Security Sitemap - Page 2 2016-09-26

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3

Conducting A Vulnerability Scan With Nessus
A visual step-by-step tutorial on performing a vulnerability scan using Nessus 3

Configure or Disable UAC in Windows Vista Home (or Home Premium)
Configure or disable UAC (User Account Control) in Vista Home or Vista Home Premium. The home versions lack the Local Security Policy console for configuring these settings, so users of these operating systems have to dig deeper and edit the registry to make changes.

Configure or Disable UAC in Windows Vista Home (or Home Premium)
Configure or disable UAC (User Account Control) in Vista Home or Vista Home Premium. The home versions lack the Local Security Policy console for configuring these settings, so users of these operating systems have to dig deeper and edit the registry to make changes.

Book Review of The Da Vinci Code by Dan Brown
Check out this in-depth review of the New York Times best-selling thriller The Da Vinci Code by Dan Brown. It has only loose connections to cyber security or cyber fiction through some code-breaking and cryptography, but it is an excellent book.

Top 5 Forensic and Incident Response Books
Check out these top picks for books on computer forensics investigation and incident response

Profile: Nessus Vulnerability Scanner
Profile of the freely available Nessus open source vulnerability scanner from your About.com Guide for Internet / Network Security, Tony Bradley

Stay Safe on the Internet
Understand what is safe to share online and know how to make sure your computers don't get hacked when you are using the internet.

Get Free Music on Your Car's Satellite Radio With This Legal 'Hack'
Did you let your XM/Sirius

Blocking Scammers and Creepers Online and On Your Phone
Have you reached a point with someone where you think it's time to block them? If you’ve reached that point, check out our article on how to block someone from calling or messaging you on your phone, contacting you on social media, and on other sites as well.

How To Create Your Own Digital Safety Deposit Box
You might have a bank safety deposit box protecting your important papers, but what about your digital life? Let's learn how you can create a digital safety deposit box for your important data:

How Criminals Use Google Street View to Case the Joint
Learn how criminals are using Google Maps Street View to help them 'case the joint' before they rob your house. We'll also show you how to protect yourself by making your property invisible in Street View so that all the bad guys will see is a big fat blur.

Keep Hackers Out With a Defense In Depth Strategy
Learn how to use a layered defense strategy to protect your computer and other network devices from hackers

DIY Computer Forensics: How to Recover a Deleted File
Can you bring files back from the dead? In some cases, the answer is yes. I'm not talking about the recycle bin, I'm talking about when you deleted the stew out of them. Let's find out how to resurrect dead files.

What is a Personal VPN Service and Why Do I Need One?
VPNs aren't just for big corporations anymore. Learn how a personal VPN service can help protect your privacy and keep the hackers at bay.

How to Lock Your Home From Your Smartphone
Did you remember to lock your front door when you left the house this morning? Let's learn how you can remotely lock up your home and even turn lights on and off via your smartphone.

How to Remotely Wipe Your Stolen or Lost iPhone's Data
Did someone steal your iPhone or iPad? Learn how to remotely wipe its data so that the bad guys can't steal your personal information.

How to Protect Your Network From a Natural Disaster
Learn the steps you need to take to prepare your network and IT assets for a natural disaster such as a flood or a hurricane.

Remove These 5 Things From Facebook Right Now!
There are certain bits of personal information that you may want to leave out of your Facebook profile for privacy and safety reasons. Here are 5 of them:

How to Hide Specific Facebook Posts From Nosy People
Let's face it, when your mom joins Facebook and becomes your

How to Create an Effective Security Awareness Training Program
Does your organization have a security awareness training program. We'll show you why you should have one and how to make your own.

How to Encrypt Your Files And Why You Should
Don't end up being the guy who just lost a laptop with a million social security numbers on it. Learn what you need to do to encrypt your hard drive so that its data is protected in case it ever falls into the wrong hands.

How to Clear Your Facebook Search History
Did you forget to log out of Facebook on a friend's computer? Are you worried someone might happen upon your Facebook search history? Here's how to clear your Facebook search history:

Use Security Event Logs to Catch a Hacker
Setting up auditing to log events on your computer or network helps to detect and prevent intrusions as well as provide forensic evidence after an intrusion occurs. Page 2.

Why Should I Use Security Event Logs?
An article on setting up auditing to log events on your computer or network. Having logs helps to detect and prevent intrusions as well as providing valuable forensic evidence after an intrusion occurs.

How To Use The MSCONFIG Utility
A brief quick tip article on starting Windows XP in Safe Mode using the MSCONFIG utility rather than trying to press the F8 key at just the right time

How to Remove Hidden Data From Microsoft Office Files
Microsoft Office retains a lot of data in the background hidden as metadata. The hidden data includes field comments, deleted data and other information which could be embarrassing or outright damaging if passed on to other people. This Quick Tip will show you how you can remove the hidden data from Microsoft Office files

How To Configure The Windows XP Firewall
The Windows XP SP2 firewall may not offer the best protection, but it offers better protection than no firewall at all and it is built-in to Windows XP systems. This tip will show you how to configure the Windows XP SP2 firewall.

How to Block Spyware in 5 Easy Steps
A quick, down and dirty hit list of the 5 easy steps you can take to protect your computer system or network from being infiltrated by spyware and adware

Nessus Vulnerability Scanner: Missing Bells and Whistles?
Nessus is generally considered to be one of the best, if not THE best, vulnerability scanner out there. The fact that it is open source can be a pro or a con depending on your viewpoint and many give it a bad rap for lack of a glossy reporting mechanism.

Should You Mix Business and Personal Email?
Should you mix business and personal email? Are there any reasons for or against it? Are there any rules that govern it? Is it a good idea? Let's answer these questions.

Product Review: NeWT Vulnerability Scanner from Tenable Network Security
Nessus is acclaimed as one of the best vulnerability scanners available. It is an open source project, but its sole sponsor has been Tenable Network Security. Nessus is great, but for Windows users it still requires a *nix machine to run the backend scan engine...until now. NeWT, from Tenable, is a port of Nessus to the Windows platform so that Windows users or administrators can scan their systems without the *nix server.

Product Review: eBlaster 6.0
A review of SpectorSoft's eBlaster 6.0 remote computer monitoring software. eBlaster allows parents or employers to monitor computer activity via email by generating periodic reports.

