Spybot Evalutation
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
I’m going to link to a post from SmarterMSP.com, but I want to summarize here. Most of my clients won’t benefit that much from the linked article. They need to follow my much simpler rule set: This is only going to get worse. AI allows even people who are not very clever to create clever…
… consider yourself warned. I have encountered several machines recently on which people were either running without anti-virus protection or had allowed the anti-virus subscription to lapse, sometimes for long periods of time. I know it’s tempting to avoid that little expense, but the protection is critical. You also need to let those scans run,…
Today I deleted a spam comment from this blog. That is not very memorable. What was different was that the first line stuck with me. This is a very funny blog! I loved the way you … One of the techniques of comment spammers is to include generically congratulatory text on the grounds the bloggers…
You don’t want to just do a search for security software. It’s quite possible that you’ll find a tool that is useless, or even is malware itself. Thus this excellent list of security software at Gizmo’s Freeware. Several of these tools are ones I use and recommend. There are, however, a number I haven’t used,…
A number of people have wound up calling me to help them recover their computers when the problem was simply that some website had been given permission to send notifications. When browsing, be very careful. The more popular the category in which you’re searching, the more likely there are bad websites pretending to serve your…
You will find more infographics at Statista I would recommend reading the article for more information. Users should note that the primary vector for infection is an infected email. Do not follow a link from an email or download an attachment unless you know who sent it, trust them completely, and are confident of the…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)