July 11, 2025PC Security Name, Rank and Social Security Number Identity theft is the fastest growing crime in the U.S. The U.S. Secret Service has estimated that consumers nationwide lose $745 million […] Read more
July 10, 2025PC Security How many spyware items are infecting your computer? I just had, by mistake, a plug-in called Intelligent Explorer attach to my browser. What a nightmare! I have another article on […] Read more
July 9, 2025PC Security Finding the Security Suite that meets your needs Before proceeding to read this article, it is important that we state something up front. It is essential for the reader to […] Read more
July 8, 2025PC Security Fighting Spam How prevalent is Spam? According to Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org): “Studies show unsolicited or “junk” e-mail, known […] Read more
July 7, 2025PC Security Fighting off Viruses: Advancements in Antivirus Software Suites Protecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes […] Read more
July 6, 2025PC Security Department of Defense Crackdown on Security The top commander of the department of Defense network operations just ordered a crackdown on security. According to a recent article by […] Read more
July 5, 2025PC Security Spyware Beware Spyware and Adware are not only an ever increasing nuisance for computer users everywhere, but also a booming industry. According to Webroot […] Read more
July 4, 2025PC Security Computer Viruses that Come a Callin’ Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses […] Read more
July 3, 2025PC Security Just what is Intelligent Explorer? For your safety, you really need to know I recently hit, by mistake, what I thought was an Explorer upgrade option. It turned out to be a pop-up appearing legitimate […] Read more
July 2, 2025PC Security About Encryption and Making Your System Secure What does encryption do for me? Encryption and cryptographic software has been used in many different ways to make systems more secure. […] Read more