protection

Wed
09
Mar
Dennis Faas's picture

Backup Made Easy: A Six Point Guide to Buying Backup Software

Continued from Choosing a Backup Solution: An In Depth Look and 6 Key Elements for any Backup Strategy ; this article is our third and final installment. -- Each year, home and business users lose millions of dollars in lost data because the backup ... solution they've elected to use has failed to live up to its promises -- often, the result of a failed restore, partially corrupted files, or poor hardware support. With -- literally -- millions of documents on the web related to "backup software", making an informed decision about an appropriate backup solution can prove to be an ... (view more)

Wed
23
Jul
Dennis Faas's picture

Spy Sweeper Review

If told you that 9 out of 10 PC's are infected with some form of Spyware, would you be concerned? According to Webroot Software, you should be! In general, Spyware is software which records information about you or your computer usage -- without ... your knowledge -- and then relays this information to a third party (quite often, for marketing purposes). Spyware has the ability to trace your every keystroke, and may record things such as passwords, credit card numbers, email addresses, and other personal information. All of this makes Spyware a serious threat to privacy and the protection of your ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Mon
14
Jan
Dennis Faas's picture

How Buffer Underrun technology hinders CD Recording Performance

If you own a CD Burner, there's a good chance that you've come across a "Buffer Underrun" error message. A buffer underrun happens when information cannot be recorded to the CD because of resource starvation. All CD recorders without buffer underrun ... protection require a constant flow of data to be read from the hard drive to the CD recorder without interruption. If the flow of data is stopped, a buffer underrun will follo w. For example, if your hard drive can only read information at a rate of X and the CD Recording needs information at a rate of X+1, this is referred to resource ... (view more)

Pages

Subscribe to RSS - protection