1. Computing
Send to a Friend via Email
Tommy Armendariz

Updated Articles and Resources

By Tommy Armendariz

    Updated Articles and Resources
    • Enable Task Manager Created: Monday, November 05, 2007 Updated: Friday, April 18, 2014
      To make manual inspection and removal more difficult, malware often disables access to Task Manager. Fortunately, a few quick registry edits are usually all that are needed to regain control. Here'...
    • Disabling System Restore to remove viruses Created: Friday, August 27, 2004 Updated: Thursday, April 17, 2014
      Antivirus software may report that a virus was found in either the _RESTORE (Windows ME) folder or the System Volume Information folder (Windows XP) but the antivirus software may be unable to remo...
    • How to Disable Java in Internet Explorer Created: Tuesday, September 28, 2010 Updated: Wednesday, April 16, 2014
      Java is fast becoming the most targeted third-party application for malicious exploit via the Web. One easy thing you can do to avoid this method of attack is simply disable Java. When you do need ...
    • Best Free Antivirus Software for Windows Created: Tuesday, April 14, 2009 Updated: Wednesday, April 16, 2014
      The best free antivirus software for Windows PCs. Here are my top picks and reviews of the best free antivirus software for Windows.
    • How to Edit the Hosts File Created: Wednesday, February 17, 2010 Updated: Wednesday, April 16, 2014
      By modifying the HOSTS file, malware can block access to antivirus updates or force you to a malicious website. It's a good idea to check the HOSTS file periodically. Here's how to find - and edit ...
    • What is Sirefef Malware? Created: Thursday, January 24, 2013 Updated: Wednesday, April 16, 2014
      Learn about the dangers of Sirefef (ZeroAccess) Malware and how to prevent it." itemprop="description"> Monday, December 29, 2008 Updated: Wednesday, April 16, 2014
      Sality is a family of file infecting viruses that spread by infecting exe and scr files. The virus also includes an autorun worm component that allows it to spread to any removable or discoverable ...
    • Exclude Programs from DEP (Data Execution Prevention) Created: Monday, June 07, 2010 Updated: Wednesday, April 16, 2014
      DEP can cause conflicts with legitimate programs. If this happens to you, here's how to disable DEP for specific applications.
    • Top Windows Antivirus Created: Friday, June 15, 2007 Updated: Wednesday, April 16, 2014
      A list of top antivirus software based on its virus detection abilities, features, and breadth of protection. All tests performed on Windows 7 (32-bit).
    • The Best Mac Antivirus Software Created: Friday, June 15, 2007 Updated: Thursday, April 10, 2014
      It's true - Mac viruses really do exist, although fewer viruses target the Mac OS compared to Windows. In addition, there are cross-platform threats that can impact Mac users. Though the risk of cr...
    • Antivirus Bootable Rescue CDs Created: Tuesday, December 16, 2008 Updated: Wednesday, April 09, 2014
      A few antivirus vendors offer excellent (and free) rescue CDs that will enable you to boot, scan, and repair an infected machine.
    • View Hidden Files and Folders Created: Sunday, January 06, 2008 Updated: Wednesday, April 09, 2014
      By default, Windows does not display hidden files and folders. Here's how to change the default settings so you can view hidden files and folders.
    • Advanced Evasion Techniques (AETs) Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      A new report by McAfee examines the controversy and confusion surrounding Advanced Evasion Techniques (AETs) and the role they play in Advanced Persistent Threats (APTs).
    • McAfee Labs Q4 Report Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      On March 10, 2014, McAfee released the McAfee Labs Threat Report: Fourth Quarter 2013, which highlights the role of dark web malware industry as the key enabler to the point-of-sales (POS) attacks and data breaches in the fall of 2013.
    • Beware of Tax Scams Created: Monday, March 31, 2014 Updated: Monday, March 31, 2014
      Both consumers and business owners are targeted by hackers during tax season. Robert Siciliano, identifies the following as common tax scams and offers tips on how to avoid them:
    • How to Remove GoogleUpdate.exe Created: Wednesday, September 03, 2008 Updated: Friday, March 21, 2014
