264 results on '"*DATA protection"'
Search Results
2. iDrive: Excellent online backup, sharing, and more.
- Author
-
JACOBI, JON L.
- Subjects
- *
SHARING , *DATA protection - Published
- 2023
3. Marriott Starwood hotel data breach FAQ: What 500 million hacked guests need to know.
- Author
-
SIMON, MICHAEL
- Subjects
- *
DATA security failures , *HOTELS , *DATA protection , *HOTEL reservation systems , *CREDIT cards , *PASSPORTS - Abstract
The article presents facts about the Marriott Starwood hotel data breach which affected 500 million guests. Topics covered include the manner in which the hackers got into the Marriott reservation database, the types of data that were stolen which include mailing address and passport numbers, and the impact of the data breach on passwords and credit card information. Several data security measures for those affected by the breach are also cited.
- Published
- 2019
4. HOW ‘FREE’ WI-FI HOT SPOTS CAN TRACK YOUR LOCATION EVEN WHEN YOU AREN’T CONNECTED.
- Author
-
HOLGER, DIETER
- Subjects
- *
DATA protection , *WIRELESS Internet , *WIRELESS hotspots , *DATA security , *INTERNET safety - Abstract
The article shares tips on how Internet users can protect their privacy and location data from free Wi-Fi. Topics discussed include the tracking of users' location when they sign-in in free Wi-Fi hotspots, the collection of personal information at the captive portal, and steps to protect personal data such avoiding the use of free Wi-Fi, reading the privacy policy, and avoid signing with social media.
- Published
- 2018
5. Ads based on your browsing history quietly hit Firefox's New Tab page.
- Author
-
CHACOS, BRAD
- Subjects
- *
WEB browsers , *INTERNET advertising , *PERSONALLY identifiable information , *DATA protection - Abstract
The article describes the Suggested Tiles service of web browser Mozilla Firefox which taps browsing history to show advertising that appeals to user on its New Tab page. It mentions that the service was quietly rolled out in early August 2015, according to content services vice president Darren Herman. It notes the help of the service without being intrusive or haphazard with personal data, and can be disabled by clicking the gear icon in the upper right corner of the New Tab page.
- Published
- 2015
6. Facebook privacy questions resurface.
- Author
-
MINERS, ZACH
- Subjects
- *
DATA protection , *SOCIAL media , *INTERNET advertising , *TARGET marketing - Abstract
The article discusses the privacy issues that surfaced following the employment of Facebook's user data for advertising purposes, citing the social networking site's roll-out of a rebuilt version of Atlas, which it acquired in 2013 from Microsoft, allowing advertisers to deliver targeted advertisements (ads) to Facebook users on outside sites. Topics mentioned include the benefits of Atlas to businesses, Facebook's claim of the program's anonymous operation, and how to opt out of ad targeting.
- Published
- 2014
7. The challenges of scrubbing Web history.
- Author
-
Miner, Zach
- Subjects
- *
DATA protection , *UNIFORM Resource Locators , *GOVERNMENT policy - Abstract
The article focuses on Internet search company Google's letter to European data protection authority Article 29 Working Party following the Court of Justice of the European Union's decision that compels search engine operators like Google and Bing to delete uniform resource locators (URLs) from results list. Topics discussed include Google's removal of URLs in compliance with the law, the British House of Lords subcommittee's criticism of the ruling, and the online form for removal petitions.
- Published
- 2014
8. Passing on an old PC? Make sure your data is truly gone.
- Author
-
HOFFMAN, CHRIS
- Subjects
- *
DATA protection , *COMPUTER files , *PERSONAL computers - Abstract
The article offers instructions for protecting data files from old personal computers or drive.
- Published
- 2014
9. Your backup drive needs a backup plan.
- Author
-
BRADLEY, TONY
- Subjects
- *
COMPUTER security , *DATA protection , *COMPUTER files , *TROJAN horses (Computer viruses) , *PSYCHOLOGICAL vulnerability , *SECURITY systems - Abstract
The article focuses on how to protect backup drive in personal computers form vulnerability. It mentions about ransomware trojan, Cryptolocker, that encrypts local data files and other storage locations connected to computer. It further discusses options for protecting backupdrive which includes disconnecting backup media, using cloud for holding backups and maintaining a copy of backup.
