Here are some, that are close to your description, but no quite, what you are looking for. Still might be useful though....
Well said. If a hacker wants to hack someone, it is not the question, if he can do it, but more like how long does it take. NSA or FBI have...
I recall using firewall beyond limits, I was very close to allow only IPs of webpages I visited, so everything else would be blocked and then I...
AVs will never die, they are still the best choice for users, because HIPS requires user to understand, what it does and not just to allow blindly...
I always try it and I never get it working. So far I have tried Ubuntu, OpenSUSE, Mint, Fedora and some others with unity, KDE or LXDE. I...
I read an article some time ago, that the more security applications you have, the higher risk of being hacked though their vulnerabilities, since...
I can not say, that I would notice any performance increase, but my 8 was running smoothly before already, so who knows. Anyway I like the RAM...
I recall, when I got my first internet with 56,6 kbps dialup modem, 12MB took an hour to download. Now I feel limited by FUP of 5GB per an hour...
Do not even mention it please, I had to reinstall Windows in order to fix, what CCEnhancer did. The same happened about a year ago and I did not...
Well this forum is obviously not for common folk. I would never advice anyone not to use AV nor firewall. I am just sick of hearing, that once you...
If there were any. Usually you can pay by a card or by paypal and that is it and paypal is obviously safer.
Always disabled. I never ever used search in Windows, I am not sure, what I should be searching for anyway. ::)
Yandex uses Kaspersky to do an on-demand scan of every downloaded file, but not packed like zip....
http://arstechnica.com/security/2014/02/new-attack-completely-bypasses-microsoft-zero-day-protection-app/
Datacoup is running a beta trial in which people get $8 a month in return for access to a combination of their social media accounts, such as...
Because most people on this forum understand, that a difference between closed and stealth ports is zero. :) No I am not a moron, I have no...
BTW, I see, that you are trying to help, I appreciate it, but I am install and forget guy. I focus my security triangle on usability and...
I looked into it, but it is too bothersome to set up, even DEP at max caused many games to fail without actually giving a supposed message, that...
Well, I do not use PC just for gaming, I have an internet banking, pay by credit cards and I shop online only. But do not take me wrong, I do not...
I used too, but then I stopped, I find it pointless, it is not like malware can so simply execute by itself, even if it is in PC already, unlikely...
That link again?! It was an opened port in XP, I know about it, I was infected while I was still installing Windows, twice in a row. It is a...
Only what I have in my signature, like a sandboxed browser, disabled Windows services, tasks, UAC at max. I call is a passive defense. I rely on...
As I said, they are not really opened, I can not really explain it technically, I hope, that someone smarter will....
I have deleted almost all of those tasks and no problems, but I use 3rd party defragmenter and a memory optimizer (Cleanmem). Deleted, because...
By default there are no real opened ports. You do not need a firewall nor AV, but the point is, this article is not meant for the common folk, but...
Separate names with a comma.