Tuesday, June 30, 2009

Undeliverable e-mail spam

A man has been receiving many undeliverable e-mail messages. The messages are coming from all over the world. He would like help figuring out who is using his e-mail address as the return address. His e-mail provider assures him that the messages are not coming from his computer.

Saturday, June 27, 2009

Fraudsters Try to Scam Security Expert on EBay

When security expert Bruce Schneier tried to sell a used laptop on eBay, he thought it would be easy. Instead, a sale was aborted twice -- first by a scammer using a hacked eBay account and then by a buyer who tried to trick Schneier into sending her the laptop after she cancelled payment.

Thousands of Free Programs, Utilities & Demos

Essential utilities and other hidden gems you sure don't want to miss. We have built our downloads section with the enthusiast in mind, updated everyday with utilities that go from protecting your privacy to performance optimizers, Internet tools and of course, gaming.

IObit SystemCare

Ideal integrated protection for your home and home office workstations (not servers). Simple and easy.

Advanced SystemCare Free(formerly Advanced WindowsCare Personal) has a one-click approach to help protect, repair, clean, and optimize your PC. Click on logo below.

Smart Defrag works automatically and quietly in the background on your PC, keeping your hard disk running at its maximum speed. Click on logo below.

IObit Security 360 is a novel PC security utility that can scan, analyze and eliminate security problems in your system. It can be used as the necessary mate for any security product anti-virus and anti-spyware programs.
Available Soon!

Friday, June 26, 2009

Five Reasons Blu-Ray Will Fail

It's been more than a year since the backers of Blu-ray triumphed in the Format Wars, sending HD-DVD to the technology scrap heap. But consumers don't seem to care. Traditional DVDs are outselling Blu-ray discs by a 6 to 1 margin, and a recent Harris Interactive survey indicated that 93 percent of Americans have no plans to buy a Blu-ray player within the next year. Even though Blu-ray sales are slowly increasing on a year-to-year basis, only 7 percent of Americans own a Blu-ray player today.

Wednesday, June 24, 2009

How Can You Tell If A Website Is Legit?

A few pointers to help determine if a website is indeed legit.

What’s New in Printers

Printer Reviews, How-To Guides, and More!

Looking for a new printer...or just looking? Our editors and writers have been busy testing and reviewing as many inkjet, laser, and multifunction printers as we can get our hands on. Fresh off the lab bench: We’ve just taken a look at HP’s latest multifunction printer, the Officejet 6000 Wireless. Read our review to find out how it fared in our testing.

About RocketDock

RocketDock is a smoothly animated, alpha blended application launcher. It provides a nice clean interface to drop shortcuts on for easy access and organization. With each item completely customizable there is no end to what you can add and launch from the dock.

Now with added Taskbar support your minimized windows can appear as icons on the dock. This allows for better productivity and accessibility.


  • Minimize windows to the dock
  • Real-time window previews in Vista
  • Running application indicators
  • Simple drag-n-drop interface
  • Multi-monitor support
  • Supports alpha-blended PNG and ICO icons
  • Icons zoom and transition smoothly
  • Auto-hide and Popup on mouse over
  • Positioning and layering options
  • Fully customizable
  • Completely Portable
  • ObjectDock Docklet support
  • Compatible with MobyDock, ObjectDock, RK Launcher, and Y'z Dock skins
  • Runs great on slower computers
  • Unicode compliant
  • Supports many languages and can easily be translated
  • A friendly user base :)
  • And best of all... its FREE!!! Watch the video.

Tuesday, June 23, 2009

How to Offload Your Cell-Phone Pictures

Are your camera-phone photos trapped on your handset? Here's how to get them off your phone and onto your PC for storing, printing, and sharing.

Monday, June 22, 2009

Thieves, Cons And Scammers May Be Watching You Online

You're on summer vacation, enjoying time away. But at home, burglars are making quick work of your house. They've read your social-networking updates and know that you're out of town.

helped them scope your house. The pictures of your home's interior you posted online, say on, help them find high-ticket items quickly. Read more...

That e-mail attachment is not a Twitter invite

is warning about a mass-mailing worm that comes in an attachment pretending to be a invite.

"The observed messages appear as if they have been sent from a Twitter account; however, unlike a legitimate Twitter message, there is no invitation URL present in the body," a Symantec blog post says. "Instead, the user will see an attachment that appears as a .zip file that purportedly contains an invitation card."

The name of the attachment is "Invitation" and Symantec identified it as
W32.Ackantta.B@mm, a worm targeting Windows computers that was discovered in an e-card virus attack in February, according to Symantec. The worm gathers e-mail addresses from compromised PCs and spreads by copying itself to removable drives and shared folders.

