1. Computing
Send to a Friend via Email

Internet / Network Security: Most Popular Articles

These articles are the most popular over the last month.
The 5 Things You Should Never Post on Facebook
For the sake of the safety of you and your family, there is some information that you should never post on Facebook. Here are 5 things you should consider removing or not posting to Facebook and/or other social networks.
How to Avoid Credit Card Skimmers
Check out these tips on how to avoid credit card skimming before you swipe your card at the ATM or the gas pump.
How to Change the Password for Your Wireless...
Have you lost the admin password to your wireless router or need to change your wireless router password because you never changed it from the factory default. Here are some tips on how to reset / change your wireless router's admin password.
How to Change the Password for Your Wi-Fi Network
Do you think it's time to change your Wi-Fi password? Learn how to change it by checking out our guide
How to Delete Your iPhone's Data so That You...
Selling your iPhone or trading it in? There are a couple of steps you need to take to erase the data on your iPhone before you sell it.
Want to Hide Your Likes on Facebook? Here's How
Do you want to prevent people from seeing which pages you like on Facebook? Here's how to hide your liked pages on Facebook:
DIY iPhone-controlled Home Security Camera for...
How to setup a iPhone controlled home security camera system for under $100
How to Detect and Remove Wi-Fi Freeloaders From...
How can you tell if someone is using your wireless connection without your permission? Let's take a look at what you can do to detect and remove wireless freeloaders from your network.
How to Safeguard Yourself after Your Facebook...
Was your Facebook account just hacked? Here is what you need to do to get things back to normal if you believe your Facebook account has been compromised.
Change Default SSID
The SSID is one of the pieces of information needed for a wireless device to attach to your wireless network. You should change the default SSID to something unique, but not something identifiable like your last name. This step-by-step guide will walk you through how to do that on a Linksys wireless router.
Is Your Wireless Network Secure? Try these Easy...
Most home routers, wireless or wired, provide some form of DHCP which automatically assigns IP addresses to devices as they connect. To reduce the possibility of an unauthorized party accessing your network, you can disable DHCP and manually assign static IP addresses to your devices
How to Beef Up Security on Your Home Wireless...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Think your wireless
Is Jailbreaking Your iPhone Safe?
Moral and legal implications aside, is jailbreaking your iPhone a safe endeavor? Do the benefits outweigh the risks or is it the other way around?
How to Prevent Thieves from Disabling Your Find...
The Find My iPhone app is a great tool for tracking your iPhone provided thieves don't turn it off after they have stolen your phone. Let's find out how you can make it harder for thieves to turn off your iPhone's homing beacon.
Safeguard Your Privacy: How to Disable Facebook...
If you're a little freaked out by the fact that you can click the Facebook Places map and see everywhere you've taken a picture or checked in, you're not alone. Let's learn how to turn off this creepy feature.
How to Remove Geotags From Pictures Taken With...
If you don't like the idea of advertising the location where you took a picture with your iPhone, follow theses steps to remove geotags from your images:
How to Make a Strong Password
Tips to make your password really hard for bad guys to crack
4 Secrets Wireless Hackers Don't Want You to Know
Are you afraid of becoming the next victim of a wireless hack attack? Here are 4 secrets that wireless hackers don't want you to know about wireless security. Learn the facts so you won't become their next victim.
5 Must-have Security Apps for iPhone
From encrypting your phone calls, to arming your security system after you've already left the house, these must-have security apps for iPhone have got you covered.
How to Backup Your IP Security Cameras to the...
You've got IP security cameras setup and monitoring things 24/7 but have you thought about what happens if the bad guys steal the computer your saving your security camera footage on? Let's learn how to backup your IP security camera to off-site cloud-based storage so you can still catch the bad guys
Disable AutoComplete Password Storage
The Internet Explorer AutoComplete feature can remember Web addresses you have typed and form information such as your address. It can also remember your username and password for various sites. This may seem convenient, but it is also a huge security concern. Anyone who sits down at your computer is able to access your personal sites and information. This Quick Tip will show you how to turn off the AutoComplete feature, or at least disable the storage of usernames and passwords
Protect Your Family with These Parental Control...
This article explains all the steps necessary to enable parental controls (restrictions) on your child's iPad, iPhone, or iPod Touch.
Prepare Your Hard Drive For Disposal
Deleting data or even formatting a hard drive before selling or disposing of it is not good enough. The data can still be recovered. This article describes the steps you need to take before getting rid of a hard drive.
