|
Do you want to completely delete everything on a hard drive to protect privacy or remove a stubborn infection? Here is a review of 40 free data-destruction software programs. (2018-11)
|
|
This is the kind of information that all the sites you visit, as well as their advertisers and any embedded widgets, can see and collect about you. See if your system is leaking "WebRTC requests" or "DNS requests". (2018-09)
|
|
Detect and remove malware from USB (a.k.a flash, thumb, or zip) drives. (2018-01)
|
|
What is a "zero-day" virus? How your anti-virus software could fail you. (2017-03)
|
|
Two well-known PC gurus "discuss important issues of personal computer security. Sometimes we'll discuss something that just happened. Sometimes we'll talk about long-standing problems, concerns, or solutions. Either way, every week we endeavor to produce something interesting and important for every personal computer user." (2017-02)
|
|
DDoS Attack: How to identify vulnerable devices. How secure is yours? (2016-12)
|
|
Paranoid or prudent: Should you tape over your web cam? (Yes, says the FBI.) (2016-12)
|
|
Free Wi-Fi and the dangers of mobile Man-in-the-Middle attacks. (2016-11)
|
|
Hundreds of words to avoid using online if you don't want the government spying on you. (2016-11)
|
|
What is a DDoS ("Distributed Denial of Service") attack? (2016-09)
|
|
Ransomware scams are serious stuff. Should you pay up, or what else can you do? Here are your options, plus how to guard against ransomware. (2016-05)
|
|
Five suggested free anti-malware products to safeguard your PC. (2016-05)
|
|
|
How to tell if your computer is vulnerable to hackers. (2016-05)
|
|
Some free tools to tell if your computer is vulnerable to hackers. (2016-04)
|
|
38 free data destruction software programs for wiping data from hard drives. (2016-03)
|
|
How to wipe a hard drive before you give it away or trash it. (2016-03)
|
|
How do you secure the hard drive when you take your computer to get it serviced? Consider more than just 'trust'. (2015-10)
|
|
Do you need a firewall for your computer? Heck, yes!!!! Here's a comparison between the two types (but you should consider having both types). (2015-03)
|
|
Independent comparison of anti-virus products vs. the (mediocre) free Microsoft tool. Select 'Mobile' or 'Home User'. Click on the column headers to resort the categories. Click on any product name to view more detailed test results. (2014-11)
|
|
Trustworthy magazine PCMag offers comparative reviews of free and commercial anti-virus products (2014-11)
|
|
Can you outsmart a hacker? Take this short quiz to see. (2014-09)
|
|
The best way to explain how to choose a good password is to explain how they're broken. You need a strategy. Here are some tips you can use now. (2014-04)
|
|
CryptoLocker ransomware information guide and FAQ. Be informed now, or pay up later. (2014-01)
|
|
Ubuntu based GNU/Linux live distribution, created as a project of digital forensics, offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. (2012-12)
|
|