computermagazine

Security

Detect, Protect, Dis-infect

ByFreelance AuthorJan 28, 2005
0 out of 5
Detect, Protect, Dis-infect

Identity Theft: A crime too personal

ByFreelance AuthorJan 28, 2005
0 out of 5
Identity Theft: A crime too personal

Personal Firewalls for Home Users

ByFreelance AuthorJan 25, 2005
3.67 out of 5
Personal Firewalls for Home Users

Making Safe Online Purchases

BySarah SarahDec 01, 2004
0 out of 5
There are a number of ways you can go about finding a nice store to buy from online. First, depending on what you’re trying to buy, try to think if anyone’s mentioned any online stores for buying similar products. Especially if you’ve noticed people offline talking about it, it’s probably really reliable. Big sites, like Amazon, have great reputations- and will probably lead to a safer purchase.

Be Aware of Phishing Scams!

ByNowshade KabirNov 25, 2004
0 out of 5
If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U.S. Bank Corporation that I received contains the subject “U.S. Bank Fraud Verification Process” and in the body of the mail it says “We recently reviewed your account, and suspect that your U.S. Bank Internet Banking account may have been accessed by an unauthorized third party. Protecting the security of your account and of the U.S. Bank network is our primary concern.

The Move to a New Anti-Virus Model

ByTim KlemmerNov 25, 2004
0 out of 5
This is the first in a series of articles highlighting reasons why today’s anti-virus security solutions don’t work.

Antivirus Software

ByMike BerNov 17, 2004
3 out of 5
Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. At the same time the number of Internet surfers increased. This is a good thing because people are realizing the advantages offered by the world of technology.

Mobile devices security

ByMike BerNov 10, 2004
5 out of 5
As the cell phones and PDAs market is growing, one big problem is emerging: the security of these tools. There are several security issues in question: other people listening your phone calls, or other people illegally invoicing time to a user’s account (called “phone cloning”), or stolen devices, or illegal use of stolen information obtained from these devices, and other more concerns. As you already might know, cell phones and PDAs have evolved so much nowadays, that they are now like small portable computers filled with personal and important information.

Show Buttons
Hide Buttons
Scroll To Top