5 Things You Should Remove From Your Facebook...
There are certain bits of personal information that you may want to leave out of your Facebook profile for privacy and safety reasons. Here are 5 of them:
Google+ Security, Privacy, and Safety
Are you new to Google+ and wondering how to set your Google+ security and privacy settings to keep the world out of your business? Here are some tips on how you can use Google+'s security and privacy options to make your Google+ experience a safe one.
How to Prevent Strangers From Following You on...
Are there sketchy people following you on Twitter? Learn how to get rid of unwanted followers and prevent them from following you in the first place.
5 Security Tips to Make Your MacBook a Mobile...
5 quick and easy MacBook security tips you can use to make your MacBook an impenetrable and unstealable mobile data fortress:
How to Test Your Firewall
Learn how to test your network firewall to see if it is doing its job?
How to Avoid Getting "Catfished" Online
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Is the person
Change Your Wi-Fi Router or Access Point...
To secure your wireless access point or router you need to change the default username and password used to access the administration screen and change the configuration settings
How to Hide Your Facebook Posts From Your Mom
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Let's face it,
5 Ways to Stealth Yourself Online
Tips to make yourself virtually invisible online so you can remain anonymous, avoid targeted advertising, evade hackers, deter online stalkers, and prevent other invasions of privacy.
How to Hack-proof Your Wireless Router
Is your wireless router a target for hackers? The answer is yes. We'll show you the steps you need to take to hack-proof your wireless router.
What Hackers Don't Want You To Know About The...
Tamper Data might just be one of the best kept hacker secrets. Learn what this innocent-looking browser plug-in can do and why web application developers should worry.
How to Strengthen Your iPhone's Passcode
Are you relying on a 4-digit passcode to protect your iPhone, iPad, or iPod? There is a simple settings change that can make your screen lock passcode a lot harder to crack. Let's learn how to set a complex password on your iPhone, iPad, or iPod Touch.
Introduction to Packet Sniffing
A brief article introducing the concepts of packet sniffing- how it works, what information can be gathered, what you can do to protect yourself and how you might use packet sniffing information to help protect or secure your network
How to Secure Your Portable Wi-Fi Hotspot
Are you afraid of Wi-Fi freeloaders connecting to your hotspot and racking up data overages that you'll have to pay for? Learn how to keep Wi-Fi leeches and hackers from stealing your gigabytes by reading this article.
Stop Pop-Ups
Tips and tools to help you block pop-up ads while browsing the Web. Using these techniques can help you to reduce or eliminate pop-up ads and other Web-surfing annoyances.
How To Hide Your Wireless Network From Your...
So you've got a wireless network setup but you noticed that something is slowing your internet browsing to a crawl. It could be your Internet leeching neighbor who is freeloading of your connection. Learn what you can do hide your wireless network so you can stop their bandwidth sucking gravy train.
Free Intrusion Detection (IDS) and Prevention...
Free intrusion detection (IDS) and prevention (IPS) software to help you identify and respond to malicious or suspicious network activity on your network and stop any hackers, viruses, trojans or other malware from spreading
Introduction to Intrusion Detection Systems (IDS)
A brief article introducing the concepts of Intrusion Detection Systems (IDS)- how they work, what sorts of things they monitor for, what the results mean to you and how you might use an IDS to monitor for and detect suspicious or malicious activity on your network and alert you so that you can respond
My Top Ten Tips For Preparing and Passing The...
This is part of an article I wrote for CertCities.com describing my top 10 tips to help people study for and pass the CISSP certification exam. Excerpted from CertCities.com with permission
The Data on This iPhone Will Self-destruct in...
Did someone steal your iPhone or iPad? Learn how to remotely wipe its data so that the bad guys can't steal your personal information.
Security Tips for Telecommuters
Are you practicing safe telecommuting? We'll give you some tips to help you make sure your digital commute is a more secure one.
How to Safely Recycle or Sell Your Old Computer
It's time to get rid of your old computer and get a new one. Let's review a couple of things you need to do before you chuck that old paperweight of a PC.
I've Been Hacked! Now What?
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >You opened an
Filter MAC Addresses To Secure Your Wireless...
One way to protect your wireless network is to establish MAC address filtering. By only allowing the devices with the MAC addresses you identify to connect to your network you greatly reduce the ability for an attacker to gain unauthorized access.
