Articles: All Listings RSS

Filter listings...
https://www.bestvpn.com/blog/5184/4-ways-to-prevent-a-dns-leak-when-using-vpn/

www.bestvpn.com/blog/5184/4-ways-to-prevent-a-dns-leak-when-...

In addition to VPN connection failures (see our full article on protecting yourself against these here), the other big threat to your anonymity when using a trusted VPN service is that of DNS leaks, which can result in your ISP being able to 'see' and ...

Category:Articles
Visited566
http://blog.add0n.com/2015/05/16/tracker-and-script%20blocker-extensions-for-firefox.html

blog.add0n.com/2015/05/16/tracker-and-script%20blocker-exten...

I saw multiple posts recently where people wanted to know which addons are redundant, so I decided to do some tests and research.

Category:Articles
Visited123
http://support.eset.com/kb146/

support.eset.com/kb146/

Remove previous Antivirus software! It is important that any previously installed antivirus software is uninstalled from your system before installing your ESET product. Typical uninstallation* using the Windows removal tool (Add/Remove Programs) is of ...

Category:Articles
Visited113
http://winhelp2002.mvps.org/hosts.htm

winhelp2002.mvps.org/hosts.htm

This article provides details on blocking Ads, Banners, Parasites, and Hijackers, web bugs, etc. with a custom HOSTS file.

Category:Articles
Visited78
http://apwg.org/resources/overview/

apwg.org/resources/overview/

A lisit of security blogs and other online safety resources.

Category:Articles
Visited99
https://blog.comodo.com/pc-security/cryptolocker-virus-best-practices-to-ensure-100-immunity/

blog.comodo.com/pc-security/cryptolocker-virus-best-practice...

When you browse using Comodo Internet Security, you are 100% immune to the CryptoLocker Virus. Find out what steps to take if you're already infected.

Category:Articles
Visited86
http://krebsonsecurity.com/2013/11/how-to-avoid-cryptolocker-ransomware/

krebsonsecurity.com/2013/11/how-to-avoid-cryptolocker-ransom...

Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malici ...

Category:Articles
Visited85
http://myonlinesecurity.co.uk/how-to-protect-yourself-and-tighten-security/

myonlinesecurity.co.uk/how-to-protect-yourself-and-tighten-s...

Why do I need to know how to protect yourself and tighten security?

Why did I get infected in the first place?

You usually get infected because your security settings are too low or you blindly click yes to everything. This art ...

Category:Articles
Visited117
http://www.techsupportalert.com/content/how-stay-safe-while-online.htm

www.techsupportalert.com/content/how-stay-safe-while-online....

With the amount of malware currently prowling the internet it's very important to fully protect your computer from online dangers. This is important for everyone, not just the overly security conscious. Below I've compiled advice for both novice u ...

Category:Articles
Visited83
http://www.howtogeek.com/121267/11-ways-to-make-your-lastpass-account-even-more-secure/

www.howtogeek.com/121267/11-ways-to-make-your-lastpass-accou...

LastPass offers a lot of security options for locking down your account and protecting your valuable data. We’re fans of LastPass here at How-To Geek – it’s a great service that a lot of you already use.

Category:Articles
Visited107
https://www.f-secure.com/v-descs/eicar.shtml

www.f-secure.com/v-descs/eicar.shtml

The EICAR Standard Anti-Virus Test file is a special 'dummy' file used to check and confirm the correct operation of security products.

Category:EICAR
Visited117
https://en.wikipedia.org/wiki/EICAR_test_file

en.wikipedia.org/wiki/EICAR_test_file

The EICAR Standard Anti-Virus Test File or EICAR test file is a computer file that was developed by the European Institute for Computer Antivirus Research (EICAR) and Computer Antivirus Research Organization (CARO), to test the response of computer ant ...

Category:EICAR
Visited92
http://www.eicar.org/86-0-Intended-use.html

www.eicar.org/86-0-Intended-use.html

eicar combines universities, industry and media plus technical, security and legal experts from civil and military government and law enforcement as well as privacy protection organisations whose objectives are to unite non-commercial efforts against w ...

Category:EICAR
Visited246
http://magazine.joomla.org/issues/Issue-Jan-2011/item/373-team-ease-article-passwords

magazine.joomla.org/issues/Issue-Jan-2011/item/373-team-ease...

An article from joomlas magazine on how to create a secure password.

Category:Passwords
Visited77
https://www.youtube.com/watch?v=VYzguTdOmmU

www.youtube.com/watch?v=VYzguTdOmmU

ophos's Graham Cluley explains a simple way of creating a complex hard-to-guess password - and how you should never use the same password on different sensitive websites.

Category:Passwords
Visited75
http://windows.microsoft.com/en-us/windows-vista/tips-for-creating-a-strong-password

windows.microsoft.com/en-us/windows-vista/tips-for-creating-...

Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You should make sure you have strong passwords for all a ...

Category:Passwords
Visited101
http://www.dailymail.co.uk/sciencetech/article-2670710/Think-youre-safe-internet-Think-Map-reveals-millions-cyber-attacks-happening-world-real-time.html

www.dailymail.co.uk/sciencetech/article-2670710/Think-youre-...

The live interactive map was released by St Louis-based security firm Norse (shown). It can be used to see where global web attacks are starting and ending.

Category:Attack Maps
Visited114
https://www.yahoo.com/tech/how-to-watch-worldwide-cyberattacks-live-124594707994.html

www.yahoo.com/tech/how-to-watch-worldwide-cyberattacks-live-...

These maps show how many hacking attacks are happening around the world every second.

Category:Attack Maps
Visited230
http://www.express.co.uk/news/science/594638/HACKING-MAP-Watch-live-China-hack-attacks-UK-USA-Norse-Corp-NSA-Europe-military

www.express.co.uk/news/science/594638/HACKING-MAP-Watch-live...

It LOOKS like laser warfare with China and the USA blasting each other with Russia and Europe caught in the middle.

Category:Attack Maps
Visited241
http://www.networkworld.com/article/2366962/microsoft-subnet/spellbound-by-maps-tracking-hack-attacks-and-cyber-threats-in-real-time.html

www.networkworld.com/article/2366962/microsoft-subnet/spellb...

Norse 'dark intelligence' has a 'live' map of global hacks on honeypots and Kaspersky Lab has an interactive cyber threat map that updates in real-time. Careful not to get sucked in as the amazingly hypnotic maps are serious time eaters.

Category:Attack Maps
Visited136