a known malware site

The 140 character microblogging platform Twitter is gaining popularity by each passing day. Geek or no-geek, everybody seems to be hooked up to Twitter, which looks like a good-for-no-use application when it was started.

Read More

 

There has always been a heated debate between the advocates of Free Antivirus Software and the promoters of Paid security software products. The first category of people try to criticize the security software companies like Symantec and McAfee for charging the computer users for something which is freely available from developers like Avira and AVG totally free of cost.

Read More

 

online_antivirus_engine

Desktop virus scanners are not the only software that will help you scan files that you download, there are several online virus engines that will let you upload a file and check if it contains any virus or spywares.

Read More

 

Beat Keyloggers With Neo's SafeKeys

Protect yourself from Keyloggers while using public terminals by using on-screen keyboards like Neo’s SafeKeys 2008.

Read More

 

gmail_executable_attachments

Gmail and many other email providers disallow users from sending email with .exe (executable files) and many other file types including .class (java compiled files) or any other compiled files, or any other type of files that can be remotely executed when someone downloads them.

Read More

 

If you have not heard yet, the internal accounts at twitter was hacked through a employees account and much of the private data that is definitely not for public eyes was exposed to the world.

Read More

 

gmail_anti_phishing_key

Phishing attacks are not uncommon and many people are fooled to believe that someone is sending you a genuine email, though Gmail’s spam filters are excellent, there may be times when you want to confirm if a email is genuine and not a phishing attempt.

Read More

 

identity theft

Lots of proxy servers available today, many of them spring up everyday and disappear as quickly as they came by, this definitely puts a big question mark on whether a proxy server is really safe.

Read More

 

win7isoverifier

If you have downloaded a copy of Windows 7, before you go ahead and install it, a small tool called Windows 7 ISO verifier can save you a lot of trouble.

Read More

 

blocked_email_images_gmail

One of our readers asked a interesting question today, the readers basically asked us that he signs up for a lot of newsletters, however whenever he opens up them in Gmail, the images are hidden and he has to click on a link to show the images.

Read More

 

toplogo

Kaspersky Labs, creator of premier security applications have launched the new versions of their security suites. Kaspersky Internet Security 2010 and Kaspersky Antivirus 2010 are out on the streets. The new updated suites carry a lot of updates and new features to keep you safe from the bad guys. Kaspersky’s software has a very good [...]

Read More

 

microsoft_security_essentials

Microsoft has finally released their free anti virus solution codenamed “Morro” and AKA Microsoft Security Essentials to limited public beta users.

Read More

 

md5_file_integrity_check

Over a period of time several users have asked us a question, the question relates to MD5 strings that are associated with file downloads, many users are usually clueless about this, so we finally decided to write a post that explains to users, what those MD5 strings mean, and what significance they have in order [...]

Read More

 

online_link_scan

A friend of mine recently emailed me (and others) and included a link in it, however I found the link to be suspicious and did not open it up. In the process I chatted with the friend who had sent me the email and asked him why he sent a bad link in the email, [...]

Read More

 

Anonymous

Privacy concerns are pretty high these days, with ISPs snooping on what you download, throttling bit torrent connections and lawsuits galore. So how do you protect yourself from these privacy concerns? Image Credit The simple answer to this question would be Staying anonymous on the Internet, but how? When you browse any website, you are [...]

Read More

 

1 10 11 12 13 14 15 16
 
Copyright 2006-2012 Techie Buzz. All Rights Reserved. Our content may not be reproduced on other websites. Content Delivery by MaxCDN