Bits from Bill Pytlovany: Favorite Tips for Online Shopping

bill p

By Bill Pytlovany

It’s been five years since media coined the term Cyber-Monday but the truth is everyday is a  great shopping day online.  I planned on writing an article about the safety of online shopping but noticed everyone was already doing it.  Many sites provide the same duplicate tips. So I thought I might include some of the best tips and post them along with my favorites.

78 total views, no views today

Continue reading


Detecting Facebook Security Problems

I joined FaceBook roughly about 1 year ago, and I have truly enjoyed the experience. I have connected with many old friends and relatives. Without FaceBook none of this would be possible, and hence my life is a little richer. But and this is a big but, Facebook is evolving into a dangerous place.

Let me give an actual example of how one can be tricked into downloading badware when on Facebook. First, I would like to introduce an old friend of mine, Duffy Conway. Duffy worked at Gateway in sales, and was consistently one of the company’s top producers. I left Gateway over 10 years ago, and I was delighted to have Duffy as my friend on Facebook.

223 total views, no views today

Continue reading


TechBite: 5 Net Tricks to Save You Money

steveb

By Steve Bass

Frugal? Thrifty? No, Cheap!
"You’re a bargain hunter," one of my more polite friends says. My wife’s more to the point: She calls me a cheapskate. I like being frugal, but what do I know? Call me whatever you want (you will anyway), I don’t like paying retail and I’m always looking for a deal, especially when shopping online.

The Internet gives me the chance to comparison shop, see how shipping figures into the price, look over specifications, and feel confident I’ve found the best buy. Here are some of the sites I use.

84 total views, no views today

Continue reading


Firefox…Your Guess is as Good as Mine

20090816BadGuy

I remember the good old days when I used Internet Explorer 6 and it seemed everyone else was using Firefox 2.0. Of course that wasn’t the case as Firefox only had about 15% market share, but users were very vocal about telling you what the best browser was. If I were to write a discouraging word about Firefox, I would get roasted a crispy brown like a turkey in November.

104 total views, no views today

Continue reading


Bits from Bill: We Have Your Password & We Own You

bill p

By Bill Pytlovany

Every few months I like to write about passwords and backups just to remind everyone how important these issues can be. While I’d like to remind you again to review your backup policies, I really want to stress some common sense password protection.

I’m sure you all know enough not to use your kids or pets names for passwords but do you use different passwords for every different site you visit online? If not, you could be in real danger and you’re putting everyone else in danger too. STOP IT!

79 total views, no views today

Continue reading


ProAm Phishing Event Held at…

phishing-icon

Thursday May 15th, 2009, Facebook was again hit by a phishing attack. Facebook says it responded quickly to block fake links being shared on the site. Attacks came in the form of “Wall Posts” and inbox messages. The above link to their recent blog gives more information on the steps they have taken.

From what I gather you might also receive an email with the subject “Hello”. If you open it and click on the link, you’ll be taken to a Facebook Look-a -Like page. You might see a name containing 151.im or 121.im. Don’t open it, don’t click on it, don’t put in your name and password.

Maybe Facebook doesn’t hold the most sensitive of information around, but it’s obviously important to someone. I’m sure all the regular methods will be used to make money form our forever lost and probably now well worn information.

77 total views, no views today

Continue reading


Happy Anniversary XP SP3

cruise

It’s been a full 6 months since the release of Windows XP SP3. The unsuspecting public downloaded it faster than Tom Cruise jumps a couch, and it wasn’t long before 25% of us found we had grabbed a ticking time bomb. Endless reboots, blue screens, data loss and reinstalls were the wails coming from every help forum on the World Wide Web. In some cases John Q Public didn’t even know the grenade was coming. It was tossed in the middle of the night by Microsoft’s Automatic Update service. You don’t need to imagine the problems this created because you lived it.

116 total views, no views today

Continue reading


Your PC is NOT Old

I just finished doing the math. I began computing in 1983 and during that time, I have owned exactly 10 different computers. That means, the average life of one of my PC’s is 2.5 years. That certainly is an eye opener. 2.5 years is not that long a time in PC years. When I purchased each one, my anticipation was a lot more than a couple of years, so why is that?

463 total views, no views today

Continue reading


Botnets, Now What?

Just when I was becoming accustomed to using spyware removal tools and running the occasional Pitstop virus scan (few people keep their antivirus current these days), something new comes along.

Have you ever wondered why your machine seems like it’s operating in mud or is just ignoring you? Well that’s probably because it’s operating just fine for someone else. Yep, we’re talking Botnets. Botnets are using your CPU, draining your memory, just waiting to be told what to do by someone making money from your investment. You don’t mind do you?

133 total views, no views today

Continue reading


PC Pitstop PC Information Results

Our September 2007 survey polled the folks visiting the PC Pitstop web site to determine just how intimate people are with their PCs. Nine out of ten people surveyed indicated that they knew the manufacturer of their PC, the size of their hard drives and how much RAM is installed. Almost as many indicated that they remember the model number of their PC and who manufactured the CPU. No surprises there. These are the common attributes that PC marketers highlight in their ads and that most people look for when buying a PC.

63 total views, no views today

Continue reading


Dirty Spyware Tricks

If you had a complete knowledge of what most spyware was doing to your system, you would never agree to install it. So how does it end up installed on so many PCs? Here are some of the dirty tricks that spyware uses to worm its way onto your system and stay there. (Not all spyware uses every technique.)

130 total views, no views today

Continue reading


Tribal Fusion Advertising

Since early in 2002, we have been using an ad network called Tribal Fusion that serves banner and popup ads to our web site. And since 2002, I have hated these popup ads. Dave would regularly bother me to kill the popup ads, but we just could not afford to do it. Advertisers are willing to pay a significant premium for pop up ads, and at times they have been a significant portion of our revenues. Although XP Service Pack 2 initially provided a respite to users with its built-in popup blocker, nearly all the ad networks have found ways around popup blockers, which makes the popups even more annoying.

90 total views, no views today

Continue reading


What is spyware?

Over the past few years, a new class of software has emerged that’s up to no good. It goes by many names: spyware, adware, foistware, malware, eulaware, or even crapware. For simplicity we’ll just call them all spyware. Here are some of the “features” you get from spyware. Some spyware may only use one or two of these tactics, while others do quite a bit more.

1,320 total views, no views today

Continue reading


Beware of Phishing Scams

Beware of Phishing Scams by Rob Cheng There is a growing menace on the Internet called phishing. In simple terms, phishing can be defined as using fraudulent emails and web sites to trick you into revealing passwords and user names. The scary part is that phishing is becoming a growing and thriving industry. AntiPhishing.org reported […]

26,186 total views, no views today

Continue reading


Safe Surfing

Your kids are being targeted by spyware and other Internet-based threats. What can you do to help them surf safely?

In the first installment of this series, we showed how various Web sites and software publishers target your children and teenagers with threats such as spyware and adware. Now let’s look at what you can teach your kids about how to surf more safely in spite of the dangers. We’ll highlight some of the danger signs that can provide a tip that something is amiss, and show how to respond in a way that can protect your kids and your computer.

70 total views, no views today

Continue reading