Saturday, December 31, 2005

Spyware From Hell Part 4: Avoid Spyaxe!

I spent the last 2 days getting rid of this crap called Spyaxe. While Spyaxe (also known as Spaxe) claims to be a legitimate force in the war against spyware, malware, and viruses, it purposely infects computers or tricks people into thinking their computers are infected so they will buy their product. Their actions are criminal and they should be prosecuted, made to pay for all their damage, lost time, incidentals, etc.

See my full story at Spyware From Hell Part 4: Avoid Spyaxe!

Tuesday, December 13, 2005

HTML - Do We Need To Learn It?

By Michael Russell
In this article I am going to answer the question as to whether or not we need to learn HTML. This rather long answer will surprise you, but hopefully by the article's end you will understand why. See, this isn't an easy question to answer and there are many points of view.

See the full article at HTML - Do We Need To Learn It?

10 Simple Ways To Speed Up Windows XP

By Everton Blair
I've just finished setting up a new PC for a friend and I think some of you will be interested in some of the tweaks I make to all of my PCs to make them just a little bit quicker. I've focused here on the ones which are simple to do and won't cause problems if you get it wrong, rather than listing registry tweaks etc.

See the full article at 10 Simple Ways To Speed Up Windows XP

Monday, December 12, 2005

An Overview Of The Blackberry

By Colin P

Unless you have spent part of the past few years in a cave or under a rock, you have heard of the Blackberry. However, and with that said, even though you may have heard of the Blackberry, you may not know exactly what a Blackberry is in essence. Therefore, this article has been prepared to provide you with some basic information about the Blackberry.

See the full article at An Overview Of The Blackberry

Antispyware Or Spyware?

By Kwan Lo

Spyware has become the most prominent computer security problem. How do you choose a good spyware removal tool? Beware of antispyware software which installs spyware/adware to your computer.

See the full article at Antispyware Or Spyware?

Sunday, December 11, 2005

Wireless - The Future Of Connecting To The Internet

By Kevin Erickson

What is WiFi?
Wifi or Wireless Fidelity, allows you to connect to the internet from virtually anywhere at speeds of up to 54Mbps. WiFi enabled computers and handsets use radio technologies based on the IEEE 802.11 standard to send and receive data anywhere within the range of a base station. Wireless is a technology that's inexpensive, easy to use, and practical and yet...

See the full article at Wireless - The Future Of Connecting To The Internet

Friday, December 9, 2005

Understanding The Broadband Service In The 21st Century

By Colin P

If you are contemplating broadband service for your Internet connection, you may have a general idea as to what is involved in broadband service. However, with that said, you actually may understand very little about broadband Internet service.

See the full article at
Understanding The Broadband Service In The 21st Century

Wednesday, November 30, 2005

Why Ewido Security Suite is the Anti-Spyware of Choice

The Ewido Security Suite is fast emerging as the Spyware removal software of choice. For removing those nasty, entrenched worms, trojans, hijackers, and keyloggers, Ewido is up to the task.


See the full article at Why Ewido Security Suite is the Anti-Spyware of Choice

Sunday, November 27, 2005

Technical Difficulties

This is a video conference gone way wrong








To see more serious articles please go to You Guess

Preparation Tips For Comptia A+ Certification

The Industry Standard CompTIA A Plus Certification exam has two parts; approximately 80 questions for each part.

* Core Hardware: $153 - min. passing score 515
* Operating Systems Technology: $153 - min. passing score 505


See the full article at Preparation Tips For Comptia A+ Certification

Wednesday, November 16, 2005

How Spyware Blaster Can Protect Your Computer From Harm

By Philippa Smith
By browsing a web page, you could infect your computer with spy ware, ad ware, dialers and hijackers. These, unwelcome guests, are some of the fastest growing threats on the Internet today. It is important to protect your computer and one of the most powerful software products, available for this, is Spy ware Blaster, a program created by Java cool.


See the full article at How Spyware Blaster Can Protect Your Computer From Harm.

Monday, November 14, 2005

Building a Smoothwall: How to Build a FREE Snort IDS Device enabled Firewall

Do you have an old PC sitting around not being used, one that works, but is just old? If so, you could transform it into a Snort IDS Device enabled Firewall. Whether you are on dialup, ISDN, or broadband, this firewall can be configured to work for your connection.