- Published
- 2014
10. Kill your data dead.
- Author
-
JACOBI, JON L.
- Subjects
- *
DATA removal (Computer science) , *DATA protection , *COMPUTER security , *HARD disks , *DATA security , *USB technology - Abstract
The article discusses data protection and computer security strategies for the disposal of data while preserving a drive's functionality. Topics include free utilities for secure-erase functions for hard drives or solid-state drives (SSD), the use of block-overwrite software for hard drives, and methods for wiping SSDs and USB flash drives.
- Published
- 2014
11. Alternatives to online backups.
- Author
-
BRADLEY, TONY
- Subjects
- *
COMPUTER software , *BACK up systems , *DATA protection , *CLOUD storage , *DATA warehousing - Abstract
The article previews several products for online backups including ioSafe Solo, CrashPlan Free and My Cloud.
- Published
- 2014
12. Security tips from the spymasters.
- Author
-
MAH, PAUL
- Subjects
- *
COMPUTER hackers , *COMPUTER software , *WINDOWS (Graphical user interfaces) , *MICROPHONES , *DATA protection - Abstract
The article offers simple measures that can be implemented in order to protect one's self from hackers and cybercriminals. The importance of enabling automatic software updates is recommended. The author recommends the encryption of the hard drive using BitLocker, a built-in feature into the Enterprise and Ultimate versions of windows 7, and Pro and Enterprise versions of Windows 8. Disabling built-in microphone is recommended.
- Published
- 2014
13. When Malware Strikes: How to clean an infected PC.
- Author
-
SPECTOR, LINCOLN
- Subjects
- *
MALWARE , *ANTI-malware (Computer software) , *COMPUTER security , *COMPUTER viruses , *DATA protection - Abstract
The article offers tips on how to clean a malware-infected computer. To verify if a computer that is unusually slow is infected with a virus, check on the Processes tab of the Task Manager if there if there is any strange background application. According to the author, among the sure signs of malware are antivirus programs that will not load and the computer will not load utilities that could manually remove malware.
- Published
- 2013
14. Lock down your business: Security essentials.
- Author
-
MAH, PAUL
- Subjects
- *
COMPUTER security , *DATA protection , *SMALL business , *DATA encryption , *PREVENTION of computer hacking , *SECURITY systems - Abstract
The article offers tips on how small businesses can protect business information assets. It is said that full-disk encryption on computers is important because system passwords cannot fully secure one's system from hackers. The author claims that the portable storage BitLocker to Go can prevent stolen devices from become liabilities. Noted is the significance of installing security updates and patches on computers.
- Published
- 2013
15. PC SPRING Cleaning.
- Author
-
Bradley, Tony, Stern, Zack, and Spector, Lincoln
- Subjects
- *
CLEANING , *MAINTENANCE , *COMPUTERS , *COMPUTER operating systems , *BACK up systems , *DATA protection - Abstract
The article discusses how to clean the case of a personal computer (PC), organize its cables and reinstall the Windows operating system. Allowing the case of a desktop PC to get dirty over time may result to the fans that keep the internal parts cool clogged and eventually overheat. To clean the case, the PC must be shut down first and all cables other than the power cord must be unplugged. Some precautionary measures include wearing shoes, placing a layer of rubber between the PC and worktable and wearing an antistatic bracelet. When untangling cables, it is recommended to carefully disconnect the cables from the PC side. Making a backup of the entire drive and data should be done before reinstalling Windows, which may take a day at best and three to four days at worst.
- Published
- 2011
16. The Best Ways to Back Up Your Data.
- Author
-
Spector, Lincoln
- Subjects
- *
BACK up systems , *DATA protection , *USB technology , *COMPUTER files , *COMPUTER storage devices , *FILES (Records) - Abstract
The article discusses several strategies to back-up computer hard drive. Files that should be backed-up include documents like word processing files, spreadsheets and similar documents, application data, media files, heirlooms, and computer programs. Strategies to back-up hard drive include using Universal Serial Bus (USB) storage, backing up through the Internet or through local network, backing up Windows itself, preserving huge media files like songs and videos, automating backup and storing it at a safe distance, and having multiple backups.
