- Introduction to Vulnerability Scanning
A brief article introducing the concepts of vulnerability scanning- how it works, what sorts of things it checks for, what the results mean to you and how you might use a vulnerability scanner to detect weaknesses in your network and fix them before they are used against you
analyze article baseline brief bugtraq cve eeye introduction iss microsoft nessus number retina scanning security vulnerability
By irishdancer0215 in Public bookmarks with bookmarks computer_security
- Introduction to Port Scanning Quiz
By irishdancer0215 in Public bookmarks with bookmarks computer_security
- Computer Security 101: Lesson 6
This article is about viruses, worms, trojan horses, backdoors and other malicious code. It discusses antivirus software and techniques including heuristics. The impact of virus hoaxes is also discussed. This is the 6th in a 10-part series on computer security from your About.com Guide, Tony Bradley
anti-virus antivirus attachment backdoor block code defend file hoax horse malicious mcafee protect strip trojan virus worm
By irishdancer0215 in Public bookmarks with bookmarks computer_security
- Privacy Watch: Phishing Anxiety May Make You Miss Messages
Swarms of bogus electronic missives deter people from accepting legitimate e-mail.
2005 e-mail html messages october phishing privacy scams watch
By irishdancer0215 in Public bookmarks with bookmarks computer_security
- Enable WEP or WPA Encryption To Protect Your Wireless Network
It is great to be able to transmit data back and forth from your wireless device to your wireless router or access point, but what if someone else intercepts those airwaves as well? You can protect your wireless data by enabling encryption.
access encryption equivalent network privacy protected security wep wifi wired wireless wpa
By irishdancer0215 in Public bookmarks with bookmarks computer_security
- Free Port Scanner Software
Links to free port scanner software to analyze your system for open ports to help you secure it
2000 blues ecora free hacker hole netexplorer network nmap port portscan products scanner security shields software tools vulne
By irishdancer0215 in Public bookmarks with bookmarks computer_security by 2 users
- Disable DHCP and Use Static IP Addresses To Protect Your Wireless Network
Most home routers, wireless or wired, provide some form of DHCP which automatically assigns IP addresses to devices as they connect. To reduce the possibility of an unauthorized party accessing your network, you can disable DHCP and manually assign static IP addresses to your devices
access address control dhcp dynamic host manual network point protocol router security static wireless
By irishdancer0215 in Public bookmarks with bookmarks computer_security
- Yahoo Users Get Phished
Attackers use sophisticated new methods to tap users' IDs and passwords.
attack attacks hackers news phish phishers phishing scam yahoo
By irishdancer0215 in Public bookmarks with bookmarks computer_security
- PR Piñata: Wipe Your PC Clean
How can you get rid of an older computer without handing out personal info?
241 ask ata donation duo mail question reader schwag security
By irishdancer0215 in Public bookmarks with bookmarks computer_security
Results 21 - 29 for computer_security
« Previous