Site Security
How Sunbelt Counterspy Works
By Ben Sikes · 18 years ago
With spyware running rampant on PCs across the planet, a good spyware defense system is required. Well worth a look is Sunbelt's CounterSpy.
Originally owned by Giant Software then acquired by Microsoft, the old CounterSpy ...
TrendMicro PC-Cillin Internet Security
By Ben Sikes · 18 years ago
The original PC-Cillin was an antivirus application. In 2006 it's grown into a full Internet security suite with firewall, spam filter and parental controls.
Computer security is essential to prevent PC performance loss and identity ...
How Evidence Eliminator Works
By Ben Sikes · 18 years ago
World-renowned Evidence Eliminator is a sure fire way to remove secret and sensitive data from a PC once and for all.
Deleting files from the Windows Recycle Bin, or even formatting the hard disk, does ...
The Value of Data Media Security
By Lawrence Hilliard · 18 years ago
A basic locking cabinet can secure valuable papers or personal items but it will not protect them from theft or fire damage. Only safes can provide a superior level of protection for documents, jewelry, guns ...
SSL 101: Use Your Credit Card Online with Confidence
By Joshua Shapiro · 18 years ago
Online fraud is one of the leading ways for thieves to steal your credit, rob you of your money, and take away your personal identity and your confidence to shop online. People are so wary ...
A Third Frontier of Your Security
By Alexander Styopkin · 18 years ago
The first obstacle for harmful programs on the way to your computer is a firewall, which prevents it from penetration. The second frontier is an antivirus program, which accomplishes scanning of all files on your ...
How to backup your data properly
By Michael Cottier · 18 years ago
Your data is important to you and why shouldn’t it be. Computers have grown to be a part of our daily lives, so it’s safe to say that most of us would be devastated if ...
Are You Safe From Hackers?
By Charles Truett · 18 years ago
We don't use E-gold very often since most of our online business and customer sales are conducted through our online merchant account. However, we occasionally have someone who will request paying by E-gold so we ...
Computer Security: The Essential Components for A Safe Computer
By Sara Chambers · 18 years ago
These days, computers are almost as common in households as telephones. Computers themselves do not cause any threat to individual security. When connected with networks and the chaos that is the World Wide Web, computers ...
Very Important: Update on Severe Windows Security Flaw. What To Do Right Now To Secure Your Data
By Olga Farber Becker · 18 years ago
Earlier we warned you about a serious security flaw, so-called "WMF flow." Several days later nearly one hundred different instances of exploitation of this newly discovered vulnerability had been found.
"Desktop users that suffered the ...
Important: Severe Windows Security Flaw. What You Can Do Right Now To Secure Your Data
By Olga Farber Becker · 18 years ago
On 28 of December a severe Windows security flaw, WMF Flaw, was detected, in all Windows versions from Win98 to WinXP, no fixing patch exists yet. Using it, anyone can do any malicious action with ...
Paypal Fraud and Paypal Email Scams, Phishing Paypal Accounts
By Kaisilver Kaijewels · 18 years ago
This article is written neither to promote nor criticize the Paypal online mode of payment.
With the rapid growth in the number of Paypal users, frauds and email scams on Paypal accounts
has become more ...
How to STOP Spyware !
By Mike Steward · 19 years ago
Spyware is one of the biggest threats to your privacy and the security of your data. Here's a series of helpful questions and answers that can help you remove and minimize future spyware from your ...
Businesses Face Spyware Threats on a Day to Day basis
By Mitch Johnson · 19 years ago
The network administrator an a company ran a normal web activity report of all the enterprise’s users and found that the employees were logging thousands of hits per day on a single site that had ...
Preventing Online Identity Theft
By Melanie Breeze · 19 years ago
Identity theft is one of the most common criminal acts in
society today. Criminals will use your personal information
such as banking accounts and passwords, to pretend that they
are you. They may take out ...
Countering Privacy Invasions of Spyware
By Mitch Johnson · 19 years ago
Spyware spread quickly across the internet world forcing users to become aware of the prevalent threats facing their privacy while surfing the internet. A PC will begin to run slower, have difficulty accessing the internet, ...
A Parent's Guide to Internet Controls
By Polly Schlafhauser · 19 years ago
Well, it started. I now have a daughter who has a computer in her
room. Still no TV, just a computer…It all started when we
decided to purchase a new computer for ourselves and were ...
Spyware: The New Cancer
By Andrew Wroblewski · 19 years ago
Just like cancer, a computer virus program, whether Trojan, adware, or spyware can be deemed as any executing program that can infect your computer by recreating a copy of itself onto your system. Just like ...