Computer Security Systems

Computer security is an increasingly important consideration. From authentication to encryption keys, learn how to keep your computer's hard drive protected and your personal information safe.

Topics to Explore


Learn More / Page 3

10 Worst Computer Viruses of All Time

Most computer-savvy people know about viruses and how to prevent an infection. But what are some of the most destructive viruses of all time, the record-smasher server-crashers?

Can the government take away my laptop?

People traveling to the United States have grown accustomed to tight security. But can the government really take your laptop and keep it indefinitely?


Are you a computer? If you've ever successfully filled in a CAPTCHA on the Web, you're probably not. So what is this test, and what does it do?

What is a digital signature?

Digital signatures make sure the documents you send electronically are authentic. Learn about digital signatures and other authentication methods.

How does information technology work with trade laws?

Information technology and trade laws interact to let us purchase goods from faraway companies safely. Learn about information technology and trade laws.

How Computer Forensics Works

Could your e-mail be used against you in a court of law? Maybe. Computer forensics searches, preserves and analyzes information on computer systems for potential evidence in a trial.

How Internet Censorship Works

Internet censors range from parents and employers to national governments. They block access to the Web pages they identify as undesirable.

How E-mail Scams Work

E-mail scams are often well-disguised and can be very dangerous. Check out some examples of e-mail scams in this article.

How Hackers Work

Without hackers, we'd have no PCs or iPods. Yet, hackers have gotten a bad reputation as criminals of the computer age. Are they friends or foes?

How Online Fraud Alerts Work

As the famous cartoon has it, "On the internet, nobody knows you're a dog." Online fraud is one of the fastest-growing crimes -- so how can you protect yourself?

Is cyberbullying getting out of control?

With the evolution of the Internet, the big kid in class who used to steal your lunch money has evolved into a new kind of bully -- one who hacks your e-mail, sends you threatening messages and sabotages your computer.

How Zombie Computers Work

When hackers take over computers to do their Internet bidding, they create zombie computers. Allegedly, one hacker under investigation used a single computer to control a network of more than 1.5 million zombie computers.

Could hackers devastate the U.S. economy?

In "Live Free or Die Hard," Detective John McLane fights a group that carries out attacks using the Internet. Is it really possible for hackers to cause economic or physical devastation in the United States?

What's the problem with Microsoft Word?

How did hackers exploit four different "zero day" flaws in Microsoft Word? Find out what went wrong with Microsoft Word.

How does a logic bomb work?

Logic bombs can cripple a company's computer system and either reveal or destroy sensitive information. It's often a tool used by angry employees -- in the IT world, it has a reputation of being associated with "disgruntled employee syndrome."

How Phishing Works

Most people associate phishing with e-mail messages imitating banks or other businesses in an attempt to scam victims into revealing personal information. But e-mail messages are only one small piece of a phishing scam.

How Spyware Works

According to recent estimates, more than two-thirds of all PCs are infected with some kind of spyware. These programs track your Web habits and more. Is your computer doomed, or can you get rid of spyware?

How Fingerprint Scanners Work

Your fingerprints are not only unique; they're also very hard to fake and even harder to misplace. What better ID to use in a security system? Learn how fingerprint scanners know it's you.

Is your workplace tracking your computer activities?

If you're surfing the Internet at work, you may not be the only one who knows. Watching workers has become an industry unto itself. Find out exactly how companies are monitoring employees.

How does a security passcard work?

Security passcards are often used to gain entry into areas and buildings with restricted access. Find out what data is kept on an encoded security passcard and how they work.

How Encryption Works

The growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. But doing business online means there's a whole lot of information that we don't want other people to see. That's where encry

How Carnivore Worked

If George Orwell's book "1984" creeped you out, you'll want to read the facts about the FBI's Operation Carnivore. It gave agents the permission and technology to access to the online and e-mail activities of suspected criminals.

How Firewalls Work

Firewalls have helped protect computers in large companies for years. Now they're a critical component of home networks as well. What are they protecting you from?

How Internet Cookies Work

Cookies are widely used by Web sites to keep track of their visitors, but they can also provide a better user experience. Are cookies letting Big Brother into your PC?

Someone started controlling my computer over the Internet -- what happened?

Both BO and Netbus are Windows 95/98 applications designed to allow other people to access your machine over the Internet. But here's the kicker - you're the one installing it!