- Published
- 2009
17. HOW TO AVOID Facebook & Twitter DISASTERS.
- Author
-
Null, Christopher
- Subjects
- *
ONLINE social networks , *ACCESS to information , *SOCIAL media , *COMPUTER security , *DATA protection , *DATA security , *WEB 2.0 - Abstract
The article discusses how to use the account management interface of social networking sites Facebook and Twitter. Users are advised to use privacy options. Failure to configure privacy setting can result to unwanted leakage of personal information and confidential data. Facebook allows account holders to organize people into groups and then designate which group should be given access to certain information. Flagging unwanted viewers and classifying which personal data to be made public are also demonstrated. INSETS: The essential Guide to Facebook Etiquette;The essential Guide to Twitter Etiquette;Setting facebook's E-Mail Permissions;Get a Vanity facebook URL/ Twitter Commands Reference Guide
- Published
- 2009
18. Protecting the PC: Security Suites Compared.
- Author
-
Vamosi, Robert and Larkin, Erik
- Subjects
- *
COMPUTER software , *COMPUTER security , *SECURITY systems , *DATA protection , *INFORMATION technology - Abstract
The article reviews various computer security software, such as AVG Suite, BitDefender, and Panda. INSET: PC WORLD TOP INTERNET SECURITY SUITES.
- Published
- 2009
19. 20 Tech Habits That Will Change Your Life.
- Author
-
Trapani, Gina
- Subjects
- *
INNOVATION adoption , *HOME offices , *FREEWARE (Computer software) , *BACK up systems , *DATA protection , *TIME management - Abstract
The article discusses technology habits to help get things done more easily. It suggests tools and practices that one can incorporate into their workday to use technology tools more effectively and efficiently. One can work at home and yet have complete access to the computer in their office through free versions of remote-control software such as LogMeIn. Schedule automatic hard-drive backups and to save time, set up software and services to do the job while concentrating on more-exciting projects. Streamline computer work by using keyboard shortcuts for most frequent actions.
- Published
- 2008
20. Identity Protectors: Who Can You Trust?
- Author
-
Tynan, Dan, Moynihan, Tim, and Spring, Tom
- Subjects
- *
IDENTITY theft , *DATA protection , *ONLINE information services , *SECURITY systems - Abstract
The article discusses the online services that protect people from identity theft in 2008. According to the Privacy Rights Clearinghouse in San Diego, more than 220 million private records have been lost or stolen since 2005. Companies such as LifeLock or TransUnion offer to monitor ones credit reports for $10 to $20 a month and alert one when his or her account is being opened without his or her knowledge. Suze Orman's Identity Theft Kit and Identity Guard offer protection for anything beyond financial fraud. INSET: DIY IDENTITY-THEFT PROTECTION: A 12-Step Program.
- Published
- 2008
21. Virus Stoppers.
- Author
-
Naraine, Ryan
- Subjects
- *
MALWARE , *COMPUTER security software , *COMPUTER software , *DATA protection , *COMPUTER viruses , *ELECTRONIC data processing - Abstract
The article presents examines the effectivity of several antivirus programs. The Kaspersky Anti-Virus 6 delivered top-notch success rates for malware detection and disinfection performance. The Symantec Norton Antivirus 2007 is a solid performer, with an overall virus detection rate of 96 percent, placing it firmly in the upper echelon of the test group. The Bitdefender Antivirus 10 is effective in detecting malware with a 96 percent catch rate. The Panda Antivirus 2007 has inadequate default settings, and uninspired disinfection performance. INSET: When a Signature Isn't Enough.
