1. Technology
Send to a Friend via Email
You can opt-out at any time. Please refer to our privacy policy for contact information.
Andy O'Donnell

Updated Articles and Resources

By Andy O'Donnell

    Updated Articles and Resources
    • Is Your Computer Battle-ready? Created: Tuesday, January 28, 2014 Updated: Wednesday, July 16, 2014
      When you connected your computer to the Internet you placed it on the cyber battlefield, but did you prepare it for war? Learn how to make your PC 'battle-ready':
    • Password Policy: Store Passwords Using Reversible Encryption Created: Sunday, January 25, 2009 Updated: Tuesday, July 01, 2014
      A brief explanation of the Store Passwords Using Reversible Encryption setting in Windows Vista Local Security Policy - Account Policy - Password Policy settings.
    • Disable Remote Access In Windows XP Created: Sunday, June 25, 2006 Updated: Monday, June 30, 2014
      A quick step-by-step guide to show how to disable Remote Desktop and/or Remote Assistance. If the services are not being used, they are just another door for an attacker to access your system.
    • Do You Have a Disaster Recovery Plan (DRP)? Created: Monday, February 28, 2011 Updated: Monday, June 30, 2014
      Do you have a Disaster Recovery Plan (DRP)? Tips for creating a DRP for your home or business network and computers. Find out why a good DRP may save both your job and your marriage."
    • Wireless Security for Home Users FAQ Created: Friday, November 12, 2010 Updated: Monday, June 30, 2014
      Frequently Asked Questions and answers for wireless security for home users.
    • Help! My Browser Has Been Hijacked! Created: Sunday, June 29, 2014 Updated: Sunday, June 29, 2014
      You just tried to Google something but instead of getting a Google results page, your browser takes you to some sketchy-looking search engine that you've never heard of. Your web browser has just been hijacked.
    • Tips For Securing Your Racy Photos Created: Saturday, June 28, 2014 Updated: Sunday, June 29, 2014
      Did that sexy photo you just snapped get auto uploaded to your grandma's iPad without you even knowing it? Check out these photo privacy tips to help prevent future embarrassing mishaps.
    • Protect Your Privacy Using These Proxy Services Created: Saturday, June 28, 2014 Updated: Saturday, June 28, 2014
      Are you tired of spammers, telemarketers, and other folks bombarding you with marketing-related junk? It's time for a digital bouncer to handle all of this. Learn all about proxies in this article:
    • How to Help Your Government Keep Tabs on You Created: Saturday, June 28, 2014 Updated: Saturday, June 28, 2014
      If your government wants to spend millions of dollars to keep tabs on its own citizens, surely they have your best interests at heart, why not help them out, right? Here are some tips for making it easier for your government to keep track of you and some things that might prevent them from doing so.
    • Zero Day Exploits Created: Wednesday, November 24, 2004 Updated: Friday, June 27, 2014
      An article about zero day exploit vulnerabilities and how to protect yourself and your computer by your Guide, Tony Bradley" itemprop="description">...
    • How to Spot an Online Scam Created: Sunday, September 29, 2013 Updated: Friday, June 27, 2014
      Do you have a sixth sense when it comes to detecting online scams? If not, then you should check out our article on how to spot an online scam for tips on developing your scam-detecting skills.
    • Password Policy: Minimum Password Age Created: Sunday, January 25, 2009 Updated: Friday, June 27, 2014
      A brief explanation of the Minimum Password Age setting in Windows Vista Local Security Policy - Account Policy - Password Policy settings.
    • The Ever Growing Challenges of Data Storage Created: Tuesday, March 22, 2005 Updated: Friday, June 27, 2014
      The Ever Growing Challenges of Data Storage is an article about the issues with storing, maintaining, backing up and recovering data on today's massive storage media. It is written by Ontrack Data ...
    • New Year's Resolutions - Secure Your Digital Domain Created: Wednesday, January 15, 2014 Updated: Friday, June 27, 2014
      New Year's resolutions time AGAIN? Make this year the year you secure your digital domain. Here are some security-related New Year's resolutions and tips for getting them done.
    • Intuit Apologizes For "TurboHacks" Created: Friday, October 10, 2003 Updated: Friday, June 27, 2014
