Blogs
Firewall Control and Management
Many people are aware of the benefits firewalls provide for computer security and protection, but they often run into problems when they begin to use and configure their firewalls on their personal computers. A firewall is a software or hardware protocol for managing and restricting internet traffic. When installed, it keeps certain programs and internet […]
5 Largest Security Threats
The internet has made it possible for people to stay connected to their friends and family, to access information almost instantly, and to conduct business without ever leaving their home or office. In a way, the internet has made the world a much smaller and convenient place. Unfortunately, along with the luxuries of the World […]
Why a Secure Password is Essential
When dealing with a website, there are many security aspects which should be taken into consideration. One which is perhaps the most well known but also the least understood is the use of a username and password. Choosing a thoroughly unique strong login password is essential for site security and is one of the easiest […]
The Ten Most Harmful Viruses of the Decade
I Love You (2001) Also known as the LoveLetter, it infected millions of computers within one night. It arrived in Windows users’ inboxes with the subject line “ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.TXT.VBS.” Upon opening, the attachment sent itself to fifty email addresses in the user’s Windows Address Book and overwrote files with a copy of […]
Spyware: Symptoms and Behavior
Spyware symptoms and behavior are relatively easy to detect. The symptoms and behavior of spyware can affect the computer’s performance and cause long-term damage, if not properly dealt with. There are some things one can look for to determine if a PC has been infected with spyware. Browsing experience changes An additional browser tool is […]
What is Spyware?
The term spyware covers a broad array of malicious software programs that are designed to collect information about how a person uses their computer. The type of information gathered by spyware programs can vary from fairly benign data like commonly visited websites to personal information like account passwords and credit card numbers. Adware Adware is […]
Stealware – How Stealware is Used to Steal Your Revenue
Merchant affiliates should be aware that the integrity of their affiliate program can be compromised by stealware. Stealware can be used by individuals and corporations to replace cookies and affiliate links on a web site so that commissions are directed to the owner of the stealware instead of the owner of the site. This will […]
Hacking your Dial-Up
This article will explain what Dialer Software is and how it is used to steal money from a user by taking over their Dial-Up internet. The article will also give details of simple ways to prevent or monitor fraudulent dialing behaviors. Dialer software is a computer program designed to connect to the internet or to […]
Won’t Download
Most of the time, when you click on a link on the internet to download something, such as a document, a picture, a song, or a video, things work as planned: the file begins to download. However, there are often times when, no matter how much you click on a link, you just can’t get […]
Internet Privacy and Anonymity
The United States is a country that was founded on freedom of expression. This doesn’t mean, however, that we can say whatever we want without consequences. Or does it? Since the advent of the Internet, you’ve been able to post in newsgroups, forums, blogs, and the comments sections of various websites with complete anonymity––behind a […]