Spybot Evalutation
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
In a number of webinars I’ve attended this year on information security, I have been alerted to the changes AI is making to email scams. Background Email is the most effect tool for attack that hackers have, because if an email looks like it is from a particular company or from someone known to the…
“Turned” nasty? I think hacking is nasty in general. It has been hard to change people’s attitudes toward hackers and copyright violators, because the damage is generally not physical. But the fact is that hackers and spammers cost businesses money. These activities are not some sort of harmless joke–they do damage. Anyone who works in…
I always tell users to be very certain of any attachments, not only checking who they’re from, but being certain that the person in question intentionally sent them. This e-card greeting spam (Washington Post article) should remind you of another thing: Links in an e-mail don’t necessarily go where the text says they go. Be…
I think this article on MSNBC’s Red Tape Chronicles is good reading for the non-technically oriented. I have already encountered some of the programs mentioned on various computers. This should just be another warning to: Keep your anti-virus products up to date Keep your backups current Be very careful what you download from the internet…
Many people have the impression that most computer hacking is the result of superior technical abilities, which, despite your best efforts, let’s an attacker get control of your computer or other device electronic device. It’s true that hacking involves technical skills, but a great deal of it involves simple people skills, knowledge of how people…
Your pride in your child may represent a security, safety, and privacy issue.
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)