When Windows won’t boot and you get on the phone for tech support, one of the most common solutions is to reinstall Windows.
But that should be your court of absolutely last resort. There are many less destructive and less time-consuming techniques for getting Windows up and running again.
In this time of tight budgets, paying to pay seems especially galling.
The good news is that many of us can use a free IRS service to calculate our contribution to the Feds — but you still have to do some homework.
We may know that computing is rapidly ascending into the cloud, but do we know where we’re going and what the “cloud” is, exactly?
Once a simple euphemism for the World Wide Web’s infrastructure, cloud computing is rapidly becoming a complex virtual world where we work and play.
It’s an all-too-common occurrence: As soon as Internet Explorer gets patched, another zero-day exploit is discovered.
If you’d like to give IE more protection from hackers, Microsoft has a little-known, free tool — EMET 2.0 — you should take a look at.
The security certificates provided by various companies are supposed to update automatically, but sometimes the process fails and creates a mess.
But botched updates can leave behind remnants of certificates that are a pain to remove. They also raise the question: Why do we need them?
Your e-mail address can leave business associates with a good — or not-so-good — impression of you as a businessperson.
Creating a custom domain name for your e-mail can make your correspondence look more professional, and setting it up isn’t as hard as it might seem.
October 1 marks the start of National Cyber Security Awareness Month, an event dedicated to raising the public’s understanding of safe Internet practices.
While it’s primarily a U.S. initiative, the event has lessons that PC users around the world can use to make us all a bit safer online.
In their headlong drive to steal some of Facebook’s thunder, Microsoft and Google incorporate some highly questionable social-networking features into their popular e-mail services.
Google’s Buzz comes under the most fire, with many privacy experts and Internet users deeply concerned that it plays fast and loose with personal privacy. There are some important facts all Gmail users should know.
Rootkits are becoming a more popular method of choice for
bad guys to gain control over your computer.
This week, I’ll tell you about two antirootkit tools that you
might want to use.