Symantec is warning about a mass-mailing worm that comes in an attachment pretending to be a Twitter invite.
"The observed messages appear as if they have been sent from a Twitter account; however, unlike a legitimate Twitter message, there is no invitation URL present in the body," a Symantec blog post says. "Instead, the user will see an attachment that appears as a .zip file that purportedly contains an invitation card."

Saturday, June 20, 2009

Personal Computer Buyer's Guides

A collection of articles to help consumers shopping for a new personal computer or monitor. Whether it is for a laptop or a desktop, these articles will help in determining just exactly what you need so you don't end up with something too slow or with too many features.

How to Fix Your Computer with Accessories

Computer accessories are available if you ever have problems with your computers. You don’t have to throw it away if something doesn’t work. You might be able to replace it with something else. You can replace it with computer accessories. Computer accessories are important. You need them to fix your computer. Most computers problems can be fixed and you don’t need to buy a new computer. You can fix it with computer accessories.


Keep your computer updated with the latest Microsoft security patches to help avoid identity theft and other security breaches. Request a FREE CD from Microsoft with the:

Latest security patches for Windows at:
Download the latest updates at

The Federal Trade Commission offers tips at:

Learn More About Internet cams and taying Safe

Friday, June 19, 2009


What is Greenshot?
Greenshot is a revolutionary screenshot tool optimized for productivity.

* Save a screenshot or a part of the screen to a file within a second.
* Apply text and shapes to the screenshot.
* Offers capture of window, region or full screenshot.
* Supports several image format.

Greenshot is open source software.

Thursday, June 18, 2009

Freeraser Makes Sure Your Files Are Gone for Good

Simply deleting doesn't actually get rid of the file or its data--it can be reconstructed relatively easily. If you're worried that someone might invade your privacy by restoring files you've deleted, give Freeraser (free) a try. It's as simple a program as you'll ever find for killing files so that they stay killed.
Read more....

Never Miss a Sale Again! Get Alerts When Price Drops is shopping bookmark powered with price watch engine. It is one central place to save all your favorite products you find anywhere on the Internet, and our powerful price watch engine can alert you whenever your favorite products change prices. is for people who do any kinds of on-line shopping. It is like browser's "Favorites" for shopping, but even more: It's free!

Is Your Computer a Zombie?

A zombie is a machine that has been added to a botnet. A botnet is a group of machines controlled by criminals. Generally, these computers are used to send spam. The botnet can also be rented to other criminals for use in denial-of-service attacks.

Your computer must be infected with malware to be turned into a zombie. The software runs surreptitiously. That's because the criminals want to use your machine as long as possible. They don't want you
to know.

Given this, it is often difficult to tell if your computer is a zombie. Your computer may be sluggish. There could be a lot of causes for this, though.
You would probably also notice new programs on the machine.

Access to security sites could be blocked. And your connection speed could slow to a crawl.
Most people don't realize their computer is infected.

Kim Komando

Bizarre Bugs: Nine of the Strangest Software Glitches Ever

Writing buggy applications is a cinch--for decades, the world's software developers have been proving that with just about every program they release. Truly interesting bugs, however, are a relatively rare breed. I'm talking about the kind that cause technology products and services to stop working for extended periods, or that prompt them to behave as if they were possessed or harbored grudges against the humans who use them. And even though the bugs themselves usually stem from mundane errors such as typos or faulty math, their symptoms are anything but boring.

Tuesday, June 16, 2009

The 10 Dumbest Tech Products So Far

Why, Oh, Why Were These Tech Gadgets Made? New Coke. Chia pets. Ashton Kutcher. All are bad ideas that should have been snuffed out before they emerged into public consciousness. All are things that make you scratch your head and say, "What in God's name were they thinking?"

New Phishing Scams Hitting Facebook Users

Facebook phishing scams simply refuse to die. First, it was, then a series of links with domains ending in ".im", and now links ending in ".at." All of these scams have one thing in common: They're designed to trick you into handing over your Facebook login information and hijack your account.

The AllFacebook blog reports that people are receiving e-mails and messages in their inboxes with links such as "" Clicking it takes you to a fake Facebeook login page. If you enter your information, the site will quickly login to your account and change your password, blocking you from Facebook,. It will then forward a malicious link to all of your friends via your account.

Are Tweets and Facebook updates telling burglars when to strike?

The burglary of an Arizona video editor is making headlines this week because he thinks that his Facebook and Twitter update habits may have led to it. He not only told his network of social media friends that he was going out of town but also shared some adventures of his road trip to Kansas City. While he was away, someone broke into his home and stole his video editing equipment.

