RSSSecurity

Five Steps to Remove Malware From Your Computer

Five Steps to Remove Malware From Your Computer

Malware and Viruses can be difficult to remove if your PC gets infected. There are a few steps to remove malware users should be taking when trying to remove a known infection. Sometimes this technique will work, but occasionally more advanced tactics will need to be done in order to remove malicious code. A lot […]

continue

The Perils And Pitfalls Of Your Free Internet

The Perils And Pitfalls Of Your Free Internet

The Internet is a vast wonderland of free sites and services, a glorious cornucopia of software and information donated through the kindness of others who expect nothing in return. Unlike the real world, there is no deceit, no scams or greed-driven conspirators trying to make a buck at your expense. The Internet is a virtual […]

continue

Remote Administration Tool Attacks And How They Affect You

Remote Administration Tool Attacks And How They Affect You

The Internet is a scary place once again.  If you’re not prepared to run the gauntlet of attacks aimed at your precious PC, there could be dire consequences.  Updates and Anti-Virus/Anti-Malware software will assist you in staying clean and free of some of these buggers.  With drive by viruses, RATs, Zero Days, and a plethora […]

continue

How To Use Hitman Pro Anti-malware

How To Use Hitman Pro Anti-malware

This is an overview and tutorial of Hitman Pro.HMP is one of the easiest and most effective (free for 30 days) malware/virus scanners. For the average computer user it can be an invaluable tool, identifying most of the virus’ and malware one is likely to be infected with.Those that it can’t identify it will almost […]

continue

PCTechBytes Roundtable: Viruses and Malware

PCTechBytes Roundtable: Viruses and Malware

This week’s PCTechBytes Roundtable deals with Malware. I am joined by PCS, who owns a computer repair shop in Boston and Bucksfanjimj–our forums moderator. Both have a lot of experience dealing with malware. The purpose of this roundtable was to discuss how people get infected, what types of programs we use on a daily basis […]

continue

Getting Started With LastPass

Getting Started With LastPass

LastPass is a password manager program that stores and encrypts your passwords on your favorite devices, such as your computer, tablet and smartphone. LastPass is convenient, as it auto-fills your passwords when you login to websites. More importantly, it allows you to create ridiculously difficult passwords that you do not need to remember, making your […]

continue

Adobe Servers Hacked, Customer Info Taken

Adobe Servers Hacked, Customer Info Taken

It would appear that anything connected to the internet isn’t safe anymore.  Even mega companies such as Sun, Google, Apple, and Adobe are not immune to attacks from cyber space.  With all of the money used in intrusion detection, firewalls, DMZ honeypot schemes, and full time information security teams you would assume that it should […]

continue

How To Remove Ransomware And Protect Yourself Online

How To Remove Ransomware And Protect Yourself Online

Ransomware is malware that prevents you from accessing your computer or the Internet. It is often the direct result of a computer virus or social engineering that allowed a human to gain access to your PC. Ransomware relies on scare tactics to trick users into thinking they have done something wrong, or extortion by encrypting […]

continue

K9 Web Protection – Let’s Block Some Websites!

K9 Web Protection – Let’s Block Some Websites!

Needing any help to lock down a PC or block annoying sites like twitter, Facebook, Myspace or other websites?  Having trouble with junior looking up websites above his pay grade or tired of the kids being on the internet all night long?  K9 Web Protection is right up your alley!  With the ability to block […]

continue

Use Two Factor Authentication For Added Security

Use Two Factor Authentication For Added Security

Two factor authentication is an important security technique you should implement whenever possible. While there are many ways to do this, the gist of it means you need to authenticate your identity by using a physical device of some type. This makes it much harder for someone to hack into your email or bank account […]

continue