I go to wilderssecurity forum when I need the best information on computer security. I recently got a G1 Tmobile Cell phone, and it allows web...
Thank you for your reponses. Here is the reply email that they have sent to me after I asked them if their software contained any spyware/adware:...
For example: I usually only download / purchase software from Softpedia.com, Download.com, Snapfiles.com Because they supposedly guarantee...
I've been using LUA (SuRun) and SRP for months now and it seems very effective in controlling my computer security environment. I don't see myself...
Re: Network Security: How can I protect myself from infected computers in the network Thanks for the replies everyone. Helpful posts. All good...
Re: Network Security: How can I protect myself from infected computers in the network Hmmm, does anyone have any ideas?... Escalader?...
Re: Network Security: How can I protect myself from infected computers in the network Thanks for the link Escalader! I've written a summary and...
Re: Network Security: How can I protect myself from infected computers in the network Are you talking about the services listed under "Control...
Re: Network Security: How can I protect myself from infected computers in the network Disabling TCP/IP NetBIOS Helper. Is that the equivalent...
Re: Network Security: How can I protect myself from infected computers in the network I think we're talking about two different things. Are you...
Re: Network Security: How can I protect myself from infected computers in the network Thanks for the response Huangker! So you're saying that...
I started a thread many months ago and learned a great deal about Firewall security regarding threats *Outside of the network....
i just thought up another questionable action. What about cutting / copy and pasting a file that is "inactive malware", as from what I...
Hmmm.... it looks like MojoPac is *Not secure regarding malware. quote taken from http://www.everythingusb.com/mojopac.html "Fourth,...
Hi Lucas1985. You said that integrity checking is much more powerful that than regular AVG checking. And this statement is intriguing. Can...
I was basically trying to find a "big picture map" of software default configuration vulnerability (Such as turning off Auto-Play USB or DVD...
First I'd like to say that this is an excellent post. Along with your SuRun LUA post. Its Drastically changed my security setup. Good job Tlu....
you are correct. I forgot to add the basics. Opening & Executing mal-ware will activate it. Thanks for the info MrBrian. But one quick...
Thanks for all the responses everyone. Lots of good posts and information. You couldn't have said it any better. These links were very helpful...
Thanks for the links Longboard. So these are all Program Virtualization programs? If I use these programs and virtulize my "high risk...
This method is very intriguing: Please correct me if I am wrong, but is this method basically the following:... 1. Setup your windows like...
That's a good idea, and I'll work on this soon... but is it even possible to do the following: ? Because a lot of people say that...
Not neccessarily. Many programs are by default, vulnerable in their configurations. For example Internet Explorer, Many people change their IE...
I find this type of application very intriguing and I am going to look into this... I've actually always dreamed of the possibility of this...
Is their a SuRun like program for SRP? Is there a program that would make SRP Much more user friendly (just as SuRun does for LUA), where I...
Separate names with a comma.