- Published
- 2007
22. The Threats You Can't See.
- Author
-
Singel, Ryan
- Subjects
- *
COMPUTER viruses , *MALWARE , *COMPUTER security , *COMPUTER systems , *COMPUTER access control , *DATA protection - Abstract
The article presents information on a zero-day exploit. The zero-day exploit is an attack against a software flaw that occurs at a time when no patch to correct the problem exists. The term originally described a vulnerability that was exploited in the wild on the same day that a patch became available for it, leaving information technology staffs zero intervening days to dose the hole. Today, the value of zero-day exploits to online criminals is skyrocketing precisely because the attacks can break into up-to-date, well-maintained systems. INSETS: A ZERO-DAY ATTACK MARCHES ON;FOCUSED DOC STRIKE;ZERO-DAY DEFENSE IN MICROSOFT'S NEW OPERATING SYSTEM;MYSPACE INVADED
- Published
- 2007
23. THE 10 BIGGEST SECURITY RISKS You Don't Know About.
- Author
-
Brandt, Andrew
- Subjects
- *
COMPUTER security , *DATA protection , *SECURITY systems , *EMAIL , *SPAM email , *PHISHING , *IDENTITY theft - Abstract
The article discusses several security risks and how to avoid them. In order to prevent botnets, avoid unknown sites and never click links in unsolicited e-mail. Also remain suspicious of e-mail attachments. One could avoid the risk of data stealing by using a firewall that can block unknown programs from communicating with the Net to keep keyloggers from phoning home. This can also be prevented by cycling passwords and not using the same name and password at multiple sites. Phishing can be avoided by not trusting an unsolicited e-mail message from any company and using antiphishing toolbars.
- Published
- 2006
24. VISTA COMES INTO VIEW.
- Author
-
Spanbauer, Scott
- Subjects
- *
COMPUTER operating systems , *WINDOWS (Graphical user interfaces) , *COMPUTER security , *COMPUTER software , *SYSTEMS software , *GRAPHICAL user interfaces , *UTILITIES (Computer programs) , *DATA protection , *SECURITY systems - Abstract
The article presents information on Vista, the next Windows operating system (OS) which will be released in late 2006. Vista will be the safest, fastest, and most reliable version of Windows in a decade. It will offer tangible security and performance improvements. The OS also promises new features, including systemwide speech recognition. And its Aero interface uses transparency, shading, and color to pack more information and control into every icon, window frame, and dialog box. It can also reduce the threat from malicious software by restricting access to key system settings and hardware.
- Published
- 2006
25. The New Virus FIGHTERS.
- Author
-
Bradley, Tony
- Subjects
- *
COMPUTER viruses , *COMPUTER software , *DATA protection , *COMPUTER security , *SYSTEMS software - Abstract
The article presents a comparison of antivirus software including the BitDefender 9 Standard, McAfee Viruscan 2006 and Kaspersky Lab Kaspersky Anti-Virus Personal 5.0.
- Published
- 2006
26. Is the Net Doomed?
- Author
-
Sterling, Bruce
- Subjects
- *
COMPUTER crimes , *INTERNET laws , *ELECTRONIC commerce , *DATA protection , *CRIME , *COMPUTER security , *SECURITY systems , *NATIONAL security - Abstract
This article focuses on criminal acts committed via the Internet. The Internet is in a golden age of criminal invention. Security problems exist at all levels. Even encryption, supposedly a defensive measure, has become a tool for extortion. According to Richard Clarke, counterterrorism adviser to the National Security Council during the September 11 attacks, e-commerce is vulnerable because it generally rests on hastily deployed, jury rigged systems that need a comprehensive rethink. However, the ultimate problem facing those who would combat crime and sleaze is that the Internet is global but its law is local. INSET: The Big Net Cleanup: Experts Weight In.
- Published
- 2005
27. Spyware Stoppers.
- Author
-
Landesman, Mary
- Subjects
- *
COMPUTER security , *DATA protection , *SECURITY systems , *COMPUTER viruses - Abstract
This article presents the results of tests conducted of anti-spyware utilities designed to detect and remove spyware and adware from personal computers, looking at their rates of detection, scanning speed, ability to prevent unwanted applications from installing themselves, and ease of use. Though viruses and worms still cause more damage in compromised or lost data, a newer menace, popularly known as spyware, allegedly steals users' productivity and peace of mind. The spyware label can apply to legitimate but annoying programs that users consent to have installed on their personal computers, or it can describe programs that install themselves without permission. Both types of applications can drain a computer's resources, slow one's Internet connection, spy on one's surfing, and even forcibly redirect one's Web browser. Adware spells out its intent, comes with an uninstaller, and can be readily removed from a system. Spyware, in contrast, installs itself surreptitiously and can be nearly impossible to remove without assistance. Such product offerings include Allume Systems' Internet Cleanup, Aluria Software's Spyware Eliminator, Computer Associates' ETrust PestPatrol Anti-Spyware, InterMute's SpySubtract Pro, Network Associates' McAfee AntiSpyware, Sunbelt Software's CounterSpy, and Webroot Software's Spy Sweeper. INSETS: Future Windows Antispyware Looks Like a Winner;Protect Yourself Against Spyware: Change or Update Your Browser.
