Connectivity at home and away
What type of laptop communication interface allows you to communicate to the Internet from nearly any remote location?
What type of laptop communication interface allows you to communicate to the Internet from nearly any remote location?
What kind of device can you add to your laptop to provide a modular connection to your desktop keyboard, mouse, and other peripherals?
You want to upgrade the video on your new computer to the fastest possible speed available. What type of adapter card interface would you expect to find on this new video adapter?
One of your customers is looking for a MIDI-to-USB interface for her new laptop computer. What is she probably connecting to her PC?
You’re reading through the specifications for an LCD monitor, and you see a reference to “candela.” What is usually referenced with this metric?
Today’s generation of botnets have provided the bad guys with lots of money and access to millions of Internet-connected computers.
A logic bomb is not only quite stealthy, but the resulting digital explosion can cause massive damage to your infrastructure.
Rootkits are extremely nasty, especially since they make themselves invisible to the operating system. In this video, you’ll learn about rootkits and how you can find and remove these stealthy pieces of malware.
Trojans are the sneakiest of computer attacks, and they often leave backdoors open for other malware to use. In this video, you’ll learn about Trojans and backdoors, and we’ll infect one of our own computers to show you how they work.
CompTIA Security+ SY0-301: 3.1 – Trojans and Backdoors Read More »
Viruses and worms have been a significant security challenge on our personal computers for years. In this video, you’ll learn about the differences between computer viruses and worms, and you’ll learn how the Conficker worm manages to spread so easily between systems.
CompTIA Security+ SY0-301: 3.1 – Viruses and Worms Read More »