Articles

 Internet Safety

Internet safety or online safety is the security of people and their information when using the...

 Creating Safe, Easy to Remember Passwords

Pick your Words or Phrases. Pick 3-5 words or phrases you can easily remember. The words SHOULD...

 Social engineering (security)

  Social engineering, in the context of security, is understood to mean the art of manipulating...

 A Parent's Guide to Internet Safety

Dear Parent: Our children are our nation''s most valuable asset. They represent the bright...

 Traveling safely with Wi-Fi

Traveling with one's Wi-Fi (wireless) laptop was once the purview of business road warriors. No...

 What is the unsolicited email (spam)?

Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic...

 Why am I getting spammed and how to prevent it?

Spam is an ongoing issue that costs business and individuals billions of dollars worth of lost...

 What is a blacklist?

In computing, a blacklist or block list is a basic access control mechanism that allows through...

 Should I Give My Web Developer My Username and Password?

Many times, a web developer will ask for access to your hosting account so that they may setup...

 What is a vulnerability?

In computer security, a vulnerability is a weakness which allows an attacker to reduce a...

 What is the malware?

Malware, short for malicious software, is software used to disrupt computer operation, gather...

 What is cyberbullying?

    Image left on victims of some Facebook profiles. Cyberbullying is the...

 What is a computer virus?

    Hex dump of the Blaster virus, showing a message left for Microsoft CEO Bill...

 What is an antivirus software?

Antivirus or anti-virus software (usually written as the abbreviation AV) is software used to...

 What is a computer worm?

A computer worm is a standalone malware computer program that replicates itself in order to...

 What is a Backdoor?

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal...

 What is a Trojan horse?

A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware...

 What is a firewall?

    An illustration of where a firewall would be located in a network. In...

 What is a hacker?

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a...

 What is a cracker?

A cracker (also known as a black hat hacker) is an individual with extensive computer knowledge...

 What is an Internet robot or bot?

An Internet bot, also known as web robot, WWW robot or simply bot, is a software application...

 What is a scraper site?

A scraper site is a spam website that copies all of its content from other websites using web...

 What is web scraping?

Web scraping (web harvesting or web data extraction) is a computer software technique of...

 What is phishing?

    An example of a phishing email, disguised as an official email from a...

 What is a spoofing attack?

In the context of network security, a spoofing attack is a situation in which one person or...

 What is an SQL injection?

An SQL injection is a code injection technique, used to attack data driven applications, in...

 What is a troll?

    The advice to ignore rather thanengage with a troll is sometimesphrased as...

 What is modSecurity?

ModSecurity supplies an array of request filtering and other security features to the Apache...

 What a digital footprint?

A digital footprint is the data trail left by the interactions in a digital environment;...

 What is 'Inline Linking' or 'Hot Linking'?

Inline linking (also known as hotlinking, leeching, piggy-backing, direct linking, offsite...

 What is tunneling and SSH tunneling?

Computer networks use a tunneling protocol when one network protocol (the delivery protocol)...

 What is a Packet Sniffer?

A packet analyzer (also known as a network analyzer, protocol analyzer or packet sniffer—or,...

 What is Spyware?

Spyware is software that aims to gather information about a person or organization without...

 What is a CAPTCHA?

    This CAPTCHA of "smwm" obscures its message from computer interpretation by...

Powered by WHMCompleteSolution