Phishing is the practice of using spam emails to fool people into revealing private information that can be used for identity theft. The typical phishing scam involves an email that looks like it was sent by a legitimate organization such as a bank, credit card company, or online store such as eBay or Paypal. The […]

Your web browser creates a folder on the hard drive where it saves (or “caches”) certain items that have been downloaded for future access. The browser often downloads images to this folder as you visit different websites. If you visit the same site more than once, the browser will check in this folder first to […]

A cookie is a small text file that is downloaded and saved to your hard drive when you visit a website. This text file contains information that can be read by the web server the next time you visit that same site. Cookies are used in a number of ways. One common use of cookies […]

A plugin is a piece of software that acts as an add-on to a web browser and gives the browser additional functionality. Plugins can allow a web browser to display additional content it was not originally designed to display. An example of a plugin is the free Macromedia Flash Player, a plugin that allows the […]

In order to protect your computer from being infected by a virus or other malicious program, you should have an anti-virus program installed. The computer at your school will probably already have this kind of program installed, but you need to keep it updated with the latest definition files for it to be effective. The […]

In order to be really sure who is sending you an email you will have to carefully examine the email headers. This is also a place you can look to catch spam emails. To view all the headers in Outlook 2003, open a message and then select View, Options. The Message Options dialog box will […]

Email is often used to distribute viruses and other malicious programs that can harm your computer. These programs are often distributed as attachments that will install the malicious application on your system when you click to open them. You may receive an email that appears to come from Microsoft or another legitimate source, including images […]

The typical phishing scam involves an email that looks like it was sent by a legitimate organization such as a bank, credit card company, or online store such as eBay or Paypal. The email usually claims your account has expired or needs to be updated, or it will be suspended or closed. The email invites […]

If you computer suddenly becomes slower, the problem may not be hardware related. Sometimes programs known as “spyware” may be running in the background and taking over system resources such as memory and network bandwidth. The term spyware refers to any program that is installed on your system without your permission. These programs are often […]

There are a few precautions you can take to ensure that your computer does not fall victim to viruses, spyware, and other security threats while you surf the Web: Use a Firewall – A firewall is a piece of software that monitors communication between your computer and the internet, and only allows certain types of […]

Bookmark and Share