By Steve Bass
Okay, yes, you already have a security tool. But I have three smart, free, no-fuss browser tools that’ll give you an extra edge against cyber criminals.
By Steve Bass
Okay, yes, you already have a security tool. But I have three smart, free, no-fuss browser tools that’ll give you an extra edge against cyber criminals.
By Bill Pytlovany
As a security researcher one area I’ve always cared about is the use of tech in domestic violence cases. My regular readers know how I feel about people who advocate keyloggers as a parental tool.
By Steve Bass
I know you like new tools to try (I do too), so here are a stack. Play with them, see if they fit your working style, and maybe you’ll find a couple of keepers.
PC Specs Don’t Matter
OverDrive: “Outstanding Tool”
Ask the Pros: Kill Fake AntiVirus
2 Steps to Dual Boot Windows
64 Bit Systems on the Rise
Chris Pirillo Video: Do You Need More Memory?
Bits from Bill: 4 Reasons Win 7 is 10x Better
Technologizer: World’s Weirdest Laptops
TechBite: 6 Surprising Uses for Google
The Dodge Retort: The Politics of FIOS
Tip #1: Screenrecorder
Tip #2: Virtual PC
Tip #3: Refresh Firefox Tabs Fast
Tip #4: Monitor Off Utility
PC Pitstop Driver Library
Ira Wilsker, host of the Computer Information Hour weekly radio show on KLVI in Beaumont, Texas, recently reviewed PC Pitstop’s OverDrive scan and calls it “an outstanding tool to checkout the condition of any computer …”.
Back to School Shopping Tip
Is Firefox Growth Real?
Do Kids Still Use Computers?
The Other Browsers
$100 for 1 Lucky Friend
Chris Pirillo Video: Can you Put XP on a Vista PC?
Bits from Bill: Facebook not for Everyone
Technologizer: XP Users Speak Out
TechBite: 14 Smart and Free Websites
The Dodge Retort: Netbooks Don’t Work at Work
Tip #1: Building Your Own PC
Tip #2: Identify PC Parts
Tip #3: Speed Up Menus
Tip #4: Record What your Hear
PC Pitstop Driver Library
By Steve Bass
System Restore is a recovery tool built into Windows that backs up and restores the Registry. System Restore takes a snapshot of your computer — called a restore point — once a day, as well as before you perform certain tasks, such as installing a new program. If all goes well, you can use a restore point later on to bring your PC back to the state it was in when the snapshot was taken. But remember, we’re talking about computers.
Making it’s first appearance in late October of 2008, the Conficker worm is due to morph from its current developmental stage and sprout wings on April Fools Day 2009. Is it a big deal? Big enough for Microsoft to put a bounty on the head of this
outlaw and it’s creator, to the tune of $250,000.00.
Congratulations to our good friend and guest columnist Bill Pytlovany.
Last week, USA Today singled out WinPatrol as a “terrfic tool” in the fight against “poisoned SEO results (that) can re-direct your browser to a website serving up all sorts of malicious programs.”
Are you worried about having your identity stolen? I am. It
has happened to two people that I know. My mother and a friend
of mine in in Myrtle Beach. Once your identity is stolen, your
life is forever changed. Even after you spend weeks upon weeks
squaring everything away with your credit card company, things
will never be right. You begin to dread answering the phone
because it may be someone that erroneously thinks you owe them
money. My mother was close to tears still getting phone calls 5
years after the alleged deed took place. It certainly wears on you.
eWeek has called WinPatrol one of the Top 10 Must Have Security Tools. This highly regarded security tool now offers even more power – in the form of WinPatrol Plus.
At 11:00 AM on Monday August 25th, I decided to try IE 8 beta 2. I did some reading to become familiar with the included features and catch-up on the opinions of others, then I downloaded IE 8. During the download I choose not to install updates to Windows. The download took less than 15 seconds. I clicked the install icon and after a quick reboot it was done.