How Can I Secure My Microsoft Office Files?
Short of encrypting or securing every single file on the system, you can also use the built-in encryption capabilities of Microsoft Office to secure specific files.

Product Review: Spector Pro 6.0
review of Spectorsoft Spector Pro 6.0 monitoring software. Spector Pro 6.0 captures keystrokes, screenshots, instant messages, email, and more, stealthily, to allow a parent or employer to monitor a computer system and control how and when it is used.

What Is a Firewall and How Does a Firewall Work?
An article on the basics of firewalls- what is it? how does it work? Talks about firewalls as the first line of perimeter network security to restrict access to your network.

Four Mechanisms Used By Firewalls to Restrict Traffic
What is a firewall? How does it work? Talks about firewalls as the first line of perimeter network security to restrict access to your network. Page 2.

Pros and Cons of Using Firewalls
What is a firewall? How does it work? Learn about hardware firewalls built into routers, as well as personal firewalls that run on your computer. Page 3.

7 Things You Should Never Put In Your Online Dating Profile
Why are you getting calls from strangers asking you what you're wearing? The reason: you put your phone number in your online dating profile. For your safety, here are 7 things you should never put in your online dating profile.

5 Security Tips to Keep Your Baby From Hacking Your Phone
What in the heck is wrong with my phone and why is it covered in saliva? If you're asking this question, then you have kids and they have screwed up your phone. Here's what you need to know about baby-proofing your phone:

Forgot Your Password? How to Reset it as Administrator
If you can't remember your Windows XP password, you can use an account with Administrator rights to reset the password so you can once again access your account.

Zero Day Exploits
Understanding the dreaded zero day exploit vulnerabilities, and how to better protect yourself and your computer. Page 2.

6 Wireless Network Security Steps
Simple steps you can take to secure your wireless network, and make it more difficult for hackers to get into your personal information. Page 2.

Sub7 Trojan Overview
Once installed, Sub7 is essentially all-powerful. The hacker at the other end will be able to do any of the following and more:. Page 2.

JOKE HOAX - Seems Ridiculous But People Do These Things
A joke hoax email message that pokes fun at the spam chain letter hoaxes that go around, and how gullible users are when they follow the directions of such messages.

Teddy Bear Virus- The Hoax That Just Won't Die
A joke hoax email message that pokes fun at the spam chain letter hoaxes that go around and how gullible users are when they open attachments and follow the directions of such messages. Page 2.

Things To Look For In Host-Based Intrusion Prevention
A short list of features to look for when choosing a host-based intrusion prevention system application

Host-Based Intrusion Prevention
In an enterprise environment, I recommend host-based security wherever possible. Stopping intrusions and infections at the workstation level can be very effective. Page 2.

Zero Day Exploits: The Holy Grail
An article about zero day exploit vulnerabilities and how to protect yourself and your computer by your Guide, Tony Bradley

Introduction to Wireless Network Security
A short article to provide you with the basics you should know about securing a simple wireless network.

Sub7 Trojan / Backdoor Overview
A brief description of the capabilities of the Sub7 Trojan horse hacker utility software

Reset Forgotten Passwords With Administrator Account
If you can't remember your Windows XP password and even the password hint isn't helping, you can use an account with Administrator rights to reset the password so you can once again access your account.

Reset Forgotten Passwords With Administrator Account
If you can't remember your Windows XP password and even the password hint isn't helping, you can use an account with Administrator rights to reset the password so you can once again access your account.

Reset Forgotten Passwords With Administrator Account
If you can't remember your Windows XP password and even the password hint isn't helping, you can use an account with Administrator rights to reset the password so you can once again access your account.

Reset Forgotten Passwords With Administrator Account
If you can't remember your Windows XP password and even the password hint isn't helping, you can use an account with Administrator rights to reset the password so you can once again access your account.

Reset Forgotten Passwords With Administrator Account
If you can't remember your Windows XP password and even the password hint isn't helping, you can use an account with Administrator rights to reset the password so you can once again access your account.

Internet Parental Controls Start At Your Router
Wouldn't it be nice if you could block a site so that your children can't get to it no matter what device your child is using to try and access it? Let's look at implementing parental controls at the router level.

How to Easily Backup Your Facebook Data
Is there an easy way to backup all the pictures, videos, links, etc, that you've ever posted to Facebook, in case your account gets hacked, deleted, or disabled? The answer is yes, and we'll show you how to archive your Facebook content quickly and easily.

6 Online Dating Safety Tips for OkCupid Users
Are you using OkCupid for online dating? Before you create that profile and put yourself out there, check out these safety and security tips to help make your online dating experience a safer one.

How To Hide From Your Online Creepers
Do you always feel like somebody’s watching you…..online? Creepers are gonna creep. It’s what they do. Let’s learn what you can do to try and keep online creepers at bay:

What is a Road Apple Social Engineering Attack?
You might want to think twice before picking up that USB drive you found in the parking lot at work. While it may be tempting to see what’s on it, you are likely about to become a victim of a Road Apple social engineering attack. Let’s learn about Road Apple attacks and what you can do to prevent them:

How to Protect Your Facebook Account with Login Approvals
Worried about Facebook hackers gaining access to your Facebook account? Consider using Facebook Two-Factor Authentication to protect your account. We'll show you how:

5 Home Wireless Network Security Questions Answered
You've got questions about wireless network security, we've got answers. Here a 5 frequently asked questions and answers about wireless security:

How to Protect Yourself From Clickjacking Attacks
Oh SNAP! You just got Clickjacked!! What is Clickjacking and how would you even know that it happened to you? Learn more about clickjacking attacks and find out how you can avoid having your clicks jacked.

How to Quickly Secure Your Mac
Securing your Mac doesn't have to take a ton of effort. There are great security features built into the OS that might not be turned on. This article will show users how to enable the security features that are built-in to OS X, but are often disabled by default.

How to Make a Strong Password
Tips to make your password really hard for bad guys to crack

The 8 Worst Privacy Settings to Leave Turned On
Some privacy settings might make you say to yourself

Twitter Privacy and Safety Tips for Parents
Do you know who's following your child on Twitter? Here are some Twitter privacy and safety tips to help keep you and your family safe.

The Do's and Don'ts of Home PC Backups
Do you backup your computer on a regular basis? Where do you store your backup disks? If you said next to the computer, then you might want' to check out this article to see why that might be a bad idea.

