Internet Security

The 3 Levels of Spyware: Do you still control your computer?

Has spyware taken over your computer? Learn the 3 levels of spyware to know for sure… “The only difference between the fool, and the criminal who attacks a system is that the fool attacks unpredictably and on a broader front.” (Tom Gilb)

Spyware Hackers or You: Who is the most dangerous?

Are you sabotaging yourself with spyware? “The Amish Virus You have just received the Amish virus. As the Amish don’t have any technology or programming experience, this virus works on the honor system.  Please delete all the files from your hard drive and manually forward this virus to everyone on your mailing list.  Thank you […]

Spyware Invasion: What to Do when You Have Been Hacked

If you want to prevent having your personal files exposed then you should read what to do when you get hacked…

Ten Spyware Warning Signs: Are You Infected?

Is your computer infected with spyware? Check out these 10 warning signs to take action today…

Five Spyware Mistakes Most Everyone Makes: Could this be you?

If you want to avoid being overrun with spyware then read and avoid the five mistakes most everyone makes…

Halt…Who goes there? How to Create Strong & Secure Passwords – Part Two

Five Practices for a Strong Password Fact: no password is unbreakable. In theory, any password can be cracked given the right software; enough computing time and the money to pay for them. If someone REALLY wants to break into your accounts, they can.

Halt…Who goes there? How to Create Strong & Secure Passwords – Part One

Protecting Your Privacy With Passwords! Your cash, your personal history and your private identity information is stored in computers all across the Internet. And you control the access to all of these with a simple password.

Too Legit To Quit? How to Know if a Website is Safe, Part Two

Step 5 – No Physical Location Due to fears of, (I don’t know what) some people never list their business’s street address on their websites. Bad sign, folks. I always look for an address. No “addy”, no “moola”.

Too Legit To Quit? – How to Know if a Website is Safe, Part One

Recently a friend emailed me a link to a software website. On the site they proclaimed to be selling OEM (Original equipment manufacturer) software at a very steep discount.

Does Your Email Etiquette Suck? – Part Five

Use Email Responsibly: A couple of years back, a business associate came to me with a deal he and a friend were working on. They wanted my help in setting them up with an online web server or a web host who would let them send out unlimited “unsolicited emails” to a list of small […]