Custom Search

Safe Computing

Here you will find knowledge about how to safeguard your personal information on the internet, including your identity, password, privacy info, online activities, surfing habits, and personal computer resources. Also you will be introduced to information about malicious internet activities, such as scams and fraud, computer viruses, spyware, adware, keyloggers, trojan horse, etc.

1. Choose Good Passwords That You Can't Remember

You may have read articles about how to choose good passwords that is easy for you to remember but hard for hackers to guess. There is one problem with this approach...

2. How to protect your files and folders with highly secure encryption software

Have you ever wondered how you could safely protect a few folders and all files in these folders? You may have tried to zip these folders and files into one single file with password protection - let me tell you, there are better ways to do it. In this article, we'll go through the steps to encrypt your folders and files with free and open source encryption software TrueCrypt.

   Inside this article:
3. A MD5 checksum file generated by freeware FileCheckMD5

This is a MD5 checksum file created by freeware FileCheckMD5. This file is used to test data integrity of all files on a CD-ROM.

4. How to use freeware FileCheckMD5 to create a checkfile and verify data integrity of a CD burning process

This article shows you how to use freeware FileCheckMD5 to verify data integrity of a CD burning process. This applies to any other forms of file and folder backups and copies.

5. What is checksum and how to calculate and use checksum values

Checksum is a calculated value that is used to determine the integrity of data. The sender of the data calculates checksum value by taking the sum of the binary data transmitted. When receiving the data, the receiver can perform the same calculation on the data and compare it with the checksum value provided by the sender. If the two values match, the receiver has a high degree of confidence that the data was received correctly. Checksum value is also called hash value.

6. What is index.dat file and how your internet privacy is affected

Many internet users never even heard about the existence of index.dat file. After reading this article, you should become at least aware of the potential privacy issues this file could expose you to.

7. What is keylogger and the differences between software and hardware keylogger

Keyloggers are two-edged swords. They can be used for good and bad, depending on how people use them and what the purpose is. Equipping yourself with knowledge about keyloggers is the best way to stop the bad and utilize it for the good.

8. Protect Your Computer On the Internet For Free - 6 Essential Steps

Step-by-step essentials that you can easily follow to protect your computer on the Internet for free. The best part is that all the tools and software are available for 100% FREE.

9. Free Password Manager KeePass - a feature rich, free, very secure, and easy-to-use

KeePass is a free/open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk. So you only have to remember one single master password or insert the key-disk to unlock the whole database.

   Inside this article:
10. Do you manage your username and password wisely?

A few years back I used MS Excel to manage all my usernames and passwords. I thought I would just need to remember one password to open the Excel workbook and I would get all the information I needed. The idea was good but not secure enough.

11. Introduce Free Password Manager - Password Safe

Password Safe is a password database utility. It can keep track of unlimited number of usernames / passwords and allows you to safely and easily maintain them in a secured and encrypted file. A single Master Password unlocks them all for your use.

Copyright © 2017 All Rights Reserved.

This website is hosted by HostGator.

No portion may be reproduced without my written permission. Software and hardware names mentioned on this site are registered trademarks of their respective companies. Should any right be infringed, it is totally unintentional. Drop me an email and I will promptly and gladly rectify it.

Home | Feedback | Terms of Use | Privacy Policy