WELL COME TO MalgareeSwabiwal.com... Home of District Swabi.. Informatioal and Entertainment Site...:Creating Backup and Recovery Plan,Backup Tips .ATM Tips,Hardware Tips,Microsoft Office Tips,Mobile Tips,Networking Tips,PC buying Tips,Windows Instalations,Backup Tips,Bluetooth Technology,Computer Security,Digital Vedio,GPRS Tips,Information Technology,Internet Tips,Laptop Tips and Tricks,Messaging Guide,Mobile phone ,viruses Tips,MP3 Guide,Printer Tips,Registry Tricks,Satellite TV Tips,Scanner Tips,Scanning Tips,.>>




ATM Tips
Hardware Tips
Microsoft Office Tips
Mobile Tips
Networking Tips
PC buying Tips
Windows Instalations
Backup Tips
Bluetooth Technology
Computer Security
Digital Vedio
Information Technology
Internet Tips
Laptop Tips and Tricks
Messaging Guide
Mobile phone viruses
MP3 Guide
Printer Tips
Registry Tricks

Satellite TV Tips
Scanner Tips
Scanning Tips
Signal Tips
Tips about DSL Filters
Tips on buying  mobile
Mobile Maintenance
USB Tips
WAN Tips
Web cam Tips
What is DSL
The Paging System
Windows Tips and Tricks
Wireless Headset Tips
Wireless Hub Tips
Wireless Keyboard Tips
Wireless Mouse Tips
Wireless Printer Tips
Wireless Router Tips
More Tipes







Computer Security



Computer Security
Computer security or Home Computer Security is the effort
to create a secure computing platform, designed so that
agents (users or programs) can only perform actions that
have been allowed. This involves specifying and implementing
a security policy.

Home Computer Security is a effort to make a secure
computing platform for home users.
The actions in question can be reduced to operations of access,
modification and deletion. Computer security can be seen as a
subfield of security engineering, which looks at broader security
issues in addition to computer security.
Computer security is the process of preventing and detecting
unauthorized use of your computer. Prevention measures help
you to stop unauthorized users (also known as "intruders") from
accessing any part of your computer system.

Detection helps you to determine whether or not someone
attempted to break into your system, if they were successful,
and what they may have done.
We use computers for everything from banking and investing
to shopping and communicating with others through email or
chat programs. Although you may not consider your communications
"top secret," you probably do not want strangers reading your
email, using your computer to attack other systems, sending
forged email from your computer, or examining personal
information stored on your computer (such as financial statements).















Copyright 2007_2008 Malgareeswabiwal.com. All rights reserved.