Password Protecting Folders in Windows Vista
In this third article of the How to Password Protect-series you will be shown your options if you want to Password Protect Folders in Windows Vista.
Continue ReadingIn this third article of the How to Password Protect-series you will be shown your options if you want to Password Protect Folders in Windows Vista.
Continue ReadingLooking for Password Protecting Folders in Windows XP? Find here an overview and all you need including the Private Folder uitlity, as well as the …
Continue ReadingUsing the PC to surf the Web is not always safe for kids (or adults) due to the pop-up ads and links to inappropriate sites–containing either …
Continue ReadingWhen a newcomer hears discussions about computers and networking they hear plenty of unusual acronyms and jargon. Some terms are quite colorful, such …
Continue ReadingWe find spam in our e-mail inboxes, our junk mail folders, and more and more often in our text messages and instant messages. There’s so much …
Continue ReadingRecent Windows operating systems do not offer regular password protection for networked shared folders. However, here’s how to password protect a …
Continue ReadingSo you got a computer virus. But how did you get infected? How do they spread, exactly? Computer viruses are complex, and there are many types that …
Continue ReadingFolder Lock fills a gap in Windows operating systems: Password protecting objects such as files, folders and drives for example. On top of that is …
Continue ReadingAny PC user who has doubts about which antivirus software is best might want to read this article, as it will identify the top virus protection …
Continue ReadingSpam has been around as long as e-mail, it seems. But what is spam, exactly? Why don’t you want it? Where did the name come from? Let’s …
Continue ReadingComputer viruses and computer worms are threats we hear about daily. They are usually mentioned in the same breath, but there is a distinction. How is …
Continue ReadingAuthentication protocols such as Kerberos get mentioned frequently when talking about OS security, but how do they actually work? Let’s take a …
Continue Reading