Saturday, December 31, 2005
Spyware From Hell Part 4: Avoid Spyaxe!
See my full story at Spyware From Hell Part 4: Avoid Spyaxe!
Tuesday, December 13, 2005
HTML - Do We Need To Learn It?
By Michael Russell
In this article I am going to answer the question as to whether or not we need to learn HTML. This rather long answer will surprise you, but hopefully by the article's end you will understand why. See, this isn't an easy question to answer and there are many points of view.
See the full article at HTML - Do We Need To Learn It?
10 Simple Ways To Speed Up Windows XP
I've just finished setting up a new PC for a friend and I think some of you will be interested in some of the tweaks I make to all of my PCs to make them just a little bit quicker. I've focused here on the ones which are simple to do and won't cause problems if you get it wrong, rather than listing registry tweaks etc.
See the full article at 10 Simple Ways To Speed Up Windows XP
Monday, December 12, 2005
An Overview Of The Blackberry
By Colin P
Unless you have spent part of the past few years in a cave or under a rock, you have heard of the Blackberry. However, and with that said, even though you may have heard of the Blackberry, you may not know exactly what a Blackberry is in essence. Therefore, this article has been prepared to provide you with some basic information about the Blackberry.
See the full article at An Overview Of The Blackberry
Antispyware Or Spyware?
By Kwan Lo
Spyware has become the most prominent computer security problem. How do you choose a good spyware removal tool? Beware of antispyware software which installs spyware/adware to your computer.
See the full article at Antispyware Or Spyware?
Sunday, December 11, 2005
Wireless - The Future Of Connecting To The Internet
What is WiFi?
Wifi or Wireless Fidelity, allows you to connect to the internet from virtually anywhere at speeds of up to 54Mbps. WiFi enabled computers and handsets use radio technologies based on the IEEE 802.11 standard to send and receive data anywhere within the range of a base station. Wireless is a technology that's inexpensive, easy to use, and practical and yet...
See the full article at Wireless - The Future Of Connecting To The Internet
Friday, December 9, 2005
Understanding The Broadband Service In The 21st Century
If you are contemplating broadband service for your Internet connection, you may have a general idea as to what is involved in broadband service. However, with that said, you actually may understand very little about broadband Internet service.
See the full article at Understanding The Broadband Service In The 21st Century
Wednesday, November 30, 2005
Why Ewido Security Suite is the Anti-Spyware of Choice
See the full article at Why Ewido Security Suite is the Anti-Spyware of Choice
Sunday, November 27, 2005
Preparation Tips For Comptia A+ Certification
* Core Hardware: $153 - min. passing score 515
* Operating Systems Technology: $153 - min. passing score 505
See the full article at Preparation Tips For Comptia A+ Certification
Saturday, November 26, 2005
Be nice to your sysadmins, they know things about you
A funny song that sings the praises of System Administrators. Written by Wes Borg and Three Dead Trolls in a Baggie (deadtroll.com).
Sunday, November 20, 2005
Wednesday, November 16, 2005
How Spyware Blaster Can Protect Your Computer From Harm
By browsing a web page, you could infect your computer with spy ware, ad ware, dialers and hijackers. These, unwelcome guests, are some of the fastest growing threats on the Internet today. It is important to protect your computer and one of the most powerful software products, available for this, is Spy ware Blaster, a program created by Java cool.
See the full article at How Spyware Blaster Can Protect Your Computer From Harm.
Monday, November 14, 2005
Building a Smoothwall: How to Build a FREE Snort IDS Device enabled Firewall
Smoothwall Express, or Smoothie as some users like to call it, is based on the latest Linux 2.6 kernel...
See the full article at Building a Smoothwall: How to Build a FREE Snort IDS Device enabled Firewall
Sunday, November 13, 2005
Katrina Scams Move online
Hurricane Katrina has set off a wave of online phishing and other scams that try to capitalize on the emotional response of Americans to the disaster, security experts warned...
See the full article at Katrina Scams Move online
Phishing, Fraudulent, and Malicious Websites
Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living.
See the full article at Phishing, Fraudulent, and Malicious Websites
Phishing-Based Scams: A Couple of New Ones
Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp.
See the full article at Phishing-Based Scams: A Couple of New Ones
3 Pervasive Phishing Scams
Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones.
See the full article at 3 Pervasive Phishing Scams
Saturday, November 12, 2005
Network Security - All About Firewalls
The Importance of Firewalls to Network Security
Most networks should have a firewall in place before they are up and running. A firewall is the most common form of network security employed by companies large and small. If you own a personal computer your anti-virus software company may at one time or another have offered you firewall protection.
A firewall on a home network is....
See the full article at Network Security - All About Firewalls
Network Security - Little Known Threats
Little Known Network Security Threats
There are a number of common network security threats that can damage your network. Some prime examples include remote login capability, SMTP hijacking and backdoor entry to a computer network.
See the full article at Network Security - Little Known Threats
Network Security 101
As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. It is important to protect your network and ensure the safety of all computers and users in that network.
See the full article at Network Security 101
How To Remove Winfixer 2005 Plus Unwanted Spyware And Adware
Spyware and adware is advertising supported software that allows its publishers to snoop on a computer user's internet activity.
See the full article at How To Remove Winfixer 2005 Plus Unwanted Spyware And Adware
Sunday, November 6, 2005
Adware: Why is it Different?
Advertising supported software, which has come to be more commonly referred to as adware, is a computer program and/or package of software under which advertisements or other marketing material are included or are just loaded automatically and played back to you over and over again after they install themselves.
