Integrity checking products work by reading your entire disk and recording integrity data that acts as a signature for the files and system sectors. … [Read more...]
Interception
Interceptors (also known as resident monitors) are particularly useful for deflecting logic bombs and Trojans. The interceptor monitors operating … [Read more...]
AV Product Use Guidelines
Most modern anti-virus products use a combination of techniques. However, they still get almost all of their protection from their scanner component. … [Read more...]
What are Emoticons?
Emoticons are ASCII glyphs originally designed to show an emotional state in plain text messages. Over time they have turned into an art form as well. … [Read more...]
What Are Electronic Communication Acronyms?
To simplify text communications a number of acronyms have been developed. This page expands a collection of some you may encounter. Please note that … [Read more...]
What Was That Error?
You're happily working along with your computer and suddenly the screen flashes, the computer or application stops, an error message flashes on the … [Read more...]