One of your Windows 7 systems appears to be infected with malware that is causing a Windows STOP error (BSOD) just after login. Which of these troubleshooting tasks would be the best next step?
There are many technologies that we can use to combat malware on our computers. In this video, you’ll learn about the best practices for anti-virus, anti-spyware, anti-spam, pop-up blockers, and host-based firewalls.
Today’s generation of botnets have provided the bad guys with lots of money and access to millions of Internet-connected computers.
Rootkits are extremely nasty, especially since they make themselves invisible to the operating system. In this video, you’ll learn about rootkits and how you can find and remove these stealthy pieces of malware.
Trojans are the sneakiest of computer attacks, and they often leave backdoors open for other malware to use. In this video, you’ll learn about Trojans and backdoors, and we’ll infect one of our own computers to show you how they work.
Adware and spyware are one of the most common malware types. In this video, you’ll learn about adware, how spyware works, and the motivation for the bad guys to infest your computer with adware and spyware.
Malware has become a significant issue for Windows-based computers. In this video, you’ll get an overview of malware, learn about the different types of malware, and learn how malware manages to infect our PCs.
Man-in-the-middle attacks are challenging to protect against. In this video, you’ll learn about man-in-the-middle attacks and we’ll show you a live attack using ARP poisoning.
You’ve discovered that one of your computers at work has been infected with malware. Which of these options would provide the most effective removal of the spyware?
Viruses and malware can cripple a computer and cause significant downtime while the system is cleaned. In this video, you’ll learn how to identify malware, quarantine a computer, remediate the infected system, maintain anti-virus software, and much more.