files

Mon
17
Jun
Dennis Faas's picture

NSA Scandal: Google Reveals How It Shares Your Data

Google has revealed extensive details about what it does when the government asks for access to your personal data. It's part of an ongoing attempt by the search giant to distance itself from the National Security Agency (NSA) surveillance scandal . ... Google's explanation is designed to make a clear point: that it delivers the data directly to the government, rather than allowing the government to physically access Google computers. The company wants to make clear it doesn't allow officials the opportunity to access more data than the law requires. (Source: nytimes.com ) Google continues to ... (view more)

Wed
22
May
Dennis Faas's picture

'Files Terminator Free 2.5.0.1', and 'Start Menu Reviver 1.0.0.145'

Files Terminator Free 2.5.0.1 Tired of deleting programs only to find their files still on your system? Worried that sensitive information deleted from your system can still be retrieved? Then try Files Terminator Free, which permanently deletes ... files and cleans up your hard drive. http://elefantsoftware-en.weebly.com Start Menu Reviver 1.0.0.145 Not a fan of the new Windows 8 interface? Many fans of Windows XP, Windows Vista, and Windows 7 have said they miss the old user interface, particularly the Start button. Get it back with Start Menu Reviver, which is totally free. http://www. ... (view more)

Thu
25
Apr
Dennis Faas's picture

New Trojan Downloader Covers Tracks, Hard to Detect

Security researchers have discovered a new type of Trojan downloader capable of covering its tracks by deleting the files it downloads. That makes it harder for security experts to find and remove the downloader. The downloader, which is called ... Win32 / Nemim.gen!A, shows how malware writers are producing progressively more sophisticated tools. By deleting all of the files it downloads and uses, this Trojan makes it almost impossible to recover, isolate, and analyze component files. Sophisticated Malware Difficult to Confront According to Microsoft Malware Protection Center researcher Jonathan ... (view more)

Mon
15
Apr
Dennis Faas's picture

Ashampoo WinOptimizer 10 Review

Special note from Dennis: Save up to 60% off WinOptimizer 10! Deal ends on May 1st, 2013 @ 11:59PM EST. Proceeds support our website, staff, and writers. You can click here to go straight to the offer . Otherwise, continue reading below. Have you ... ever wondered why your PC, laptop, or netbook isn't as fast as it was when you used it for the very first time? If you've owned a computer for any length of time, you have inevitably downloaded, installed, and later gotten rid of program after program. What you may not realize, though, is that adding and removing programs oftentimes leaves you with ... (view more)

Wed
20
Mar
Dennis Faas's picture

Acronis True Image 2013 Review

Update 2013/05/16: We've just received news direct from Acronis that they've discounted True Image 2013 by a whopping 60% off (upgrade) and 35% for the full version -- but only for the next two weeks, ending May 31st. This is the best deal on True ... Image to date! Acronis True Image 2013 is powerful backup software, now with new features, bug fixes, and Windows 8 compatibility. Proceeds of the sale of this fine software program support our web site and staff of writers; full 30 day money back guarantee. This program comes highly recommended. Details are at the very bottom of page - click to go ... (view more)

Tue
05
Mar
Dennis Faas's picture

HTML5 Browser Bug Floods Hard Drives In Minutes

A recently-discovered browser flaw could allow hackers to manipulate a site visitor's physical hard drive. At the moment, Mozilla's Firefox is the only browser not affected by the problem. The technology involved is HTML5, the latest edition of the ... standard code used to produce websites. One of the key features of HTML5 allows web developers to include code for showing multimedia -- such as animations and videos -- without the website visitor having to install special plug-in software. Web browsers have always had the ability to write some data to a computer's hard drive, usually on a ... (view more)

Wed
30
Jan
Dennis Faas's picture

How to Use Microsoft SkyDrive

We recently received this question from an Infopackets reader: "Hi there, I'm interested in giving cloud storage a try, but I'm not sure which service to use. Can you help me out? Thanks! Roger T." My response: Hi Roger -- certainly there are a ... number of different cloud storage services worth trying. I've given both DropBox and Microsoft SkyDrive a try and, personally, I prefer the latter. In this guide, I'll show you how to get started using that service. If you've recently upgraded to Windows 8 or have purchased a Windows 8 computer (including Windows RT, Windows 8 standard, or Windows 8 ... (view more)

Mon
28
Jan
Dennis Faas's picture

DNA: The Future of Data Storage

European researchers have made it possible to store coded data in the form of DNA, officially creating the most compact form of digital storage ever in existence. UK-based EMBL-European Bioinformatics Institute (EMBL-EBI) recently announced the ... successful storage of encoded data in DNA format. The files include an MP3 of Martin Luther King's famous "I Have a Dream" speech, a .jpeg photo, and several other text files. Millions of Data Stored in a Cup of DNA The innovative encoding method makes it possible to store over 100 million hours of high-definition video in just a cup of DNA. Among its ... (view more)

Fri
04
Jan
Dennis Faas's picture

Shocking New Study Evaluates Antivirus Products

Security researchers have recently claimed the leading antivirus products demonstrate just a 1-in-20 chance of detecting new malicious software. However, high-profile figures in the security industry have questioned the validity of this new ... research. The research was conducted by Imperva, a digital security firm based in California. It intentionally set out to collect samples of virus code. To make sure it was collecting new samples of brand new viruses, Imperva searched discussion forums for hackers offering tips on how to breach security defenses. After gathering 82 examples of malicious ... (view more)

Wed
12
Dec
Dennis Faas's picture

Hackers Hold Medical Records Hostage

A group of hackers has gained access to an Australian medical center's electronic patient records. Until they receive a cash payout, the hackers say they won't relinquish control of the information. It's relatively common for hackers to access ... sensitive data and then threaten to expose it unless a victim pays up. There have been several cases where scammers have remotely installed viruses on computers, then threatened to wipe the hard drive of all its stored data unless they receive hefty payments. But this case, involving the Miami Family Medical Center (MFMC), is different. Rather than ... (view more)

Pages

Subscribe to RSS - files