Category: Security

Five Steps to Remove Malware From Your Computer

Malware and Viruses can be difficult to remove if your PC gets infected. There are a few steps to remove malware users should be taking when trying to remove a known infection. Sometimes this technique will work, but occasionally more advanced tactics will need to be …

The Perils And Pitfalls Of Your Free Internet

The Internet is a vast wonderland of free sites and services, a glorious cornucopia of software and information donated through the kindness of others who expect nothing in return. Unlike the real world, there is no deceit, no scams or greed-driven conspirators trying to make a …

How To Use Hitman Pro Anti-malware

This is an overview and tutorial of Hitman Pro.HMP is one of the easiest and most effective (free for 30 days) malware/virus scanners. For the average computer user it can be an invaluable tool, identifying most of the virus’ and malware one is likely to be …

PCTechBytes Roundtable: Viruses and Malware

This week’s PCTechBytes Roundtable deals with Malware. I am joined by PCS, who owns a computer repair shop in Boston and Bucksfanjimj–our forums moderator. Both have a lot of experience dealing with malware. The purpose of this roundtable was to discuss how people get infected, what …

Getting Started With LastPass

LastPass is a password manager program that stores and encrypts your passwords on your favorite devices, such as your computer, tablet and smartphone. LastPass is convenient, as it auto-fills your passwords when you login to websites. More importantly, it allows you to create ridiculously difficult passwords …

Adobe Servers Hacked, Customer Info Taken

It would appear that anything connected to the internet isn’t safe anymore.  Even mega companies such as Sun, Google, Apple, and Adobe are not immune to attacks from cyber space.  With all of the money used in intrusion detection, firewalls, DMZ honeypot schemes, and full time …

How To Protect Yourself From Ransomware

Ransomware is malware that prevents you from accessing your computer or the Internet. It is often the direct result of a computer virus or social engineering that allowed a human to gain access to your PC. Ransomware relies on scare tactics to trick users into thinking …

K9 Web Protection – Let’s Block Some Websites!

Needing any help to lock down a PC or block annoying sites like twitter, Facebook, Myspace or other websites?  Having trouble with junior looking up websites above his pay grade or tired of the kids being on the internet all night long?  K9 Web Protection is …

Use Two Factor Authentication For Added Security

Two factor authentication is an important security technique you should implement whenever possible. While there are many ways to do this, the gist of it means you need to authenticate your identity by using a physical device of some type. This makes it much harder for …

PCTechBytes Computing Guide To Being Paranoid

They’re watching you. Literally. In a recent article posted at Ars Technia, it was reported that hackers have the ability to remotely take over your computer and install software on your computer that allows them to turn on your webcam. What? They do this using a …

Your Computer Is Exploitable

You have an current antivirus installed and you run Windows Updates. That’s great. You’re safe to roam the Internet. You can bank online, research online and game online without having to worry about getting a virus. You don’t click on links in emails and you have …