Top Wireless Network Security Books
top picks for books on wireless network security, wireless access points, wep, ssid, encryption, 802.11b, 802.11a, 802.11g, 802.11x, war driving

Top Computer and Network Security Books
A list of top Computer and Network Security books from your Guide, Tony Bradley

Surf Anonymously - How do I Surf the Web Anonymously?
Tips to help you learn how to surf / browse the web anonymously.

5 Tips for Securing Your Wireless Network
Is your wireless network secure? Here are 5 steps you can take to help better secure your wireless network.

Top Encryption / Cryptography Books
top picks for books regarding encryption, cryptography, steganography, pki, rsa and other encryption and decryption topics

Can my Wireless Network Name Affect My Security
Is having a common network name a security risk? Is it as bad as having a simple network password? Let's learn why your network name might be a big security risk.

5 Hacks Seen In Movies That Are Totally Legit
Are movie hacks for real or are they pure fiction? Check out these 5 hacks seen in the movies that are totally legit in the real world.

What to do if You've Been Threatened Online
Have you been threatened online? What should you do about it? Here are some tips for how to handle online harassment and threats.

When Does Oversharing Online Become a Security Problem?
Oversharing. Just about everyone indulges in it to some degree. When does oversharing become a security risk? Let's learn when oversharing might become a problem and pose a threat.

5 Instagram Safety Tips For Parents
What do parents need to know about Instagram safety? Check out these Instagram safety tips before you let your kids snap and post that next pic.

Is Your Baby Monitor Being Hacked?
Are there really people out there that would hack your baby monitor? The answer is yes. Learn why hackers hack baby monitors and what you can do to prevent yours from being hacked.

4 Security Lessons We Can Learn From 'Mr. Robot'
USA Network's hacker drama 'Mr. Robot' follows the life of hoodie-clad elite hacker Elliot Alderson as he goes about his daily life as a security analyst by day, hacker by night. Here are 4 security lessons you can learn from watching the series.

Can Hackers Hijack My Car?
It's probably on your top 5 list of worst nightmares: Someone hijacking your car. What if hackers figured out a way to remotely take control over your car from thousands of miles away. Guess What? THEY DID!!

How to Use Netflix's Parental Controls
Do you worry about what your kids might watch on Netflix when you're not around? Netflix has parental controls, but many people don't turn them on. Learn how to enable Netflix's parental controls in our article:

7 Bad Habits That Are Killing Your Security
Whether it’s pure laziness or you're just resistant to change, we all develop bad security habits. Here are 7 bad habits that are killing your security and some tips for replacing them with good habits:

Why You Should Care About Like / Click Fraud
Is it ok to buy likes or clicks to help out your marketing campaign? We’ll discuss this and other questions in our article on click and 'like fraud' and we’ll also learn why you might do yourself more harm than good if you engage in this practice.

Tricks For Keeping Your Text Message Notifications Private
Are you tired of people being nosy and reading the text notifications on your lock screen? Let’s learn how you can help people mind their own business by shutting these notifications off:

Why Sharing Your Location on Social Media is a Bad Thing
Can sharing your current, past, or future location be a security risk? The answer is yes. We’ll explain why and give you some location privacy tips to help you stay safe:

Free Pop-Up Ad Blocking Software
Free software and tools to help you block the invasion of pop-up, pop-under and Windows Messenger Service spam

Making Sense of Google's New Simplified Privacy Settings
If you're like most people, you use a lot of different Google products and services including Maps, Search, Gmail, Youtube, etc. Wouldn't it be nice if Google had a simple way to manage your privacy settings across all of their products and services? Thankfully, THEY DO! Here's what you need to know:

5 Security Mistakes That Could Put You in Harm's Way
Some security mistakes can be bad, others can be downright dangerous. Here are 5 security mistakes that could put you in harm's way:

Protecting The Elderly From Online Scams And Malware
If your parents or grandparents aren't the most tech savvy people on the planet and you're worried about them getting taken by online scammers or getting tricked into loading malware onto their computer, check out these tips for some ways you can help protect them:

Tips For Better Controlling Your Privacy Online
Do you think your privacy settings are effective or are you getting tons of SPAM messages, friend requests from total strangers, and other indicators that your privacy settings aren't strong enough. Here are 5 tips for better controlling your privacy online:

When You See The Dark Side Of Clickbait, You'll Freak Out!
Clickbait is all over Facebook and other social media sites. Every other story has a clickbait headline, but would you know how to tell the difference between harmless clickbait versus the malicious variety? Here are 3 tips to help you spot the bad kind of Clickbait:

January 2005 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of January 2005.

January 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of January 2006.

February 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of February 2006.

June 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of June 2006.

July 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of July 2006.

August 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of August 2006.

October 2005 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of October 2005.

November 2005 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of November 2005.

June 2005 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of June 2005.

How to Test Your Facebook Privacy Settings
Are your Facebook privacy settings working as intended? Here's how to test them:

The Ever Growing Challenges of Data Storage
The Ever Growing Challenges of Data Storage is an article about the issues with storing, maintaining, backing up and recovering data on today's massive storage media. It is written by Ontrack Data Recovery's

The Ever Growing Challenges of Data Storage
The Ever Growing Challenges of Data Storage is an article about the issues with storing, maintaining, backing up and recovering data on today's massive storage media. It is written by Ontrack Data Recovery's. Page 2.

Windows XP SP2 Firewall - Is It Sufficient Or Should You Still Use a 3rd-Party Firewall?
With the release of Windows XP Service Pack 2 (SP2) Microsoft has improved the capabilities of the built-in firewall by leaps and bounds. Is the new firewall sufficient? Should you replace your 3rd-party personal firewall with the built-in Windows firewall?

Free Vulnerability Scanning Software
Free software and tools to perform vulnerability scans and proactively find the holes in your systems before an attacker or malware does.

iPhone / iPod Touch Security - Secure Information Storage on iPhone / iPod Touch
A brief article discussing the need for protecting sensitive and confidential data on the iPhone or iPod Touch and links to some Apps available to do just that

Locking Down the iPhone
A brief overview of the Center for Internet Security (CIS) security benchmarks for the Apple iPhone (OS 2.2.1)

January 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of January 2007.

January 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of January 2008.

February 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of February 2008.

March 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of March 2008.

