Posts

  • TFC

    TFC (Temp File Cleaner) will clear out all temp folders for all user accounts (temp, IE temp, java, FF, Opera, Chrome, Safari), including Administrator, All Users, LocalService, NetworkService, and any other accounts in the user folder. It also cleans out the %systemroot%\temp folder and checks for .tmp files in the %systemdrive% root folder, %systemroot%, and…

  • Passwords

    Strong passwords are important protections to help you have safer online transactions. Keys to password strength: length and complexity An ideal password is long and has letters, punctuation, symbols, and numbers. Whenever possible, use at least 14 characters or more. The greater the variety of characters in your password, the better. Use the entire keyboard,…

  • How to Choose a Firewall

    Three basic types of firewalls are available for you to choose from: Software firewalls Hardware routers Wireless routers To determine which type of firewall is best for you, answer these questions and record your answers: How many computers will use the firewall? What operating system do you use? (This might be a version of Microsoft…

  • Sandbox

    In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third-parties, suppliers and untrusted users. I Recommend Sandboxie for Daily use. The sandbox typically provides a tightly-controlled set of resources for guest programs to run in, such as scratch…

  • Spam

    Spam is any kind of unwanted online communication. The most common form of spam is unwanted e-mail. You can also get text message spam, instant message spam (sometimes known as spim), and social networking spam. Some spam is annoying but harmless. However, some spam is part of an identity theft scam or another kind of…

  • Firewall

    A firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. A personal firewall differs from a conventional firewall in terms of scale. Personal firewalls are typically designed for use by end-users. As a result, a personal firewall will usually protect only the…

  • Checklist: Protecting your business, your employees and your customers

    Checklist: Protecting your business, your employees and your customers Do Unsubscribe from legitimate mailings that you no longer want to receive. When signing up to receive mail, verify what additional items you are opting into at the same time. De-select items you do not want to receive. Be selective about the Web sites where you…