Wednesday, February 03, 2016
Tuesday, August 04, 2015
But there’s something you should know: As you read this article from your newly upgraded PC, Windows 10 is also spying on nearly everything you do.
By default, Microsoft gets to see your location, keystrokes and browser history -- and listen to your microphone, and some of that stuff is shared with "trusted [by Microsoft, not by you] partners."
You can turn this all off, of course, by digging through screen after screen of "privacy" dashboards, navigating the welter of tickboxes that serve the same purposes as all those clean, ration-seeming lines on the craps table: to complexify the proposition so you can't figure out if the odds are in your favor.
Friday, July 24, 2015
Wednesday, May 13, 2015
Tuesday, April 07, 2015
NETWORLD MAGAZINE Article ==> A site linked to 73,011 unsecured security camera locations in 256 countries to illustrate the dangers of using default passwords.
This is the online website ==> The world biggest directory of online surveillance cameras
Thursday, June 12, 2014
Open a command prompt with admin rights and run this DISM command to detect and repair corrupted files on the HDD:
This is the advanced version of sfc /scannow. Windows now downlaods the corrupted files from the Internet instead of telling you that the files can't be repaired.
This is a windows of command.com:
"Microsoft Windows [Version 6.3.9600]
(c) 2013 Microsoft Corporation. All rights reserved.
Beginning system scan. This process will take some time.
Beginning verification phase of system scan.
Verification 100% complete.
Windows Resource Protection found corrupt files but was unable to fix some
of them. Details are included in the CBS.Log windir\Logs\CBS\CBS.log. For
example C:\Windows\Logs\CBS\CBS.log. Note that logging is currently not
supported in offline servicing scenarios.
C:\Windows\system32>DISM /Online /Cleanup-Image /RestoreHealth
Deployment Image Servicing and Management tool
Image Version: 6.3.9600.17031
The restore operation completed successfully. The component store corruption was
The operation completed successfully.
Tuesday, April 29, 2014
DO YOU USE INTERNET EXPLORER?
The Department of Homeland Security wants people to stop using it immediately because of a major security gap.
** SHARE WITH FRIENDS **
FOR FULL STORY- http://bit.ly/1rCFEb5
AOL hack causes zombie spam
"NEW YORK (CNNMoney) -- Whether or not you use AOL, a recently exposed mass hack of the company's network promises trouble for everybody.
AOL users: Hackers stole "a significant number" of email addresses, passwords, contact lists, postal addresses and answers to security questions, the company said in a blog post Monday. Anyone of the company's 120 million account holders might be affected. Judging by AOL's description of the incident, that total number could well be in the tens of millions. But AOL isn't giving any details about the incident for now.
Non-AOL users: Watch out for spam that looks like it came from you or your friends' AOL accounts."
Thursday, March 27, 2014
What is a Hashtag? And What Do You Do With Hashtags?
What is a Hashtag?
Tuesday, November 12, 2013
"FBI virus is a sneaky malware, which mostly gets inside its target computer undetected with a help of Trojan.LockScreen. As soon as it gets inside, this scam presents about itself for the victim as 'The FBI Federal Bureau Investigation' and shows an aggressively-designed alert that claims that computer is blocked because of the Copyright and Related Rights Law violation or other reason. However, if you find yourself blocked by a program, which tells that you have been illegally using or distributing copyrighted content, viewing or distributing pornographic content and spreading malware to other computers, you must ignore such alert first of all and remove FBI virus immediately! This program is distributed by scammers to swindle the money. Be aware that security experts expect this group of ransomware to grow and improve.. "
Remove FBI virus
Wednesday, June 05, 2013
If you Computer slow down or Freezes at times...What to do?
Use CCleaner to clean your computer, then run RKILL, Please see review about Rkill to detect any unwanted malware service running on the background.
Scan your machine for Malware with MalwareBytes then run Avast Anti Virus. These applications are free of charge.
If after cleaning the machine nothing happens then download and run TDDSKiller from Kaspersky Labs. to look for a hidden rootkit.
Please run also a defragger such as Auslogics Disk Defrag
P.S A rootkit is a program or a program kit that hides the presence of Malware in the system
http://www.avast.com/en-us/index (Avast Antivirus)
http://www.avast.com/en-us/index (Avast Antivirus)
Tuesday, May 28, 2013
AVAST antivirus just caught a malicious infection below trying to sneak into my computer via Firefox web browser. This is a fake Adobe Flash player
A Flash Player Update is Required to View this Content
- 100% FREE Update
- Experience the Web at its fullest
- Beautiful HD video, faster graphics rendering, and high performance
- Richer, more immersive user experiences
This update will only take a couple of minutes.