Search Results | Computer Security -macy's -entering
Your search for "Computer Security -macy's -entering" returned 147 results
What is a smart card?
computer.howstuffworks.com/question332.htm
What is a "smart card"? Learn how an embedded microprocessor in a smart card can authenticate your computer usage and data. Learn about smart cards.
How Computer Mice Work
computer.howstuffworks.com/mouse.htm
The mouse might just be the computer user's best friend. Every day of your computing life, you reach out for your mouse whenever you want to move your cursor or activate something. Learn how this human-machine interface translates your movements into digital data.
How Computer Monitors Work
computer.howstuffworks.com/monitor.htm
Chances are you're reading this on a computer monitor. Do you know what's going on behind the scenes? Find out all about it, including dot pitch, refresh rates and the signals flowing along the graphics cable.
How the Mac Mini Works
computer.howstuffworks.com/macs/mac-mini.htm
The Mac Mini was first geared toward PC switchers. What do people say about it now? Learn about the features and specs of the Mac Mini.
Are Macs more expensive than comparable PCs?
computer.howstuffworks.com/macs/macs-more-expensive.htm
Are Macs really more expensive than PCs? On the surface they seem more expensive, but find out if Macs are more expensive than PCs once you add in Mac perks.
How to Change Your Gmail Password
computer.howstuffworks.com/change-gmail-password.htm
We're told to change our computer passwords often, but sometimes it can be a hassle to remember how to do it. Here are some easy instructions for changing your Gmail password.
How does a logic bomb work?
computer.howstuffworks.com/logic-bomb.htm
Logic bombs can cripple a company's computer system by revealing or destroying sensitive information. Learn how logic bombs work.
Annoying Verification On Its Way Out as CAPTCHA Goes Invisible
computer.howstuffworks.com/internet/basics/google-invisible-captcha-verification.htm
How will Google's reCAPTCHA technology change as it goes invisible? Learn more about identity verification in this HowStuffWorks article.
How Trojan Horses Work
computer.howstuffworks.com/trojan-horse.htm
A Trojan horse is a program that looks helpful but actually lets a cracker take over your computer. Find out more about a Trojan horse.
Is cyberwar coming?
computer.howstuffworks.com/cyberwar.htm
Cyberwar may be on the horizon as hackers target whole countries with online attacks. Find out more about the possibility of upcoming cyberwar.