Saturday, March 8th, 2008
Wondering if your favorite peer-to-peer file-swapping program has spyware bundled into it? Chances are good that it does.
The information on this page is believed to be accurate. However, if any program is listed under the wrong section, please let me know immediately. If you know of a file sharing ...
Posted in Internet, Privacy, Security, Software | No Comments
Saturday, March 8th, 2008
I now have even greater sympathy for people suffering a spyware infection than ever before. I spent the better part of Tuesday night fighting off the worst spyware infection I have ever seen or heard of.
Someone was kind enough to donate a copy of VMWare for me to use ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
For the last three years, I?ve been meaning to put to rest once and for all the urban legends and myths on wireless LAN security. Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths. If that ...
Posted in Internet, Networking, Privacy, Security | No Comments
Saturday, March 8th, 2008
Users have a lot to worry about when downloading and playing media files. Are the files legal? Can their computers play the required file formats? Now there's yet another problem to add to the list: Will a media file try to install spyware?
When Windows Media Player encounters a file ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
Everyone likes to be a good host, but bad guests get carried away. They?ll stay too late or empty bottles too soon. They could even break something along the way. That?s why you take precautions as a host.
Think of your Windows HOSTS file in the same way. By properly setting ...
Posted in Privacy, Security | No Comments