Dozens of readers responded to my
Sept. 10 Top Story,
many of them proposing alternative ways to evade keyloggers other than the “revised Vesik method” I described.
No method can make you completely safe when using a public computer, so you must balance convenience with the level of risk that’s acceptable to you.
Internet Explorer 8 includes a security feature that shuts down misbehaving applications before they can harm your system.
This capability, known as Data Execution Prevention (DEP), runs by default when IE 8 is installed on XP SP3 and Vista SP1 or later, but it may not always be clear to you why DEP has put the brakes on one of your PC’s applications.
Strong passwords are important, but even the best password won’t keep you safe from keyloggers — hardware and software that’s designed to secretly record your keystrokes.
Fortunately, there’s a way you can enter sensitive data so it’s extremely difficult for snoops to extract your passwords from keylogger files.
The Windows Secrets Security Baseline describes products and services that serve as a minimum safe PC configuration.
This week, I’m updating the latest findings on a set of hardware and software that should meet the needs of individual PC users, though more-advanced users and large businesses may want a more-sophisticated approach to computer defense.
There’s an easy way to stretch Windows 7’s 30-day free-trial period to 120 days so you can determine whether Microsoft’s new operating system meets your needs.
Even better — if you know the secret — you can try out any version of Win7, from Ultimate to the lowly Basic, using a single install disc.
When you apply a security update for one of the programs on your PC, beware of uninvited software that wants to come along for the ride.
Vendors are more and more often going over the line, piggy-backing unsolicited commercial products and services onto crucial security patches.
The disclosure of a back door allowing bad guys to repeatedly guess Gmail passwords should remind us all to protect our accounts with long and strong character strings.
There’s a straightforward way to protect your online accounts — use sign-in phrases that are easy for you to remember but hard for others to guess.
Two emergency updates released by Microsoft this week correct flaws in Internet Explorer and potentially dozens of third-party programs.
One of the patches is intended primarily for use by application developers, but how far the threat to apps extends — and how many end users will be affected — is not yet clear.
Every moment your computer is on, a nearly undocumented Microsoft file — WindowsUpdate.log — maintains a record of your system’s patching activity.
Making sense of the information in this update log can be a challenge, but I’ll show you how you can use it to learn the inside story of your PC’s update history.
With the arrival of Windows 7’s release to manufacturing (RTM) imminent, my inbox is teeming with questions about the next version of every PC user’s favorite whipping boy.
You need to make a few key decisions to ensure that you pick the Windows 7 version that best meets your needs.