• Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware Image

    Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware

    Many Spyware, Hijackers, and Dialers are installed in Internet Explorer through a Microsoft program called ActiveX. These activex programs are downloaded when you go to certain web sites and then they are run on your computer. These programs can do a variety of things such as provide legitimate services likes games or file viewers, but they can also be used to install Hijackers and Spyware on to your computer without your permission.

  • Using Ad-Aware 2007 Free to remove Spyware & Hijackers from Your Computer Image

    Using Ad-Aware 2007 Free to remove Spyware & Hijackers from Your Computer

    An excellent free program to include in your collection of anti-spyware programs is Ad-Aware 2007 Free. This tutorial will provide instructions on how to install, configure, and remove malware from your computer using Ad-Aware 2007. It is important to note, though, that Ad-Aware 2007 is not compatible with Windows 95, Windows 98, or Windows ME. If you are using those operating systems then you must follow the instructions on using the older Ad-Aware 6 SE Personal edition.

  • Introduction to the File Transfer Protocol (FTP) Image

    Introduction to the File Transfer Protocol (FTP)

    In current times if you want to transfer a file to a friend, you can just attach it in an email and send it off. With high speed bandwidth being so cheap and plentiful to the home user, transferring a file in this manner is usually more than adequate. What if you needed to transfer the file to someone immediately; there could be no delays, it has to be fast, and the files you are transferring may be very large. In a scenario like this, email will most likely not be adequate. This is because most email providers limit the size of your mailbox on their servers, the size of attachments you may receive, and that there is no guarantee when you send email how long it will take for the recipient to receive it or if it will even get there. This is where FTP comes in.

  • How the Web Works Image

    How the Web Works

    For many of us, the Internet and Web Browsing has become a daily activity. Whether it is for checking stock prices, buying food, doing work, ordering books and music, or just to browse a favorite site, web browsing has become an institution in our lives much the way television is. Have you ever wondered how this whole web thing works, though? This tutorial is designed to explain the history and concepts of the Web and how it works technically. After you browse to a site, you will understand actually how it is done and how your computer retrieves this information. Our first stop, is the history of the Web.

  • Windows Program Automatic Startup Locations Image

    Windows Program Automatic Startup Locations

    Many programs that you install are automatically run when you start your computer and load Windows. For the majority of cases, this type of behavior is fine. Unfortunately, there are programs that are not legitimate, such as spyware, hijackers, Trojans, worms, viruses, that load in this manner as well. It is therefore important that you check regularly your startup registry keys regularly. Windows does offer a program that will list programs that are automatically started from SOME of these locations. This program, Msconfig.exe, unfortunately, though, only lists programs from a limited amount of startup keys.

  • Using Spybot - Search & Destroy to remove Spyware from Your Computer Image

    Using Spybot - Search & Destroy to remove Spyware from Your Computer

    If you suspect that you have spyware installed on your computer, then an excellent tool called Spybot - Search and Destroy can be used to remove them. Follow the instructions below to learn how to use Spybot - S&D to remove these programs from your computer. Word of warning, though, Spyware can sometimes be integrated tightly into software that you use, and if you remove the spyware, that software may not function correctly. So be careful as to what you remove.

  • HijackThis Tutorial - How to use HijackThis to remove Browser Hijackers & Spyware Image

    HijackThis Tutorial - How to use HijackThis to remove Browser Hijackers & Spyware

    HijackThis is a utility that produces a listing of certain settings found in your computer. HijackThis will scan your registry and various other files for entries that are similar to what a Spyware or Hijacker program would leave behind. Interpreting these results can be tricky as there are many legitimate programs that are installed in your operating system in a similar manner that Hijackers get installed. Therefore you must use extreme caution when having HijackThis fix any problems. I can not stress how important it is to follow the above warning.

  • Understanding Spyware, Browser Hijackers, and Dialers Image

    Understanding Spyware, Browser Hijackers, and Dialers

    For the past couple of years there has been a new threat introduced to your computer that anti virus software does not as of yet remove. This software is developed to track your movements on the Internet, create statistics of what you do on your computer, or even worse, actually hijack your web connections to direct you to pages that you did not ask for. These types of Malware are called Spyware, Browser Hijackers, and Dialers. Malware is the generic category of any programs that perform a detrimental effect on your computer without your knowledge or permission. Other more notorious types of Malware are viruses, Trojans, worms, and backdoors.

  • How to configure the Windows Firewall in Windows XP Image

    How to configure the Windows Firewall in Windows XP

    Windows XP comes with a built-in firewall called Windows Firewall. For people who do not want to spend the money on a commercial software firewall, this firewall will be more than enough to protect your computer. By default, Windows Firewall disables all incoming traffic to your computer, including ICMP traffic, which consists of pings. Just like all other firewall's you can specify which services/ports you would like to have open so that other computers can connect to yours. This will allow you to open up ports for services like web servers, mail servers, game servers, etc. Windows Firewall comes configured with basic services that you can enable to be opened, and you also have the ability to add other rules for incoming traffic that are not already configured. If you would like, you also have the ability to enable incoming ICMP traffic, so that you can ping and traceroute to your computer.

  • Enable and Disable XP Built-In Zip Support Image

    Enable and Disable XP Built-In Zip Support

    A very useful tool that comes built-in to Windows XP is the inherent zip support. This allows you to view, create, and extract zip files without having a third party tool. There are times that you will want to use a third-party zip compression program, and at those times, the built-in zip support may conflict. If this is the case, you can follow these steps to disable or re-enable the built-in zip support for Windows XP.

Login

Remember Me
Sign in anonymously