May 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of May 2007.

May 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of May 2008.

June 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of June 2007.

June 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of June 2008.

February 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of February 2007.

July 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of July 2007.

August 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of August 2007.

September 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of September 2006.

September 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of September 2007.

October 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of October 2006.

October 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of October 2007.

November 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of November 2006.

November 2007 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of November 2007.

December 2006 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of December 2006.

April 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of April 2008.

April Fool's Day: PC Pranks to Watch Out For
April Fool's Day is a day of jokes, pranks, and general frivolity each year. If you don't lock your PC while you're away, you could find yourself the victim of one of these classic PC pranks.

False Sense of Security
Home users are migrating to broadband, 24/7 connections to the Internet without the basic knowledge and skills necessary to protect themselves and the rest of the Internet from the security risks that exist on their computer. This false sense of security is bad for everyone. Page 2.

False Sense of Security
Home users are migrating to broadband, 24/7 connections to the Internet without the basic knowledge and skills necessary to protect themselves and the rest of the Internet from the security risks that exist on their computer. This false sense of security is bad for everyone. Page 3.

In Depth Security: Using a Layered Approach to Network Security
In Depth Security. Using a layered approach to network security provides better protection. An attack that compromises or bypasses one security layer will be detected and blocked by another.

Annoying Windows Messenger Service Pop-Up Spam
An article on Windows Messenger Service pop-up spam by your Guide, Tony Bradley. Page 2.

Computer Security 101 - Quiz 1
A short quiz to test how much you learned from the first lesson of the Free Computer Security 101 course.

Protect Your Business From Phishing Scams
Phishing scams have spiked recently and have become more of a concern. This article talks about what phishing scams are and illustrates five steps users and companies can take to keep from being victimized by phishing scams.

Apple Releases Patch for Critical Vulnerability in Mac OS X
The Mac OS X operating system is generally considered to be one of the more stable and secure available. When there is a security vulnerability- especially one ranked as

Protect Yourself From Phishing Scams
Phishing scams have spiked recently and have become more of a concern. This article talks about what phishing scams are and illustrates five steps users and companies can take to keep from being victimized by phishing scams.

Why And When You Might Need an Offline Malware Scanner
Is there a virus that has taken hold of your system and won't let go, even after your virus software has supposedly removed it? Learn why you might want to consider using an offline malware scanner to help in this situation.

How to Unlock Your Phone With Your Fitbit
Wouldn't it be great if instead of typing in a PIN or passcode to unlock your phone you could unlock it by simply being near a Bluetooth device such as a Fitbit? NOW YOU CAN!! Here's how:

4 Convincing Online Scams You Might Actually Fall For
Learn about these 4 convincing online scams now so that you don't end up falling for them in the future.

5 Ways You Might Be Sharing Your Location Without Knowing It
Is your location being shared without your knowledge? Learn 5 ways it might be.

How to Avoid Getting Scammed By Social Media Phishers
Think you'll never fall for a phishing scam? Phishers are now using social media in sophisticated spear phishing attacks. Let's learn more about this new breed of scams and how you can avoid them:

Red Flags it Might be an Internet Scam
Have you every been the victim of an online scam? Check out these red flags that might indicate that someone is attempting to scam you.

Senator Hatch Proposes INDUCE Act To Combat Piracy - Page 2
Orrin Hatch is at it again. The Senator from Utah has concocted yet another bill aimed at giving his buddies in the RIAA and MPAA broad, sweeping legal grounds to declare virtually any technology illegal by virtue of its ability to

Senator Hatch Proposes INDUCE Act To Combat Piracy - Page 3
Orrin Hatch is at it again. The Senator from Utah has concocted yet another bill aimed at giving his buddies in the RIAA and MPAA broad, sweeping legal grounds to declare virtually any technology illegal by virtue of its ability to

Senator Hatch Proposes INDUCE Act To Combat Piracy - Page 4
Orrin Hatch is at it again. The Senator from Utah has concocted yet another bill aimed at giving his buddies in the RIAA and MPAA broad, sweeping legal grounds to declare virtually any technology illegal by virtue of its ability to

Computer Security 101 (tm)- Lesson 2
Lesson 2 of the 10-part Computer Security 101 (tm) series covers a range of topics including the concept of protocols, TCP/IP, DHCP and NAT protocols, TCP/IP, DHCP and NAT. Page 2.

Why You'll Love Android's New Smart Lock Feature
Are you tired of having to type in a PIN or password every time you pick up your phone? Android's new Smart Lock feature may be just what the doctor ordered:

Going Into Stealth Mode While Online
Do you want to be less conspicuous online? Check out these tips to help you 'go stealth':

Why Enabling iPhone's 'Send Last Location' Might Save Your Life
Did you know that turning on one little security setting might help others locate you if you have been kidnapped or are lost? Let's learn how iPhone's 'Send Last Location' setting might just save your life.

The 4 Scariest Types Of Malware
There are many forms of malware out in the wild, some more damaging than others. Here are the 4 types of malware we find the most disturbing:

Wireshark Network Protocol Analyzer
A profile of Wireshark, maintained and developed by the creator and core development team from Ethereal, and the features and functions of the application.

Google Chrome Security - Overview of Features and Issues
A brief overview of Google Chrome security features and issues. Google jumped into the browser market with the Beta release of Chrome. Learn about the security

Enable Security Auditing in Windows XP Pro
A how-to tutorial for enabling security auditing and logging in Windows XP Professional

What Is a Rootkit?
A frequently asked questions (FAQ) entry describing what a rootkit is and how they are used legitimately and maliciously to control computer systems.

Protect Your Privacy Using These Proxy Services
Are you tired of spammers, telemarketers, and other folks bombarding you with marketing-related junk? It's time for a digital bouncer to handle all of this. Learn all about proxies in this article:

5 Reasons Why Sharing Your Location is a Bad Idea
Did you just tag yourself or someone else having a good time at a local restaurant? Guess what? You may have just compromised the personal safety of you and your friend? Learn why location sharing is a bad idea:

5 Tips For Avoiding Online Stalkers
It's not me, it's you. Seriously, it's you. Quit online stalking me or I'm going to use these 5 helpful tips from netsecurity.about.com to avoid you!

