The Cyber Cops
Uncomplicating Technology: Clear, Concise, Connected.
About
The Cyber Cops Project
Authors
Contributions
Basics
What is a Computer?
History of Computers
How Computer works?
Computer Hardware
Software
Memory Units
File Systems
USB – Universal Serial Bus
Binary Number System
Data Storage on a Computer
Hexadecimal Number System
Amateur Radio (HAM Radio)
Operating System
What is an Operating System?
Virtual Machines
Microsoft Windows
Linux
macOS and beyond
Other Operating Systems
Internet
Basics>
What is Internet?
How internet works?
Network Types – LAN/WAN/MAN/PAN
How a website works
HTTP Cookie
Net Neutrality
Is Internet Secure?
Cloud Computing
Mobile Telephony
Search Engine
Accessing Internet Securely
Advanced>
Network addressing
Deep/Dark Web
P2P Networks
VPN (Virtual Private Network)
VoIP – Voice over Internet Protocol
Protocols>
Transmission Control Protocol (TCP)
Internet Protocol (IP) – IP v4 & IP v6
User Datagram Protocol (UDP)
HTTP vs HTTPS
Dynamic Host Configuration Protocol (DHCP)
Domain Name System (DNS) Protocol
POP, IMAP and SMTP
File Transfer Protocol (FTP)
Privacy>
What is Internet Privacy?
Is Internet Privacy Important?
Private Browsing
Proxy Server & Proxy Website
Internet Privacy Tips
Email>
What is Email?
How Email Works
Email Security
Cybersecurity
Basics>
What is Cybersecurity
Important cybersecurity concepts every beginner should know
Security Threats and Security software
Choosing Strong Passwords
2FA – Two Factor Authentication
Password Managers
Software Updates & Cybersecurity
Biometrics
File and System Backup
Cracked Software
Advanced>
Delete Data Securely
Metadata
Encryption
Full Disk Encryption
Public Key Cryptography
Hash
Digital Signature
Pretty Good Privacy (PGP)
Cybercrime>
What is a Cybercrime?
Avoiding Cybercrime>
ATM/Credit/Debit Card >
Fake Bank Manager
ATM Skimming
ATM/Debit/Credit Card Swap
Instructions Regarding ATM/Debit/Credit Card
Social Media >
Fake Account
Social Media Guidelines
Financial Frauds >
Nigerian Frauds
Online Lottery
Money Order Bride
Travel Scam
Job Scam
SMS Scam
Overpayment Scam
Hitman Scam
Other >
Phishing
Cyber Bullying
Social Media >
What is Social Media?
Benefits of Social Media
Drawbacks of Social Media
Is Social Media worth it?
Advanced
Artificial Intelligence/ Machine Learning>
What is it?
Deepfake
3D Printing
Blockchain
Cryptocurrency
IoT – Internet of Things
Virtual Reality
Self Driving Cars
Radio Frequency identification (RFID)
Steganography
Digital Forensics>
What is Digital Forensics?
Digital Forensics Procedure
List all Posts
The Cyber Cops
deputy superintendent of police
About
The Cyber Cops Project
Authors
Contributions
Basics
What is a Computer?
History of Computers
How Computer works?
Computer Hardware
Software
Memory Units
File Systems
USB – Universal Serial Bus
Binary Number System
Data Storage on a Computer
Hexadecimal Number System
Amateur Radio (HAM Radio)
Operating System
What is an Operating System?
Virtual Machines
Microsoft Windows
Linux
macOS and beyond
Other Operating Systems
Internet
Basics>
What is Internet?
How internet works?
Network Types – LAN/WAN/MAN/PAN
How a website works
HTTP Cookie
Net Neutrality
Is Internet Secure?
Cloud Computing
Mobile Telephony
Search Engine
Accessing Internet Securely
Advanced>
Network addressing
Deep/Dark Web
P2P Networks
VPN (Virtual Private Network)
VoIP – Voice over Internet Protocol
Protocols>
Transmission Control Protocol (TCP)
Internet Protocol (IP) – IP v4 & IP v6
User Datagram Protocol (UDP)
HTTP vs HTTPS
Dynamic Host Configuration Protocol (DHCP)
Domain Name System (DNS) Protocol
POP, IMAP and SMTP
File Transfer Protocol (FTP)
Privacy>
What is Internet Privacy?
Is Internet Privacy Important?
Private Browsing
Proxy Server & Proxy Website
Internet Privacy Tips
Email>
What is Email?
How Email Works
Email Security
Cybersecurity
Basics>
What is Cybersecurity
Important cybersecurity concepts every beginner should know
Security Threats and Security software
Choosing Strong Passwords
2FA – Two Factor Authentication
Password Managers
Software Updates & Cybersecurity
Biometrics
File and System Backup
Cracked Software
Advanced>
Delete Data Securely
Metadata
Encryption
Full Disk Encryption
Public Key Cryptography
Hash
Digital Signature
Pretty Good Privacy (PGP)
Cybercrime>
What is a Cybercrime?
Avoiding Cybercrime>
ATM/Credit/Debit Card >
Social Media >
Financial Frauds >
Other >
Social Media >
What is Social Media?
Benefits of Social Media
Drawbacks of Social Media
Is Social Media worth it?
Advanced
Artificial Intelligence/ Machine Learning>
What is it?
Deepfake
3D Printing
Blockchain
Cryptocurrency
IoT – Internet of Things
Virtual Reality
Self Driving Cars
Radio Frequency identification (RFID)
Steganography
Digital Forensics>
What is Digital Forensics?
Digital Forensics Procedure
List all Posts