- Published
- 2005
28. Windows XP's Big F!X.
- Author
-
Thurrott, Paul
- Subjects
- *
COMPUTER software , *COMPUTER systems , *COMPUTER security , *COMPUTER network security , *COMPUTER access control , *DATA protection , *SECURITY systems , *COMPUTER operating systems - Abstract
This article features the Service Pack 2 (SP2) for Windows XP computer security software from Microsoft. The software allegedly makes Wireless-Fidelity and Bluetooth networks easier to navigate, adds new features to Tablet and Media Center personal computers, and updates the multimedia components of the XP operating system. The software comes in a 220-megabit package that installs in under an hour over broadband. Precautions when making a major update of the software include backing up crucial files and creating a System Restore point before starting. Among the most important security upgrades in SP2 are a major overhaul to Windows' built-in firewall and the addition of a Security Center Control Panel, which is a single starting point, offering convenient links to several security features. The tools will help safeguard even the least-protected systems against the most common kinds of Internet attacks, and will also provide a baseline of fundamental security technologies that will protect personal computers from future attacks. The Windows Firewall in SP2 replaces the Internet Connection Firewall, which is part of the operating system since Windows 2000. The utility can block probes and attacks coming in from hackers or worms over the Internet. INSET: Windows Road Map.
- Published
- 2004
29. Better Backups.
- Author
-
Jacobi, Jon L.
- Subjects
- *
BACKUP processing alternatives in electronic data processing , *COMPUTER storage devices , *COMPUTER input-output equipment , *COMPUTER peripherals , *DATA protection - Abstract
This article presents the results of tests conducted for several backup applications that one can use with storage devices. If one wants to back up the entire system, one way is by using a capacious external Universal Serial Bus 2.0 or FireWire hard drive. Such drives cost about $1 per gigabyte, depending on the interface. For the tests, Maxtor offered its Maxtor OneTouch 300-gigabit external hard drive. On the other hand, pressing a button on the front of the drive launches Dantz's Retrospect Express 6.0 backup software on one's personal computer. The default Retrospect script uses native file copying without compression, which is allegedly convenient because one can browse and restore them using Windows' Explorer. To conserve space, one can set Retrospect to conduct a full traditional backup function, comprising one's data into a single proprietary file that can be restored via Retrospect. The amount of space such compression saves depends on the type of files involved. With either native file copying or traditional backing up, one can arrange for a full backup of all one's data. To restore from incremental backups, one must first copy back the initial full backup, and then restore each subsequent incremental backup. INSET: RECOVER UNREADABLE CDs AND DVDs.
- Published
- 2004
30. LOCK DOWN YOUR PC.
- Author
-
Spanbauer, Scott
- Subjects
- *
COMPUTER security , *SECURITY systems , *DATA protection , *ELECTRONIC system security measures - Abstract
Provides security measures for computer systems. Protection of the physical integrity of computers; Technique in preventing intruders to boot the system; Procedure in password-protection for the BIOS. INSET: Kill Viruses Before They Get You.
- Published
- 2004
31. THE GREAT AMERICAN PRIVACY MAKEOVER.
- Author
-
Kandra, Anne and Brandt, Andrew
- Subjects
- *
COMPUTER security , *DATA protection , *RIGHT of privacy , *COMPUTER network security , *COMPUTER access control - Abstract
Gives advice on online personal information management. Control of passwords; Use of memory tricks to craft passwords; Need to change passwords frequently; Importance of setting automatic updates for sentinel applications. INSETS: WHAT'S YOUR PRIVACY QUOTIENT?;The Family With Budding Browsers;Top Utilities for Your Toobox;CALCULATE YOUR PQ
- Published
- 2003
32. Pest Zappers.
- Author
-
Spanbauer, Scott
- Subjects
- *
COMPUTER security , *SECURITY systems , *COMPUTER viruses , *DATA protection , *COMPUTER software - Abstract
Reviews several computer security software and antivirus scanners. INSET: DOUBLE PROTECTION Big ISPs Take On Antivirus Protection.