      Intuit apologizes for product activation and spyware in the flagship Turbotax income tax preparation software program. H&R Block capitalized on the customer backlash to sell more copies of its ...
    • The Dangers of Short Links Created: Tuesday, August 28, 2012 Updated: Friday, June 27, 2014
      Learn why you should think twice before you click that short link" itemprop="description"> Tuesday, October 28, 2003 Updated: Friday, June 27, 2014
      A brief overview of the basics of wireless networking- the technology, terminology, protocols and equipment. This is provided as a beginning point before moving on to the concepts of securing wirel...
    • Spy Tip #1 Created: Monday, November 14, 2005 Updated: Friday, June 27, 2014
      If you want to secretly monitor or check up on what an employee or child, or even a spouse, is doing on their computer, you need to take some precautionary steps to make sure your actions are not d...
    • How to Disable Facebook's Facial Recognition Feature Created: Sunday, September 23, 2012 Updated: Friday, June 27, 2014
      Does Facebook's facial recognition feature seem just a little creepy to you? Learn how you can disable it in just a few simple steps." itemprop="description">"description" Monday, March 11, 2013 Updated: Friday, June 27, 2014
      Follow these tips to help you keep yourself safe while browsing the web at your local coffee shop." itemprop="description"> Monday, January 16, 2012 Updated: Friday, June 27, 2014
      Everywhere you turn on the Internet, a scammer is waiting for you. Learn what it takes to scam-proof your brain." itemprop="description">> Sunday, May 24, 2009 Updated: Friday, June 27, 2014
      A step-by-step quick tip to walk through the steps for creating a new user account in Windows Vista and assigning it a secure password to protect it.
    • The Creepy Side of Facebook's Graph Search Created: Saturday, July 13, 2013 Updated: Friday, June 27, 2014
      Facebook Graph Search might seem like a cool social search tool, but it has a creepy side as well. Learn more about how Facebook's Graph Search might be abused by scammers and stalkers."
    • Do Not Use Real Words Created: Sunday, April 09, 2006 Updated: Friday, June 27, 2014
      One of the main tips when creating passwords is to not use any real words, or close approximations of real words, because they are more easily guessed or cracked by password cracking tools.
    • Security Content Automation Protocol (SCAP) Created: Saturday, January 29, 2011 Updated: Friday, June 27, 2014
      Security Content Automation Protocol (SCAP) resources for security professionals." itemprop="description"> Friday, February 27, 2009 Updated: Friday, June 27, 2014
      In Depth Security. Using a layered approach to network security provides better protection. An attack that compromises or bypasses one security layer will be detected and blocked by another."
    • Why You Need a Disposable Email Account Created: Monday, November 19, 2012 Updated: Friday, June 27, 2014
      Are you tired of SPAM. You should consider getting yourself a disposable email account. Let's look at some uses for disposable email accounts." itemprop="description" Saturday, April 05, 2003 Updated: Friday, June 27, 2014
      An article on setting up auditing to log events on your computer or network. Having logs helps to detect and prevent intrusions as well as providing valuable forensic evidence after an intrusion oc...
    • What Should Your Network Password Policy Be? Created: Sunday, September 23, 2012 Updated: Friday, June 27, 2014
      Have you been tasked to come up with a network password policy for your users. If you need help developing a network password policy then you've come to the right place." i--#if expr="$zTP='t3'" --...
    • Ad-Aware Pro AE (Anniversary Edition) Created: Wednesday, January 28, 2009 Updated: Friday, June 27, 2014
      A review of Ad-Aware Pro AE (Anniversary Edition). Lavasoft released new versions of Ad-Aware dubbed AE for Anniversary Edition in honor of 10 years of leading spyware and malware protection.
    • User Account Control: Admin Approval Mode for the Built-in Administrator Account Created: Thursday, February 05, 2009 Updated: Friday, June 27, 2014
      A brief explanation of the Admin Approval Mode for the Built-in Administrator Account setting in Windows Vista Local Security Policy - Security Options - User Account Control settings.
    • How do I Surf the Web Anonymously? Created: Sunday, April 10, 2011 Updated: Friday, June 27, 2014
      Tips to help you learn how to surf / browse the web anonymously.

    ©2014 About.com. All rights reserved.