1. Technology

Home, Wireless and Internet Network Security

As networks become an integral part of everyone's lives, advanced network security technologies are being developed to protect data and preserve privacy, especially Internet privacy.
  1. Wireless Network Security
  2. Proxy Servers / Lists
  3. VoIP Security
  4. Firewalls (16)
  5. Spyware / Malware (9)

Introduction to Computer Network Security
Guarding against just these few basic security risks will greatly increase peace of mind when using wireless and computer networks.

About.com Internet/Network Security
This Internet/Network Security site offers detailed professional coverage of books, current events and technology in the network security field.

What is a Hacker?
In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. Historically, hacking referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.

What Is a Keylogger?
A keylogger is a hardware device or software program that records the real time activity of a computer user including the keyboard keys they press. Keyloggers are used for network monitoring and troubleshooting, sometimes for malicious purposes.

Network Sniffers
Network sniffers monitor data without altering its content or impeding its flow. Sniffers are software tools commonly use by governments, corporations, hackers and students.

DoS - Denial of Service
Denial of Service (DoS) attacks are intended to disable networked systems by blocking or severly limiting access to them. DoS is almost always considered a malicious activity.

SSL - Secure Sockets Layer
Secure Sockets Layer (SSL) is a standard security technology for Web-based transactions.

Encryption - 40-bit and 128-bit Internet Security
What is the difference between 40-bit and 128-bit security? Learn about some basics of encryption and how this translates to more secure network communications.

Ping of Death
A popular form of network attack several years ago, the Ping of Death technique illustrates the importance of network security systems.

Nmap is an Open Source port scanner and network mapper utility often used for network security audits.

You can opt-out at any time. Please refer to our privacy policy for contact information.

Discuss in my forum

©2014 About.com. All rights reserved.