Defense In Depth | Posted 5 Jan 2006 | Comments Off on Minimizing Windows Risks | 1,501 views
Microsoft Windows Logo

Using a Windows-based system is quickly becoming the Internet equivalent of driving an early British automobile. Users are spending more and more time fixing problems rather than using their computer. One of the first steps to securing a computer is …

Data Management | Posted 20 Dec 2005 | Comments Off on TrueCrypt Virtual Disk Encryption | 1,573 views

TrueCrypt creates virtual encrypted disks on Microsoft Windows and Linux. It is based on a project called Encryption for the Massess (E4M). TrueCrypt provides “on-the-fly” encryption to automatically encrypt files as they are save to the virtual volume. …

Malware Tools | Posted 15 Apr 2005 | Comments Off on SpywareBlaster | 3,048 views

Our first anti-spyware tool takes a simple approach. Rather than scanning and cleaning, SpywareBlaster aims to prevent malicious sites from installing unwanted software. The publisher of Spybot Search and Destroy recommends SpywareBlaster to control ActiveX installations.

Installation

The test computer …

Malware Tools | Posted 31 Mar 2005 | Comments Off on Spyware Begone | 1,204 views

Spyware and adware infections are now increasing to epidemic proportions. There are several ways for spyware and adware to get installed on a target computer. The most common method is bundling it with other freely downloadable applications, but some sites …

Defense In Depth | Posted 8 Jun 2004 | Comments Off on Ten Basic Steps To Protect Your Privacy | 984 views

Do not reveal personal information. Avoid giving out any personally identifiable information unless it is absolutely necessary.Revealing identifiable information can cause a wave of backlash ranging from unsolicitied email to identity theft. Limit giving identifiable information to only reputable websites …