Archive for KnowledgeBase
Posted by Siren on August 17, 2013
Install Security Software Now we get to installing security software on your computer. So, we have done first steps, tried to secure the computer as much as possible, we have done the System Restore, basic tune-ups, now we actually install security software to try to protect the computer and try to rip the viruses. My […]
Read more →
Posted by Siren on August 17, 2013
Uninstall Software The next thing to do is to uninstall all the crap on your PC. It is horrible what users do to their computers, they install all which is possible, behave like kids in a candy store when it comes to applications. “Wow, let me try this, and this, this, this, and let me […]
Read more →
Posted by Siren on August 17, 2013
First Steps As you try to clean a Windows PC you to try to contain the viruses and/or malware so that they will not get any worse. You don’t want infections to get worse as you work on your computer. So, the first thing that you might do is something called System Restore If you […]
Read more →
Posted by Siren on August 17, 2013
The aim is to show you how to save a computer infected with viruses, spyware, Trojans, etc. so that you can properly use it and then tune it up to boost up performance. This presentation is rather to introduce you to theory and concepts, there will be no demonstration. The reason is that the exact […]
Read more →
Posted by Siren on July 23, 2013
6. Final Thoughts So that was a class introduction to hacking. As I have said, this is the beginning of this hacking track just trying to get you into the mind center of hacking. And again I am coming out of this from the malicious hackers’ standpoint. The reason is that if you understand how […]
Read more →
Posted by Siren on July 23, 2013
5. Who hackers are – who are those guys out there? The next thing to be discussed is planning attacks, overview of this. The first thing in planning an attack is what you are trying to get out of the hack. You know, now people worry about stealing usernames for bank accounts, online banking. I […]
Read more →
Posted by Siren on July 23, 2013
3. The Fog of Law If you are hacking for malicious, nefarious, evil reasons, you probably already know you are on the wrong side of the law so can turn out this section; for those out there who are white or grey hat hackers you do need to listen to what I am about to […]
Read more →
Posted by Siren on July 23, 2013
This is a starting guide to hacking. In general, there will be a series of articles to show you how to hack computers, networks etc. Disclaimer! As far as posters and drafters of this article are concerned, hacking is simply a technical skillset, so understanding how hacking works, how hacking attack happens, the ability to […]
Read more →
Posted by Siren on July 6, 2013
Rule 8: Privileges and Permissions You can’t break what you can’t touch The next way to protect your computer is to properly use privileges and permissions. That means every computer has an operating system with users having different permission levels built into them. So the main user at any computer is considered to be Administrator, […]
Read more →
Posted by Siren on July 6, 2013
Rule 4: AntiVirus Software – Beware the Wolf in AntiVirus Clothing Yes, of course, updates are nice, but we also need to kill the viruses, to stab’em in the heart and kill’em dead; that is really cool, and that is where antivirus software comes in. Antivirus software is computer software that resides on your computer […]
Read more →
Page 35 of 36 «...1020303233343536