| |
Views | Last Activity | 11,361 |
07-03-2009 08:21 AM by KarlM | |
|
| |
Views | Last Activity | 23,454 |
05-15-2007 08:47 PM by Unregistered | |
|
| |
Views | Last Activity | 5,717 |
04-22-2009 03:57 AM by KarlM | |
|
| Windows: How to Remove the Vundo Trojan
What is the Vundo Trojan?
The Vundo Trojan is malicious code that installs itself into a computer, launches pop-up advertisements, and secretly downloads other harmful files into your... |
Views | Last Activity | 4,839 |
04-13-2009 01:04 PM by KarlM | |
|
| How to Remove the Raila Odinga Virus
What is the Raila Odinga Virus?
The Raila Odinga virus causes this pop-up to appear: “Vote Raila Odinga, the Hummer (Nyundo) for President 2007.” All infected machines have the... |
Views | Last Activity | 17,663 |
04-01-2009 10:30 AM by lurkswithin | |
|
| Windows Vista: IE7 Security
How IE7 Security Works
Theoretically, the Vista: IE7 security platform protects the system against ‘exploiter’ programs embedded in some websites. These programs initiate malicious code... |
Views | Last Activity | 4,604 |
03-03-2009 04:04 AM by KarlM | |
|
| Windows Vista: PatchGuard
The Vista kernel (64-bit) is supposedly impenetrable to modification. This is very significant as kernel-mode rootkits are becoming increasingly widespread.
What is a Kernel Mode Rootkit?
... |
Views | Last Activity | 3,877 |
03-03-2009 04:03 AM by KarlM | |
|
| Remove Antivirus 360: Windows XP and Vista
What is Antivirus 360?
The Antivirus 360 is a type of software labeled as ‘rogue anti-spyware.’ It infects a computer system, and then persuades the user to purchase the product by... |
Views | Last Activity | 23,086 |
02-21-2009 03:11 AM by KarlM | |
|
| Remove Antivirus 2009: Windows XP and Vista
What is Antivirus 2009?
Antivirus2009 - Scanner.com is a bogus security website which disseminates Antivirus 2009, a malicious anti-spyware software. The software self-installs without... |
Views | Last Activity | 6,044 |
02-19-2009 07:52 PM by KarlM | |
|
| |
|
|
| Infection Types to the Computer System
In the present scenario of technology, computers play the most significant role. Whether you are working in an income tax department, a private firm or any of the other organization, storing data on... |
|
|
| |
Views | Last Activity | 5,566 |
01-21-2008 03:02 PM by Sajid | |
|
| |
Views | Last Activity | 5,622 |
01-21-2008 02:55 PM by Sajid | |
|
| Vista Parental Control
Worried about the kids spending too much time on the internet and too little on homework? Microsoft Windows Vista has a solution to that. They have what they call time limits for each... |
Views | Last Activity | 4,447 |
06-05-2007 01:42 PM by hvios2007 | |
|
| |
Views | Last Activity | 6,977 |
05-24-2007 02:54 AM by paula_cute | |
|
| Password Management Benjamin Corll
With all of the systems that require passwords and all the sites that require accounts to access it is impossible to remember all of the username and password combinations without either using the... |
Views | Last Activity | 4,914 |
05-17-2007 01:17 AM by Sami | |
|
| |
Views | Last Activity | 5,031 |
12-05-2006 02:52 AM by Sami | |
|
| Computer Safety for Kids Rob Pirozzi Start With the Basics - Protect Your PC
Guarding Access to Your PC - Get a Firewall |
Views | Last Activity | 7,499 |
11-22-2006 02:29 AM by Sami | |
|
| Good Security Habits Mindi McDowell, Allen Householder There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted. |
Views | Last Activity | 3,848 |
03-07-2006 11:41 PM by Sami | |
|
| |
Views | Last Activity | 3,778 |
02-28-2006 12:34 AM by Sami | |
|
| Debunking Some Common Computer Security Myths By U.S. CERT Cyber Security Alert, Mindi McDowell There are some common myths that may influence your online security practices. Knowing the truth will allow you to make better decisions about how to protect yourself. |
Views | Last Activity | 3,718 |
02-24-2006 09:10 PM by Sami | |
|
| |
Views | Last Activity | 4,433 |
02-20-2006 12:22 AM by Sami | |
|