July 28th, 2013
While the word “terror” has taken on certain connotations in the last few years, there are quieter forms of terror that have nothing to do with bombs or planes. And these forms of terror are ones that you may actually be inviting into your home.
Malware has become an increasingly common source of frustration and even danger for those of us who spend a great deal of time on the Internet. Malware is, as the name would suggest, “malicious software” that can infect a personal computer and begin – for Read the rest of this entry »
January 15th, 2012
If your parents have a new clear internet provider or even if they’re just starting to use email you’ve got to help them know what to do and what not to do. Here are a few basic tips to teach your rents when you want them to be safe online
Unopened Attachments: Your parents may not know that they shouldn’t open attachments if they don’t know the sender so you’ve got to teach them. Also emphasize that sometimes bad attachments may come from people they know.
Phishing: Sure you still hear the news reports and wonder who in the world would send their personal information in online? Your parents and other people their age would so make sure they know never to answer banking emails or those about their passwords or other personal info.
SPAM Sites: Sit down and teach your parents the difference between regular, trustworthy websites and so-called SPAM sites that simply try to entice. Teach them about domains and subdomains and show them how easy it is to build a website so they know anyone’s capable of running a scam.
January 4th, 2012
Malware, or software that has been created for malicious intentions, can infiltrate one or many computers, causing loss of privacy, information and productivity. This software is disseminated primarily through email attachments although it can also infect a computer simply by the user’s clicking of a link or icon. Malware can extract personal and private information and unscrupulous individuals can than use the information to make purchases or sell teh information on a Read the rest of this entry »
July 18th, 2011
The ten commandments of tweeting:1.Never complain about your customers or clients on Twitter. They keep track!2.DM is not a secure communication path.3.Never share areas of conflicts. These area include clients, your partners or your competitors.4.Never get defensive when negative reviews start appearing. Accept negative criticism of your product or services.5.Never expose personal issues or put into danger the company’s professional relationships.6.Never share information about products and services that are still Read the rest of this entry »
July 16th, 2011
In the early days, malware originated quite innocently from programming code written for a good intention. However, gradually this code was misused with darker intentions. Earlier, most malware were viruses and were written as a prank and also for programmers to show off their programming skills.
From an exercise ruled over by the pride and ego of a programmer, malware has now turned into a tool to make big money.
Malware artists now concentrate on capturing passwords through key loggers. Spywares Read the rest of this entry »
July 14th, 2011
Most of us have been led to believe that having a strong password, installing an anti-virus, anti-malware and spyware together with a firewall are enough precautions to take to keep our PCs from being attacked. That is a myth!
The truth is that despite anti-virus software and a firewall, our computers can never be 100 safe. The reason is that the code used by virus creators are so advanced, that an anti-virus application will not be immediately able to Read the rest of this entry »
July 12th, 2011
The absolutely most unnerving and annoying computer issue is the presence of malware, spyware or adware. Viruses used to be number one in computer problems, now the infections caused by malware have taken the spot at the top.
Malware stands for “Malicious software”, and the term covers spyware and adware too. This nasty software can come into your machine through an email, web site download, photo download, executable program and many other ways. It will shut down systems, record key strokes, invade privacy, and prove a mess to get rid of. Read the rest of this entry »