No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Computer cookies actually have quite a bit in common with their baked counterparts - some are good, some are bad,... Read More
The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.These are the Top Twelve Threats No Computer User Should Ignore.1. Viruses - A computer... Read More
From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Minnesota U.S.A.Dear Evan,Hackers can get your private information from your computer in a number of... Read More
1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. There are so many malicious programs floating around out there that one or two have bound to have gotten past all of your security settings. McAfee and Norton Anti Virus... Read More
Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use.Two of the biggest things that these Anti-Spyware programs accomplish for... Read More
They're out there. Individuals trying to make a quick buck at your expense. You labour hours on end to produce quality content on your website only to get repetitive requests for huge numbers of product or promises for the greatest deals online. As a webmaster for a cell phone and... Read More
What is Phishing? Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. This is done by a form of... Read More
Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Of course I had not. I was informed by the... Read More
It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you.It is estimated that 9 out of 10 computers are infected with... Read More
![]() |
|
![]() |
|
![]() |
|
![]() |
|
|||||
|
|
|
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
In 1997, I decided after 15 years as a practicing... Read More
There is no doubt that "how-to articles" have become a... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
I am the victim of an internet scam. It is... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
First, let's do a little recap'. As I stated in... Read More
The Threat10 years ago you could probably have run no... Read More
A friend called me one day and asked if I... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Spyware is software that runs on a personal computer without... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
There has not been a time in the history of... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
You are at your computer, checking out software on EBay.... Read More
Do you sometimes notice your computer running slower. Is your... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
If you use the internet, you have probably been infected... Read More
Afraid that someone is monitoring your PC or installed a... Read More
It's late. You've been scouring the web for that perfect... Read More
Imagine my surprise when I received a phone call from... Read More
A couple of days ago, I was searching for a... Read More
By browsing a web page, you could infect your computer... Read More
Spyware and adware are becoming major problems for online surfers... Read More
In recent days, I was one of the unfortunate persons... Read More
It has been said that with the wealth of information,... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Have been an Internet user for more than 9 years,... Read More
During the release of a new software product specialized to... Read More
Spyware is the most troublesome software to appear on the... Read More
Before you enter your name, address or any other data... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Today,on most internet user's computers, we have the ability to... Read More
As soon as almost all computer users already got used... Read More
Pharming is one of the latest online scams and rapidly... Read More
Security leaks can be a big problem for any site... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
The 1998 Data Protection Act was not an extension to,... Read More
They're out there. Individuals trying to make a quick buck... Read More
The most frustrating part of having Spyware on your computer... Read More
There are ways to insure security though. You can get... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
A week or so ago, I received an inquiry from... Read More
Ok, you've got a computer, and you get online. You... Read More
When it comes to a secure website and passwords it... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Someone recently told me, "You would have to be a... Read More
So you want to know who your kids are chatting... Read More
As more people are logging onto the Internet everyday, Network... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
It has been said that with the wealth of information,... Read More
The Threat10 years ago you could probably have run no... Read More
Viruses are, however, not the only malicious software programs out... Read More
Since its birth, the Internet has grown and expanded to... Read More
Sooner or later everyone with an email account will receive... Read More
Imagine this ? you open up your email box and... Read More
You are at your computer, checking out software on EBay.... Read More
Ok, ok, I know you've seen them. All those pop... Read More
First I would like to stress I am condoning the... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Many of us have run into an annoying and time-consuming... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Internet Security |