0

Interference filters - the solution of electromagnetic compatibility and information security problems

The problem of information security today is much bulkier, than direct opposition to unauthorized entry to the database and deliberately exposed outside stakeholders. In connection with the rapid development of microelectronics and the widespread introduction of the almost all modern technical means, in… Continue Reading

0

How to deal with malware

In this article, the author shares his experience in dealing with a number of malware, that appear on the Internet almost on a regular basis. "Banner-beggar" One of the first I "caught" malware 17 December 2009 city, Downloading books and programs. However, some sites are dumped… Continue Reading

0

A simple way to protect data on a PC

According to reports, appeared in the last few years, in the world of total surveillance is booming, collect personal information about almost all the inhabitants of the land. In this regard, it has become even more urgent file protection, stored in a computer, containing, For example, design, research papers, and… Continue Reading

0

Protecting mobile communication against wiretapping and tracking

Where does mobile telephones appeared spyware capabilities Today, few who have not heard about the tapping of cell phones programs. These spyware can hide the intercept your SMS-messages, to learn the essence of your phone conversations and even at any time to know your mestopolozhenie.Budte careful. Total… Continue Reading

0

Spyware for mobile phones, smartphones, communicators

The main "spy things" have now become mobile communications. Spyware can monitor the activity on the mobile device, is installed on. text messaging, dialed on the phone, incoming and outgoing calls with call duration, SMS, MMS, Email, any data, received or… Continue Reading