Saturday, March 8th, 2008
Four-fifths of spam now emanates from computers contaminated with Trojan horse infections, according to a study by network management firm Sandvine out this week. Trojans and worms with backdoor components such as Migmaf and SoBig have turned infected Windows PCs into drones in vast networks of compromised zombie PCs.
Sandvine reckons ...
Posted in Internet, Privacy, Security | No Comments
Saturday, March 8th, 2008
What I am about to suggest may not be the most correct method to remove a BHO from your system. In fact, there is no guarantee that instructions below will resolve your issue. What I can tell you, however, is that I have used the following methods to safely remove ...
Posted in Privacy, Security | No Comments
Saturday, March 8th, 2008
There are many, many programs for cleaning out temporary files and other junk that Windows lets build up on the hard drive. Sometimes though, you just want to do things like this yourself. It seems simple enough to open the temp folder and delete everything in it, until you actually ...
Posted in Privacy, Windows | No Comments
Saturday, March 8th, 2008
Mike Healan
March 23, 2004
If you've ever been infected with a browser hijacker, you know what an infuriating situation it is. For all intents and purposes, your $3,000 computer is converted into a source of revenue for some fly-by-night web site unable to generate legitimate web traffic. Once ...
Posted in Privacy, Security | No Comments
Saturday, March 8th, 2008
With the holiday season here, the level of spam is going through the roof. This reader has correctly identified the one and only way to stop spam for good--- and it's not a filter, not legislation, and not anything exotic at all:
"Hi Fred! I hear more and more news about ...
Posted in Privacy, Security | No Comments