Other
Pcstats.com: Beginners Guides: Home Networking and File Sharing
This site contains information about establishing and maintaining a secure home computer network, with an emphasis on Windows-based operation systems.
Other
The Honeynet Project: Know Your Enemy Phishing
This site contains information about the tools, tactics and techniques used by phishing scams.
Other
Anti Spyware Coalition
This site contains industry and educational accepted spyware definitions and best practices, and includes a document listing and newsroom.
Get Safe Online
Get Safe Online: Viruses and Spyware
If a computer is connected to the internet and is not protected from computer viruses and spyware, then it is only a matter of time before the computer is infected. This article describes the symptoms of an infected computer and the...
Other
Yahoo!: Security Center Protect Your Pc
This site contains tips for protecting computers against spyware.
Federal Trade Commission
On Guard Online: Malware
This site contains practical tips for dealing with spyware malware including clues indicating that malware is present on a computer.
Get Safe Online
Get Safe Online: Using Microsoft Windows Vista Safely
Microsoft Windows Vista is an operating system for personal computers that was introduced in 2005. This site provides some tips on how to make a Vista installation safe and secure.
Get Safe Online
Get Safe Online: Use a Firewall
Firewall software forms the first line of defense against hackers and certain types of computer viruses. This site explains what a firewall can do to help secure a computer and what it cannot do. The site also discusses different types...
Other
Spyware Warrior
This site includes anti-spyware comparisons, spyware forums and other anti-spyware resources.
Other
Symantec: Steganography Revealed
This article provides an overview of steganography as well as steganographic tools and techniques.
Get Safe Online
Get Safe Online: Videos
There are many security threats today associated with internet use. This site presents some online videos that discuss security issues such as online rip-off schemes, protecting privacy, and protecting your computer from online attacks.
Other
Spyware Guide: Spyware, Greynets, Privacy, Botnets, Rootkits, Security
This site contains a listing of a variety of spyware, adware and greynet applications and their behaviors.
Khan Academy
Khan Academy: Symmetric Encryption Techniques
Learn how symmetric encryption techniques help protect computer data.
Khan Academy
Khan Academy: The Need for Encryption
Find out why we need to encrypt computer data to avoid hackers.
Khan Academy
Khan Academy: Phishing Attacks
Find out what phishing attacks are and how to avoid them.
Goodwill
Gcf Global: Internet Safety: Wi Fi Security
Learn tips and information about securing wireless internet networks.
Khan Academy
Khan Academy: User Authentication Methods
Some practice problems on user authentication methods regarding computer security.
Khan Academy
Khan Academy: Multi Factor Authentication
Find out about the security of the most common form of authentication, multi-factor authentication.
Other
Commonwealth of Australia: How to Protect Your Business From Cyber Threats
Learn some tips and suggestions to protect computers from cyber threats.
Other
Department of Homeland Security: Protect Myself From Cyber Attacks
Use these steps to help devise a solution to counter a cyber attack.
Khan Academy
Khan Academy: Computer Malware
Learn abou9t the types of malware and how to protect computers from malware.
Wikimedia
Wikipedia: Computer Security
This site contains a Wikipedia description of computer security.
Wikimedia
Wikipedia: Software Cracking
This site contains a Wikipedia description of software cracking.