6 Steps To Remove Malware Completely

exterminate1

Malware can mutate within minutes. If you’re infected, clean it fast and clean it completely.

First and foremost have a solid and reliable detection and removal program installed on your system. I use and recommend PC Matic everyday. It’s my first line of defense. I run PC Matic once a week and let it check for infections while it cleans and updates my system. The latest virus definitions are updated from our server each time I run the program. I know I’m ahead of the curve for detection.

Continue reading


Top Loved Notebooks

tln2

These are exciting times in the world of computing, and portables are seeing all the action. One thing that is becoming obvious is that the line between netbook and notebook is starting to blur. Netbooks are becoming more powerful and Notebooks are becoming lighter, and longer lasting. Shown below are your picks for Most Loved Notebooks. Keep in mind that Netbooks have been filtered out of these results and were the category we used to kick off the Most Loved series. You can find those results in the previous July Newsletter or by looking for previous articles in TechTalk.

Continue reading


Google and the Price of Oil

We spend a lot of money on advertising and a lot of money in search. Just got off the line with our advertising guru, and in rough numbers, we burn over 6 times as much money with Google than we burn with Microsoft and Yahoo COMBINED. That’s an astronomical difference between Google and the rest. Furthermore, we have tried to spend more money with both Yahoo and Microsoft, and neither has enough relevant search results to allow us to increase our spend.

Continue reading


The Evils of Unwanted Software

There is a war going on out there. As you are reading this, the forces of good and evil are at work battling to control your computer. This is not a joke nor an exaggeration. It is happening every day, and at times, I think the bad guys are winning. I’m talking about unwanted software. Software that installs itself largely without the user’s knowledge. The makers of these softwares are going to great lengths to gain control of your PC to further their own causes. Following are three different and distinct examples:

Continue reading