Pages

Thursday, May 26, 2011

What Do You Do With an Infected CD, DVD, or Flash Drive?

Safely handling infected external media.

It's dangerous, but not horrifically so. If there are files on that media that you need to get your hands on, you can get them. You just have to do it cautiously.

One simple solution is to access it on a Mac or a Linux PC. Malware tends to be OS-specific, so it's unlikely to cause harm.

If you're going to use a Windows PC, update your security software first. Then install some extra malware fighters, such as the free versions of
Malwarebytes' Anti-Malware and  SUPERAntiSpyware. Update those, too.

You don't want Windows to launch a malicious program as soon as you insert the disc or flash drive, so disable AutoPlay. That's the Windows feature that looks for, then runs, instructions on just-plugged-in external media. You can always turn it back on later, although many security experts advise that you don't. Read more...




Keep Your Computer Running Fast and Reliably

Your computer needs regular maintenance to continue performing at its best.

All-in-one PC maintenance tools make it a breeze to keep your system in top shape. Their functions generally include registry cleaning; disk defragmentation; optimization of system settings; and deletion of unnecessary temporary files. Some FREE PC maintenance tools include scheduling of maintenance, cleanup of spyware, and system-tweaking options for advanced users.

Smart users perform PC cleanup and tune-up operations every week or so. Here's what I recommend, and some free computer maintenance tools to help you do the job.
Read more by Bob Rankin.




Monday, May 23, 2011

Kids Under 13 are Already Allowed on Facebook

Facebook founder and CEO Mark Zuckerberg has sparked a minor controversy by suggesting that children under 13 should be allowed to join social networking sites. The thing is, there is nothing stopping Facebook from allowing children to join now...except Facebook.

As it stands, the Facebook terms of service dictate that members be at least 13 years old to set up an account. However, a recent Consumer Reports survey indicates that as many as 7.5 million Facebook users are under 13, and two-thirds of those kids are under 10. Either they, or their parents, simply lied about their age to set up the account.


Friday, May 20, 2011

Where Did That Scammer Get Your Email Address?

An eye opening look at the underpinnings of scam emails.
If you've ever wondered how scammers get email addresses you'll want to read this article.
It's a great overview of how scammers acquire and use email addresses.
If you're curious about the Nigerian letters scam you'll find it and other ploys explained.


Protect Your Kids Online


Parents need to protect their kids from all sorts of technological dangers. There are pornographic web sites, scams, hate groups, violent video games, and online predators pretending to be age-appropriate harmless flirts.

And even if your kids (and grandkids) visit only safe sites, you still have to worry about all the time they waste on their computers. Every hour they spend starring at a glowing screen is an hour not spent getting exercise, playing out-of-doors, sleeping, or interacting with people in the real world.
Click below:
 

'Checkout Your PROFILE Stalkers' scam spreading on Facebook

Multiple users are reporting on a currently circulating "Checkout Your PROFILE Stalkers" Facebook scam.

READ FULL STORY...

Wednesday, May 18, 2011

How to Block All Cookies Except for Sites You Use


Cookies can be useful when you’re in control of them. (A cookie is simply a small file that a web site places on your computer to store information). Today we’re taking a look at how you can control cookies by blocking them except for when you want them to enhance your user experience. 

Anti-Spam Email Filters

By some estimates, over 90 per cent of all email traffic is spam. Anti-spam email filters do their best to keep spam from reaching your inbox, but no spam filter is perfect. You may need to tweak your filters to catch particularly clever spam, or to allow some legitimate email to reach you.

One in fourteen Internet downloads is Windows malware

Microsoft admits that one in fourteen downloads are Windows malware. And you thought the Mac having malware trouble was news! Read more...

Monday, May 16, 2011

Is Your Email Secure? Category: Email

Many consumers are blissfully unaware of the threats knocking on the doors of their email inboxes. Popular free email service providers such as Google, Yahoo, and Hotmail, stop a vast number of threats at their mail servers without any attention from end users. But some threats still get through, so consumers using desktop email software, and businesses that operate their own email servers must defend themselves. Here are some of the email security software programs that get the job done...


LearnOutLoud.com - Changing the Way the world Learns

LearnOutLoud.com is your one-stop destination for audio and video learning. (The links in red below take you directly to that subject)

Browse the Net's largest Catalog of educational audio books, podcasts, downloads, & free audio & video. Over 25,000 titles from hundreds of authors and publishers.


Saturday, May 14, 2011

Seven Signs of Identity Theft

In 2009, 11.1 million adults were victims of identity theft, according to a study by Javelin Strategy & Research. This was a 12% increase from 2008. One of the biggest problems with identity theft is the cost to consumers both in time and money. The study shows that the average fraud victim spent 21 hours and $373 trying to clear their name of identity theft.

Early detection is always key when it comes to fighting identity theft. The sooner you find out about a theft occurrence, the sooner you can take steps to prevent further damage. Learn to recognize the signs of identity theft so you can respond quickly.



Why You Should Dump Outlook and Windows Live Mail

The main advantage of webmail services is portability. It lets you check send and receive email from your own computer desktop, or any computer in the world.
Why stay chained to your desktop, when you can check email from your laptop, iPad, or mobile phone?
There are many webmail services like Gmail, Hotmail, and Yahoo. Millions of people use them to stay connected to their email inbox anywhere there is an Internet connection.

Webmail is maintenance-free for users, too. There is no need to download, install or update software, junk mail definition databases, or other app components. Webmail requires only a standard web browser, eliminating one more disk-hogging application program. Over time, email messages can consume a lot of disk space, but with webmail, messages remain on the provider's server. 


