AI News, Difference between revisions of "Basic Computer Security/Introduction"

Difference between revisions of "Basic Computer Security/Introduction"

The aim of this book is to instruct the reader on numerous topics of computer security such as passwords, privacy, encryption, and networking.

This book is written for a reader with little to no previous knowledge of security issues, but one who is familiar with the basic functionality of his or her computer's operating system.

Reading this book should give you a basic understanding of the processes needed to secure your home computer and home network, as well as protect your privacy and data on the web.

16px (Also visible on the top right of the page.) This feature will facilitate returning to the index to move on to the next section, to return to this introduction, or to re-orient yourself if you click on a link and find yourself lost.

short word of warning before we begin: Any book on the subject of security is likely to enlighten the reader on a variety of nasty things that could potentially happen to him or her.

It is our hope that by reading this book you will learn more about the world around you and gain valuable knowledge and understanding that will help you protect yourself, your privacy, and your information.

While these are probably not the best place to start learning about security, you may find them useful or interesting after you have become more familiar with some of the basics.

Bitcoin Q&A: Full node and home network security

Does running a Bitcoin and Lightning node at home attract hackers? Why is security through obscurity not the best strategy? What is some general advice on ...

Windows 10 (Beginners Guide) 2018

The Windows 10 operating system has been out for more than a couple years now. I still get questions on how to perform certain tasks and which settings to use ...

The Complete Ethical Hacking Course: Beginner to Advanced!

Get the complete hacking bundle! Additional FREE resources

Windows 7: FULL TUTORIAL (Basics)

Are you new to Windows 7 and want to learn how to navigate the operating system? In this tutorial, David will show you the ins and outs of Windows 7 (designed ...

Computer Security / Privacy Cloud Computing: Digital Business with Unisys Chief Trust Officer (#238)

Security is on everyone's mind today, so corporations and the government must consider how to create secure systems while maintaining usability and customer ...

Bitcoin Q&A: Coin selection and privacy

How do coin selection algorithms work? What is STONEWALL and Ricochet? How did Samourai become one of the most privacy-preserving wallets? How much ...

Is Your CPU Spying On You?

Turns out all modern CPUs have backdoors built right into them. More Tech Discussions ...

Liquid Sand Hot Tub- Fluidized air bed

Water filled hot tubs are soooo 2016. Go to and use promo code "MarkRober" for $50 off any mattress. They're super dope

USENIX Enigma 2016 - Computer Security and the Internet of Things

Tadayoshi Kohno, Short-Dooley Professor of Computer Science & Engineering, University of Washington Computers are now integrating into everyday objects, ...

Internet Safety for Kids K-3

Internet safety for kids is a topic getting much attention because children are being exposed to the Internet at a younger and younger age. IUP Communications ...