How to prevent my system info from being leaked I realise websites and my software is managed to read my system and other information about my...
It is not "must". I know someone call it technical attack. This refers to an attack which requires zero user interaction to launch this attack to...
I have no time to read the whole thread, I'm not sure if it is mentioned before. Sorry if it did. Yes, an ISP is probably the "ultimate spy"....
I have a 99.9%, if not 100%, approach to carry out all these important things safely. it is potentially very safe too and can against any new or...
One question: Even if that security is as evil as described above, it is still not possible to read my encrypted folders/files. The only way it...
Any comment?
The wireless connection technology is still not mature. It has too many holes and exploits. If you wish to have more security boundaries, the...
Indexing CD/DVD files and contents Does anyone know if there is any software which can index external sources (filenames and contents)?? External...
Is it to do with the fact that NOD32 will do HTTP scan before the webpage is loaded into your browser? This might somehow interfere how Firefox works.
Good choice. :thumb: However it is still possible for a malware to bypass all of them. So try to do more to reduce the possibility: - harden...
DropMyRights -- make the application run as if it is in a limited account (so that app can't make changes which require administrative rights)...
It looks like it is very hard to bypass since it needs to bypass one by one. However sometimes it is not true. For example, if a malware writer...
Yes, exactly. But what if we don't distrust to such a degree, rather we trust it not to do the clearly malicious activities, but it may do...
OK, the answer is no. So what can we do to protect our pivacy? Wouldn't the answer in post #18 help:...
Yes, but probably just initially due to familarity. As the time goes by, the bad guys will be more familar to Vista and will be able to exploit...
A definite no. They will still have a place. Security is a losing battle for the defender. It is just the nature of computing. A security guru...
My answers (based on objective observations/independent tests, no subjectivity is involved): Trojan -- Avira Antivir(99.44%), Kaspersky(98.54%)...
Wouldn't it defeat the purpose of encryption? If you keep mounting the drive all the time, the contents are kept decrypted and can be easily stolen.
I'm afraid you haven't read the link, or interpret it wrong. What the above tries to say is there is hardly any (nearly) sure-fire way to...
Yes, this is one of the valid point - to take care of the newbies. However it is useful for (advanced) surfers with basic common senses too....
It is because malware doesn't always need to ask for your permission before it can execute. Another misconception is "a user will not be able to...
Haha... Funny. I haven't heard of it. Is it secure to use secure-it? 8) It seems we can acheive the same by configuring the system ourselves...
I can't see the point. If a malware can easily disable AV before it can detect the malware, what's the point of using it, even having the perfect...
Okay, so this is the only source of the test, right? http://www.safensoft.com/security.phtml?c=83&id=1100 A clever reader might think that it...
Yes, but what if the malware reuse that code and package in non-HTA file? I would feel more confident if I can block it regardless of what...
Separate names with a comma.