However, if you’re using xB VPN, there is no concern about Java or JavaScript revealing a user’s true IP address, regardless of which browser is...
It’s not free, but personally I use Nyms when I need a disposable email address to avoid spam. Unlike many other anonymous email services, Nyms...
Symantec says “we are shooting for July 2nd for the public beta launch” (see here).
Anyone have comments (that can be properly shared) about the extent to which the 2010 edition of Norton Internet Security has enhanced its...
My suspicion is that “Early Load” was made an option by Symantec in order to accommodate the varying preferences of individuals. Users differ in...
That’s true for users of Norton Internet Security. With an active subscription, users are entitled to both updates as well as all upgrades (e.g.,...
Panda Global Protection 2010 released? Seems that “2010” is starting earlier and earlier in “2009”…. :)
For an alternative point-of-view, consider: “Norton scored better than any other suite or standalone antispyware utility on the current round of...
SteveTX, what are your thoughts on the issues described in the article The Proxy Fight for Iranian Democracy?
The logic is true, if and only if the AV has the signature used for detection at the time that the threat occurred on the user’s PC. Since there...
Every test has its own strengths and weaknesses, but on-demand scan tests (such as this Malware Research Group investigation) may not properly...
Pbust, I am a bit confused about this comment. Isn’t the processing of malware samples to create detection signatures essentially an automated...
Pbust, I am curious: can you describe the processes and procedures by which the samples are shared among anti-virus companies? Is there an...
Cd08, beyond the basics of “real, full, complete” erasure, what are the criteria by which you define the “best” utility -- speed, price,...
Softtouch, another difference between The Vault and WinZip is that the former appears to have the ability to encrypt file and folder names. With...
Softtouch, to clarify, what precisely is the problem that The Vault is seeking is solve? Based on the list of its features (see here), the...
Qzt, the Anonymity Checker by XeroBank may be of interest. Han, the fact that a website is able to return pages to your browser does not imply...
Here is one simple way to think about the problem that might be useful for some . . . If pi = the probability that a malware instance will be...
I find it disappointing that the individuals and institutions performing anti-virus comparisons appear to be so blissfully unaware of the basics...
N8chavez, I did in fact notice that R-Wipe&Clean had been previously mentioned in this thread. However, its compatibility with Internet Explorer...
Siberianwolf, you may wish to look at R-Wipe&Clean. I use it with Internet Explorer 8 (on Windows Vista), and am pleased with its operation.
FYI -- The log is C:\Windows\Debug\mrt.log on Windows Vista.
FYI: It may be worthwhile to recognize a fact well known and demonstrated by psychologists: electronic communication is very ineffective in...
For really stubborn files that you can’t otherwise delete, try the free MoveFile utility.
Mosqu, I see your point now. There are, however, some possibilities to consider. (1) Perhaps the malware was missed by the anti-virus because a...
Separate names with a comma.