Integrity Checking

Integrity checking products work by reading your entire disk and recording integrity data that acts as a signature for the files and system sectors. … [Read more...]

Interception

Interceptors (also known as resident monitors) are particularly useful for deflecting logic bombs and Trojans. The interceptor monitors operating … [Read more...]

AV Product Use Guidelines

Most modern anti-virus products use a combination of techniques. However, they still get almost all of their protection from their scanner component. … [Read more...]

Computer Knowledge Newsletter – January 2002 Issue

In This Issue: Windows AOL Instant Messenger Vulnerability ClickTillUWin ATM Skimming MS Security (Unchecked Buffer in Universal Plug and Play … [Read more...]

Computer Knowledge Newsletter – February 2002 Issue

In This Issue: Form Spam Viruses Worse? Safe Computing Tips Morpheus Hole Secret Updates MS Security (Malformed Network Request Can Cause … [Read more...]

Computer Knowledge Newsletter – March 2002 Issue

In This Issue: SNMP Vulnerabilities PHP Vulnerability Gator Digital Wallet Vulnerability MS Security (Cumulative Patch for Internet Explorer; … [Read more...]

Computer Knowledge Newsletter – April 2002 Issue

In This Issue: Printer Attacks MS Security (04 March 2002 Cumulative VM Update; 28 March 2002 Cumulative Patch for Internet … [Read more...]

What are Emoticons?

Emoticons are ASCII glyphs originally designed to show an emotional state in plain text messages. Over time they have turned into an art form as well. … [Read more...]

What Are Electronic Communication Acronyms?

To simplify text communications a number of acronyms have been developed. This page expands a collection of some you may encounter. Please note that … [Read more...]

What Was That Error?

You're happily working along with your computer and suddenly the screen flashes, the computer or application stops, an error message flashes on the … [Read more...]