protection

Wed
23
Jul
Dennis Faas's picture

Spy Sweeper Review

If told you that 9 out of 10 PC's are infected with some form of Spyware, would you be concerned? According to Webroot Software, you should be! In general, Spyware is software which records information about you or your computer usage -- without ... your knowledge -- and then relays this information to a third party (quite often, for marketing purposes). Spyware has the ability to trace your every keystroke, and may record things such as passwords, credit card numbers, email addresses, and other personal information. All of this makes Spyware a serious threat to privacy and the protection of your ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Mon
14
Jan
Dennis Faas's picture

How Buffer Underrun technology hinders CD Recording Performance

If you own a CD Burner, there's a good chance that you've come across a "Buffer Underrun" error message. A buffer underrun happens when information cannot be recorded to the CD because of resource starvation. All CD recorders without buffer underrun ... protection require a constant flow of data to be read from the hard drive to the CD recorder without interruption. If the flow of data is stopped, a buffer underrun will follo w. For example, if your hard drive can only read information at a rate of X and the CD Recording needs information at a rate of X+1, this is referred to resource ... (view more)

Pages

Subscribe to RSS - protection