I thought I’d try something a little different I have always wondered what it would be like to shrink down to the size of an ant and walk around inside a computer system (without getting […]
Whaling is a specific kind of malicious hacking within the more general category of phishing, which involves hunting for data that can be used by the hacker. The targets are usually high-ranking bankers or executives. […]
Spam or junk email is the use of e-mail systems to send an unsolicited/unwanted message, especially advertising, as well as sending messages repeatedly on the same site. Spammers harvest recipient addresses from publicly accessible sources, […]
When researching for one’s PAT (Practical Assessment Task for Computer Applications Technology students), the date a document was last updated/modified is required to assess the validity of that information. However, what does one do when […]
Could a keystroke logger be hiding on your PC without you even knowing?
By Wayne Strydom About four years ago, our school embarked on its journey with tablets in the classroom. Initially it was a bring your own device scenario, meaning that any tablet device was allowed onto […]