How to Keep up With The Latest Security Vulnerabilities and Patches
Trying to keep up with the latest vulnerabilities before they end up affecting your computer? Here are 5 tips for keeping up with the latest security issues that may affect your computer:

How to Secure Your Child's School-provided PC or Tablet
Your child's school just issued him or her a new laptop computer, what could possibly go wrong? Check out netsecurity.about.com's back to school security tips to help you and your child secure their new school-issued device.

5 Tips For Beefing Up Your Gmail Security
Your Gmail account is arguably one of the most sensitive accounts that you have online. Check out these 5 tips for enhancing your Gmail account's security:

5 Reasons Why Malware Exists?
Why do malware makers do what they do? Here are 5 reasons why malware is made:

3 Set-And-Forget Internet Parental Controls to Help Protect Your Kids
For the most part, Internet parental controls are an illusion but here are 3 that you can quickly set and forget that may have at least some chance of stemming the tide of junk that reaches your kids via the Internet

Why Your Child's PC is Full of Malware and What to do About it
Has your child's computer become infested with malware? Learn how to keep them from trashing it and what to do if it's already too late.

What To Do If You've Been Scammed Online
Have you become the victim of an online scam? The clock is ticking. You need to act quickly to try and stop them before they make off with any more of your

Help! My Browser's Been Hijacked
You just tried to Google something but instead of getting a Google results page, your browser takes you to some sketchy-looking search engine that you've never heard of. Your web browser has just been hijacked.

Could Your Tinder Match be a Scam Bot?
Is your new Tinder match too good to be true? Here are 5 warning signs that they might be a scam bot in disguise:

Security Mistakes That Might Get You Fired
Do you like your job? Do you want to keep it? Avoid these security mistakes at work, or there might be a pink slip in your future.

How to Back up Your Data Using Free Cloud-based Storage
Are you backing up your data to more than one place? What happens if your primary backup disk fails? Let's look at some free cloud-based secondary backup options to help keep your data safe.

5 Common Mistakes That Might Get You Hacked
What makes you an attractive target for hackers? Check out these 5 common mistakes that might get you hacked.

Securing Your New Computer
You just got your new computer out of its box and you want to make sure it's ready to brave the perils of the Internet. What should you do first to secure your computer? Let's learn how to secure a new computer:

How to Spot a Tech Support Scam
Did you just get a call from someone claiming to be from

I Just Fell For a PC Support Scam, Now What?
'Tech Support' just called you and said your computer has a problem. You let them into your computer and may have given them your credit card information before you realized it was a scam. What do you do now?

Cyber Security Spring Cleaning Tips
It's that time of year again, time for Spring cleaning. Let's do some security maintenance to clean the cyber cobwebs out and prevent hackers from breaking in.

YouTube Parental Controls
Are you a parent trying to figure out if there are any parental controls for YouTube? We'll show you a couple of steps you can take to try and limit your child's access to inappropriate video content

How to Avoid Getting Catfished Online
Is the person you're falling in love with online really who they say they are, or are they

How to Spot and Avoid Fake Online Charity / Disaster Aid Scams
Are there really people out there that would take advantage of human tragedies in order to scam people out of money? Unfortunately, the answer is

How to Keep Leeches From Using Your Wireless Hotspot
Are you afraid of your co-workers or others connecting to your portable wireless hotspot, using all your data, piling up overages, and leaving you holding the bill? Let's look at a few steps you can take to help prevent this from happening:

5 Types of Internet Creepers and How to Avoid Them
Are you being creeped on? Let's look at 5 types of Internet creepers and how you can avoid them.

How to Spot a Fake Online Product Review
Is that glowing 5-star review of a product you're interested in a complete lie? Let's look at some tips to help you spot fake online product reviews:

5 Online Dating Red Flags You Shouldn't Ignore
Are you looking for love online? Make sure you don't ignore these red flags when searching for your perfect match.

Help! My Computer's Screen Has Been Locked by Ransomware!
Are you locked out of your computer? Is there a big box on the screen that says the FBI has locked your computer until you pay a fine? You have just become a victim of screen locking ransomware. Let's learn what you need to do next (t's not really the FBI by the way).

Keep Kids Out of Your Stuff With Android Guest Mode and Screen Pinning
Are you tired of your kids messing stuff up on your Android phone? Now you can finally do something about it. Learn how Android's Guest Mode and Screen Pinning can help keep your kids from seeing and/or screwing up your stuff:

How Hack-proof is Your Wireless Network?
How potentially hack-proof is your wireless network? While no network is truly hack-proof, take this quick quiz to see how well protected your network is against hacking attacks.

How The Heck Did They Get My Password?
Have you ever wondered how hackers and scammers get a hold of your password? Here are a few methods they may have used to obtain it:

Can You Stalk-proof Your Facebook Profile?
Is your Facebook timeline a stalker's goldmine? Here are several things you can do to try and stalk-proof your Facebook profile:

What Can The Public See On My Facebook Timeline?
Have you ever wondered what the public can see on your Facebook timeline? Here's how you can view your Facebook timeline as a member of the Public or even as a specific Facebook user:

Improve Security By Locking Your Internet Door At Night
Do you lock your front door at night? Most likely you do. Do you cut off your Internet connection at night? Probably not. Here's why you might want to start thinking about locking your 'Internet door' at night too:

Security Tips For Using A Shared Computer
Do you frequently use computers in libraries, computer labs, or Internet cafes? Check out these tips on how to safely use a shared computer.

How to Enable Private Browsing In Your Web Browser
Do you want to browse the web without your history being cached and stored on your computer? Here's how to enable private browsing in most major web browsers:

5 Common Network Security Mistakes
Did your computer just get hacked or infected? Check out these 5 common security mistakes that you might be making.

WPA2? WEP? What's The Best Encryption To Secure My Wi-Fi?
WEP? WPA? WPA2? PSK? So many acronyms! What do they all mean? Let's learn about the different types of Wi-Fi security and encryption standards and find out which one is best for protecting your network:

What Is A BHO (Browser Helper Object)?
A frequently asked question (faq) explainin what a BHO (browser helper object) is and how they can be used to attack your computer system.

Free Enumeration Software
Links to hacker enumeration tools. These tools will help list out valuable information about users, hosts, services, ports and more.

