Using HijackThis to remove malware
HijackThis is a free but powerful utility to inspect a system. It is not recommended to use by non-advanced users because it is not a malware scanner …
Continue ReadingHijackThis is a free but powerful utility to inspect a system. It is not recommended to use by non-advanced users because it is not a malware scanner …
Continue ReadingThis article provides a comparative analysis of security concerns in the two most popular browsers namely Internet Explorer and Firefox. Despite the …
Continue ReadingBuilding and implementing a business continuity plan in case of an unexpected disaster is vital to surviving of a company. You should know the …
Continue ReadingInstant messaging is becoming a commonly used techonology tool for both home, school, and work. This tool always its user to communicate in real-time …
Continue ReadingThere are numerous free firewalls available. So, know which one offers what and which one you should use before downloading it. This article looks at …
Continue ReadingIs your system secure with updates, firewalls and anti-virus products alone? Home users should also use system cleaners to delete temporary files and …
Continue ReadingIntegrity is the next of four core concepts of information security examined in this series. Integrity, in Information Technology terms, means that …
Continue ReadingUsing a wireless network at home gives you more control over how you set up your personal network. However, there are security considerations when …
Continue ReadingNeed to encrypt data with Windows? Included with Windows XP and Vista is the cipher command. This command line prompt utility included with these …
Continue ReadingThis article provides a simple but non technical description of security issues existing in a common Bluetooth device and some simple tips on how we …
Continue ReadingIf you use a cell phone or PDA, it can be a security risk. Read on to find out what the risks associated with cell phones and PDAs are and how …
Continue ReadingThe malware family’s lineage continues to proliferate with another malicious software-Tigger’s attack. Compromising the PC’s, …
Continue Reading