You’re probably aware that when you delete a file — even from the recycle bin — it’s not really gone; Windows has, in effect, deleted the file’s address on the hard drive.
You likely also know that completely erasing a file requires thoroughly writing over its bits on the hard drive, though not as thoroughly as you might think.
Measuring the vulnerability of operating systems and applications to attacks from hackers is vital to safe computing on the Internet.
The most-common measure of computing security is counting vulnerabilities. But using this metric is horribly inaccurate and needs to stop.
I’ve been hearing about a new community-centric AV program that purports to use your social network to fight malware.
The free version I looked at has some intriguing features, such as the ability to run alongside other AV programs, but the community part seems something of a stretch.
Malicious code isn’t the only thing anti-malware applications catch when they scan your PC and e-mail. Legitimate utilities get flagged, too.
It’s good that security software errs on the side of caution, but PC users need to know when to trust their security tools and when to trust their online sources for apps.
A popular Windows utility maker offers its suite of apps as a single download with a new application launcher that makes picking and running a utility quick and easy.
The suite covers everything from an application-crash reporter to a Windows updates viewer — and over a 100 other titles in between.
What do you do when your PC won’t load Windows — or it loads, but you’re locked out?
Panic is the first thing that comes to mind. But a better alternative is to create custom boot CDs to access your files and recover lost passwords.
The last several rounds of malware I’ve had to fight were all of a type — bogus security applications.
In this article, I’ll share my favorite techniques for removing those fake “You’re infected!” warnings that pop up on your PC.
Making a PC secure — truly secure — is incredibly difficult, and no one has ever done a perfect job of it.
Eliminating all security vulnerabilities in your system is simply not within your power, but you can make it a much less-attractive target.
Malware removal is only the first step in fighting an infection.
Your job isn’t finished until you’ve determined what the malware is, how it breached your defenses, and how to prevent similar infections in the future.
Readers responding to my
Oct. 8 column
on router security asked primarily about three things: upgrading a device’s firmware, saving its configuration settings, and encrypting wireless devices.
These activities can be tricky but can also pay huge benefits when done deliberately.