Free Network Monitoring Software
Links to free network monitoring tools & software to analyze network performance and functionality

Windows XP Security "Flaw"
article about windows xp security

Sasser Worm Exploits MS04-011 Vulnerability
The Sasser worm is spreading on the Internet exploiting the LSASS vulnerability that Microsoft recently released a patch for with Security Bulletin MS04-011

Microsoft Security Bulletins - June 2009
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of June 2009.

January 2009 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of January 2009.

March 2009 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of March 2009.

February 2009 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of February 2009.

October 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of October 2008.

December 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of December 2008.

August 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of August 2008.

September 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of September 2008.

July 2008 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of July 2008.

Remove These 4 Things From Your Auto-replies RIGHT NOW!!
Are you going on vacation for a week. Before you craft that out-of-office auto-reply message, consider leaving these 4 things out of it for your own safety and the safety of others.

5 Ways to Make Your PC a Less Attractive Hacker Target
Does your computer have a big sign on it that says

Internet Parental Controls That Might Actually Work
Your kids may scoff at your feeble attempts to enable parental controls, but these might actually have a chance of working (to some degree at least):

Are You Ready For Cyber-warfare?
Alright soldier, on your feet err... I mean keyboard! Your cyber-warfare training starts NOW!. Welcome to basic training:

4 Essential Steps For Securing a New Wireless Network Router
Did you just buy a new wireless router? As soon as you get it out of its box, check out these 4 essential steps to help secure it.

4 Security Measures Hackers Don't Want To Encounter
What doesn't a hacker want to see when he/she is planning to attack you? Here are 4 security measures that hackers don't want to encounter:

5 Reasons a Wi-Fi Guest Network is a Good Thing For Your Network Security
Are you using your wireless router's guest network feature? Here are 5 reasons you might want to enable it:

Is Your Wireless Router Too Old To Be Secure?
Your wireless router might be an antique soon. Learn why that old trusty router might be the weakest link in your network's security and why an upgrade might be in order:

5 Signs It's a Phishing Email
Is your spidey sense telling you something is wrong with an email? Trust your instincts and also check out these 5 signs that it might be a phishing email:

Selling Your Old Game Console? Remove Your Data First!
Selling or trading in your old game console? Don't forget to perform these critical security tasks before you get rid of it:

5 Signs Your Computer Might be Infected With Hidden Malware
Does something seem not quite right with your computer but your antivirus software claims that all is well? Here are 5 signs you might have a hidden malware infection:

Blog


How to Secure Your Windows XP Home Edition
Windows XP Home, like most Windows products for home users, is sorely lacking in security. Here are some steps you can take to remedy that.

5 Steps To Secure Windows XP Home Edition
Windows XP Home, like most Windows products for home users, is sorely lacking in security. It is better than past Windows operating systems for home users, but there are still some things you need to do. These are 5 quick steps you can take to make your Windows XP Home operating system more secure. Page 2.

Is Jailbreaking Your iPhone Safe?
Moral and legal implications aside, is jailbreaking your iPhone a safe endeavor? Do the benefits outweigh the risks or is it the other way around?

5 Must-have Security Apps for iPhone
From encrypting your phone calls, to arming your security system after you've already left the house, these must-have security apps for iPhone have got you covered.

Disable AutoComplete Password Storage
The Internet Explorer AutoComplete feature can remember Web addresses you have typed and form information such as your address. It can also remember your username and password for various sites. This may seem convenient, but it is also a huge security concern. Anyone who sits down at your computer is able to access your personal sites and information. This Quick Tip will show you how to turn off the AutoComplete feature, or at least disable the storage of usernames and passwords

Closing Pop-Up Windows - Clicking "No" May Mean "Yes"
Pop-Up windows often appear to look like normal message windows. Users may feel that simply clicking

Top 100 Network Security Tools
Fyodor, creator of NMap, polled the readers of the NMap-Hackers mailing list for their favorite or most useful tools. With 3,243 readers responding, the Top 100 Security Tools list has been created.

Transferring Windows XP Activation Information
Since the introduction of product activation in Microsoft products, many people have complained. For those who dread having to activate the product again with Microsoft just because they reinstall the software, this tip will show you how to transfer the activation data over.

Introduction to Port Scanning in Network Security
Introduction to Port Scanning is a basic overview of TCP/IP port scanning - how to do it and what the results will or won't tell you- from your About.com Guide for Internet / Network Security, Tony Bradley

Automatically Erase Your Page File - Windows XP
A quick tip illustrating how to configure Windows XP to automatically erase the page file when Windows shuts down to remove any sensitive information.

Use 'Run As' To Execute Programs As Administrator
Most security experts recommend that you log into your computer system as a regular user instead of Administrator. By using the 'Run As' option in Microsoft Windows, you can still execute programs with Administrator privileges even when you are logged in as a regular user.

Enable WEP/WPA Encryption To Protect Your Wireless Network
It is great to be able to transmit data back and forth from your wireless device to your wireless router or access point, but what if someone else intercepts those airwaves as well? You can protect your wireless data by enabling encryption.

Filter MAC Addresses To Secure Your Wireless Network
One way to protect your wireless network is to establish MAC address filtering. By only allowing the devices with the MAC addresses you identify to connect to your network you greatly reduce the ability for an attacker to gain unauthorized access.

Free Packet Sniffer Software
Links to free packet sniffer software to capture and analyze network traffic on your network

Configuring Unix / Linux File and Directory Access Rights
A brief overview of file and directory access rights in Unix and Linux operating systems and using the chmod command to alter or modify file and directory permissions.

Ten Tips for Preparing and Passing the CISSP Exam
This is part of an article I wrote for CertCities.com describing my top 10 tips to help people study for and pass the CISSP certification exam. Excerpted from CertCities.com with permission

Disable SSID Broadcasting to Protect Your Wireless
Wireless networks have a beacon which broadcasts information. Learn how to disable the SSID broadcast so no random wireless devices know your network.

Using Windows EFS (Encrypted File System)
Windows EFS (Encrypted File System) can help you add extra security and protection for your files to make sure that unauthorized users are unable to view or use them.

