Search Results | Computer Security -macy's -entering

Your search for "Computer Security -macy's -entering" returned 147 results

What is a smart card?

computer.howstuffworks.com/question332.htm

What is a "smart card"? Learn how an embedded microprocessor in a smart card can authenticate your computer usage and data. Learn about smart cards.

How Computer Mice Work

computer.howstuffworks.com/mouse.htm

The mouse might just be the computer user's best friend. Every day of your computing life, you reach out for your mouse whenever you want to move your cursor or activate something. Learn how this human-machine interface translates your movements into digital data.

How Computer Monitors Work

computer.howstuffworks.com/monitor.htm

Chances are you're reading this on a computer monitor. Do you know what's going on behind the scenes? Find out all about it, including dot pitch, refresh rates and the signals flowing along the graphics cable.

How the Mac Mini Works

computer.howstuffworks.com/macs/mac-mini.htm

The Mac Mini was first geared toward PC switchers. What do people say about it now? Learn about the features and specs of the Mac Mini.

Are Macs more expensive than comparable PCs?

computer.howstuffworks.com/macs/macs-more-expensive.htm

Are Macs really more expensive than PCs? On the surface they seem more expensive, but find out if Macs are more expensive than PCs once you add in Mac perks.

How to Change Your Gmail Password

computer.howstuffworks.com/change-gmail-password.htm

We're told to change our computer passwords often, but sometimes it can be a hassle to remember how to do it. Here are some easy instructions for changing your Gmail password.

How does a logic bomb work?

computer.howstuffworks.com/logic-bomb.htm

Logic bombs can cripple a company's computer system by revealing or destroying sensitive information. Learn how logic bombs work.

Annoying Verification On Its Way Out as CAPTCHA Goes Invisible

computer.howstuffworks.com/internet/basics/google-invisible-captcha-verification.htm

How will Google's reCAPTCHA technology change as it goes invisible? Learn more about identity verification in this HowStuffWorks article.

How Trojan Horses Work

computer.howstuffworks.com/trojan-horse.htm

A Trojan horse is a program that looks helpful but actually lets a cracker take over your computer. Find out more about a Trojan horse.

Is cyberwar coming?

computer.howstuffworks.com/cyberwar.htm

Cyberwar may be on the horizon as hackers target whole countries with online attacks. Find out more about the possibility of upcoming cyberwar.

41 - 50