norton

Tue
27
Aug
Dennis Faas's picture

'Norton Identity Safe 2014.5.0.67', and 'CutePDF Writer 3.0.0.6'

Norton Identity Safe 2014.5.0.67 Having trouble remembering all those complex passwords you use for your favorite websites? Then check out Norton Identity Safe from renowned security firm Symantec. It's designed to save you time but keep your most ... important passwords safe and secure. http://identitysafe.norton.com CutePDF Writer 3.0.0.6 This handy little tool is designed to help you convert PDF (portable document format) documents! It's compatible with every version of Microsoft Windows since Windows 98 and is absolutely free for non-commercial usage. http://www.acrosoftware.com This freeware ... (view more)

Fri
17
Feb
Dennis Faas's picture

Symantec Norton 360 Gets Win8, Multi-Platform Overhaul

Symantec has unveiled three new versions of its popular security software, Norton 360. The three releases include Norton 360 Version 6 (compatible with the upcoming Windows 8 beta), Norton 360 Everywhere, and Norton One. Each of the three versions ... offer something different. For example, Symantec boasts that Norton 360 Version 6 will provide a download option to support the Windows 8 beta edition whenever that new operating system becomes available to the public, which is reportedly due this summer . Compatibility with Windows 8 Beta a "Priority," Symantec Says "We're making it a ... (view more)

Mon
05
Sep
Dennis Faas's picture

Free Norton App Targets Malicious Facebook 'Likejacking'

With accessibility being one of the central features of almost every "smart" device, it is no wonder that social networking has become an integral part of the everyday routine. But one of the factors that takes away from this experience is the ... increasing number of virtual traps that hackers design to victimize and/or profit from social networking users. Among the most prolific attacks on Facebook members is the "likejacking" scam, a form of click hijacking whereby users are tricked into recommending a site they've never visited. In response to this malicious practice, Norton has created a new ... (view more)

Thu
20
Dec
Dennis Faas's picture

Symantec's 360 Beta Coming Soon

Scared about holiday spam and spyware messages? Although it's some ways off, Symantec is now just a few weeks away from shipping a test edition of its next significant update to the Norton 360 security/backup formula. The finished product is ... expected to wrap up early this spring, shipping by the time March wraps up. So, what's under the hood of this new Norton 360 (for now dubbed 'version 2.0)? Preventative measures against Internet hackers and identity thieves A "Smart Firewall" that reportedly uses behavior-based methods to weed out incoming threats New software that can be used to back up ... (view more)

Wed
20
Dec
Dennis Faas's picture

A Custom Security Suite that Beats Norton: For Free?

Do you use Norton Security or an "all-in-1" solution to protect your PC? You might not want to after you read this: Infopackets Reader Mike L. writes: " Dear Dennis, My problem is that I'm a relatively naive computer user and have -- for some time ... now -- depended on Norton's 'all in one' security package (firewall / anti-virus / anti-spam) to blanket my PC from Internet nasties. A friend told me that Norton tends to configure a PC to best meet their own specifications, and that this causes periodic corruptions. Can you point me to information about the best way for a less than ... (view more)

Thu
17
Mar
Dennis Faas's picture

System Restore and similar Registry Reverting utilities -- pointless?

Infopackets Reader Helen H. writes: " Dear Dennis, I recently installed Norton System Works 2005, and now my computer is reporting that System Restore for Windows XP will not complete the restore process. It says, 'System Restore Incomplete.' Can ... you tell me if the Norton antivirus is interfering with the restore program? If so what to I need to do to correct the problem? " My response: Personally, I don't use Norton System Works 2005, so I can only speculate on your situation. Since one of the components of Norton System Works (NSW) is to provide a "Go Back" restore ... (view more)

Tue
14
Dec
Dennis Faas's picture

Is XP SP2 necessary, since my router acts like a firewall?

Infopackets Reader Kathy O. writes: " Dear Dennis, I am getting ready to build a new computer and plan to put Windows XP Home Edition with XP Service Pack 1, although I have already ordered the XP Service Pack 2 CD from Microsoft. As it stands now, ... I will be running both computers from my LinkSys router; however, I was told by a friend that I would need to turn off Windows XP's firewall from the Control Panel after I install Service Pack 2. Is this true? And also, is it necessary to apply XP Service Pack 2 since my router acts like a firewall? If so, should I disable the Windows Firewall ... (view more)

Tue
17
Feb
Dennis Faas's picture

Verify Action Type for File Association

Infopackets Reader Berlin B. writes: " Dear Dennis, As part of my stringent preventive maintenance plan, I recently ran AdAware 6.0 and Norton AntiVirus software on my PC. Norton reported a number of 'at risk' files on my system. After I ran AdAware ... 6.0, the document files listed in the My Documents folder now show a .DOC extension with no associative icon. When I try to click these files, a window appears and asks me to select the appropriate file extension. It also warns me that if I select the wrong type, the file may become unusable. I was unsure what to do, so I ran System Restore ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Wed
09
Oct
Dennis Faas's picture

Can I track down a hacker?, Part 2

Yesterday's Visitor Feedback asked, " Can I track down a hacker ?" My answer to that question was a passive one -- mainly based on the fact it would take an inconceivable amount of time to prosecute each and every hacker who tries to wallow his way ... into your computer system. An algorithm for a typical Hacker might look something like this: Randomly select a computer to hack; Attempt to gain access to randomly selected computer; If access is granted, deliver a payload (send virus/trojan, delete files); If access is not granted, disconnect from this computer; Repeat process. With the ... (view more)

Pages

Subscribe to RSS - norton