protection

Fri
01
Jul
Dennis Faas's picture

Use more than Spyware Remover for Redundant Protection?

Infopackets Reader Henry H. writes: " Dear Dennis, I have Spy Sweeper installed in my computer, but last week after running Norton Antivirus I discovered a threat called 'Adware.Ezula.' Thanks to an article of yours I also downloaded Acronis True ... Image , which I have found fantastic, so I was able to revert my system back to a previous state (and without the Adware.Ezula on my system)! I was so impressed with True Image that I decided to examine the entire Acronis product line. I came across their 'Acronis Privacy Expert Suite', and I would appreciate your opinion on whether or not I ... (view more)

Wed
09
Mar
Dennis Faas's picture

Backup Made Easy: A Six Point Guide to Buying Backup Software

Continued from Choosing a Backup Solution: An In Depth Look and 6 Key Elements for any Backup Strategy ; this article is our third and final installment. -- Each year, home and business users lose millions of dollars in lost data because the backup ... solution they've elected to use has failed to live up to its promises -- often, the result of a failed restore, partially corrupted files, or poor hardware support. With -- literally -- millions of documents on the web related to "backup software", making an informed decision about an appropriate backup solution can prove to be an ... (view more)

Wed
23
Jul
Dennis Faas's picture

Spy Sweeper Review

If told you that 9 out of 10 PC's are infected with some form of Spyware, would you be concerned? According to Webroot Software, you should be! In general, Spyware is software which records information about you or your computer usage -- without ... your knowledge -- and then relays this information to a third party (quite often, for marketing purposes). Spyware has the ability to trace your every keystroke, and may record things such as passwords, credit card numbers, email addresses, and other personal information. All of this makes Spyware a serious threat to privacy and the protection of your ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Mon
14
Jan
Dennis Faas's picture

How Buffer Underrun technology hinders CD Recording Performance

If you own a CD Burner, there's a good chance that you've come across a "Buffer Underrun" error message. A buffer underrun happens when information cannot be recorded to the CD because of resource starvation. All CD recorders without buffer underrun ... protection require a constant flow of data to be read from the hard drive to the CD recorder without interruption. If the flow of data is stopped, a buffer underrun will follo w. For example, if your hard drive can only read information at a rate of X and the CD Recording needs information at a rate of X+1, this is referred to resource ... (view more)

Pages

Subscribe to RSS - protection