be better than a longer password

Free Pop-Up Ad and Messenger Service Spam Blocking Software
Free software and utilities to block pop-up advertising including blocking the Windows Messenger Service spam that pops up even when you are not browsing the Web.

Top 5 Picks: Pop-Up Ad Blockers
A list of top picks for applications and utilities designed to block or control pop-up, pop-under and other advertisements on web sites from your About.com Guide, Tony Bradley (Edited by Andy O'Donnell)

Hacker Enumeration Tools
Links to hacker enumeration tools. These tools will help list out valuable information about users, hosts, services, ports and more.

Have you Fallen for the 'Ammyy' Scam?
Security.

Computer Security 101 (tm): Lesson 1
A series of articles on computer security for home users. Computer Security 101 (tm) is a 10-part series of lessons about basic computer, network and Internet security. Lesson 1 introduces hosts, IP addresses, DNS, ISP and backbone.

Computer Security 101: Lesson 1 - DNS and ISP
Computer Security 101 (tm) is a series of lessons about basic computer, network & Internet security. Lesson 1 introduces hosts, IP addresses, DNS, ISP & backbone. Page 2.

Hacker Defense Tools and Utilities
This is a listing of software to help you secure and protect your computer from various sorts of malware or malicious hacking attempts.

Your Right Of Privacy
There is an assumed or implied Right Of Privacy in the United States. Many think it is rooted in the Constitution, but not without a good deal of interpretation. There are many statutes and regulations that guard personal information, but security and privacy generally come at the expense of freedom and convenience. It is up to you to make an educated choice about where you want the balance to be.

Your Right Of Privacy
There is an assumed or implied Right Of Privacy in the United States. Many think it is rooted in the Constitution, but not without a good deal of interpretation. There are many statutes and regulations that guard personal information, but security and privacy generally come at the expense of freedom and convenience. It is up to you to make an educated choice about where you want the balance to be. Page 2.

Balancing Privacy and National Security
There is an assumed or implied Right Of Privacy in the United States. Many think it is rooted in the Constitution, but not without a good deal of interpretation. There are many statutes and regulations that guard personal information, but security and privacy generally come at the expense of freedom and convenience. It is up to you to make an educated choice about where you want the balance to be. Page 3.

Balance Your Privacy with Convenience
There is an assumed or implied Right Of Privacy in the United States. Many think it is rooted in the Constitution, but not without a good deal of interpretation. There are many statutes and regulations that guard personal information, but security and privacy generally come at the expense of freedom and convenience. It is up to you to make an educated choice about where you want the balance to be. Page 4.

How Secure Is Security by Obscurity?
Security by obscurity relies on protecting a system or application by hiding knowledge of its existence. This article shares my point of view on why security through obscurity is the wrong way to go.

Introduction to Vulnerability Scanning
A brief article introducing the concepts of vulnerability scanning- how it works, what sorts of things it checks for, what the results mean to you and how you might use a vulnerability scanner to detect weaknesses in your network and fix them before they are used against you

How to Safely Recycle or Sell Your Old Computer
It's time to get rid of your old computer and get a new one. Let's review a couple of security-related things you need to do to that old paperweight before you chuck it.

Free Wireless Security Tools to Help Monitor Your Network
Free tools to monitor and protect your wireless connection or test your WEP encryption. There are wireless IDS (intrusion detection systems), wireless scanners that detect hidden networks and access points and more.

Charter Communications Hijacks Windows Live Search Engine
Since installing Windows Vista, I have used the default Windows Live Search to do my web searches from the address bar of my Web browser. One day, instead of Windows Live Search results, I got Charter.net search results, 'powered by Yahoo!'

Ten Tips for Shopping Safely Online
Do you know what it takes to shop safely online? Use these 10 tips to gain some peace of mind.

How to Scam-proof Your Brain
Everywhere you turn on the Internet, a scammer is waiting for you. Learn what it takes to scam-proof your brain.

CASP Certification From CompTIA
Interested in the CompTIA Advanced Security Practitioner (CASP) certification? Learn more about it in our article on the CASP.

Is Pet Cam Hacking Really a Thing?
Did you recently purchase a pet cam or receive one as a gift? Did you know that hackers may be trying to hack your pet cam so they can eavesdrop on you and your family? Here are some tips to help prevent someone from hacking into your pet cam:

6 Tips for Keeping Your Kids Safe Online
What's your Internet safety strategy for protecting your kids while their online? Here are 6 tips to help you protect your kids while they use the Internet on their computer or mobile device:

Minecraft Safety Tips for Parents of Minecrafters
Has your child drank the Minecraft cool-aid? Are they all about the blocks 24/7? If you're a parent of a Minecrafter, you'll want to check out these tips on how to keep your child safe in the Minecraft universe.

How to Beef Up Security on Your Home Wireless Network
Think your wireless network is safe because you're using WPA2 encryption instead of WEP? Think again. Check out these tips for beefing up your wireless security:

How to Strengthen Your iPhone's Passcode
Are you relying on a 4-digit passcode to protect your iPhone, iPad, or iPod? There is a simple settings change that can make your screen lock passcode a lot harder to crack. Let's learn how to set a complex password on your iPhone, iPad, or iPod Touch.

