Category: computer

Home / Category: computer

Computer security is of paramount importance for all types of businesses. Since computers are connected to the Internet, your business is always prone to threats, such as viruses, spam, DDOS attacks and Trojans, just to name a few. These cyber-attacks are increasing in number and can destroy your business in a few minutes. While you can install antivirus software to protect your computers from viruses, the apps can’t give you the required level of protection. What you need is a computer security expert. Let’s know the benefits of hiring a computer expert.

The In-House Computer Security

With an in-house computer expert, you can enjoy greater visibility. In other words, you can see the team working, which will give you peace of mind that your system is secure. Aside from this, one major advantage of hiring an in-house security expert is that it can save you a lot of money.

On … Read More

In the Linux operating system(which is free), the super user(root) has raw access to disks and partitions on the disks in the machine. The general idea is to write random data generated by the Linux operating system, to the hard disk.

The situation often arises where an individual needs to throw away an old computer, but does not want the data on the disk of the old computer to be accessible if someone retrieves it via dumpster diving. There might still be data stored in the motherboard or some of the peripherals, but that is beyond the scope of this article. Ideally, the disk platters should be physically destroyed, but due to hardware or cost constraints, this might not always be possible.

A free way to wipe the data on the disk involves using a bootable Linux disk to write random data to the disk multiple times. Here is the … Read More

Invisible computer monitoring should be just that – invisible. So then, why are so many computer spy software programs that are out there have these obvious telltale signs that such software is on my computer watching everyone? How smart is it to have a software icon just sitting there on my desktop screen, or glowing away and pulsating in the system tray or task bar while it’s running? Doesn’t that tell the whole world that everything and every act performed on my computer is being watched?

This is why invisible computer monitoring should really and truly be invisible. It should be something that requires no icons to be turned on, but rather a program that automatically begins running right at the same time as you turn on your PC. Everything that gets recorded should be placed into file folders that are hidden and invisible, only known to you yourself. Periodic … Read More

The Dennis Rader Computer Forensics Case

Back in January 1974 police turned up at a family home to find a horrific scene all four members of the same family has been brutally murdered. This included Joseph and Julie Otero and the two children 11 year old daughter and the 9 year old son. This was the start of the now infamous serial killers campaign of terror with his self-styled insignia “BTK”. His murderous rampage continued on for 17 years when he committed his last confirmed murder. The Otero family was a little outside the normal victims of the BTK which generally fell within the female gender with a wide age range, he was also known to label his victims as projects.

Dennis Rader the BTK killer would contact and communicate with the police and local media on a regular basis he would use newspaper columns and leave clues and cryptic … Read More

Computer Gaming Online Role-Playing

May 4, 2020 | computer | No Comments

Computer gaming online role-playing is quite a fun spin on the old favorite of role-playing games that have been sold in comic shops for years. In a way, this is consistent with the expanding world of were our leisure activities are going as computers become more and more ingrained in our society and culture.

Role-playing games started in the 1970’s with Dungeons and Dragons and quickly grew to include virtually any type of game or scenario one could imagine including games that revolved around action-adventure, science fiction, espionage, horror, sports and a ton of other genres.

The Computer Version Of Role-Playing Games

Role-playing games eliminated the traditional cause effect method that board games utilized and turned games into an improvisational exercise that proved intriguing. In time, people started to use computer gaming online to expand how role playing games can be conducted. In the computer gaming online variant of role-playing, … Read More

Explaining “Cookies” (the non caloric ones that reside in your computer!)

You can’t talk about all those nasty ‘things’ that can ‘attack’ your computer while you are surfing the Internet, like viruses or spyware, without talking about ‘Cookies’. But what are they and are they really bad for my computer?

Ok, first let’s define the term, and then we’ll explain the good and the bad about it.

Cookie(s):

A small data (text and numbers) file (piece of information) created by a Web server (large computer that stores web sites) that is stored on your computer either temporarily for that session only (the time that you spend on a web site) or permanently on the hard disk (persistent cookie). Cookies provide a way for the Web site that you visit and go back to visit again, to identify users and keep track of their preferences. Amazon and Barnes and Noble online … Read More

In today’s society, traveling with a laptop seems like an everyday occurrence, whether for “mobile office” or just personal use. There are some things you should be aware of when traveling with your laptop. Since it is portable and portable items can be easily lost or stolen. Here are a few tips to help avoid heartache and an employer’s wrath.

#1 Treat your laptop like cash. Some of the information might be replaceable. Other information, however, may be irreplaceable. There is also the risk of someone using the information to further their cause (attempt to sell it back to you, or one of your competitors). If nothing else, it will be the hell and countless hours you have to go through to get another machine and get it setup just like the laptop which disappeared.

#2 Never leave your laptop alone and exposed, ANYWHERE! Not in the car, not in … Read More

All About Computer Networks

May 4, 2020 | computer | No Comments

Over a period of time, computers have become an indispensable part of businesses. Installation of computers, their support and maintenance are services all organizations require. As businesses grow, the number of computers in the organization also increase. It becomes imperative to establish a systematic way to connect these computers so that they function in a hassle-free manner. Therefore, computers are interconnected in various ways. This is the concept of a computer network.

What is a computer network?

A computer network can be understood as a number of computers connected together to share resources. The most common resource shared is the internet. Other resources can be printers, file servers, etc. The computers in the network may be connected through an Ethernet cable or wirelessly through radio waves.

Now we will see how the individual computers in a network are connected:

Computers connected in a network are referred to as nodes.

Star Read More

Computer Forensics, or Digital Forensics to give it another name, is something that in today’s fast moving environment has become as much part of policing as walking the beat or patrolling or the mobile unit.

As technology progresses and it does so extremely quickly these days, so to do the ways in which technology is applied to crime and its uses by the criminal. Whereas in the past when crime was much more straightforward and involved a physical presence, Computer Crime requires, in some instances, nothing more than a computer, access to the internet, and the personal information of an unwitting individual.

As this type of computer criminal becomes more and more common so too does the need for experts in the field of Computer Forensics Analysis. However in the United Kingdom at the present time there is a shortage of trained professionals in this field which leaves the computer … Read More

The number one threat against the security of your information system is the insider threat. Make sure that your employees know how to safely function with computers. Failing to do so is a lack of due diligence on your part.

Among what employees should know as a bare minimum is listed below:

What type of information does your company process?

What are the employees’ basic responsibilities for information security?

What are the components of the organization’s password policy?

What are the security best practices that employees should follow?

What qualifies as a clean work area that supports security?

What type of threats should employees be on guard against?

What are some common attack methods?

What actions should employees take when an attack occurs?

What are the company’s email policies?

What are the company’s social media and web surfing policies?

Your employees should be aware of how raw data is processed … Read More