No one's going to give you a high quality proxy service indefinitely for a one-time purchase. Servers and bandwidth cost money. I don't know how...
The guy knew nothing about computers. From the article, it appears he didn't even try to hide his IP. I take more precautions accessing Wilders....
SmartSniff should do what you want. It's my favorite network monitoring tool. http://www.nirsoft.net/utils/smsniff.html
It had occurred to me that it could just be executables, but still, this type of system can cause a lot of problems, especially for small-time...
dd for Windows. I've never used anything else and I've never had any problem with it. It always does a sector by sector copy though, which I...
Could someone describe how this actually works. Because after reading the article, I thought any file that didn't have a sufficiently good...
Yes. All correct. There's no way to protect yourself if a site is compromised. Obviously the site has to receive all data unencrypted (even if...
Keyscrambler premium looks like it covers a lot of programs (they say 130). What happens when you upgrade a program like Firefox or Opera? Does...
Yeah, I guess that's something better for a user like Rico than my solution. Fortunately, you can run most firewalls either way. You can use smart...
To each his own. I use everything you use plus HIPS/firewall, such as Comodo or Online Armor. In the interests of simplicity, I would just use the...
I wonder what the false positive rate is with a system like this. What this article is implying is that files can get flagged as malware simply...
I agree with 1boss1. After a month of using your HIPS and/or firewall, you begin to become familiar with what programs routinely ask for what...
To each his own. I'm not a big fan of blacklists personally. Here's my take on malware. Anything that ONLY affects my system (i.e. doesn't...
I'll make a couple more points. I'm not your typical grandpa computer user that just does some banking and word processing. I'm not just paranoid,...
Yeah, it's hard to imagine a simpler setup than yours. I added an edit to my last post. I wouldn't mind hearing more about your setup. Let me...
Yeah, it's not really a very advanced exploit. I just gave it as a specific example of a general way in which a trusted program can be used to...
http://www.pcworld.com/article/119016-1/article.html I've never been personally hit by something like this, so I can't comment specifically on...
Make sure to re-read my post, as I edited after you made this post. How can anyone think that a HIPS cramps their style less than an outbound...
You never mentioned that you had a HIPS (or that a HIPS was okay with you). It makes little sense that anyone would deal with anything as...
I hear this opinion so many times, and I have no idea what sheltered environment these people are living in. The types of software that try to...
I've looked at the data Windows tries to send out during various functions, though not specifically Windows Update or WGA validation (since I...
Of course, I meant the components in Windows that they rely on, not every component in Windows. Another thing that was addressed in the NSAKEY...
http://www.samsimpson.com/static/pgpfaq#SubNSACAPI This link is about the NSAKEY issue from a decade ago. Needless to say, it doesn't affect...
I have some problems with a lot of what you said, and I never denied the existence of a backdoor. What I said was: "To my thinking, any backdoor...
I agree with almost everything you say, however when I was discussing Windows, I was talking solely about potential undocumented "features" that...
Separate names with a comma.