There are numerous operating system and program settings that can be tweaked in order to better your security profile. True system “hardening” is not for the impatient or faint of heart, and may be discussed in a future column; this column will cover only...
Instant messaging (IM) is rapidly becoming a favored attack vector for the bad guys. Too many IM programs allow anonymous connections by default. This is a very, very bad idea. You don’t want anonymous Internet creeps pinging you to become your...
Antiadware/antispyware software is a basic security requirement. Forget buggy resource hogs like Windows Defender; there are two free programs that, when used together, will do a good job of cleaning up any problems that might invade. Download and install...
Certain software items must be in place and properly configured before you can have decent security. Your first consideration should be choice of operating system. If you are using Windows 98 or ME, it’s time for a new computer, as those are not safe machines...
Continuing from last week’s article, I’ve noticed that without proper education, users and their computers are just accidents waiting to happen. If a user cannot correctly answer the following questions, then I guarantee you that their computer will...
Page 2 of 10«12345...10...»Last »