How to Hack Into Your Own Computer
Did you lock yourself out of your own computer and are trying to hack your way back in? Follow these tips to get your virtual house keys back so you don't have to start over from scratch.
YouTube Parental Controls
Are you a parent trying to figure out if there are any parental controls for YouTube? We'll show you a couple of steps you can take to try and limit your child's access to inappropriate video content
8 Ways to Kid-proof Your Internet Parental...
How to keep your Internet Parental Controls from being circumvented by your curious kids.
How to Secure Your Facebook Timeline
Facebook's new Timeline is like a scrapbook for stalkers. Learn what you can do to secure it and make it safer.
What You Need to Know About Heartbleed
Worried about the Heartbleed vulnerability? Here's what users can do to help protect themselves and resources for system administrators as well.
How to Buy and Sell Safely on Craigslist
Craigslist can be a great resource for buying and selling things. Follow these tips to make your Craigslist experience a safe and profitable one.
Review: 2GIG Technologies Go!Control Wireless...
Learn why the 2GIG Go!Control Wireless Home Security system might just be considered the iPhone of Home Security Systems.
How to Easily Backup Your Facebook Data
Is there an easy way to backup all the pictures, videos, links, etc, that you've ever posted to Facebook in case your account gets hacked, deleted, or disabled? The answer is yes, and I'll show you how to archive your Facebook content quickly and easily.
Introduction to Port Scanning
Introduction to Port Scanning is a basic overview of TCP/IP port scanning - how to do it and what the results will or won't tell you- from your About.com Guide for Internet / Network Security, Tony Bradley
Myths Of Copying and Sharing CD's and MP3's
There are many misperceptions and much confusion about where the legal and ethical line is for buying, downloading, sharing or copying music. This article addresses some common myths.
How to Protect Yourself From Clickjacking Attacks
Oh SNAP! You just got Clickjacked!! Learn more about clickjacking and find out how you can avoid getting your clicks jacked.
Transferring Windows XP Activation Information
Since the introduction of product activation in Microsoft products, many people have complained. For those who dread having to activate the product again with Microsoft just because they reinstall the software, this tip will show you how to transfer the activation data over.
Is Your Cordless Phone Being Hacked?
Are hackers listening in to your cordless phone conversations or is it just your nosy neighbor? Learn how to protect yourself from cordless phone eavesdroppers.
VPN's: IPSec vs. SSL
VPN's: IPSec vs. SSL is an article comparing and contrasting internet protocol security (IPSec) virtual private networks (VPN) with secure sockets layer (SSL) VPN's from your About.com Guide for Internet / Network Security, Tony Bradley
IT Security Jobs - Tips to Help You Land an IT...
5 tips to help you get your foot in the door in the IT Security field.
Rainbow Tables: Your Password's Worst Nightmare
Rainbow Tables may not sound like something sinister, but they are your password's worst nightmare. Rainbow Tables are yet another hacker tool in their ever growing arsenal. Don't let their cute name fool you, these things are scary.
Creating Secure Passwords
Article on password security. Passwords need to be long enough and complicated enough to protect you, but not so complicated you forget them. Also, due to password cracking algorithms and the format of the encrypted password hash, sometimes a shorter password can be better than a longer password
Beware of the 'Ammyy' Security Patch Phone Scam
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >There is a widespread
How to Protect Yourself from Premium SMS Text...
Did you just get a text that says you signed up for Trivia Facts, Ring Tones, or something similar? Did you get a bill saying you owe $9.99 for Premium SMS content? I bet you don't even remember signing up for it, because you probably didn't.
Use 'Run As' To Execute Programs As Administrator
Most security experts recommend that you log into your computer system as a regular user instead of Administrator. By using the 'Run As' option in Microsoft Windows, you can still execute programs with Administrator privileges even when you are logged in as a regular user.
Don't Close That Pop-Up Window!
Pop-Up Ads Even with new browsers and security technology aimed at reducing or eliminating annoying pop-up
Storing and Remembering Passwords Securely
This article examines the challenge of trying to remember the passwords and usernames to a wide variety of sites and applications and discusses the tools available to help users securely store and remember their passwords
LinkedIn Privacy and Security Tips
LinkedIn can be a great resource for professional networking but if you're not careful you might give out too much information to the wrong people. Here are some tips for staying safe on LinkedIn.
Foscam FI8905W Outdoor Wireless Security Camera...