Monday, June 15, 2009

Tagged (social network) is a social networking site founded in 2004. Tagged is the subject of numerous customer complaints for sending deceptive bulk mail and is regarded as a phishing and spamming site and an "E-mail scam" by consumer anti-fraud advocates.

magazine article called Tagged "The World's Most Annoying Website".

Tagged asks users for their email username and password, checks their email address books for contacts and repeatedly sends email invitations to people who are not yet on Tagged, stating that they have been "added as a friend" or that the inviter had sent them photos on Tagged. This process has drawn criticism in the technology press and from users. These emails were discussed as possible spam by Black Web 2.0. resemblance to a virus has often been mentioned, including by urban legend site

Sunday, June 14, 2009


CDBurnerXP is a FREE application to burn CDs and DVDs, including Blu-Ray and HD-DVDs. It also includes the feature to burn and create ISOs, as well as a multilanguage interface. Everyone, even companies, can use it for free. It does not include adware or similar malicious components.

Saturday, June 13, 2009

A Look at the ‘Clickjacking’ Web Attack and Why You Should Worry

There’s a nasty new security threat making waves on the web. Actually, clickjacking, as this attack is known, isn’t entirely new, but because no one has yet come up with an effective solution, it remains a serious threat. And clickjacking is the worst sort of security risk — it’s transparent to the unwitting user, simple to implement and difficult to stop.

Friday, June 12, 2009


TweetDeck is your personal browser for staying in touch with what’s happening now, connecting you with your contacts across Twitter, Facebook and more. TweetDeck shows you everything you want to see at once, so you can stay organized and up to date.

  • Tweet directly from TweetDeck and share photos or web links
  • Manage conversations with @replies and direct messages
  • Create Groups to easily follow friends, colleagues or other interest groups
  • Follow topics in real-time with saved searches
  • Update Facebook and view your friends’ status updates
  • Preview short URLs from the comfort of TweetDeck
  • View Twitpic thumbnails directly from TweetDeck
  • Record video clips within TweetDeck using 12seconds
  • And many other Twitter favourites including Stocktwits, Twitscoop and much more

Find the company you want, and enter your personal phone number. Bringo will call the company for you. When it reaches a person, it will call you. It then connects you with the representative.

gethuman - Customer Service Help,

The gethuman™ movement has been created from the voices of millions of consumers who want to be treated with dignity when they contact a company for customer support. Our main goals right now:
    • catalog steps to bypass automated (ivr) phone systems to speak directly to a human main database extended
    • establish standards for customer care based on input from customers (not businesses)
    • allow users to rate businesses for their customer service
    • allow users to discuss customer service experiences
    • allow users to share tips on how to contact help and receive better service

Thursday, June 11, 2009

The Two Worst Email Mistakes - Or Why Most of Email Doesn’t Get Read

The Two Worst Email Mistakes - Or Why most of Email Doesn’t Get Read

Email messages are unread for two simple reasons:

  • The message is buried
  • The entire message is a graphic.

Wasted Space
The first mistake has to do with the physical limitation of e-mail - which is not a printed page that the eye can scan all at once.

At most, the recipient of an email sees 10 lines of text on the first screen of an email (less if they’re reading it on a mobile device.) If you don't get your message in the first three or four lines: it won't get read.

Between fancy mastheads, lengthy letters from publishers, boilerplate about privacy policies and just plain garbage prose, it's the rare email that presents the subject in the first few lines.

How publications and advertisers waste space and time include:

  • The HTML masthead takes up the entire first screen of the e-mail then expects us to read through advertising to get to the table of contents.
  • The entire first screen is taken up, and sometimes as many as three screens, reminding us that we subscribed to this publication so we are not being spammed; that the mailing list will not be shared and that new subscribers are welcome. And only then, as many as 40 lines later - that's 4 screens in Outlook, etc - are we told what the issue contains.
  • Lots of white space between paragraphs introducing the issue of a publication, and then making us plough through a 10-line ad, a few paragraphs about the newsletter and a privacy statement before we get to the beginning of the first article.

All-Image email
Set your email not to download images unless you manually determine that you want to see them.


Do not send attachments without saying: I can send you the report, photos, PDF, press release, etc. if you are interested. Or state what the attachment is in the main body of the message.

Email mistake regarding recipients

Do not send to people you don't know - emails about stuff they do not care about, or want to know.

Calendars That Work

Printable Calendars for Your Life's Work. Click below for the FREE version.

Wednesday, June 10, 2009

Find Out How to Do (Almost) Anything at WikiHow

The site has amassed thousands of how-to manuals, authored by your fellow humans, covering an endless range of subjects. In the Computers and Electronics section alone, for example, you'll find guides ranging from Bypass DRM-Enabled Music to Make Laptop Screens Readable Outdoors.

