Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • PC Matic Site
    • Information Desk
    • OverDrive Test or AutoFix Problems
    • PC Matic's Paid Products
    • Site Feedback
    • Tech Talk
  • Community
    • Networking, Email, and Internet Connections
    • Viruses, Spyware, Adware
    • User to User Help
    • Tips 'n' Tricks
    • Post Your Pit Test Results
    • Linux
    • Custom PCs, case mods, overclocking
    • Smart Phones and Hand-held Devices
    • Games and Gear
    • Distributed Computing Teams
    • General Discussions

Calendars

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


System Specifications:

Found 8 results

  1. Can someone please tell me why PC Matic isn't catching this? I have gotten it twice on my own laptop and once on another laptop that PC Matic is supposed to be protecting. Also, how to make sure the malware is removed? I'm disappointed that PC Matic isn't protecting our machines from this.
  2. generally, do you guys have a better opinion of Norton or Bitdefender? i'm a longtime Norton guy, but my subscription is about to expire, and i've heard great things about Bitdefender lately. BUT i tried contacting customer service and it was a complete nightmare. so i'm leaning on sticking with Norton, but... just wanted to hear some opinions from people who might've used both.
  3. is it wise to have both IPV4 and IPV6 enabled? or should it be one or the other?
  4. JDK 1.7.0_13 has been out for a few days, and you are still talking about 1.7.0_11 as if it were hot off the press news. You are trashing Java unfairly. Java has had 3 security breaches in 15 years, and then only in the rarely used Applet feature. Other languages have no security sandbox whatsoever. Java had a leak it its. Microsoft sends me 2 security fixes a DAY! Please get some perspective. I get the feeling you have no first hand knowledge of Java. You are just passing on politically motivated trash talk.
  5. Chrome Privacy Manager for the Google Chrome Web Browser Manage privacy settings, data deletion, quickly access page in incognito mode, manage cookies and monitor network traffic. Full Description and download in the Chrome Web Store
  6. Before installing an app it's good to know just how much of your personal information it has access to and what it may do with it. App Advisor from Secure.me lets you search a wide variety of Facebook apps to see just how safe they are. Just visit the App Advisor Homepage, enter the apps name in the search box and then search for it's information page. There you will find information on the apps Permissions, App Behavior and User Ratings including detailed information on how the app has to access your personal data, the apps behavior after connecting and what users think about the app.
  7. When taking digital pictures the information stored in the EXIF data can contain a lot of personal information like GPS location, time/date, owner name, camera make and model plus more. If you share pictures on the Internet you may want to remove certain information stored in the images to protect your personally identifiable information. Here are a few free software solutions to view, edit and remove EXIF data. Metability Software FileMind QuickFix Microsoft Pro Photo Tools Microsoft Windows users also have the ability to view, edit and remove EXIF data without using any addition
  8. With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more security features, offer better out-of-the-box security settings and have closed many of the historical security holes. Windows 7, for example, has changed the default User Account Control level so that it's harder for rogue programs to run without first explicitly gaining the user's permission. http://www.pcworld.com/article/254369/10_commandments_of_windows_security.html Thanks to, PCW
×
×
  • Create New...