Error message

  • Warning: file_get_contents(http://survival.tacticaltech.org/sites/survival.tacticaltech.org/themes/survival/templates/splash.php): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in include() (line 88 of /srv/d7/sites/survival.tacticaltech.org/themes/survival/templates/page.tpl.php).
  • Notice: Undefined variable: hide_site_name in include() (line 100 of /srv/d7/sites/survival.tacticaltech.org/themes/survival/templates/page.tpl.php).
  • Notice: Undefined variable: hide_site_name in include() (line 104 of /srv/d7/sites/survival.tacticaltech.org/themes/survival/templates/page.tpl.php).
  • Notice: Undefined variable: hide_site_slogan in include() (line 117 of /srv/d7/sites/survival.tacticaltech.org/themes/survival/templates/page.tpl.php).

security

Computer viruses

If you use a computer, the sad fact is that you need to know about computer viruses. There are many different ways to classify viruses, each with its own set of colourfully named categories. Worms, macroviruses, trojans and backdoors are some of the more well-known examples. Many of these viruses spread over the internet using email, malicious webpages or other means to infect unprotected computers.

FAQs: Password and encryption

Should I protect my computer with a password?

Tip: Passwords

1. Pick one really easy password and use it only for nuisance logins - those sites where you know you won't really care if someone gets hold of your account. Yes, someone could steal your password - but what are they going to do with it? If you’re worried about protecting your privacy, use a better password, but if you aren't, use the same plain word over and over again and don't think twice about it. Good examples of nuisance logins are:

Keeping your computer and data safe 

Any connection in to your computer can be a source of vulnerability: your office or home network, the internet, a USB flash drive or even someone who has just walked into your office.

Assess your risks

FAQs: Software applications

If I am using pirated software, are there any steps I can take to protect myself?

Pages

Subscribe to RSS - security