Tech Support banner

security

  1. Downloading to Thumb Drive - Are any Ghosts Left on the Computer?

    Windows 10 Support
    Over the coming holiday I will not have access to my computer but will have to DL some work files. The files may contain PII so I need to know if I DL directly to a secure thumb drive will there be any residual left on a Win 10 PC? I'm guessing that the DL folder will show the name and that's OK...
  2. Just beacuse you're paranoid....

    General Computer Security
    I just read an article on Mark Zuckerberg in which there is a photo with a casual inclusion of his computer - with the camera and microphone TAPED OVER! Mark Zuckerberg is just as paranoid as the rest of us - NY Daily News I have been doing this myself ever since my latop camera "popped on"...
  3. The Most Advanced Security Suite Available – An ESET Remote Administrator 6 with additional software Review

    Mac Support
    This world is digitally controlled, operated, and powered by computers. Every action we do today involves the use of a computer, whether that action be reading this review, driving your car, or ordering a meal at a restaurant. At the end of 2014, the United Nations stated that over three...
  4. How to install and use Malwarebytes Anti-Malware

    Computer Security News
    Malwarebytes Anti-Malware (MBAM) is a powerful anti-malware application that assists Windows computers in removing and protecting against numerous threats including, but not limited to, worms, Trojans, rootkits, rogues, spyware, etc.. Used by our security team here at Tech Support Forum...
  5. How to Perform a Remote Wipe on a Mobile Phone from Exchange Server 2010

    Smart Devices | General Topics
    There’s a neat tool in Exchange Server 2010 that you may utilize in case a company smart phone (e.g. Android, iPhone, Windows Phone, etc..) has been misplaced, lost or stolen, to protect all the sensitive data stored on that phone. You may perform a remote wipe of the data on the mobile phone...
  6. Malware in 2013

    Computer Security News
    I've been doing some crystal ball gazing and thought I would share with you my thoughts for the year ahead. Judging by the way that mobile malware has been increasing over the last year, I suspect that this trend will continue. Android will come under increasing attack and users will need to...
  7. Using an Anti-Virus Program

    Computer Security News
    One of the most well-known ways of protecting your computer from viruses and hackers is to use an anti-virus program. These programs scan your computer for malicious software and alert you to their presence - they will usually attempt to remove the virus for you also or, alternatively, place the...
  8. The Do’s and Don’ts of Basic Internet and Network Security

    Networking Support
    How certain are you that no untrustworthy individuals or unauthorized activities can access your network? Are your network files safe? Do you have some security protection (software and hardware) to keep your vital documents safe in your computer? How important is it for you to guard all your...
  9. Malware gone Mobile

    Computer Security News
    Recently Apple and Google have removed a malicious app from their stores. The new malware app is called “Find and Call” and was flagged by Kaspersky to be a type of malware. The app was available on Google Play since May 21st and Apple’s app Store since June 13th. When uploading a new...
  10. DNS Drama with DNSChanger

    Computer Security News
    Today marks the day that the infamous DNSChanger virus is finally shut down by the FBI in the USA. This could cause anyone that was still infected to lose their internet connection. DNSChanger came about in early 2007. It was a simple piece of malware that changes your computer's DNS settings...
  11. Please Sir, I want some more...

    Computer Security News
    So said Oliver Twist, although I'm sure he was not looking at school meals. You will be aware that a schoolgirl in Lochgilphead on the West coast of Scotland has been upsetting those in power. The young lady has an excellent blog called  NeverSeconds  in which she records and comments on her...
  12. LinkedIn - or caught out?

    Computer Security News
    You will be aware of the  recent fiasco  regarding the loss of data at LinkedIn. It still amazes me the number of corporations that really have no clue about data safety. After high profile cases such as Sony, you would think that all corporate IT heads and CIOs would be reviewing their systems...
  13. Configuring an AP or Client Bridge Router Behind a Firewall or Security Appliance

    Networking Support
    This tutorial can be utilized in a business network environment. This is based on my knowledge of how to configure a Buffalo AP (Access Points)/Bridge Router (other Brands and Models of AP/Bridge Routers may have some similar features) that’s connected behind a Sonicwall TZ 210 or any...
  14. When is an iPad not an iPad?

    Mac Support
    Answer: when it's sold in China. At least, that's what now appears to be the situation with Apple having lost a court case over rights to the iPad name. A Chinese company registered the name "iPad" back in the year 2000 (with great foresight?) and Apple had agreed use of the name from the...
  15. A guide to installing Microsoft Security Essentials

    Computer Security News
    Microsoft Security Essentials is an excellent free Antivirus recently offered by Microsoft. This program offers a lightweight simple to use Antivirus and can be downloaded direct from Microsoft here: Microsoft Security Essentials The official Support page, including FAQs, is located here...
  16. Encrypt and Secure Your Data with TrueCrypt

    Computer Security News
    Having my computer secure and protected is a big thing for me as it gives me peace of mind just in case it is stolen and my personal details are compromised, like passwords, login details, bank statements, photos etc. I have used Truecrypt for just over 4 years now and is also on all our...
  17. Disposing of your old computer - Beware!

    Computer Security News
    WARNING. Before you dispose of that old computer, it is advised that you take note of certain very serious and dangerous security issues. Ignoring these issues could have a traumatic and life changing effect on you. You may not appreciate or realise it, but the old machine that has served you...
Top