Like HowStuffWorks on Facebook!

Tech | Computer | Computer & Internet Security

Computer surveillance and security covers a wide range of ways to keep you and your information safe. Learn about firewalls, zombie computers, hackers and workplace surveillance.

Featured
How Spyware Works

According to recent estimates, more than two-thirds of all PCs are infected with some kind of spyware. These programs track your Web habits and more. Is your computer doomed, or can you get rid of spyware?


Can you hack a drone?

Can you hack a drone?

Hack a drone? The short answer is yes. The long answer? Read more about hacking a drone at HowStuffWorks. See more »

How could an algorithm spot trolls on the Internet?

How could an algorithm spot trolls on the Internet?

Trolls on the Internet are never fun to deal with. Find out if an algorithm could spot trolls on the Internet to make online life easier. See more »

10 Forms of Online Harassment

10 Forms of Online Harassment

Online harassment seems to know no bounds, with new opportunities for meanness evolving all the time. Learn about 10 types of online harassment. See more »

How can Google forget you?

How can Google forget you?

Do you have some incriminating videos, photos or more online? Learn more about Google's online forgiveness at HowStuffWorks. See more »

What is doxxing?

What is doxxing?

Do you know what you're doing when you're 'dropping dox' on somebody? It's called doxxing. Learn all about doxxing at HowStuffWorks. See more »

Exactly what is a zero-day vulnerability?

Exactly what is a zero-day vulnerability?

When software encounters a zero-day vulnerability, you better cross your fingers the developer creates a fast fix. Learn why at HowStuffWorks. See more »

Is the Chinese army hacking American computers?

Is the Chinese army hacking American computers?

Is the Chinese army hacking American computers? Learn more about the possible connection between the Chinese army and series of hacks. See more »

How CISPA Works

How CISPA Works

The proposed CISPA cybersecurity bill is controversial. Learn what CISPA is all about. See more »

How Anonymous Works

How Anonymous Works

The hacktivist group Anonymous garners mixed opinions. Learn how Anonymous is structured and what the group does. See more »

How Protect IP Works

How Protect IP Works

The Protect IP Act has the seemingly simple and noble goal of stopping electronic piracy. Some saw it is flawed. See how the Protect IP Act works. See more »