- Published
- 2003
33. Smooth-Sailing Utilities.
- Author
-
Spector, Lincoln
- Subjects
- *
UTILITIES (Computer programs) -- Evaluation , *WINDOWS (Graphical user interfaces) , *HARD disks , *DATA protection , *COMPUTER viruses - Abstract
Evaluates several utility products to complement Windows computer software. Recommendation for a diagnostic program and Registry cleaner; Products for scanning, defragmenting, and partitioning hard drives; File management; Backups to protect computer set-up; Protection against viruses. INSETS: Ontrack's SystemSuite 3;Solo or Suite?;When Utilities Attack;Skipping the Shrink-Wrap
- Published
- 2001
34. Hassle-Free Backups.
- Author
-
Miastkowski, Stan
- Subjects
- *
DATA protection , *BACKUP processing alternatives in electronic data processing , *HARD disks , *COMPUTER security , *TECHNOLOGICAL innovations - Abstract
Presents advice for creating backup systems for the storage of personal computer hard drive data. Reliability of hard disk drives; Alternatives to daily tape-based data backups; Technological innovations in the manufacture of tape drives; Advantages of rewritable compact disc (CD-RW) drives; Outlook for the viability of writable digital video disc (DVD) drives; Availability of Internet-based backup solutions. INSETS: Do I Really Need to Back Up?;Getting Data From Dead Drives;Alternative Back up Solutions.
- Published
- 2000
35. Backup software.
- Author
-
Byers, TJ and Farrance, Rex
- Subjects
- *
COMPUTER software safety measures , *DATA protection - Abstract
Presents backup software. Starting, scheduling and easy selections; Speed; Central Point PC Tools 8.0 from Central Point Software; Gazelle Back-It 4 1.4; Gazelle Back-It for Windows 1.2; Symantec Norton Backup for DOS 2.2; Symantec Norton Backup for Windows 2.2; Sytron Sytos Plus 1.4. INSETS: Best buys.;Fastback upgrades: Ripe with promise.;Norton backup for DOS is fastest overall..
- Published
- 1993
36. How to prepare for data disaster.
- Author
-
Hogan, Mike and Tynan, Daniel
- Subjects
- *
DATA protection , *HARD disks , *DATA tape drives , *BACK up systems , *EQUIPMENT & supplies - Abstract
Opinion. Discusses backing up a personal computer's hard drive. Why it is a wise move; Why a tape backup drive is the best solution; Best options for keeping desktops and laptops backed up; Other advice on backing up data; Recommended products. INSETS: Up in smoke (backing up data);The 11 commandments of backup;Talk about writer's block... (backing up data);Honey, I shrunk your data (backing up data)
- Published
- 1996
37. Study shows how long hard drives actually last.
- Author
-
CHACOS, BRAD
- Subjects
- *
CLOUD storage , *DATA warehousing , *CLOUD computing , *HARD disks , *DATA protection - Abstract
The article offers information on BackBlaze cloud-storage service. As of January 2014, BackBlaze employs more than 25,000 consumer-grade hard drives to back up its customer's data. BackBlaze's comprehensive report on the life span of those hard drives is discussed. The report can be accessed at go.pcworld.com/backblazereport.
- Published
- 2014
38. 5 things you must do to prepare for the end of BlackBerry.
- Author
-
BRADLEY, TONY
- Subjects
- *
MOBILE communication systems , *INSTANT messaging , *DATA transmission systems , *DATA protection - Abstract
The article five things that must be done in preparation for the end of BlackBerry devices. It advises businesses to address which mobile platform to switch to if BlackBerry ceases to be an option. It suggests the need for businesses to migrate to a third-party mobile device management (MDM) and to use and secure an instant messaging technology. It encourages businesses to consider data protection technologies that guard against unauthorized access as well as alternative software applications.
