PC Security Reviews

Reviews Criteria

Security Articles

Types of Threats

Legal Notice


About Us

Security Articles

Tips for preventing VIRUS, WORM and Trojan Horse Infections

Methods that guarantee a computer or network is safe from computer viruses, worms and trojan horses simply do not exist. Users can take several precautions, however to protect their home and work computers from these malicious infections.

Online Security

The proliferation of computer technology and emergence of the Internet has enhanced the lives of children and adults. Increasing productivity and efficiency, the Internet is a powerful educational tool, and it provide youths a vast amount of information. That said, it is important to remember that the Internet can also be very dangerous. Criminals are using modern technology to prey on innocent victims.

Security Systems Software

Install virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. Update your anti-virus software daily or weekly and schedule a regular scan. Make sure all family members know what to do if the home computer becomes infected.

Encryption, Security and SSL

When it comes to accepting online payments and other sensitive information over the web, normal HTTP just doesn't cut it. It's an insecure method of communication where everything is sent over the wire in cleartext - it's completely trivial for anyone in a network administrator position at a business or ISP to gain access to the network, and most networks are even vulnerable to 'sniffing' by non-privileged users of the network.

Hightech Fingerprint Fraud

Eyeballs, a severed hand, or fingers carried in ziplock bags. Back alley eye replacement surgery. These are scenarios used in recent blockbuster movies like Steven Spielberg's "Minority Report" and "Tomorrow Never Dies" to illustrate how unsavory characters in high-tech worlds beat sophisticated security and identification systems.

Protect from Identity Theft

Identity theft is the fastest growing criminal activity in the 20th Century, replacing illegal drug sales.

Security Classification Primer

Much is heard these days of government secrets being uncovered, national security being compromised, and of sensitive information getting into the wrong hands. Most countries have a classification system to formalize state secrets and protect information from being used to endanger citizens. This article will familiarize you with the security classification system.

Background Checks

If you have ever been employed, chances are good that you’ve had a background check run on you. Employers looking for reliable, trustworthy individuals will often use these reports to confirm that information given on a resume is true and ensure that they are hiring persons of high standards. But what is included in a background check? Do you have control over who can access your report? How can you find out what is on your record?