Exactly my thoughts.
If you put master password nobody could decrypt the info. This is how it's meant to be used.
Imho it's intentionally done from big tech manufacturers to confuse and manipulate customers. Intel also has some mess with processor numbers...
When I need to evaluate GPU normally look here: http://www.tomshardware.com/reviews/gaming-graphics-cards,1965-6.html ;)
Or used file manager for explorer replacement. I didn't have Rising in context menu of Directory Opus. Read about similar problems with other file...
According to the opinion in the link posted above http://www.wilderssecurity.com/showpost.php?p=1397854&postcount=51 Rising is quite capable of...
I used this form: http://sample.rising-global.com/webmail/upload_en.htm Is it possible for ISP to clean zip file during this type of submission?...
Firefox plus NoScript is enough for most of the time. The only risk is when trusted site is compromised. Other apps will cover these cases if used...
Yea, I'm more and more convinced that Rising is still not to be trusted too much. I submitted some malware to them to help them out rise...
I don't know how to interpret this too. Logically it should catch equally when scanning or running something. Anyway I'm changing to Avira...
Got the same result. Also tried it against ~500 baddies and it could catch only around 150 in comparison of 480-490 by Avira.
Did you actually manage to infect the system or just Rising didn't have the signatures. It appears that this AV has a few more tricks in the bag:...
I do. Never before done this, curious to try. Where can I find these baddies? PM?
Don't allow them. Only ytimg should be enough for videos at youtube and google video.
Don't forget to set ImgLikeOpera to "Load images for this site only" ;) Yes, of course. When the second copy of the browser ask internet access...
Yes correct, they are not programs by itself just links to images that browser requests. Use ImgLikeOpera and bugs will not be working. Ghostery...
If you save pages without images you will not have bugs on your system. They are small linked images that show your IP to the owner of third party...
Doesn't translate much really. The question for RAM is adequate when you have less of it on the PC. Otherwise it's important how the program is...
That's why I didn't wrote "post it" :) I meant to give it by PM to me or someone he knows better.
Cookie Monster too. Don't remember why switched from Cookie safe - may be late update for the new version of FF or some other minor problem. It...
If you don't feel confident in this matter just give us FileMon log (~20 seconds max) with filtered obvious entries (like browsers, mail clients...
Spector can easily be detected with Filemon from Sysinternals. Just fire it up and see if there are reading and writings of long and garbled files...
Nice work PROROOTECT!! Just found something I was searching from long time ago :) Thank you!
These days I've lost my funny side and obviously take everything like an oath :) On the topic - CIS for me. Very light on resources, simply,...
I saw some posts about XP Antivirus 2009 (2008 ) which is rogue antivirus program. Just google it.
Separate names with a comma.