Stay safe online - 2018-02-24

Manual removal of harmful files

Every program consists of files. Even spyware, a virus or a different parasite - all have their own files.More
Articles Security   July 12, 2005  

Manual removal of malicious registry entries (3)

The registry is one of the most vital components of the Microsoft Windows operating system.More
Articles Security   July 12, 2005  

Netscape 8. Secure two-headed browser

Netscape 8 is a new Amercia Online product that qualitatively differs from earlier browser versions, although it still has many in common with previous releases and also is based on Mozilla Foundation's code, this time - code of the best all-around alternative to Microsoft Internet Explorer - Firefox.More
Articles Security   July 12, 2005  

Is Opera protected from spyware? (1)

Opera is a multifunction, multi-platform web browser with rich set of functions.More
Articles Security   July 08, 2005  

CoolWebSearch – the most infamous browser hijacker

Browser hijackers are malicious programs that alter web browser settings without asking for user permission.More
Articles Security   July 08, 2005  

Mozilla Firefox. Customizable, secure, safe from spyware (1)

Firefox probably is the most successful newcomer to the web browsers niche.More
Articles Security   July 08, 2005  

How to prevent browser hijacking? (1)

If you often surf the Internet, use Microsoft Windows operating sytem and Internet Explorer web browser, then you're in big danger.More
Articles Security   June 27, 2005  

Definition: Cracking (1)

Cracking is kind of malicious activity, when some cracker gets into someone's computer system without his permission and knowledge.More
Articles Security   April 06, 2005  

Definition: parasiteware

Parasiteware is a term used to describe any type of software or code that is engineered to attack and damage a computer system.More
Security   March 28, 2005  

The importance of antispyware

Nowadays almost everybody has a computer at home. And almost everyone of them had problems with computer threats.More
Articles Security   March 23, 2005  

Remote administration

Nowadays when life's speed is enormous and people are really busy remote administration is a really winning solution.More
Articles Security   March 22, 2005  

Definition: Stealthware

Along with spyware and adware Internet users can catch stealthware.More
Articles Security   March 09, 2005  

Internet Hoaxes (1)

Internet is full of information. Some of it is valuable and important, some of it just exist and that's all.More
Articles Security   March 08, 2005  

Definition: Phreaking

Beside hacking and close to this term, there is another illegal activity called phreaking.More
Articles Security   March 03, 2005  

DoS (Denial of Service) / DDoS

Popularity of computer attack is growing each day. We can see more and more complaints from the victims of such attacks in the mass media.More
Articles Security   March 02, 2005