- Published
- 2013
39. Don’t erase, overwrite: How to avoid being that person who resells a drive with data on it.
- Author
-
HACHMAN, MARK
- Subjects
- *
HARD disks , *COMPUTER storage devices , *DATA security , *SECURITY management , *DATA protection - Abstract
The article advises computer users to overwrite hard drives again and again to ensure that the hard drives they would sell, give away or destroy no longer contain data. Topics covered include a study from Blancco which found that 42 percent of hard drives purchased on eBay still contain data, why formatting a hard drive is not enough when erasing data and the availability of tools for erasing data on hard drives.
- Published
- 2019
40. How to back up your PC before trying Win 8.1.
- Author
-
CHACOS, BRAD
- Subjects
- *
BACK up systems , *DATA protection , *BACKUP processing alternatives in electronic data processing , *MICROSOFT operating systems - Abstract
The article offers tips on how to back up data before upgrading to the operating system Windows 8.1. The author recommends preparing a recovery drive that will enable users to restore their Windows 8 installation if they have decided they do not like Windows 8.1. He also suggests checking the web site go.pcworld.com/bufiles that contains primer on ways to back up files.
- Published
- 2013
41. Four ways to make Internet Explorer more secure.
- Author
-
GEIER, ERIC
- Subjects
- *
INTERNET security , *WEB browser security , *COMPUTER security , *DATA protection - Abstract
The article offers tips on how to ensure that web browser Internet Explorer (IE) 9 and 10 is properly secured. Users should make sure that they have installed the latest versions and to keep the browser updated. It is also stressed that add-ons should be updated as soon as possible to prevent browser attacks. Information on how to manage the security settings for the different zones of IE is included.
- Published
- 2013
42. Protect your PC from surveillance.
- Author
-
HACHMAN, MARK
- Subjects
- *
COMPUTER security , *WEB search engines , *DATA protection , *DATA encryption , *EMAIL security - Abstract
The article provides tips on how to protect one's computer from surveillance. According to the author, instead of using the popular search engines like Microsoft Bing and Google, it is better to use DuckDuckGo so that searches will not be stored. It is said that smartphones can be tracked because a number of services ask users for their location in the name of improving services. In addition, it is advised to encrypt the connection from one's email provider, email messages and stored emails.
- Published
- 2013
43. How to Build a PC for Photographers.
- Author
-
CASE, LOYD
- Subjects
- *
DIGITAL photography , *FLASH memory , *USB technology , *ELECTRONIC photography equipment , *COMPUTER storage devices , *DIGITAL image processing , *COMPUTER buses , *PERSONAL computers , *DATA protection , *COMPUTER graphics , *COMPUTER network resources - Abstract
The article presents information on the requirements of microcomputers intended for use by photographers. The importance of the proper balance of components in the microcomputer is stressed, particularly the balance between the central processing unit (CPU) and computer graphics performance. The need for significant data storage capability is noted, and a USB 3.0 microcomputer bus is advised for moving data from the flash memory cards of digital cameras to the microcomputer. Having more than one physical drive on the microcomputer is suggested. Use of cloud computing storage as a backup of data is examined. Use of multiple computer monitors is recommended. INSET: Installing a Core i7 CPU.
- Published
- 2012
44. Set Up a Secure Web Connection.
- Author
-
Andrés, Steven
- Subjects
- *
DATA encryption , *COMPUTER security , *INTERNET traffic , *DATA security , *DATA protection , *ELECTRONIC data processing , *INTERNET , *WIDE area networks , *INTERNET users - Abstract
The article focuses on how to ensure that one's confidential data is safe. An encrypted channel can be created through which individuals can send traffic that originates at one's laptop end ends at a known location. Setting up one's own secure Web tunnel begins with paying a monthly fee for a hosting company to do all the work. It is also deemed important to use a command-line SSH client to set up one's tunnel and configure a port on local computer that will take any packets that the user has thrown into an SSH encrypted session.
- Published
- 2010
45. Reinstall and Restore Your Windows PC.
- Author
-
Spector, Lincoln
- Subjects
- *
DEBUGGING , *BACK up systems , *DATA protection , *WINDOWS (Graphical user interfaces) , *INFORMATION technology , *DATA corruption - Abstract
The article discusses how to restore Windows computers that have malfunctioned after a failed program installation. Users can resort to a bootable compact disc provided by original equipment manufacturers to restore hard drive to the exact contents it had prior to installation. A restore partition can be accessed by pressing a particular key combination. Other tools needed for computer restoration are backup media and software. Guidelines for creating an image backup of hard drive during the restoration are also presented.
