• What is Domain Name Resolution Image

    What is Domain Name Resolution

    When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert it to an IP address that it will use to connect to.

  • The Hosts File and what it can do for you Image

    The Hosts File and what it can do for you

    When using the Internet most people connect to web sites, ftp servers or other Internet servers by connecting to a domain name, as in www.bleepingcomputer.com. Internet applications, though, do not communicate via domain names, but rather using IP addresses, such as 192.168.1.1. Therefore when you type a domain name in your program that you wish to connect to, your application must first convert it to an IP address that it will use to connect to.

  • Using SpywareGuard to protect your computer from Spyware & Hijackers Image

    Using SpywareGuard to protect your computer from Spyware & Hijackers

    While you use anti-virus software to protect your computer against known viruses, trojans, and worms, you most likely do not use a piece of software to protect your computer against Spyware and Hijackers. That is where SpywareGuard comes in to play. SpywareGuard is a Freeware program by Javacool Software that will run alongside your traditional virus scan, but instead of alerting you when you are about to run a program infected with a virus, it instead tells you when you are about to run a Spyware/Hijacker. Though products like these are not mainstream like anti-virus software, these products are becoming essential for keeping your computer secure and clean from harmful software.

  • Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware Image

    Using SpywareBlaster to protect your computer from Spyware, Hijackers, and Malware

    Many Spyware, Hijackers, and Dialers are installed in Internet Explorer through a Microsoft program called ActiveX. These activex programs are downloaded when you go to certain web sites and then they are run on your computer. These programs can do a variety of things such as provide legitimate services likes games or file viewers, but they can also be used to install Hijackers and Spyware on to your computer without your permission.

  • Using Ad-Aware 2007 Free to remove Spyware & Hijackers from Your Computer Image

    Using Ad-Aware 2007 Free to remove Spyware & Hijackers from Your Computer

    An excellent free program to include in your collection of anti-spyware programs is Ad-Aware 2007 Free. This tutorial will provide instructions on how to install, configure, and remove malware from your computer using Ad-Aware 2007. It is important to note, though, that Ad-Aware 2007 is not compatible with Windows 95, Windows 98, or Windows ME. If you are using those operating systems then you must follow the instructions on using the older Ad-Aware 6 SE Personal edition.

  • Introduction to the File Transfer Protocol (FTP) Image

    Introduction to the File Transfer Protocol (FTP)

    In current times if you want to transfer a file to a friend, you can just attach it in an email and send it off. With high speed bandwidth being so cheap and plentiful to the home user, transferring a file in this manner is usually more than adequate. What if you needed to transfer the file to someone immediately; there could be no delays, it has to be fast, and the files you are transferring may be very large. In a scenario like this, email will most likely not be adequate. This is because most email providers limit the size of your mailbox on their servers, the size of attachments you may receive, and that there is no guarantee when you send email how long it will take for the recipient to receive it or if it will even get there. This is where FTP comes in.

  • How the Web Works Image

    How the Web Works

    For many of us, the Internet and Web Browsing has become a daily activity. Whether it is for checking stock prices, buying food, doing work, ordering books and music, or just to browse a favorite site, web browsing has become an institution in our lives much the way television is. Have you ever wondered how this whole web thing works, though? This tutorial is designed to explain the history and concepts of the Web and how it works technically. After you browse to a site, you will understand actually how it is done and how your computer retrieves this information. Our first stop, is the history of the Web.

  • Windows Program Automatic Startup Locations Image

    Windows Program Automatic Startup Locations

    Many programs that you install are automatically run when you start your computer and load Windows. For the majority of cases, this type of behavior is fine. Unfortunately, there are programs that are not legitimate, such as spyware, hijackers, Trojans, worms, viruses, that load in this manner as well. It is therefore important that you check regularly your startup registry keys regularly. Windows does offer a program that will list programs that are automatically started from SOME of these locations. This program, Msconfig.exe, unfortunately, though, only lists programs from a limited amount of startup keys.

  • Using Spybot - Search & Destroy to remove Spyware from Your Computer Image

    Using Spybot - Search & Destroy to remove Spyware from Your Computer

    If you suspect that you have spyware installed on your computer, then an excellent tool called Spybot - Search and Destroy can be used to remove them. Follow the instructions below to learn how to use Spybot - S&D to remove these programs from your computer. Word of warning, though, Spyware can sometimes be integrated tightly into software that you use, and if you remove the spyware, that software may not function correctly. So be careful as to what you remove.

  • HijackThis Tutorial - How to use HijackThis to remove Browser Hijackers & Spyware Image

    HijackThis Tutorial - How to use HijackThis to remove Browser Hijackers & Spyware

    HijackThis is a utility that produces a listing of certain settings found in your computer. HijackThis will scan your registry and various other files for entries that are similar to what a Spyware or Hijacker program would leave behind. Interpreting these results can be tricky as there are many legitimate programs that are installed in your operating system in a similar manner that Hijackers get installed. Therefore you must use extreme caution when having HijackThis fix any problems. I can not stress how important it is to follow the above warning.

search tutorials

Login

Remember Me
Sign in anonymously