user

Wed
04
Jan
Dennis Faas's picture

Trojan Horse Computing

In the context of computer software, a Trojan horse is a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan horse. In the siege of Troy, the Greeks left a large wooden horse outside ... the city. The Trojans were convinced that it was a gift, and moved the horse to a place within the city walls. It turned out that the horse was hollow, containing Greek soldiers who opened the city gates of Troy at night, making it possible for the Greek army to pillage the city. Trojan horse programs work in a similar way: they may look useful or ... (view more)

Wed
02
Nov
Dennis Faas's picture

Mouse Computing

A mouse is a handheld pointing device for computers, involving a small object fitted with one or more buttons and shaped to sit naturally under the hand. The underside of the mouse houses a device that detects the mouse's motion relative to the flat ... surface on which it sits. The mouse's 2D motion is typically translated into the motion of a pointer on the display. A mouse is called a 'mouse' primarily because the cord on early models resembled the rodent's tail, and also because the motion of the pointer on the screen can be mouse-like. In popular usage, the plural can be either mice or ' ... (view more)

Wed
12
Oct
Dennis Faas's picture

Windows Form Parking Window Error?

Infopackets Reader Jimmy B. writes: " Dear Dennis, I'm running windows XP and use Webroot Spy Sweeper and Norton Anti Virus. Sometimes I'll be using my computer when -- all of the sudden -- I get this very strange error message that reads 'Windows ... Form Parking Window' error and it shuts my computer down. What is Windows Form Parking Window and how can I stop it from appearing? I've done a Spyware and AntiVirus scan of my computer and haven't come up with anything. Can you help? " My response: From what I read via Google, the "Windows Form Parking Window" or " ... (view more)

Sun
11
Sep
Dennis Faas's picture

Popup Ad

Pop-up ads are a form of online advertising on the world wide web intended to increase web traffic or capture email addresses. It works when certain web sites open a new web browser window to display advertisements. The pop-up window containing an ... advertisement is usually generated by JavaScript, but can be generated by other means as well. A variation on the pop-up window is the pop-under advertisement. This opens a new browser window, behind the active window. Pop-unders interrupt the user less, but are not seen until the desired windows are closed, making it more difficult for the user to ... (view more)

Fri
26
Aug
Dennis Faas's picture

Phishing

In computing, phishing (also known as carding and spoofing) is the act of attempting to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business with a real need for ... such information in a seemingly official electronic notification or message, such as an email or an instant message. It is a form of a social engineering attack. The term phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' financial information and password data. With the growing ... (view more)

Mon
22
Aug
Dennis Faas's picture

Malware

Malware Malware , or "malicious software" is a generic term used to describe various types of malevolent programs. Below are some of the most common forms of malware. Virus Viruses have used many sorts of hosts. When computer viruses first ... originated, common targets were executable files that are part of application programs and the boot sectors of floppy disks. More recently, most viruses have embedded themselves in e-mail as Email attachments, depending on a curious user opening the viral attachment. In the case of executable files, the infection routine of the virus arranges that ... (view more)

Thu
11
Aug
Dennis Faas's picture

Spyware

Spyware is a broad category of malicious software intended to intercept or take partial control of a computer's operation without the user's informed consent. While the term taken literally suggests software that surreptitiously monitors the user, ... it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party. Spyware differs from viruses and worms in that it does not usually self-replicate. Like many recent viruses, spyware is designed to exploit infected computers for commercial gain. Typical tactics furthering this goal include ... (view more)

Fri
24
Jun
Dennis Faas's picture

MetaProducts Offline Explorer Review

Synopsis: What's the best way to archive your favorite web pages and web media permanently? Answer: MetaProducts Offline Explorer! Using a clear, intuitive and convenient user interface, Offline Explorer downloads Web and FTP sites (up to 500 ... simultaneously!) at the highest possible speed so you can browse, search, export to CD or perform other operations on downloaded sites. Among its many awards, Offline Explorer is a ZDNet.com 5-star winner! Offline Explorer: Screenshots Click to view: Page 1 | Page 2 | Page 3 | Page 4. 10 Reasons why you should be using Offline Explorer (1) A Powerful, ... (view more)

Wed
23
Feb
Dennis Faas's picture

Registry Mechanic 4 Review

Great news! PCTools, the authors of the incredibly popular flagship utility 'Registry Mechanic', have just recently released version 4.0. If you've been keeping up with our newsletter, you've undoubtedly heard me mention this extremely beneficial ... utility a number of times in the past. Reminder: What is Registry Mechanic? Registry Mechanic is by far the most widely regarded Windows Registry Cleaner on the Internet -- not only because it's received countless rave reviews from credible online sources, but also because it is one of the few Registry cleaners on the market that actually delivers ... (view more)

Thu
02
Dec
Dennis Faas's picture

Lock down Windows XP from unauthorized use?

Infopackets Reader Glenda 'LadyInRed' writes: " Dear Dennis, Since I am not that tech-savvy when it comes to making changes on a computer system, I have decided to ask this question. I hope that you can give me an answer to it, then I can stop ... trying to figure it out on my own. I have a son that is 27 years old and he is very intelligent when it comes to the computer. He likes to get on my computer since I have a fast Internet connection (DSL), and downloads music using Kazaa. The problem is that every time that Kazaa is installed onto my computer it causes a lot of problems. I have ... (view more)

Pages

Subscribe to RSS - user