Looking at all the ads which promise to get rid of all spy programs, one may wonder why there is still plenty of them everywhere and the situation is by no means getting better. So let me spoil the advertisers’ mood and show some of the “holes” in the majority of software products we expect […]
P2P file sharing programs are free. Period. But there are P2P scam sites out there that want you to pay them instead. P2P scam sites are rogue companies that have set up shop to fleece unsuspecting music downloaders looking for file sharing programs by charging a fee for an otherwise free service. No P2P file […]
We all know that it’s dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access?
I like my software simple. If it’s too complex or difficult to figure out, I don’t use it.
You’re probably familiar with e-mail signature (or “sig”) files
You are familiar with the software applications that you run on your computer, but you may not be familiar with the dozens of programs running in the background on your computer. These programs, called “services” handle tasks like event logging, spooling files to the printer, and networking. One of these services, the Messenger Service, can […]
Wouldn’t you be shocked to find that your personal sensitive information, like files, credit card information, operating system / software and other non-disclosed data to be penetrated by unscrupulous prying eyes? Even worse…
If you run your own business like I do, you don’t have much time to spend fudging around with new programs. Here are some tricks I picked up while using Constant Contact’s email marketing software to create my company newsletter.