- Published
- 2009
46. Build Your Own Free Security Suite.
- Author
-
Larkin, Erik
- Subjects
- *
FREEWARE (Computer software) , *COMPUTER software , *PERSONAL computers , *COMPUTER security , *INTERNET searching , *DATA protection , *WEBSITES , *WEB browsers , *COMPUTER systems - Abstract
The article presents information on free computer security tools that work together to protect personal computer (PC). AVG Free 8.0. can be easily installed and it works under XP and Vista. Also, it generally does well in signature based detection tests from organizations such as AV-Test.org. AVG's LinkScanner component checks sites in your search results for browser busting exploits. To add warnings for dangerous downloads, user complaints, and spam potential, bring SiteAdvisor into the mix. This free download from McAfee will add an icon that sits next to the one from AVG in your search results, along with a safety indicator for the currently viewed page.
- Published
- 2008
47. Carry a Portable Computer in Your Pocket.
- Author
-
Dunn, Scott
- Subjects
- *
USB technology , *INFORMATION storage & retrieval systems , *COMPUTER equipment , *COMPUTER storage devices , *SPYWARE (Computer software) , *DATA protection - Abstract
The article recommends the use of a universal serial bus (USB) flash drive. It is noted that by having a USB keychain drive and a little forethought, people can take a personalized computer everywhere and leave their laptop at home. With the right device and software, a flash drive can be plugged into a computer at an Internet café, hotel business center or elsewhere. In selecting the right USB flash drive, speed is said to a relevant factor. Installing antispyware and antivirus software in a flash drive is advised since using USB drive on an unknown computer exposes the drive to additional risks. INSET: Install PortableApps on Your Thumb Drive.
- Published
- 2008
48. Give Your Facebook Page a Much-Needed Lift.
- Author
-
Spanbauer, Scott
- Subjects
- *
ONLINE social networks , *INTERNET users , *DATA security , *DATA protection , *INTERNET , *WEBSITES , *ELECTRONIC industries , *COMPUTER industry , *HIGH technology industries - Abstract
The article offers tips for creating a secure Facebook profile on the Internet. It suggests that a user should exclude his/her home address, phone numbers, and other sensitive information from his/her profile unless listing the data is absolutely necessary. It further suggests that a user should avoid identifying the city he/she lives in, the age, and other exploitable stats as well. It further says that one should not accept Facebook's security defaults. It suggests school and regional networks for building personal social network.
- Published
- 2007
49. Is Web 2.0 Safe?
- Subjects
- *
COMPUTER security , *INTERNET servers , *COMPUTER viruses , *DATA protection , *WEB browsers , *INTERNET software - Abstract
The article examines whether the fast-evolving collaborative model of Internet development known as Web 2.0 is safe from the Samy worm, a virulent bug created by Samy Kamkar that no firewall could block. The worm was among the more prominent of a new generation of Web attacks that some security experts fear may slow the development of Web 2.0. The two major types of Web attacks that have security researchers concerned are cross-site scripting attacks, and cross-site request forgeries. Without a radical change in the way that browsers interact with the Web, experts say, the Web 2.0 security problem will only get worse.
- Published
- 2007
50. Vista Security.
- Author
-
Naraine, Ryan
- Subjects
- *
MICROSOFT operating systems , *COMPUTER security , *DATA protection , *COMPUTER operating systems , *FIREWALLS (Computer security) , *COMPUTER security software - Abstract
This article discusses the security features of Windows Vista from Microsoft Corp. It explains that though Windows Vista is safer than Windows XP, its predecessor operating system, it is already proving to be vulnerable. But security experts still proclaim Windows Vista as a major improvement over previous Windows versions and readily say that its important security features include an improved firewall, a protected mode for Internet Explorer and User Account Control. Another major addition to Vista's security arsenal is Windows Defender, an antispyware tool that is available at no cost for XP and Vista users. INSET: VISTA'S VULNERABILITIES.
- Published
- 2007
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.