anti spam, work from home, home based, be my own boss, your own boss, computer troubleshooting, computer cleaning, spyware removal, pc repair and upgrades,  networking, training

Don’t Let OneCare Eat Your Email

Whenever a program gets wide distribution there are bound to be some users who, rightly or wrongly, feel it has caused them pain. Sometimes it’s a case of post hoc ergo propter hoc (Latin for “the hog was here, so the hog did it”). Other times there really is a problem, perhaps due to an […]

Rootkit malware activity is on the up

PandaLabs reported registering a 62 per cent annual increase in rootkit activity in 2006, and says the outlook for 2007 is bleak. The firm reckons amount of malicious code using rootkit techniques is already up 25 per cent on last year and predicts an overall increase this year of around 40 per cent. According to […]

Seven ways to keep your search history private

The greatest threat to your privacy may not come from cookies, spyware or Web sites tracking and analyzing your Web surfing habits. Instead, it may come from search engines, which collect and store records of your searches. Search engines track your search terms, the sites you visit as a result of your searches, the times […]

FTC Might Expose Adware Supporters

THE FEDERAL TRADE COMMISSION’S efforts against adware have so far focused on the supply side by filing lawsuits against companies that unlawfully install ad-serving software. Now, one agency commissioner says it might be time to target demand, by naming the big brands that use adware to market their products. “A little shaming here might go […]

Windows Vista firewall weakness can be corrupted by attackers

The firewall in Microsoft’s Windows Vista operating system (OS) can be compromised to perform prohibited functions, according to new research from Symantec. Microsoft has touted Vista as its most secure platform to date, implementing a plethora of new security features, including an improved firewall. The software giant’s OS is, by default, configured to block all […]

Stopping Spyware at the Source

During the past few months, the Federal Trade Commission has filed deceptive- advertising cases against two distributors of what is called adware or spyware. The insidious form of software subjects consumers and their computers to unwanted advertising and surveillance. The five-member commission plans to escalate its attack by going after some of the big-name Internet […]

New Vulnerability Found In Microsoft’s Windows Vista

A security vendor has found vulnerability with a ‘medium’ security rating in Microsoft’s new operating system Windows Vista. The flaw, which is similar to a buffer overflow problem, is a privilege escalation bug, according to Marc Maiffret, co-founder and chief hacking officer of eEye Digital Security, an endpoint security company based in Aliso Viejo, Calif. […]

PC Tools Uses a Virtual Sting Operation to Nab Suspected Malware

PC Tools Threat Expert—a new automated spyware/virus weapon that rapidly decodes dangerous threats has a secret weapon—it creates the equivalent of a “sting operation” to fool suspected viruses and spyware into revealing dangerous behavior. “Most Internet security sandbox detection of suspected threats use systems that replicate the Microsoft OS,” said Michael Greene, Vice President of […]

What’s really in my cookie cache?

You see people rant and rave about how your privacy is being seriously compromised by the use of cookies. I must say, if you just read around on google, advertiser cookies are one of the most misunderstood beasts out there. Nowadays, practically every spyware removal program flags advertiser cookies as ‘SPYWARE/ADWARE’. Try it, google up […]

The Family Computer: Maintaining, backing up computer

While I was writing last week, I tried a couple of services for disk management so you wouldn’t have to. One was Microsoft’s free online maintenance tools at and the other its for-fee Live OneCare. I beta-tested the for-fee Live OneCare during its trial period and found it really streamlined maintenance. The service was […]

System Performance Software Drives Corporate Viability

Without a doubt, the most important piece of software on your workstations and servers is the operating system. Without an operating system, like Windows®, these business machines aren’t going to do much computing. But, assuming they do have an operating system, what should come next? The answer is system performance software. It can be said […]

1 in 5 Businesses Fail to Identify Spyware Source

Latest survey findings demonstrate a lack of understanding in protecting against real-time threats. Southall, UK (22nd February 2007) – Of the 73% of businesses that suffered a spyware invasion in 2006, 19% were unable to identify the source, raising the question of how organisations can thoroughly protect their networks, when they clearly haven’t identified […]

How to Remove Spyware From Your PC

Removing spyware is as much art as it is science. The rogues who create spyware make removing their malicious programs as difficult as they can. In addition, some types of spyware download and install additional components, often hiding pieces of code from Windows to make removal even harder. The instructions below will wipe out most […]

Want a Contract With Your Key Logger?

Malware authors in Russia are now offering service contracts with their spyware. Yes you read right: You can now get a service contract to provide upgrades for spyware, Trojans, rootkits and key loggers, just like you get with your computers, Oracle databases and CRM software. You have to marvel at the sheer brass of it […]

Router pharming: your bank account is an open book

Popular models of routers from Netgear, D-Link, Linksys were found by Symantec to be vulnerable to drive-by pharming attacks, and now Cisco has admitted many of their routers are vulnerable, too. While protecting yourself is still easy today, cyber attacks are only on the increase, so be prepared! Drive-by pharming, where your computer is ‘infected’ […]

Adware Became Most Prolific Type of Spyware in January

Almost 64 percent of spyware detected in January by PandaLabs was adware. There are currently three sub-categories of spyware: spyware itself, adware and PUPs. Adware is a type of spyware that displays advertisements on infected computers using pop-ups, banners, etc. Spyware compiles information about users’ Internet activity, such as Web sites visited, searches made, etc, […]

Independent Research Confirms Allegations That Vista’s Anti-Spyware Protection Has Holes

PC Tools announced today the results of an independent comparison by Enex Testlab of anti-spyware software including Microsoft’s own Windows® defender. PC Tools hired independent testing facility — Enex Testlab — to evaluate how Windows Defender stacks up against Spyware Doctor(1) and other third party vendors. The internationally renowned, independent lab has been performing comparison […]

Dodgy program advertised on MSN Messenger

Banner advertisements for a security application said to report false or inflated threats appeared for at least a few days on Microsoft’s instant messaging (IM) program, prompting warnings from security analysts. Microsoft appears to have removed the ads, which were displayed in the contacts panel for its IM program, Windows Live Messenger, said Sandi Hardmeier, […]

Adware has become the most prolific type of spware

There are currently three sub-categories of spyware: spyware itself, adware and PUPs. Adware is a type of spyware that displays adverts on infected computers using pop-ups, banners, etc. Spyware compiles information about users’ Internet activity, such as websites visited, searches made, etc, but does not display any adverts. This sub-category was responsible for just over […]