Messages are easily searched, archived, deleted, forwarded, etc., all without eating up your hard drive, processor power or bandwidth. That's especially important when dealing with messages that include large attached files. Read more.....



Friday, May 13, 2011

If I forward this e-mail to 10 people, will I win $1,000?

How many times have you received an e-mail from a friend, co-worker, or family member that reads something like this: "Forward this e-mail on to 10 people and receive good luck for a month!" Or "If you forward this to 10 people, you'll see something funny on your screen after you send it!"

I don't know about you, but I still receive these occasionally. But what happens when you do forward them on as instructed? I hate to be the one to burst your bubble, but nothing will come of them. So what is the purpose of this chain mail?  Is it true that tracker programs are attached to these e-mails that track the cookies and e-mails of those folks you forward to? Is it a way to get names and cookie tracking information for telemarketers and spammers--to validate active e-mail accounts for their own profitable purposes?

Read more...

Tuesday, May 10, 2011

Check For Viruses Before Downloading That File!

It's good to scan your system for viruses regularly. It's better to use an antivirus program that offers real-time protection by scanning incoming files as you download them. But wouldn't it be best if you could scan a file for viruses before you started downloading it? Several free tools let you do just that.

I subscribe to Bob's newsletter. it is written very well and he answers questions that his readers have. A link to his website is always available on the right side of my blog under: "My Favorite Links".


Internet Safety: How do I keep my computer safe on the internet?

Internet Safety is difficult and yet critical. Here are the seven key steps to internet safety - steps to keep your computer safe on the internet.

I subscribe to Leo's newsletter. it is written very well and he answers questions that his readers have. A link to his website is always available on the right side of my blog under: "My Favorite Links".


Giveaway of the Day - Free Licensed Software

Every day we nominate one software title that will be a Giveaway title of that day.
The software is available for download for 24 hours (or more, if agreed by software publisher) and that software is absolutely FREE.


That means – not a trial, not a limited version – but a registered and legal version of the software is completely free for our visitors.


The software product is presented in its full functionality, without any limitations save for those mentioned in Terms and Conditions.


The download link remains on our web-site for the agreed period of time, together with the review of the software product and the information about other products from the software publisher presenting the giveaway title.



You will find a permanent link to this website on the right hand side of Don's Blog.



Monday, May 09, 2011

Bin Laden Virus

You knew it was coming: viruses embedded in messages with purported images of Osama Bin Laden and videos of the raid. Don't open the message; if you do, don't click any of the links.


Don

Sunday, May 08, 2011

Advanced SystemCare Free

Obit's Advanced SystemCare Free 4 offers a moderately useful set of free tuneup tools that performs tasks from cleaning your disk of unnecessary files to protecting your privacy by erasing traces of your surfing habits, defragging your hard disk, scanning your system for security holes and more. 

I have been using this successfully for quite a while. I liked it enough to upgrade to the paid version. It is very user friendly



Saturday, May 07, 2011

Free Satellite TV on PC?

Everything I've read about this type of thing tells me it's a scam, or at least a waste of money. The software you get for your forty bucks is nothing more than a menu of free online television broadcasts. Most of the stations listed are foreign, and the list contains many entries that are obsolete or do not work.


The Top 100 Tech Products of 2010


Mega-Guide! The Top 100 Tech Products of 2010
Laptops, tablets, desktops, and way more: Our editors pick the best tech they tested over the past year. See what they chose and why—as well as where to get it.
Click to See the Whole Guide
See Our Picks for the Top Desktops
See Our Picks for the Top Laptops and Tablets
See Our Picks for the Top Printers
See Our Picks for the Top PC Upgrades

The Usability of Passwords

Security companies and IT people constantly tells us that we should use complex and difficult passwords. This is bad advice, because you can actually make usable, easy to remember and highly secure passwords. In fact, usable passwords are often far better than complex ones. 

What makes a password secure in practical terms?  Passwords can be made both highly secure and user-friendly.
Read more...

MozyHome Free - online backup service

MozyHome Free - 2 GB for free!
Any exceptional backup service should be easy to use, automatic, reliable, and easy to restore from. Mozy is all of these.
 

MozyHome Free is completely free and gives you up to 2 GB of storage on Mozy's servers.
Get 2 GB of 100% free online backup for your photos, music, and other files. No setup fee, no credit cards, no monthly payments or fees, and no hassle.


To get started with Mozy, visit their website and sign up for an account. Download and install their software, tell it what files or types of files to backup, and then set it to automatically backup whenever you like.


 

Thursday, May 05, 2011

How to Buy a Point-and-Shoot Digital Camera

By far the largest segment of the digital camera market, point-and-shoot models are compact, easy to use, and typically take great pictures with minimal effort. You simply press the shutter button, and the camera automatically adjusts shutter speed, aperture, focus, and light sensitivity to capture a clear image with optimal color. Unlike digital SLRs, which offer larger image sensors, more manual control and interchangeable lenses, point-and-shoot cameras can slip into a pocket, and are often hundreds of dollars less expensive than their D-SLR counterparts.


Wednesday, May 04, 2011

Malinator - Let Them Eat spam

Learn how to get a disposable e-mail address. Protect your privacy and avoid spam. Use Mailinator! No Registration! No Sign-up!

How do I create an account at Mailinator? It's simple, you just send email to it. Temporary accounts are created when email arrives for them. First, you give out the mailinator email address you created, and then you check it. It's that simple.



Monday, May 02, 2011

Responding Heads 4

Responding Heads is a Windows XP application that enables you to launch programs, commands and actions via voice commands spoken into your PC microphone. The program uses the MS Speech recognition engine and is very easy to configure.





 
Loading