We may know that computing is rapidly ascending into the cloud, but do we know where we’re going and what the “cloud” is, exactly?
Once a simple euphemism for the World Wide Web’s infrastructure, cloud computing is rapidly becoming a complex virtual world where we work and play.
It’s an all-too-common occurrence: As soon as Internet Explorer gets patched, another zero-day exploit is discovered.
If you’d like to give IE more protection from hackers, Microsoft has a little-known, free tool — EMET 2.0 — you should take a look at.
The security certificates provided by various companies are supposed to update automatically, but sometimes the process fails and creates a mess.
But botched updates can leave behind remnants of certificates that are a pain to remove. They also raise the question: Why do we need them?
Your e-mail address can leave business associates with a good — or not-so-good — impression of you as a businessperson.
Creating a custom domain name for your e-mail can make your correspondence look more professional, and setting it up isn’t as hard as it might seem.
October 1 marks the start of National Cyber Security Awareness Month, an event dedicated to raising the public’s understanding of safe Internet practices.
While it’s primarily a U.S. initiative, the event has lessons that PC users around the world can use to make us all a bit safer online.
In their headlong drive to steal some of Facebook’s thunder, Microsoft and Google incorporate some highly questionable social-networking features into their popular e-mail services.
Google’s Buzz comes under the most fire, with many privacy experts and Internet users deeply concerned that it plays fast and loose with personal privacy. There are some important facts all Gmail users should know.
Rootkits are becoming a more popular method of choice for
bad guys to gain control over your computer.
This week, I’ll tell you about two antirootkit tools that you
might want to use.
Mark Joseph Edwards
Encryption isn’t any good if it can be easily cracked.
You need to use the best encryption available, which currently means using
WPA2. This week, I explain WPA2 and why you should take a layered approach
Haste makes waste, and that includes rushing into new software.
New software is very enticing. Sometimes, you might
even find it irresistible. But when you don’t practice
patience, you can cause yourself and your system considerable grief.