Similar Posts
Avoiding Facebook Hacks and Fakes
Top 3 Myths about Hackers on Facebook from thatsnonsense.com provides some good information, though in my experience trying to explain to people the difference between being hacked and having installed rogue software is usually futile. All they know is their computer is doing something they didn’t plan, and they want it to stop. It’s difficult…
Link: Securing a Linux Server
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
Hacking Turned Nasty
“Turned” nasty? I think hacking is nasty in general. It has been hard to change people’s attitudes toward hackers and copyright violators, because the damage is generally not physical. But the fact is that hackers and spammers cost businesses money. These activities are not some sort of harmless joke–they do damage. Anyone who works in…
Freeware Security List
You don’t want to just do a search for security software. It’s quite possible that you’ll find a tool that is useless, or even is malware itself. Thus this excellent list of security software at Gizmo’s Freeware. Several of these tools are ones I use and recommend. There are, however, a number I haven’t used,…
Stats on Security and Convenience
I posted on March 23 about how security and convenience conflict. I just found some numbers on one of my favorite sites, FiveThirtyEight.com. Their article The Trouble With Leaving Facebook Is That We Like Facebook explains the data.
Scam: Your Computer Has Been Hacked
Many people have the impression that most computer hacking is the result of superior technical abilities, which, despite your best efforts, let’s an attacker get control of your computer or other device electronic device. It’s true that hacking involves technical skills, but a great deal of it involves simple people skills, knowledge of how people…