Software Firewalls: Programs That Stop Hackers

February 22, 2007 0 Comments 0 tags

A good software firewall for home users should have the following attributes: * It’s easy to configure. * It’s frugal with system resources so it doesn’t bog down the computer.

Expert Tips for Keeping Google Hacks at Bay

February 22, 2007 0 Comments 0 tags

The first step for protecting yourself from something is knowing how that something works. In the case of Google hacking, you will have to learn how it can be used

Firewall: Shut Out the Hackers

February 20, 2007 0 Comments 0 tags

This book discusses many of the security tools you can use to defend your computer against digital threats. An antivirus program and anti-spyware programs are critical; however, the third key

Hacker Motivation: I Think Therefore I Hack

February 19, 2007 0 Comments 0 tags

Hackers’ motivations vary. For some, it’s economic. They earn a living through cyber crime. Some have a political or social agenda—their aim is to vandalize high-profile computers to make a

Targets of a Hack Attack

February 19, 2007 0 Comments 0 tags

Hacker interests lie in many types of computers on the Internet. Following is a discussion of the types of targets and their appeal to the perpetrators.Corporate Networks Corporate computers are

What Damage Can Hackers Do?

February 18, 2007 0 Comments 0 tags

Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in

Who Are the Hackers?

February 16, 2007 0 Comments 0 tags

Hackers and crackers are usually highly intelligent social misfits who tend to have a strong curiosity and often have an anarchist or, at very least, anti-authoritarian bent. They see the