Delete Your Old Tweet From Twitter's New Powerful Search Engine
Your old tweets just became a lot easier to find thanks to Twitter's revamped search feature. Here's how to remove your old embarrassing tweets:

The 5 Lamest Excuses For Not Securing Your Computer
Do you roll your eyes when you hear the words

But First.... Secure That Selfie!
Are selfies a risk to your personal safety? Learn why criminals love your selfies and how you can take safer ones:

Beef up Your Wireless Router Security in 10 Minutes or Less
Improving your wireless security doesn't have to take a lot of your time. Let’s check out some quick fixes that you can accomplish in 10 minutes or less that will help you beef up your wireless security:

6 Apps That Take Apple's Touch ID Beyond Just Unlocking Your Phone
Apple's Touch ID isn't just for unlocking your iPhone anymore. Check out these 6 apps and learn what else Touch ID can do for you.

5 Signs Your Online Love Interest Might be a Scam Bot
Are you dating a scam bot? Here are 5 red flags that might indicate that your online love interest might be a scammer or bot in disguise.

Step-By-Step: Change Default SSID on Wireless Router
The SSID is one of the pieces of information needed for a wireless device to attach to your wireless network. You should change the default SSID to something unique, but not something identifiable like your last name. This step-by-step guide will walk you through how to do that on a Linksys wireless router.

How to Change Default SSID - Wireless Settings
Navigate through your wireless router administration console to the wireless settings where you can change the SSID for your router.

Change Default SSID
change the default SSID to some other unique SSID that is not identifiable to you. Do not use your name or anything obvious like that.

Store Passwords Using Reversible Encryption
A brief explanation of the Store Passwords Using Reversible Encryption setting in Windows Vista Local Security Policy - Account Policy - Password Policy settings.

Intuit Apologizes For "TurboHacks"
Intuit apologizes for product activation and spyware in the flagship Turbotax income tax preparation software program. H&R Block capitalized on the customer backlash to sell more copies of its program- TaxCut

Intuit Apologizes For "TurboHacks"
Intuit apologizes for product activation and spyware in the flagship Turbotax income tax preparation software program. H&R Block capitalized on the customer backlash to sell more copies of its program- TaxCut. Page 2.

Quick Tip: Basics of Wireless Networking
A brief overview of the basics of wireless networking- the technology, terminology, protocols and equipment. This is provided as a beginning point before moving on to the concepts of securing wireless networks in the Free Wireless Network Security Class

Spy Tip #1: Cover Your Tracks
If you want to secretly monitor or check up on what an employee or child, or even a spouse, is doing on their computer, you need to take some precautionary steps to make sure your actions are not discovered.

How to Disable Facebook's Facial Recognition Feature
Does Facebook's facial recognition feature seem just a little creepy to you? Learn how you can disable it in just a few simple steps.

Coffee Shop Net Surfing Security Tips
Follow these tips to help you keep yourself safe while browsing the web at your local coffee shop.

Passwords: Do Not Use Real Words
One of the main tips when creating passwords is to not use any real words, or close approximations of real words, because they are more easily guessed or cracked by password cracking tools.

What Should Your Network Password Policy Be?
Have you been tasked to come up with a network password policy for your users. If you need help developing a network password policy then you've come to the right place.

Ad-Aware Pro Anniversary Edition: Review of Ad-Aware Pro AE
A review of Ad-Aware Pro AE (Anniversary Edition). Lavasoft released new versions of Ad-Aware dubbed AE for Anniversary Edition in honor of 10 years of leading spyware and malware protection.

Admin Approval Mode for the Built-in Administrator Account
A brief explanation of the Admin Approval Mode for the Built-in Administrator Account setting in Windows Vista Local Security Policy - Security Options - User Account Control settings.

Money Saving Household Hacks
Hacking isn't just for bad guys anymore. Check out these Money Saving Household Hacks.

Mac OS X's Gatekeeper Explained
Learn what Mac OS X's Gatekeeper does and how you can use it to enhance your Mac's security posture

Product Review: GFI LANguard Network Security Scanner
A review of GFI LANguard N.S.S. (Network Security Scanner) version 6.

What Is UAC?
UAC is the most controversial and maligned feature of the Windows Vista operating system. It is also one of the most misunderstood. Learn what UAC is and what it isn't so you can understand why it works the way it works.

SCAP - What is Security Content Automation Protocol (SCAP)?
Definition of Security Content Automation Protocol

Is Your Mac Safe From the Flashback Attack?
Learn how to prevent your Mac from becoming a victim of the Flashback attack and find out how to detect and remove the infection if your Mac has already been compromised.

Serious New Linux Vulnerabilities
Three new vulnerabilities were discovered which could allow for Local attacks to escalate privileges and execute programs with complete root access

Free Internet / Network Security Software
Free tools to help you secure and protect your network from the following categories: firewalls, antivirus, virus removal, miscellaneous security, email spam blocking, spyware removal, pop-up and messenger spam blocking, vulnerability scanning, intrusion detection (IDS), packet sniffer, port scanner, encryption, enumeration, network monitoring and wireless network security.

How to Remove Spyware
Are you convinced that you have spyware or adware running on your computer? Learn how to detect and remove spyware from your PC.

Why You Shouldn't Trust Caller ID
Is the person on the other end of the line really who the Caller ID information says they are? Not always. Learn more about why some callers are

Use The NTFS File System
While Windows XP is capable of using FAT, FAT32 or NTFS as the file system on hard drives, only NTFS natively supports encryption, compression and superior security such as the ability to protect individual files and folders. If you aren't already using NTFS you should be and this tip will show you how.

Facebook Security, Safety, and Privacy
All you ever wanted to know about Facebook Security, Safety, and Privacy but were afraid to ask.

What is ASLR?
What is ASLR? This brief article will answer that question and explain the advantages of Address Space Layout Randomization

What To Look For In Antivirus Software
A description of the various features and functions commonly found in antivirus software so that you can understand their use and know what to look for when making an antivirus software purchase

Windows Vista Password Complexity Requirements
A brief explanation of the Password Must Meet Complexity Requirements setting in Windows Vista Local Security Policy - Account Policy - Password Policy settings.

What Is Two-Factor Authentication? - Overview
Two-factor authentication. A brief overview to answer the question 'what is two--factor authentication' and help reader's understand this security mechanism.

Network Security Glossary: Packet Sniffing
A definition of the term packet sniffing

Profile: Nmap Scanner
Nmap is a powerful open source utility. It is a port scanner, security audit tool and, as the name implies, network mapper. It is very versatile and is a tool that network and security administrators should be familiar with.