Smoothwall Express, or Smoothie as some users like to call it, is based on the latest Linux 2.6 kernel...

See the full article at Building a Smoothwall: How to Build a FREE Snort IDS Device enabled Firewall

Sunday, November 13, 2005

Katrina Scams Move online

Spam and phishing scams try to capitalize on the Hurricane Katrina tragedy.
Hurricane Katrina has set off a wave of online phishing and other scams that try to capitalize on the emotional response of Americans to the disaster, security experts warned...

See the full article at Katrina Scams Move online

Phishing, Fraudulent, and Malicious Websites

By Alexandra Gamanenko


Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living.

See the full article at Phishing, Fraudulent, and Malicious Websites

Phishing-Based Scams: A Couple of New Ones

By Alexandra Gamanenko

Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp.

See the full article at Phishing-Based Scams: A Couple of New Ones

3 Pervasive Phishing Scams

By Matthew Keegan


Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones.

See the full article at 3 Pervasive Phishing Scams

Saturday, November 12, 2005

Network Security - All About Firewalls

By Frank Owen


The Importance of Firewalls to Network Security

Most networks should have a firewall in place before they are up and running. A firewall is the most common form of network security employed by companies large and small. If you own a personal computer your anti-virus software company may at one time or another have offered you firewall protection.
A firewall on a home network is....

See the full article at Network Security - All About Firewalls

Network Security - Little Known Threats

By Frank Owen


Little Known Network Security Threats

There are a number of common network security threats that can damage your network. Some prime examples include remote login capability, SMTP hijacking and backdoor entry to a computer network.

See the full article at Network Security - Little Known Threats

Network Security 101

By Robert Flanglin


As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. It is important to protect your network and ensure the safety of all computers and users in that network.

See the full article at Network Security 101

How To Remove Winfixer 2005 Plus Unwanted Spyware And Adware

By Edward Toppe

Spyware and adware is advertising supported software that allows its publishers to snoop on a computer user's internet activity.

See the full article at How To Remove Winfixer 2005 Plus Unwanted Spyware And Adware

Sunday, November 6, 2005

Adware: Why is it Different?

By Andrew Wroblewski

Advertising supported software, which has come to be more commonly referred to as adware, is a computer program and/or package of software under which advertisements or other marketing material are included or are just loaded automatically and played back to you over and over again after they install themselves.

See the full article at Adware: Why is it Different?

Friday, November 4, 2005

Should You Build Your Own PC?

By: Mark Humphrey


Many people are intimidated by the inside of a computer case. At first glance all those wires and components look confusing and impossibly high-tech. The thought of actually putting all the parts together may seem impossible.

See the full article at Should You Build Your Own PC?

Tuesday, November 1, 2005

Four Ways To Eliminate Spam

By: Gary Gresham

The CAN-SPAM Act of 2003 was supposed to eliminate spam email. This federal spam law that became effective January 1, 2004, was passed by Congress to get rid of junk email.

See the full article at Four Ways To Eliminate Spam

Friday, October 28, 2005

What's a Root Kit and How Hackers Are Getting Into Your Computer With It

By Ken Savage

A root kit is a set of tools used by an intruder after cracking a computer system. These tools can help the attacker maintain his or her access to the system and use it for malicious purposes. Root kits exist for a variety of operating systems such as...

See the full article at What's a Root Kit and How Hackers Are Getting Into Your Computer With It

Wednesday, October 26, 2005

Protecting Yourself Against Spyware

By David Heffelfinger

Spyware is a category of malicious software that secretly obtains information about a computer user's and sends it to a third party without the user's consent. For example, a piece of spyware running on an infected computer can obtain the user's bank account number when online banking, user's username and password when online trading or the user's credit card number when shopping online...