A review of the Foscam FI8905W Outdoor IP Security Camera
Enable WEP or WPA Encryption To Protect Your...
It is great to be able to transmit data back and forth from your wireless device to your wireless router or access point, but what if someone else intercepts those airwaves as well? You can protect your wireless data by enabling encryption.
How do I Report Internet Scams / Fraud?
Information on how to report internet-based scams / fraud.
Automatically Erase Your Page File
A quick tip illustrating how to configure Windows XP to automatically erase the page file when Windows shuts down to remove any sensitive information
Securing Windows XP Home Edition
Windows XP Home, like most Windows products for home users, is sorely lacking in security. Here are some steps you can take to remedy that.
Facebook, Twitter, privacy, safety, security,...
For your safety and the safety of your friends and family, avoid posting these 10 things on any social networks.
How to Hide From Google
Is your personal information appearing in search results? Would you prefer to limit what Google shares about you? Here's how:
Help! I've Been Scammed Online!
Have you just been scammed online? Here are some tips to help you stop the scammers before they make off with more of your money or open any more accounts using your identity.
The Dangers of Facebook Oversharing
When does oversharing on Facebook become dangerous? Learn about the perils of oversharing and what you should keep in mind before you share too much.
What Is A Bot?
If you read news headlines you may have heard about the overwhelming onslaught of 'bots' or 'zombies'.
Help! I Think I've Been Hacked
An article on incident response when you think you've been hacked. how do you collect clues and evidence of your perpetrator- when they attacked? what they did? How do you restore your system and how do you protect yourself from future occurrences??
iPad Security Tips
Follow these security tips to help turn your iPad into a mobile information fortress
DIY Computer Forensics: How to Recover a...
Can you bring files back from the dead? In some cases, the answer is yes. I'm not talking about the recycle bin, I'm talking about when you deleted the stew out of them. Find out how to resurrect dead files.
Undo Malware With System Restore
If antivirus, firewalls, anti-spyware and other protective measures don't work, you can simply go back in time to a point before your computer had problems by using System Restore.
Ten Tips to Prevent Identity Theft
It seems like almost weekly a major security breach is announced involving the compromise of hundreds of thousands or even millions of customer's personal information. Some look to network security as the solution. Some look to legislation and penalties as the solution. The reality is that most identity theft is actually very low-tech and it is up to you to guard your own identity. These ten tips will help you protect yourself from identity theft.
How to Enable Mac OS X’s Built-in...
This article provides will show users how ton enable the security features that are built-in to OS X, but are disabled by default.
BackTrack: The Hacker's Swiss Army Knife
BackTrack is a free security audit toolkit comprised of hundreds of open-source security tools used by both security professionals as well as hackers. Did I mention that it's free?
Configuring Unix / Linux File and Directory...
A brief overview of file and directory access rights in Unix and Linux operating systems and using the chmod command to alter or modify file and directory permissions.
Why You Need a Personal VPN Service
VPNs aren't just for big corporations anymore. Learn how a personal VPN service can help protect your privacy and keep the hackers at bay.
Top 10 Computer and Network Security Books
A list of top Computer and Network Security books from your Guide, Tony Bradley
Review: Alarm.com Interactive Home Alarm...
A review of alarm.com's interactive alarm monitoring service
How to Safely Unfriend a Facebook Creeper
Are you trying to distance yourself from a Facebook creeper without hurting their feelings? Here is a kinder, gentler way to unfriend a creeper.
Using Windows EFS (Encrypted File System)
Windows EFS (Encrypted File System) can help you add extra security and protection for your files to make sure that unauthorized users are unable to view or use them.
Free Packet Sniffer Software
Links to free packet sniffer software to capture and analyze network traffic on your network
Internet Parental Controls Start At Your Router
Wouldn't it be nice if you could block a site so that your children can't get to it no matter what device your child is using to try and access it? Let's look at implementing parental controls at the router level.
Free Wireless Security Tools
Free tools to monitor and protect your wireless connection or test your WEP encryption. There are wireless IDS (intrusion detection systems), wireless scanners that detect hidden networks and access points and more.
The Dangers of Evil Twin Wi-Fi Hotspots
Is the free wireless hotspot you just connected to a legitimate one, or is it an Evil Twin hotspot setup to steal your passwords and other personal information? Let's learn about Evil Twin hotspots and how to guard against them.