Security Basics For Home Computing
a short article describing basic computer and network security steps for home users and small office home office (SOHO) users

PrepLogic LearnSmart Video Training for CISSP Review
A review of the 11-disc set of PrepLogic LearnSmart training for the CISSP (certified information systems security professional) exam. The discs contain over 33 hours of video instruction to help you learn and prepare to pass the CISSP exam.

Firefox Security Tips and Tools
Follow these tips to help secure Mozilla's Firefox web browser on your computer.

Is Your Kindle Spying on You?
You read books on your Kindle but did you every stop to think that IT might be reading YOU?

Spicy Password Crackers
These treats are called password crackers because people who eat them would probably give you their password just so they could have another one.

V: Network Security Books Starting With The Letter "V"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

Y: Network Security Books Starting With The Letter "Y"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

J: Network Security Books Starting With The Letter "J"
Book reviews of network and computer security book reviews sorted alphabetically by title. This section contains books starting with the letter

Securing Your Windows XP / 2003 Computer
Windows XP and Windows Server 2003 are ostensibly more secure than their older predecessors, but there are still plenty of vulnerabilities and pitfalls to watch out for- especially in Windows XP Home edition.

Securing Your Windows 95 / 98 / Me PC
Windows 9x/Me is not a secure system by default. The operating system was designed for home use where security was previously looked at as less important. It is difficult to actually

Windows Books
Reviews of books to help you secure your Windows operating system.

Computer Security Backups and Disaster Recovery
Whether from a virus, hacking or simply a fire or flood or other act of nature- there may come a time when you will experience a catastrophic loss of computer data. These articles and tips will help you be properly prepared to recover and get back to business as quickly as possible.

CISSP (Certified Information Systems Security Professional)
Information you need to learn more about the CISSP certification and to study and prepare to pass the exam.

What You Need To Know To Abide By GLBA
What you need to know to understand the requirements of the Gramm-Leach-Bliley Act (GLBA) and how to implement network security that abides by this legislation.

Free Enumeration Tools and Utilities
Free tools and utilities you can use to enumerate and identify hosts on a network, users on a system and more.

Free Miscellaneous Computer and Network Security Tools
A variety of free computer and network security tools that don't fall into any of the other categories.

Free Spyware and Adware Removal Tools
Free tools and utilities to help you detect, identify and remove spyware and adware including browser hijackers, web bugs, tracking cookies and other malicious spy programs.

Free Personal Firewall Software
Free personal firewall software to help you protect your individual computer systems from unauthorized access and malicious traffic.

Free Wireless Security Tools
Free tools and utilities to help you secure and protect your wireless network or device.

Network Security Book Reviews Sorted Alphabetically by Book Title
This category contains network and computer security book reviews separated alphabetically by title.

Computer and Network Security Quizzes and Polls
Quizzes to help you test the knowledge you have gained on computer and network security as well as polls to give you an understanding of prevailing opinion on a variety of computer and network security topics.

Network Security Book Reviews Sorted by the Category or Subject
Network and computer security book reviews sorted by the category of the book's subject matter.

Computer and Network Security Tutorials and Classes
Tutorials and classes to help you learn various aspects of computer security.

Step-By-Step Visual Tutorials for Computer and Network Security Tools and Applications
Step-by-Step contains tutorials which include graphics and visualizations to help you understand what the written steps are referring to or what you are supposed to do.

Network Security Terms Beginning With "C"
Network Security Terms Beginning With

Network Security Terms Beginning With "G"
Network Security Terms Beginning With

Network Security Terms Beginning With "H"
Network Security Terms Beginning With

Network Security Terms Beginning With "I"
Network Security Terms Beginning With

Network Security Terms Beginning With "J"
Network Security Terms Beginning With

Network Security Terms Beginning With "K"
Network Security Terms Beginning With

Network Security Terms Beginning With "N"
Network Security Terms Beginning With

Network Security Terms Beginning With "O"
Network Security Terms Beginning With

Network Security Terms Beginning With "P"
Network Security Terms Beginning With

Network Security Terms Beginning With "T"
Network Security Terms Beginning With

Network Security Terms Beginning With "V"
Network Security Terms Beginning With

Network Security Terms Beginning With "X"
Network Security Terms Beginning With

Free Computer and Network Security Tools
Free tools, applications and utilities grouped by type to help you secure and protect your computer or network without breaking the bank.

Hacker Tools and Utilities
Information and advice about tools and applications commonly used to hack computer networks and systems as well as how many of these tools can be used to proactively protect your computer network as well.

Profiles Highighlighting Key Features of Security Tools
These profiles will provide a brief overview of the features and functionality of different security tools.

Security Blog Sites
This page links to network, computer and Internet security blog sites by other network security gurus and experts around the Internet

Alternate Web Sites You Can Use To Find Computer Security Information
The About.com Internet / Network site has tons of useful information and valuable articles and reviews, but it may not have exactly what you are looking for. These other sites are excellent resources as well and provide a wealth of information you can refer to.

March 2004 Microsoft Security Bulletins
A brief article highlighting and linking to the Microsoft Security Bulletins for Microsoft Windows for the month of March 2004

Microsoft Windows Security 101
quick overview of basic steps to take to secure your microsoft windows computer system including using strong passwords and a firewall

Zero-Day Exploit of CHM Vulnerability in Internet Explorer
Microsoft Internet Explorer has been reported prone to an unspecified vulnerability when handling CHM files. There is zero-day exploit code in the wild, but not actively spreading at this time. The CHM exploit is exploitable to provide automatic delivery and execution of an arbitrary executable. This would occur when malicious web content is rendered in Internet Explorer.

Computer Security 101 (tm): Lesson 3
An article on Ports, TCP (transmission control protocol), UDP (user datagram protocol) and firewalls. This is the 3rd in a 10-part series called Computer Security 101 (tm) from your Guide, Tony Bradley, CISSP-ISSAP.

Computer Security 101 (tm): Lesson 3
An article on Ports, TCP (transmission control protocol), UDP (user datagram protocol) and firewalls. This is the 3rd in a 10-part series called Computer Security 101 (tm) from your Guide, Tony Bradley, CISSP-ISSAP. Page 2.

Computer Security 101 (tm): Lesson 3
An article on Ports, TCP (transmission control protocol), UDP (user datagram protocol) and firewalls. This is the 3rd in a 10-part series called Computer Security 101 (tm) from your Guide, Tony Bradley, CISSP-ISSAP. Page 3.