One of the things Windows recognizes and tries to fix is its vulnerability to attacks. These attacks to your PC can cause significant damage to your system and the information you keep stored on it. Even if you run anti-virus …[Continue]
Computer Safety Tips
Computer safety is something that almost everyone is concerned about because of the amazing popularity and convenience of owning a computer. Of course there are some households that do not have computers, but it is safe to say that households …[Continue]
Best Defense Against Phishing
The best defense against spoof (fake or phishing) emails is to be educated and informed about how to spot them. eBay has a good tutorial on how to protect yourself, as does Stop-Phishing.com from the University of Indiana. Number one …[Continue]
E-Card Safety
What are e-cards? E-cards, the shortened version of electronic greeting cards, are a popular way for people to send birthday, Thinking of You, Thank You, holiday, and other wishes. Most e-cards are free, so they are convenient and fun to …[Continue]
Two Things Everyone Should Know About ID Theft
When it comes to online identity theft, everyone should know two main things. The first is that nobody is immune to identity theft; you don’t even have to have a checking account or be an adult to fall prey to …[Continue]
Gmail and Executable Attachments
In an effort to combat the spread of computer viruses, Google’s Gmail does not allow you to send or receive executable files even if they are in a zipped format. Although many blogs have reported ways around this, most of …[Continue]
E-Card Spam
In recent months, e-card spam infected with a virulent computer worm has increased. How do you tell the difference between a valid e-card and a virus? Never open a greeting card sent from an unnamed friend, neighbor, classmate, schoolmate, partner …[Continue]
Beware of Malware!
The rise of computer technology has created a completely new computer culture. This culture comes complete with its own language, rituals, and villains. Yep, the bad guys started using the computer for criminal activity just as soon as the computers …[Continue]