Facebook Friend or Facebook Hacker? Here's How...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Did your grandmother
The Dangers of Out-of-Office Auto-Reply Messages
Think twice before you set your out-of-office auto reply, you might reveal information that is useful to scammers and spammers.
How to Secure Your HomePlug Powerline Network
How secure is your HomePlug Powerline Network? Let's learn how you can implement the security features of your HomePlug Powerline Network.
Review: Foscam Surveillance Pro for iPhone
Foscam Surveillance Pro is a great app for keeping an eye on your home from your iPhone. Check out our review for more information.
Free Spyware and Adware Detection & Removal...
Free spyware removal tools and utilities to help you block, or at least detect and remove spyware and adware that can infest your computer and bog it down severely and may even perform malicious functions like capturing your passwords.
How to Encrypt Your Wireless Network
Is your wireless network traffic safe from hackers and eavesdroppers? Learn why your current wireless encryption might not be adequate and what you can do to protect your network.
What Is A BHO (Browser Helper Object)?
A frequently asked question (faq) explainin what a BHO (browser helper object) is and how they can be used to attack your computer system.
Caller ID Spoofing
Is that really the president calling you at home or have you just been Caller ID spoofed?
Is Your Wireless Network's Name a Security Risk?
Can something as simple as your choice of wireless network name make you a more appealing target for hackers trying to crack your wireless network's password? The answer is yes and here's why:
Peer-to-Peer (P2P) Network Security
A tutorial article providing tips to use peer-to-peer (p2p) networking sites such as BitTorrent or eMule safely and securely.
Securing Your New Wireless Router
Got a shiny new wireless router? Follow these tips to help make it more secure:
How to use Google Voice as a Privacy Firewall
Let's learn how to use Google Voice as your very own telephone privacy firewall.
How to Secure Your iPhone's Siri Assistant
Is Siri telling all your secrets? If you have a new iPhone and are using the Siri assistant, there is a potential Siri-related security hole that a simple settings change can fix.
What is a Packet Sniffer?
Do you know what a packet sniffer is or what it's used for? Let's learn how packet sniffers can be both a great diagnostic tool for network technicians and a dangerous weapon in the hands of hackers.
Security Basics For Home Computing
a short article describing basic computer and network security steps for home users and small office home office (SOHO) users
Protect Yourself From SMiShing (SMS Phishing)...
Smishing is basically phishing scams that are sent over Short Message Service (SMS) text messages. Here are a few tips to help you tell spot SMiShing.
Why Stalkers Love Your Geotags
Are you being geo-stalked? Is someone using your location tags to hunt you down? Learn how to protect yourself from Geo-stalkers.
How to Start a High-Tech Neighborhood Watch
Is the crime rate up in your area? Are burglars treating your neighborhood like it's an all-you can-steal buffet? It's time to upgrade your neighborhood watch to version 2.0.
Why You Should Encrypt Your Email
A brief article describing why you should encrypt your email communications and some tips on how to do it
How Criminals Use Google Maps Street View to...
Learn how criminals are using Google Maps Street View to help them 'case the joint' before they rob your house. We'll also show you how to protect yourself by making your property invisible in Street View so that all the bad guys will see is a big fat blur.
Introduction to Vulnerability Scanning
A brief article introducing the concepts of vulnerability scanning- how it works, what sorts of things it checks for, what the results mean to you and how you might use a vulnerability scanner to detect weaknesses in your network and fix them before they are used against you
How to Secure Your IP Security Cameras
Are your IP security cameras safe from Internet voyeurs and hackers? Check out these tips to help you secure your IP Security cameras:
Disable SSID Broadcasting To Protect Your...
Wireless network equipment generally has a beacon which broadcasts information, part of which usually includes the SSID, about the wireless network every few milliseconds. Disable the SSID broadcast so that random wireless devices won't have it announced to them.
Why You Need a Second Opinion Malware Scanner
Your virus scanner says everything is OK, but your computer is acting very strange and won't let you open any files. It's time for a second opinion malware scanner to see what your antivirus software might have missed.
Protect Yourself From Spyware
A quick, down and dirty hit list of the 5 easy steps you can take to protect your computer system or network from being infiltrated by spyware and adware
Disable Remote Access In Windows XP
A quick step-by-step guide to show how to disable Remote Desktop and/or Remote Assistance. If the services are not being used, they are just another door for an attacker to access your system.
Keep Track of Your Kids With Geofences
Geofence Technology: Parental control on steroids and likely your child's worse nightmare.
