security

security

Tutorials

  • Protect Windows XP from zero-day flaw in HCP protocol

    Earlier this week was Microsoft's Patch Tuesday for June--a busy Patch Tuesday with ten new security bulletins fixing 34 different vulnerabilities. However, there is now a publicly disclosed vulnerability with potentially dire consequences that didn'...

  • How to foil Web browser 'tabnapping'

    A new, incredibly sneaky identity-theft tactic surfaced earlier this week when Mozilla's Aza Raskin, the creative lead of Firefox, unveiled what's become known as "tabnapping."

  • Keep your personal data off the market

    In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay h...

  • The ultimate guide to Windows 7 security

    Windows 7 has been warmly received and swiftly adopted by businesses, with the result that many IT admins are now struggling with the platform's new security features. In addition to changes to User Account Control, BitLocker, and other features inhe...

  • One or two anti-malware programs?

    A reader asked if it's really a good idea to supplement your regular antivirus program with something like SuperAntiSpyware or Malwarebytes Anti-Malware. I've recommended doing just that in the past.

  • Lose the Trojan

    A reader asked the Answer Line forum how she can remove a Trojan from an infected .dll file called infamiqayoq.dll. Her security software quarantined the file, but now she gets an error message every time she boots.

  • Full disk encryption comes to workgroups

    Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up...

  • Check the strength of your password

    A good password can mean the difference between identity safety and identity theft. Unfortunately, too many otherwise intelligent people rely on ridiculously weak passwords, the kind that make hackers rub their hands with glee.

  • Securely access e-mail

    SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encrypt your email connection so that your password and messages are scrambled to eavesdroppers. If you're only connecting through a wired, office PC, you'll face little exposure with non-e...

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?