Computer Security posts

Jul 31st 2014

What is a Firewall? How to Choose one for Your PC

Even a novice baseball fan knows that you don't pitch a hardball in a softball game. Unfortunately, the rules of network and personal computer security aren't quite so well known.

Exhibit A: Hardware vs. software firewalls. When properly configured, both security solutions shield users from hackers, crackers, cyber-prowlers, disgruntled employees and other would-be attackers. But despite their similarities, hardware and software firewalls have many differences. Choose the wrong one and you could wind up spending far more money than necessary.

Jun 3rd 2014

How to Tighten Your Browser's Security

One of the most basic ways to protect your computer from potentially harmful online content or malicious software that can be installed without your knowledge or permission is easy, fast and free. How? Just make sure your browser's security settings are set at the appropriate level.

But even if you use the highest security settings, you are only as safe as the actions you take online.

Nov 19th 2013

Internet Security's 10 Year Journey from the Dial-up

Over ten years ago, most internet users had to wait for their connection. Mobile devices were not common and the full potential of Wi-Fi was nowhere near its present capacity. Instead, computers were physically connected to the modem through landline telephone connections. In 2002, only 13 percent of internet users used the faster broadband connection through cable and telephone services. Once, clicking on the Explorer icon (in 2002 over 95 percent of internet users connected through Explorer), the computer and telephone provider "shook hands" and made a sound similar to pots and pans being eased through a blender. After all that, the internet was at a user's fingertips, one slow downloaded page at a time.

Oct 23rd 2013

What Is a VPN?

A virtual private network, often called a VPN, is software that builds an "encrypted tunnel" to secure your online data across the Internet. So when you use a VPN, your data passes through this tunnel and is protected from anyone who tries to intercept it. This helps ensure that no hacker or online crook can read, steal, or modify any information being transmitted.