Web site security is a complex and perhaps even controversial topic. On one side, there are persons who regard themselves as the freedom fighters of the technology and information era; on the other side there are those who view this as a form of modern terrorism. Whatever the case and without question, breaking into a computer system without consent is a crime.
It is convention to use a protected connection when compiling sensitive data such as the personal information of a visitor of a Web site. The security levels of those secured connections currently in popular use are “none”, 40-bit, 56-bit, and 128-bit listed from lowest to highest level of page security. Read more . . .
It’s four a.m. You’re on your third half-caf and ready to prepare the final page to that greatly feared department budget proposal. You’ve put it off for three weeks and the submission is tomorrow, but completion is just a page away. However, without notice, your system locks up. The page is frozen and the frightening blue screen emerges. In desperation you try to reboot, but the system won’t respond. Your hard work has vanished in a disastrous hard drive failure, never to be seen again. Read more . . .
Who can forget the way the world was frozen with the damage of the “Millennium Bug”? While people around the world should have been counting down to a phenomenal celebration, we were too busy preparing for certain doom and gloom beset by a computer virus. But then, the clock struck twelve on January 1, 2000 and a new millennium quietly began, bug-free.
Those unfortunate enough to have had to deal with a computer virus knows all too well the threat that can be done. From taking on annoying quirks, to completely obliterating computers or entire systems, to erasing files, the Read more . . .
If you are a regular Internet user, then you’ve perhaps come across the term “spyware”. This is a pretty good definition of what these programs are. Spyware is a program that exists within your computer system to carry out functions like displaying unwanted ads, recording your keystrokes, and even monitoring how much you use your computer.
These programs enter your computer system without you even aware of it (just like real spies). They may slip past you when you’re downloading music, or they may even be disguised as programs that you thought were not harmful. That’s how tricky the authors of these programs are.
So what exactly does this mean for you? The implications of this range from the frustrating, to the down-right maddening. On the other hand, some spyware programs simply generate pop-up ads while you are browsing. Others can re-define your browser’s homepage. Read more . . .
The Internet has brought about brand new security threats, and spyware is one of the most common. If you use the Internet you need to take immediate action to counter the spyware that poses a serious threat to your privacy.
There are four ways to block spyware. Each should be used to keep prying eyes out of your computer files.
You are facing a battle that must be waged at two levels. First, you’ll have to detect and eliminate the spyware that has already entered the computer system without your knowledge. Second, you need to make sure that the steps that you have taken will prevent new spyware from infiltrating your system. Read more . . .