How to Backup Your IP Security Cameras to the Cloud
You've got IP security cameras setup and monitoring things 24/7 but have you thought about what happens if the bad guys steal the computer your saving your security camera footage on? Let's learn how to backup your IP security camera to off-site cloud-based storage so you can still catch the bad guys

Prevent Thieves from Disabling "Find My iPhone" App
The Find My iPhone app is a great tool for tracking your iPhone provided thieves don't turn it off after they have stolen your phone. Let's find out how you can make it harder for thieves to turn off your iPhone's homing beacon.

How to Monitor and Protect Your Online Reputation
Who's talking about you or your business online on social media, blogs, and other websites? What are they saying? Let's look at some steps you can take to monitor and protect your online reputation.

New Cybersecurity Threats For The New Year
New year, new threats. Let's take a look at what new cybersecurity threats may emerge in 2016 and beyond:

Regaining Control of Your PC After a Hack Attack
Has your PC been taken over by malicious software? Let's learn how to pull the plug on the bad guys and get things back to normal:

5 Apple Watch Security Settings You Should Consider Turning On
Does your Apple Watch have any security settings? Do you need them? Let's look at 5 Apple Watch security settings that you may want to consider enabling:

iVault iPhone / iPod Touch App
A brief profile of the iVault app for the iPhone and iPod Touch.

Book Review: Digital Fortress by Dan Brown
A review of the cyber-thriller novel Digital Fortress by Dan Brown. An excellent novel highlighting encryption and high-technology espionage as well as some government / privacy issues.

Book Review: Counter Hack Reloaded
A review of Counter Hack Reloaded, the second edition of Ed Skoudis' Counter Hack: A Step-By-Step Guide to Computer Attacks and Effective Defenses.

Windows XP - How to Disable Remote Assistance and Desktop
A quick step-by-step guide to show how to disable Remote Desktop and/or Remote Assistance. If the services are not being used, they are just another door for an attacker to access your system.

Disable Remote Desktop and Remote Assistance in Windows XP
A quick step-by-step guide to show how to disable Remote Desktop and/or Remote Assistance. If the services are not being used, they are just another door for an attacker to access your system.

How to Turn Off Remote Assistance in Windows XP
A quick step-by-step guide to show how to disable Remote Desktop and/or Remote Assistance. If the services are not being used, they are just another door for an attacker to access your system.

Disable Remote Desktop and Remote Assistance in Windows XP
A quick step-by-step guide to show how to disable Remote Desktop and/or Remote Assistance. If the services are not being used, they are just another door for an attacker to access your system.

Disable Remote Desktop and Remote Assistance in Windows XP
A quick step-by-step guide to show how to disable Remote Desktop and/or Remote Assistance. If the services are not being used, they are just another door for an attacker to access your system.

Don't Invite Strange Devices to Play on Your Network
Most home routers, wireless or wired, provide some form of DHCP which automatically assigns IP addresses to devices as they connect. To reduce the possibility of an unauthorized party accessing your network, you can disable DHCP and manually assign static IP addresses to your devices

Counter-Hacking: Savior or Vigilante?
An article on counter-hacking or counter-attacking when an infected device hits your computer. Is it legal or ethical to respond? Is it vigilantism? There are many questions yet to be answered on how to handle devices that are insecure and show no signs of fixing themselves anytime soon. Page 2.

Counter-Hacking: Savior or Vigilante?
Is it legal or ethical to respond to a hack or attack with a counter-attack or counter-hack? Is it vigilantism? There are many questions yet to be answered on how to handle devices that are insecure and show no signs of fixing themselves anytime soon.

NMap Network Scanning - A Review of the Book NMap Network Scanning
A review of NMap Network Scanning, a detailed book on the functions and uses of the NMap network scanning software written by the original developer of NMap, Fyodor

Charter Communications Hijacks Windows Live Search Engine
Since installing Windows Vista, I have used the default Windows Live Search to do my web searches from the address bar of my Web browser. One day, instead of Windows Live Search results, I got Charter.net search results, 'powered by Yahoo!'

Charter Communications Hijacks Windows Live Search Engine
Since installing Windows Vista, I have used the default Windows Live Search to do my web searches from the address bar of my Web browser. One day, instead of Windows Live Search results, I got Charter.net search results, 'powered by Yahoo!'

Charter Communications Hijacks Windows Live Search Engine
Since installing Windows Vista, I have used the default Windows Live Search to do my web searches from the address bar of my Web browser. One day, instead of Windows Live Search results, I got Charter.net search results, 'powered by Yahoo!'

Charter Communications Hijacks Windows Live Search Engine
Since installing Windows Vista, I have used the default Windows Live Search to do my web searches from the address bar of my Web browser. One day, instead of Windows Live Search results, I got Charter.net search results, 'powered by Yahoo!'

Charter Communications Hijacks Windows Live Search Engine
Since installing Windows Vista, I have used the default Windows Live Search to do my web searches from the address bar of my Web browser. One day, instead of Windows Live Search results, I got Charter.net search results, 'powered by Yahoo!'

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Backup and Restore Data in Windows Vista
A visual, step-by-step tutorial to illustrate how to backup and restore data in Microsoft Windows Vista

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3