See the full article Protecting Yourself Against Spyware

Thursday, October 20, 2005

Spyware From Hell, Part 3

By John Crawford

In parts 1 and 2 I discussed the programs to use to remove spyware. But, the first thing you should do when attempting to remove spyware is to look at all the processes that are running. You can look at the task manager, if you see funky named processes in there like fgthdz or kwsbrl, it's a good bet spyware has taken over your computer. More than likely attempting to stop those processes will fail. If you're using Windows XP, ME, or 98, you can run the msconfig utility from the command line and see what is in the startup folder. Be careful what you uncheck, such as your antivirus software. Once you deselect the bad processes, restart the computer. Hopefully, some of the bad stuff will not start, and free up needed resources. You may even find that some applications or devices may suddenly start to work.

See the full article... Spyware From Hell, Part 3

Wednesday, October 19, 2005

Spyware From Hell, Part 2

By John Crawford

Ok, my buddy at work wasn't happy with me cause I dis'd the Yankees in my last post. I'm a long time Orioles fan, there hasn't been much to cheer about for a few years. My buddy's from NYC, so I can't really hold it against him for being a Yankees fan. In spite of that flaw, he's a good friend and a great bowler. By all accounts you would think we really hate the very companies that make the products we spend all day fixing. It's frustrating, for sure. In the end, if the big guys started making perfect products, I'd have to take a greeters job at Wal-Mart. I don't think that's likely to happen anytime soon. Unless Microsoft builds a brand new operating system, from the ground up, with a new core, a write protected registry, and a browser that is stable and doesn't leak, chances are I'll have a job well past retirement.

See the full article... Spyware From Hell, Part 2

Tuesday, October 18, 2005

Spyware From Hell

By John Crawford

Hello fellow bloggers. Keeping up with this is sometimes more work than fun. With work and family commitments, looking for something unique to write about on a regular basis can be trying. But let's see, what's interesting that happened recently? Last week was pretty good, the Yankees got eliminated, and the Redskins lost. I've been working on some friends computers, trying to remove spyware and such. What a mess! The conventional tools and methods are just not working. Apparently there is a new wave spyware on the horizon, and once it gets on your machine you won't be able to remove it short of reloading the operating system. Two of the sites I frequent for spyware removal help are www.spywareinfo.com and www.pchell.com, these guys have seen it all.

See the full article... Spyware From Hell

Monday, October 17, 2005

Ford Parts Dealer Stays Attuned To Ford's Superior Standards

By Jay Stevens

Ford vehicles have always been loved for their technologically advanced powertrain and suspension components, sturdy body parts, solid construction, superb design and high quality interior auto parts. In the truck and SUV segment, Ford has particularly established a highly respectable name through its top-notch vehicles such as the Ford Escape, the best-selling small SUV; Ford F-150, the best-selling pickup truck for 28 years now; Ford Ranger, America's best-selling compact pickup; and Ford Escape Hybrid, the first full hybrid SUV in the world.

See the full article... Ford Parts Dealer Stays Attuned To Ford's Superior Standards

Beware of The Jury Duty Scam

By: Gary Gresham

The jury duty scam is the newest type of identity theft scammers are using to get your personal information. This is a new twist on identity theft, and you should be aware of it so you can avoid becoming a new victim.

See the full article... Beware of The Jury Duty Scam

Protect your Computer and Internet Privacy

By: Alex Marias

It's a known fact that every time you open a browser to view a web page, order something online, or read your email in a web based viewer that information is stored on your computer for later use. Whether you are viewing the weather online, reading sports, catching up on the latest world news or viewing something a little more private, all that information is stored in your computer. Windows operating systems store all this material in what are called Temporary Internet Files or cache. Web pages may store bits of information about who you are when you visit web sites in files called cookies on your computer. Your web browser will store a list of web sites you've visited and places you've gone in a history file in your computer. Even if you are not online, programs will store histories of the files you've opened, played, or viewed.

See the full article... Protect your Computer and Internet Privacy

Sunday, October 16, 2005

The Myths And Magic Of Ebay Drop-Shipping Vendors

By Kirsten Hawkins

If you’ve never heard of drop shipping, then prepare to be impressed – it sounds like every eBay seller’s dream. With drop shipping, you don’t have to keep any stock at all. You simply list auctions for what your drop shipper sells, without actually seeing it yourself.


See the full article... The Myths And Magic Of Ebay Drop-Shipping Vendors