Computer Security Systems

Computer security is an increasingly important consideration. From authentication to encryption keys, learn how to keep your computer's hard drive protected and your personal information safe.

CISPA is a proposed cybersecurity bill that has fervent supporters and opponents. What makes some people feel it's a dangerous piece of legislation, and what are its potential benefits?

You've probably heard of the hacktivist group known as Anonymous, but do you really know what motivates the group’s actions or how members organize their initiatives?

The Protect IP Act has the seemingly simple and noble goal of stopping electronic piracy. But its foes say the bill is fundamentally flawed. What would the new law do and how would it work?

The entertainment industry has tried to stop people from making digital copies of its work, but in 2011, they enlisted the help of the U.S. government. What is the Stop Online Piracy Act and what would it achieve?

There are some computer programs that can monitor your Internet viewing habits for commercial purposes. Learn how you can remove adware from your computer in this article.

Tracking copyrighted files online is a tricky business, but cutting-edge software has learned to recognize data unique to music and movie clips. You're also leaving digital traces of yourself all over the internet. How are these two things related?

No one should think of surfing the Internet without some kind of anti-virus software protection. Learn if there is any free anti-virus software in this article.

Hacking has become a more common problem, and the risk of identity theft is always increasing. Hackers have become infamous for their viruses and their ability to outsmart our password-protected secrets. Take a look at these hacking and computer pictures.

In 2009, President Barack Obama created a White House position -- the cybersecurity czar -- to oversee the nation's computer network safety. With so many other federal agencies focused on the same task, what exactly does the cybersecurity czar's job entail?

Biometrics provide a unique method of security that's virtually foolproof. Just scan a fingerprint or your retina and you're in. But what could happen if your personal information were stolen?

Millions of people around the world have personal profiles on social networking sites. But when those people pass away, what happens to all that personal information they put online?

What does it take to cripple a nation? Someone with solid computer skills, for a start. Nefarious hackers wield a lot of power with a few keystrokes, and the United States is taking action.

We all get spam e-mail messages that tell us to follow a link. But that link could download a Trojan horse. What is it, and how is it different from a virus?

Where you go on the Web is your own business. Without an administrator's password, no one should be able to take control of your computer. At least, that's what you've been told.

Sometimes it seems like no matter what Internet community you join, someone's trying to drive you crazy. Are they just annoying, or are they doing it on purpose?

Hackers can disable digital infrastructure in minutes. Is it only a matter of time before countries attack one another's computers? Or have they already started?

You can get some great deals on online auction sites. But do you know where the items originally came from? You might be buying from an eFence.

Most computer-savvy people know about viruses and how to prevent an infection. But what are some of the most destructive viruses of all time, the record-smasher server-crashers?

People traveling to the United States have grown accustomed to tight security. But can the government really take your laptop and keep it indefinitely?

Are you a computer? If you've ever successfully filled in a CAPTCHA on the Web, you're probably not. So what is this test, and what does it do?

Digital signatures make sure the documents you send electronically are authentic. Learn about digital signatures and other authentication methods.

Information technology and trade laws interact to let us purchase goods from faraway companies safely. Learn about information technology and trade laws.

The United States government is pretty much on your side when it comes to Internet browsing freedom. But some circumstances merit Big Brother's watchful eyes.

Could your e-mail be used against you in a court of law? Maybe. Computer forensics searches, preserves and analyzes information on computer systems for potential evidence in a trial.

Internet censors range from parents and employers to national governments. They block access to the Web pages they identify as undesirable.