      Google Chrome and an untold number of other Google applications may install an update mechanism named googleupdate.exe, googleupdater.exe, or something similar. GoogleUpdate may continually attempt...
    • McAfee Delivers on Free Mobile Security for Consumers Created: Friday, March 07, 2014 Updated: Friday, March 07, 2014
      McAfee announced that its full-featured version of McAfee Mobile Security is available for free in 30 languages for both Android and iOS consumers.
    • How to Remove Adware and Spyware Created: Wednesday, October 08, 2008 Updated: Wednesday, February 26, 2014
      Getting stubborn adware and spyware off your PC can be frustrating. However, there are steps you can take to make the process easier and more effective.
    • Mevade and Sefnit: Click Fraud Botnet Created: Saturday, February 01, 2014 Updated: Saturday, February 01, 2014
      Medave and Sefnit are malware that are grouped together in the same family of botnets that use Tor to anonymize and hide its network traffic.
    • Deep Web Created: Saturday, February 01, 2014 Updated: Saturday, February 01, 2014
      The emergence of virtual currencies and its anonymous transaction infrastructure has led to the development of a number of “Deep Web” marketplace sites that specialize in retail distribution of illegal products and services.
    • ESET NOD32 Antivirus (2014 edition) Created: Saturday, February 01, 2014 Updated: Saturday, February 01, 2014
      ESET NOD32 Antivirus 2014 is equipped with the following features:
    • ESET Smart Security 7 (2014 edition) Created: Saturday, February 01, 2014 Updated: Saturday, February 01, 2014
      ESET Smart Security 2014 is equipped with the following features:
    • Black in the White House Created: Monday, July 12, 2010 Updated: Wednesday, January 22, 2014
      The Black in the White House virus hoax is a variation of A Virtual Card for You hoax and the Invitation Virus hoax.
    • Phishing scams Created: Monday, November 29, 2004 Updated: Friday, January 17, 2014
      Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.
    • Top Cyber Threats for 2014 Created: Tuesday, December 31, 2013 Updated: Thursday, January 16, 2014
      McAfee has kicked off its annual list of the biggest cyber threats anticipated to take effect in 2014. The following are McAfee’s Top Cyber Threats for 2014:
    • What is a DDoS attack? Created: Thursday, December 09, 2004 Updated: Thursday, January 16, 2014
      Trojans are often used to launch Distributed Denial of Service (DDoS) attacks against targeted systems, but just what is a DDoS attack and how are they performed?
    • Shadow IT: Trends Impacting Your Security Posture - Part 2 Created: Tuesday, December 31, 2013 Updated: Tuesday, December 31, 2013
      Shadow IT is a term used by IT professionals to describe IT systems and solutions used by employees without organizational approval. SaaS solutions are popular with employees.
    • Shadow IT: Trends Impacting Your Security Posture Created: Tuesday, December 10, 2013 Updated: Tuesday, December 31, 2013
      Shadow IT is a term used by IT professionals to describe IT systems and solutions used by employees without organizational approval. SaaS solutions are popular with employees.
    • What is Creepware? Created: Monday, December 23, 2013 Updated: Tuesday, December 31, 2013
      According to Symantec, creepware uses a client-server model – a software architecture model that consists of client and server systems. Creepware, however, reverses this process and makes your infected PC the server and the attacker’s computer becomes the client.
    • McAfee Labs Third Quarter Threat Report Created: Saturday, November 30, 2013 Updated: Saturday, November 30, 2013
      McAfee Labs researchers have released the third quarter threat report that highlights common cyber threats and a few new ones as well. McAfee Threat Report.
    • McAfee Labs Third Quarter Threat Report – Part 2 Created: Saturday, November 30, 2013 Updated: Saturday, November 30, 2013
      McAfee Labs researchers have released the third quarter threat report that highlights cyber threats and details common and new malware that has emerged during the third quarter.
    • 12 Cyber Scams of Christmas Created: Saturday, November 30, 2013 Updated: Saturday, November 30, 2013
      McAfee released its annual 12 scams of Christmas list which outlines the most common scams cyber-criminals use during the holiday season.

    ©2014 About.com. All rights reserved.