How to Protect Yourself When it Comes to Social Networking and Identity Theft
In part two of our series on Social Networking Safety, we address the importance of identity theft protection and how to ensure your identity is safe …
Continue ReadingIn part two of our series on Social Networking Safety, we address the importance of identity theft protection and how to ensure your identity is safe …
Continue ReadingThe rise of HDTVs, and the resulting slide in prices, make the idea of owning an HDTV specifically for use with a computer more compelling than ever …
Continue ReadingSocial networks are everywhere and though they can be great tools for home and business users, there are some risks and things that need to be …
Continue ReadingWant to eject a CD from or Mac? Or how about take a picture of your screen? Or download an image from a website? Those tips and more are in this …
Continue ReadingAre you always finding yourself sending emails to the same group of people over and over again? Do you have to type in their addresses individually …
Continue ReadingCheck out the best firewall software and hardware firewall for your SOHO
Continue ReadingIn the final part of this series, we address how to protect a computer from malware when using social networking. Malware is dangerous and may cause …
Continue ReadingSome vendors of anti-virus software for Windows computers also provide no-cost virus and worm removal utilities to do away with specific infections. …
Continue ReadingWant to ensure your email is secure? Most modern email clients and many instant messenger programs have the capability to guarantee communication is …
Continue ReadingThough passwords can be created strong and unbreakable, not everyone pays attention to password security. Using Windows password policies, we can …
Continue ReadingAfter looking at ZoneAlarm Free Firewall, we shall now look at CheckPoint’s integrated security suite, ZoneAlarm Internet Security Suite 2009. …
Continue ReadingComputers connected to the Internet can be attacked by a hacker in an average of minutes. Therefore, some defense measures, such as a software and/or …
Continue Reading