There are 35 Security tutorials. Show
Protecting your children while they are online can be a difficult and scary task for any parent. While it is important to introduce children to computers and the Internet, it is also just as important to do this in a safe environment. To help you with this is Family Safety, which is a parental control applications that monitors your children's online activity, and if necessary, controls what they can do on the computer. By using a tool like Family Safety a parent can feel comfortable allowing their child to use the computer and the Internet while knowing exactly what they are doing and where they are going.
Category: Windows 7, Security, Windows 8, Windows Vista, Windows XP | Read 17,373 times | Last Modified on December 13, 2012
Many organizations that use Remote Desktop Services or Terminal Services are not using a VPN connection before allowing connections to their in-house servers or workstations. If no VPN is required, this means that the Terminal Server or Remote Desktop is publicly visible and allows connections from anyone on the network and in most cases the Internet. This is a major security risk because it allows remote hackers to attempt to use password cracking attacks on your accessible servers in order to gain remote access. As Remote Desktop Services are configured by default to listen on TCP port 3389, all a hacker has to do is scan the Internet for computers that have that port open and then use a cracking program to try and crack the computer's accounts and passwords. This may seem like a hard task, but it is actually not difficult at all using free and publicly available tools.
Category: Basic Concepts, Apple, Linux, Security | Read 13,438 times | Last Modified on July 17, 2012
A file extension, or file name extension, is the letters immediately shown after the last period in a file name. For example, the file extension.txt has an extension of .txt. This extension allows the operating system to know what type of file it is and what program to run when you double-click on it. There are no particular rules regarding how an extension should be formatted other than it must begin with a period and have at least one character after it. For the most part, file extensions consist of three characters, which are typically letters or digits, that textually represent the type of file it is. Some examples of file extensions include .txt, .mp3, .jpg, and .gz, which represent text files, mp3 files, jpeg image files, and files compressed with the gzip program. As you can see, the actual extension name gives clues as to the type of file it is.
One of the most important things a user can do to keep their computer secure is make sure they are using the latest security updates for Windows and their installed programs. Unfortunately, staying on top of these updates can be a time consuming and frustrating task when you have hundreds of programs installed on your computer. Thankfully, we have a utility called Secunia PSI, which is vital component for any Windows user's toolkit.
Category: Security | Read 25,429 times | Last Modified on July 14, 2010
If you suspect that you have spyware installed on your computer, then an excellent tool to remove them is Ad-Aware SE. Follow the instructions below to learn how to use Ad-Aware SE to remove these programs from your computer. Word of warning, though, Spyware can sometimes be integrated tightly into software that you use, and if you remove the spyware, that software may not function correctly. So be careful as to what you remove.
Category: Security | Read 102,438 times | Last Modified on February 27, 2012
Though Firewalls are necessary when your computer is connected to the Internet, they can cause problems trying to get Internet aware programs working properly. For example, if you wanted to host a game server on your computer, unless you configure your firewall correctly, outside users would not be able to connect to your server. This is because by default a Firewall blocks all incoming traffic to your computer. This causes a problem, because programs that require incoming connections will now not be reachable. To fix this, we need to open the specific Internet port that the program expects to receive incoming connections on. This tutorial will cover how to open specific ports for programs, or to open these ports globally using Zone Alarm.
Category: Security | Read 125,554 times | Last Modified on February 27, 2012
Rootkits are scary and becoming a larger and larger menace to our computers every day. In the past if our computers were infected with a piece of malware, we simply removed it and we were clean of the infection. Now that rootkits are commonly bundled with other malware, this cleaning process has become even harder to do. This tutorial will cover how to use F-Secure Blacklight to scan your computer for rootkits and help you to remove them.
Category: Security | Read 175,482 times | Last Modified on June 05, 2012
HijackThis ne doit être utilisé que dans le cas où votre navigateur ou votre ordinateur continue à avoir des problèmes après l'exécution de Spybot-S&D ou d'un autre nettoyeur d'Espiogiciels (Spyware)/Pirates (Hijackers). HijackThis est un outil évolué, et par conséquent il requiert des connaissances approfondies sur Windows et les systèmes d'exploitation en général. Si vous supprimez des éléments qu'il affiche, sans savoir ce qu'ils sont, cela peut entraîner d'autres problèmes comme la perte de votre connexion Internet ou des problèmes dans le fonctionnement de Windows lui-même. Vous devriez aussi essayer de nettoyer les Spywares/Pirates/Trojans au moyen de toutes les autres méthodes avant d'utiliser HijackThis. Si vous autorisez HijackThis à supprimer des éléments avant qu'un autre outil de suppression ne balaie votre ordinateur, les fichiers créés par le Pirate/Spyware resteront sur votre ordinateur et ensuite les outils de suppression seront incapables de les trouver.
Category: Security | Read 33,016 times | Last Modified on June 05, 2012
HijackThis moet alleen gebruikt worden als de browser of computer nog steeds problemen ondervindt nadat Spybot Search & Destroy, Ad-Aware SE of een ander anti-spyware scanner gebruikt zijn.
Category: Security | Read 206,485 times | Last Modified on February 27, 2012
An essential piece of software for every computer is an Anti-Virus. An Anti-Virus protects your computer from many common viruses and Trojans which can be deadly for you system. Avast Anti-Virus Free Edition is very good and effective FREE Anti-Virus.
|Tech Support Forums | The Computer Glossary | RSS Feeds | Startups | The File Database | Virus Removal Guides | Downloads|