Spybot Evalutation
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
“Turned” nasty? I think hacking is nasty in general. It has been hard to change people’s attitudes toward hackers and copyright violators, because the damage is generally not physical. But the fact is that hackers and spammers cost businesses money. These activities are not some sort of harmless joke–they do damage. Anyone who works in…
I’m going to link to a post from SmarterMSP.com, but I want to summarize here. Most of my clients won’t benefit that much from the linked article. They need to follow my much simpler rule set: This is only going to get worse. AI allows even people who are not very clever to create clever…
I was reading this article from TechRepublic today and at first I thought it had little to do with me, because I manage such small networks. But it wasn’t many paragraphs until it was ringing too true to me to ignore. It matches my experience. Now the largest network I manage has 12 pieces of…
With Norton Anti-Virus and Internet Security 2006 I reluctantly quit recommending Norton for everything. It was using too much in the way of resources, and it was too expensive for the value provided. In a number of cases internet providers were offering free services that were less obtrusive and worked, at least for home clients….
Cory Doctorow is a very well known science fiction writer, journalist, and a commentator on technology and social issues. He is interviewed in about the first 15 minutes of the Canadian (CBC) program Spark 170. I think what he’s saying is both prescient and very important. It would be worthwhile for American readers to listen…
I have made the point before that security and convenience tend to conflict. Having a secure password is harder than having one that’s easy to remember. Generally, if it’s easy to remember it’s easy to crack. Two-Factor Authentication is similarly inconvenient. I was reminded of that today when I was logging into a site and…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)