Winpatrol is always worth a go for removing these PITAs as well.
I have to play Devil's advocate. Like the wars against other things such as drugs, does each success really make a difference? In spite of the...
Trinity rescue kit [ not sure what this does]
Let's make a list of things that would be useful if you got diddled by cryptolocker and needed to bring your computer back. I'd start off with:...
Look. In my job as a 3D graphics designer I try out a lot of software. Over time I have seen the good, the average, the bad, the lousy and the...
Now, I never missed through the 60's. Missed it by about a decade. Damn. So much good stuff that I missed out on. Anyway, as a broad...
The trams [ only foreigner noobs call them streetcars!] go "Ding! Ding!" The weather has all 4 seasons in 1 day. There are more sports to watch...
Another aspect of complexity is to ask "what is your most vulnerable attack vector for malware?" For me it would probably be via emails. Sure,...
One thing that surely must be factored into any scenario is the "submarine attack". That is, there can be time gaps between when malware X got...
I will have a look at freefile sync. During the day is possible if it doesn't take long. Let me look at it for a few hours and I will come...
I am afraid that my situation involves even more complexities of the home business environment: I have computer A = uses ethernet computer...
Thanks for giving me a lot to think about! OK. There are some unique issues for my situation if I have any round robin scheme: First, I have...
I guess that it helps to ask "what do I need to restore?" It would be: computer A = business reports, business photos for engineering sites...
Thanks for the help! Much appreciated. OK. This morning I bought 2 seagate external backup drives. So Now I have 3 [1 I bought 3 years ago...
Hello I am not a security professional. I run a business from home with two desktop computers. They both run Windows 7. Mostly they don't...
Separate names with a comma.