Deleting Cell Phone Data Before Upgrading Phones

Whether you’re itching to get an iPhone or another cell phone, there are certain security precautions you should take when upgrading phones. Before you sell or trade in your current phone, learn how to delete your cell phone data. The last thing you want is to hand over personal information or sensitive data to a stranger.

Tuesday, June 09, 2009

94 Great Freeware Programs For A Freeware Only PC

The new Freeware MegaPack has 94 freeware programs, all tested and installed. I thought about making my PC freeware only, doing my daily PC jobs only with freeware programs and getting rid of all that expensive and buggy paid software. These 94 freeware programs are the ones that I am using now on a daily basis. Click below for the FREEWARE MISSION.

Monday, June 08, 2009

Preview links before you click

Interclue 1.5 - Your Personal Link Preview Multitool
  • Before you click the link
  • Hover your mouse pointer over the link, and a Linkclue icon will appear.
  • Rest your mouse on the icon, and up pops an enhanced summary of the linked page.
Interclue can give you:
  • A text content summary
  • A small snapshot of the page
  • Sizes and dates of linked files
  • Useful stats and metadata
  • Next actions - save, email...
  • And more. Check the options!

Managing your Facebook privacy and friends

The social networking site recently hit an astonishing 200 million users. If you haven’t received a Facebook invitation, you will.

Maybe you’re skeptical of Facebook. That’s understandable. It is easy to reveal private information accidentally. And the flux of information from your contacts can be difficult to control.

Fortunately, Facebook provides a bevy of tools. Using them, you can get your profile under control in a few short minutes.

77 Must-Have Utilities: Download Them All!

These essential programs will make your PC better—and your computing life a whole lot easier. And most of them are free!

By the Editors of

Sunday, June 07, 2009


What's Vodpod? Your favorite videos on the web, in one place. Save videos you like as you surf the web, or search to find them on Vodpod.
Our widgets let people watch videos you save on your blog, website, Facebook, Myspace or just about anyplace.

Saturday, June 06, 2009

Just how do websites track or monitor our activity?

Just how do websites track or monitor our activity?That question covers a lot of ground, from cookies to *IP tracking. It also misses a couple of areas that are worth thinking about as well. One important thing for most people: you, as an individual, just aren't that interesting. It's pretty likely no one really cares where you go or what you do. Let's see what they might care about, and the ways that they can collect it.

*An Internet Protocol (IP) address is your computer's numerical identification.

What Is Bing?

Bing is a new search engine from Microsoft. It's a lot like other search engines in that it allows you to use keywords to search for web content and it allows you to search for content based on category searches. Bing does have some unique features that make it worth a try. Take the tour.

Claim: E-mailed invitations from friends to join the web site are a form of scam or virus.

Millions of Internet users have received e-mails messages with subject lines indicating that some acquaintance has sent them photos or a private message on "Tagged" and urging them to visit and join the site to view the material lest the sender "think you said no".

Update Drivers in Windows

You might need to perform a driver update in Windows for all kinds of reasons. Usually, a driver update is used as a solution to an issue with how Windows works with a piece of hardware. Updating a driver can also enable new or updated features for the hardware.

Drivers are updated in Windows by using a driver update wizard from within Device Manager..

The driver update wizard walks you through the entire driver update process, making updating drivers a fairly painless task.

Windows 7, Windows Vista and Windows XP all have slightly different processes for completing driver updates:

Updating a hardware device's driver is usually the first troubleshooting step to any hardware issue in Windows. In particular, a simple driver update will correct many of the popular Device Manager error. - Sat 6/6/2009

11 Free Registry Cleaner Programs

Registry cleaner programs are software tools that remove duplicate or undesirable entries from the Windows Registry. Registry cleaner programs are especially useful for removing registry entries that point to files that no longer exist.

Important: Registry cleaner and registry fix programs should only be used as troubleshooting tools for actual PC issues. Registry cleaning should NOT be part of your regular PC maintenance.

The Futon Critic is the “web’s best television resource.” One of the highlights of the site is the “Rants and Reviews” that explores on the different interviews, events, and the plot of a given episode on a particular TV series. Check these sections below for more entertaining TV updates:
  • “Breaking News” has the most revealing scoops on the television scene.
  • In “Shows A-Z,” you will find the list of the TV series from past to present, and even the TV movies and mini-series.
  • “Listings” covers the air dates of TV series including what’s showing today.
  • Take a look at the “Ratings” section and see what programs capture the viewers appeal.
  • Also view “TV on DVD”“, Summer Guide,” and “MyFuton”.

Friday, June 05, 2009

Five ways to keep the dust bunnies out of a PC

If you keep your PC on the floor or operate them in dirty environments, the dust bunnies can quickly take over. Don’t believe me. Check out the dirty machines in our gallery of dirty computers.