See the full article at Adware: Why is it Different?
Friday, November 4, 2005
Should You Build Your Own PC?
Many people are intimidated by the inside of a computer case. At first glance all those wires and components look confusing and impossibly high-tech. The thought of actually putting all the parts together may seem impossible.
See the full article at Should You Build Your Own PC?
Tuesday, November 1, 2005
Four Ways To Eliminate Spam
The CAN-SPAM Act of 2003 was supposed to eliminate spam email. This federal spam law that became effective January 1, 2004, was passed by Congress to get rid of junk email.
See the full article at Four Ways To Eliminate Spam
Friday, October 28, 2005
What's a Root Kit and How Hackers Are Getting Into Your Computer With It
A root kit is a set of tools used by an intruder after cracking a computer system. These tools can help the attacker maintain his or her access to the system and use it for malicious purposes. Root kits exist for a variety of operating systems such as...
See the full article at What's a Root Kit and How Hackers Are Getting Into Your Computer With It
Wednesday, October 26, 2005
Protecting Yourself Against Spyware
Spyware is a category of malicious software that secretly obtains information about a computer user's and sends it to a third party without the user's consent. For example, a piece of spyware running on an infected computer can obtain the user's bank account number when online banking, user's username and password when online trading or the user's credit card number when shopping online...
See the full article Protecting Yourself Against Spyware
Thursday, October 20, 2005
Spyware From Hell, Part 3
In parts 1 and 2 I discussed the programs to use to remove spyware. But, the first thing you should do when attempting to remove spyware is to look at all the processes that are running. You can look at the task manager, if you see funky named processes in there like fgthdz or kwsbrl, it's a good bet spyware has taken over your computer. More than likely attempting to stop those processes will fail. If you're using Windows XP, ME, or 98, you can run the msconfig utility from the command line and see what is in the startup folder. Be careful what you uncheck, such as your antivirus software. Once you deselect the bad processes, restart the computer. Hopefully, some of the bad stuff will not start, and free up needed resources. You may even find that some applications or devices may suddenly start to work.
See the full article... Spyware From Hell, Part 3
Wednesday, October 19, 2005
Spyware From Hell, Part 2
Ok, my buddy at work wasn't happy with me cause I dis'd the Yankees in my last post. I'm a long time Orioles fan, there hasn't been much to cheer about for a few years. My buddy's from NYC, so I can't really hold it against him for being a Yankees fan. In spite of that flaw, he's a good friend and a great bowler. By all accounts you would think we really hate the very companies that make the products we spend all day fixing. It's frustrating, for sure. In the end, if the big guys started making perfect products, I'd have to take a greeters job at Wal-Mart. I don't think that's likely to happen anytime soon. Unless Microsoft builds a brand new operating system, from the ground up, with a new core, a write protected registry, and a browser that is stable and doesn't leak, chances are I'll have a job well past retirement.
See the full article... Spyware From Hell, Part 2
Tuesday, October 18, 2005
Spyware From Hell
Hello fellow bloggers. Keeping up with this is sometimes more work than fun. With work and family commitments, looking for something unique to write about on a regular basis can be trying. But let's see, what's interesting that happened recently? Last week was pretty good, the Yankees got eliminated, and the Redskins lost. I've been working on some friends computers, trying to remove spyware and such. What a mess! The conventional tools and methods are just not working. Apparently there is a new wave spyware on the horizon, and once it gets on your machine you won't be able to remove it short of reloading the operating system. Two of the sites I frequent for spyware removal help are www.spywareinfo.com and www.pchell.com, these guys have seen it all.
See the full article... Spyware From Hell
Monday, October 17, 2005
Ford Parts Dealer Stays Attuned To Ford's Superior Standards
Ford vehicles have always been loved for their technologically advanced powertrain and suspension components, sturdy body parts, solid construction, superb design and high quality interior auto parts. In the truck and SUV segment, Ford has particularly established a highly respectable name through its top-notch vehicles such as the Ford Escape, the best-selling small SUV; Ford F-150, the best-selling pickup truck for 28 years now; Ford Ranger, America's best-selling compact pickup; and Ford Escape Hybrid, the first full hybrid SUV in the world.
See the full article... Ford Parts Dealer Stays Attuned To Ford's Superior Standards
Beware of The Jury Duty Scam
The jury duty scam is the newest type of identity theft scammers are using to get your personal information. This is a new twist on identity theft, and you should be aware of it so you can avoid becoming a new victim.
See the full article... Beware of The Jury Duty Scam
Protect your Computer and Internet Privacy
It's a known fact that every time you open a browser to view a web page, order something online, or read your email in a web based viewer that information is stored on your computer for later use. Whether you are viewing the weather online, reading sports, catching up on the latest world news or viewing something a little more private, all that information is stored in your computer. Windows operating systems store all this material in what are called Temporary Internet Files or cache. Web pages may store bits of information about who you are when you visit web sites in files called cookies on your computer. Your web browser will store a list of web sites you've visited and places you've gone in a history file in your computer. Even if you are not online, programs will store histories of the files you've opened, played, or viewed.
See the full article... Protect your Computer and Internet Privacy
Sunday, October 16, 2005
The Myths And Magic Of Ebay Drop-Shipping Vendors
If you’ve never heard of drop shipping, then prepare to be impressed – it sounds like every eBay seller’s dream. With drop shipping, you don’t have to keep any stock at all. You simply list auctions for what your drop shipper sells, without actually seeing it yourself.
See the full article... The Myths And Magic Of Ebay Drop-Shipping Vendors