Tips on Setting up a Windows Honeypot
Honeypots are flexible and come in various shapes and size. The two broad types are low interaction and high interaction types. A low interaction …
Continue ReadingHoneypots are flexible and come in various shapes and size. The two broad types are low interaction and high interaction types. A low interaction …
Continue ReadingFind out if the cloud-based protection by Panda and ThreatFire will work as advertise and which program has better options and features.
Continue ReadingThis is the last part of the series of article about Rkill. In this section, we will discuss when to use rkill and what to do if rkill will not work …
Continue ReadingAre you having difficulty to remove fraud tool using your anti-malware or anti-virus program. Rkill will assist your scanner and remover in …
Continue ReadingBrowser Helper Object for Internet Explorer is often found in end-users machine. Some are rogue BHO while others will help protect our computer and …
Continue ReadingAre you looking for real-time protection by anti-spyware or anti-malware to complement your anti-virus program? I put to test CounterSpy and …
Continue ReadingWith all the breathtaking security risks to our computers out there, it’s equally breathtaking that many people don’t bother to scan their computer to …
Continue ReadingIn Part of 1 this article, we described the installation, system requirements, updating and features in MBAM and A2. On this final part, we will …
Continue ReadingFree on-demand scanners are often recommended when a PC is infected and the resident anti-virus protection has failed to stop a threat. Let’s find …
Continue ReadingGoogle Pack is free and includes PC Tools’ Spyware Doctor security software and Norton Security Scan from Symantec. Here you find all you want to know …
Continue ReadingI put AntiVir Personal Edition and Microsoft Security Essentials head to head. Read this detailed antivirus comparison to find out which of the two …
Continue ReadingThe main conflict discussed in the article is employee privacy vs. employer security and the main concern for both businesses and judiciary is to …
Continue Reading