Wednesday, November 30, 2005

Why Ewido Security Suite is the Anti-Spyware of Choice

The Ewido Security Suite is fast emerging as the Spyware removal software of choice. For removing those nasty, entrenched worms, trojans, hijackers, and keyloggers, Ewido is up to the task.


See the full article at Why Ewido Security Suite is the Anti-Spyware of Choice

Sunday, November 27, 2005

Technical Difficulties

This is a video conference gone way wrong








To see more serious articles please go to You Guess

Preparation Tips For Comptia A+ Certification

The Industry Standard CompTIA A Plus Certification exam has two parts; approximately 80 questions for each part.

* Core Hardware: $153 - min. passing score 515
* Operating Systems Technology: $153 - min. passing score 505


See the full article at Preparation Tips For Comptia A+ Certification

Wednesday, November 16, 2005

How Spyware Blaster Can Protect Your Computer From Harm

By Philippa Smith
By browsing a web page, you could infect your computer with spy ware, ad ware, dialers and hijackers. These, unwelcome guests, are some of the fastest growing threats on the Internet today. It is important to protect your computer and one of the most powerful software products, available for this, is Spy ware Blaster, a program created by Java cool.


See the full article at How Spyware Blaster Can Protect Your Computer From Harm.

Monday, November 14, 2005

Building a Smoothwall: How to Build a FREE Snort IDS Device enabled Firewall

Do you have an old PC sitting around not being used, one that works, but is just old? If so, you could transform it into a Snort IDS Device enabled Firewall. Whether you are on dialup, ISDN, or broadband, this firewall can be configured to work for your connection.

Smoothwall Express, or Smoothie as some users like to call it, is based on the latest Linux 2.6 kernel...

See the full article at Building a Smoothwall: How to Build a FREE Snort IDS Device enabled Firewall

Sunday, November 13, 2005

Katrina Scams Move online

Spam and phishing scams try to capitalize on the Hurricane Katrina tragedy.
Hurricane Katrina has set off a wave of online phishing and other scams that try to capitalize on the emotional response of Americans to the disaster, security experts warned...

See the full article at Katrina Scams Move online

Phishing, Fraudulent, and Malicious Websites

By Alexandra Gamanenko


Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living.

See the full article at Phishing, Fraudulent, and Malicious Websites

Phishing-Based Scams: A Couple of New Ones

By Alexandra Gamanenko

Phishing in its "classic" variant is relatively well-known. Actually, 43.4 % of adults have already been contacted by phishers, says the survey released on May, 17 by First Data Corp.

See the full article at Phishing-Based Scams: A Couple of New Ones

3 Pervasive Phishing Scams

By Matthew Keegan


Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones.

See the full article at 3 Pervasive Phishing Scams

Saturday, November 12, 2005

Network Security - All About Firewalls

By Frank Owen


The Importance of Firewalls to Network Security

Most networks should have a firewall in place before they are up and running. A firewall is the most common form of network security employed by companies large and small. If you own a personal computer your anti-virus software company may at one time or another have offered you firewall protection.
A firewall on a home network is....

See the full article at Network Security - All About Firewalls

Network Security - Little Known Threats

By Frank Owen


Little Known Network Security Threats

There are a number of common network security threats that can damage your network. Some prime examples include remote login capability, SMTP hijacking and backdoor entry to a computer network.

See the full article at Network Security - Little Known Threats

Network Security 101

By Robert Flanglin


As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. It is important to protect your network and ensure the safety of all computers and users in that network.

See the full article at Network Security 101

How To Remove Winfixer 2005 Plus Unwanted Spyware And Adware

By Edward Toppe

Spyware and adware is advertising supported software that allows its publishers to snoop on a computer user's internet activity.

See the full article at How To Remove Winfixer 2005 Plus Unwanted Spyware And Adware

Sunday, November 6, 2005

Adware: Why is it Different?

By Andrew Wroblewski

Advertising supported software, which has come to be more commonly referred to as adware, is a computer program and/or package of software under which advertisements or other marketing material are included or are just loaded automatically and played back to you over and over again after they install themselves.

See the full article at Adware: Why is it Different?

Friday, November 4, 2005

Should You Build Your Own PC?

By: Mark Humphrey


Many people are intimidated by the inside of a computer case. At first glance all those wires and components look confusing and impossibly high-tech. The thought of actually putting all the parts together may seem impossible.

See the full article at Should You Build Your Own PC?

Tuesday, November 1, 2005

Four Ways To Eliminate Spam

By: Gary Gresham

The CAN-SPAM Act of 2003 was supposed to eliminate spam email. This federal spam law that became effective January 1, 2004, was passed by Congress to get rid of junk email.

See the full article at Four Ways To Eliminate Spam