SECURITY ARTICLES




Can My Employer Monitor My Work Computer At Home?

Your employer has access to technology and legal authority to view your work computer while working from home.
Author: Geek Computer
Monday, May 24, 2021



How to Check If an Email Is Legit?

It’s crucial for you to check if an email is legit or not as cybercriminals are continuously looking for opportunities to steal your valuable information by sending phishing emails.
Author: Geek Computer
Tuesday, May 25, 2021



What types of cyber-attacks and how to prevent them?

Cyber attacks are here to stay as long as the internet exists. In this article, we will give you the best tips on how to avoid each attack.
Author: Geek Computer
Friday, June 4, 2021



Does private browsing actually work?

Private browsing works by simply blocking your browser from tracking your online activity whenever it is activated. For instance, when browsing privately, your browser will not save your browsing history.
Author: Geek Computer
Thursday, June 10, 2021



Can You Get a Keylogger Just by Visiting a Website?

A keylogger can get installed into your computer in a matter of a few seconds by visiting an infected website. Learn how these malicious programs work and how you can protect yourself.
Author: Geek Computer
Tuesday, June 22, 2021



What Is End-to-End Encryption in Messenger?

End-to-end encryption, in simple terms, is encrypting or scrambling messages in such a way that they cannot be decrypted unless by the recipient. So the recipient receives the message in an encrypted form and decrypts it.
Author: Geek Computer
Tuesday, June 22, 2021



Cyberstalking and How to Protect Yourself From Identity Theft

Cyberstalking is a type of online harassment where a stalker carries out unwanted, persistent, and often obsessive behavior over email, online media, and mobile technology.
Author: Geek Computer
Wednesday, July 7, 2021



Computer Repair: How to Detect Crypto Mining Malware

On average, cryptojacking victims report abnormally high CPU usage, slow running computer, hot computer fan, server overload, and a shortened battery life. These crypto mining malware are hard to detect in a system as they are designed to run
Author: Geek Computer
Monday, July 19, 2021



Unlock PDF: How to Remove a Password From a PDF File

pThere are three ways using Acrobat DC Google Chrome or password recovery programs However though each has its own limitations and power Depending on the restrictions on your PDF file each of the named methods can remove passwords at a certain levelp
Author: Geek Computer
Wednesday, September 15, 2021



What is HTTPs, and Why Should I Care about it?

pThere are two types of protocols between a web server and a web browser that is HTTP and HTTPs The HTTPs protocol is the secured version of the two while HTTP is unsecuredppA secured protocol means that the sessions between the web browser you are u
Author: Geek Computer
Wednesday, October 20, 2021

ver: 20230928T144131