How to Lock Your Home From Your Smartphone
Did you remember to lock your front door when you left the house this morning? Let's learn how you can remotely lock up your home and even turn lights on and off via your smartphone.
What Not to Post on Facebook While You're on...
Are you on vacation and about to post a picture of your delicious meal to Facebook? Read this article before you post, or you might come home to an empty house.
What Is A Rootkit?
A frequently asked questions (FAQ) entry describing what a rootkit is and how they are used legitimately and maliciously to control computer systems.
How Can I Protect My Microsoft Office Files?
Short of encrypting or securing every single file on the system, you can also use the built-in encryption capabilities of Microsoft Office to protect specific files.
Starting Windows XP In SafeMode
A brief quick tip article on starting Windows XP in SafeMode using the MSCONFIG utility rather than trying to press the F8 key at just the right time
The Top 5 Facebook Scams to Watch out for
Your friend says he just added the dislike button and you can too! All you have to do is install this sketchy-looking app. Let's learn more about the dislike scam and other popular Facebook scams / myths.
How to Build an iPhone Accessible Pet Cam
We all hate leaving our pets at home while we're at work. What if you could check in on them whenever your wanted from you iPhone or Android? I'll show you how to make a low-cost Pet Cam for less than $100
Help! I Think I've Been Hacked!!
An article on incident response when you think you've been hacked. how do you collect clues and evidence of your perpetrator- when they attacked? what they did? How do you restore your system and how do you protect yourself from future occurrences?? Page 2.
Wireshark Network Protocol Analyzer
A profile of Wireshark, a fork of Ethereal, maintained and developed by the creator and core development team from Ethereal. The profile provides a brief overview of the features and functions of the application.
Computer Security 101
A short quiz to test how much you learned from the first lesson of the Free Computer Security 101 course.
Top 5 Wireless Network Security Books
top picks for books on wireless network security, wireless access points, wep, ssid, encryption, 802.11b, 802.11a, 802.11g, 802.11x, war driving
Protect Your Facebook Account With Login...
Worried about Facebook hackers gaining access to your Facebook account? Consider using Facebook Two-Factor Authentication to protect your account. We'll show you how:
How to Booby Trap Your Smartphone
Someone just stole your phone, little do they know that you've booby trapped it. They are in for a real surprise. Let's explore your smartphone booby trapping options.
How to Erase Your iPad Before You Sell it
Before you sell or trade your iPad make sure you wipe it clean of your personal data. Learn how in this article:
How to Spot a Fake Friend Request
Let's learn why some people send out fake friend requests and how you can spot a false or malicious one:
How to Zombie-proof Your Home
Are you prepared for when the walking dead come knocking at your door during a zombie apocalypse? Follow these perimeter security tips to help zombie-proof your home.
How to Test a Suspicious Link Without Clicking it
Does that link look infected? Want to find out how to check the safety of a link without actually clicking on it? Here's how:
Who's Following Your Child on Twitter?
Do you know who's following your child on Twitter? Here are some Twitter privacy and safety tips to help keep you and your family safe.
Book Review: The Da Vinci Code
A review of the best-selling thriller The Da Vinci Code by Dan Brown. It has only loose connections to cyber security or cyber fiction through some code-breaking and cryptography, but it is an excellent book.
5 Tips for Securing Your Wireless Network
Is your wireless network secure? Here are 5 steps you can take to help better secure your wireless network.
10 Tips for Shopping Safely Online
Do you know what it takes to shop safe online? Use these 10 tips to give you some peace of mind.
Free Port Scanner Software
Links to free port scanner software to analyze your system for open ports to help you secure it
Predators on Social Networks
Social networks are a popular method of meeting and communicating with like-minded persons, but they also pose a risk as predators and perverts stalk users
Nmap Network Mapping Utility
Nmap is a powerful open source utility. It is a port scanner, security audit tool and, as the name implies, network mapper. It is very versatile and is a tool that network and security administrators should be familiar with.
Free Vulnerability Scanner Software
Free software and tools to perform vulnerability scans and proactively find the holes in your systems before an attacker or malware does.
Your Right Of Privacy
There is an assumed or implied Right Of Privacy in the United States. Many think it is rooted in the Constitution, but not without a good deal of interpretation. There are many statutes and regulations that guard personal information, but security and privacy generally come at the expense of freedom and convenience. It is up to you to make an educated choice about where you want the balance to be.

©2014 About.com. All rights reserved.