Ira Wilsker's archive

Ira Wilsker

Virtually all new laptop (notebook) computers, tablets and smart phones now include some type of webcam (web connected video camera). Some of the newer desktop monitors incorporate an integral webcam, and millions of computer users have an external webcam connected to their computers, typically mounted on the top of the monitor and pointed at the user. External webcams, often only requiring a USB connection, can frequently be purchased for under $20.

There are many legitimate uses for Webcams, as well as some illicit or criminal uses that webcam owners need to be aware of.

shadow

If you have listened to the news recently, you are well aware that there is a major controversy about at least nine major Internet and phone companies turning over a massive number of records to the National Security Agency (NSA). I’ll make no attempt here to politicize or judge what has occurred regarding; instead, I’ll review the privacy policies of some of the major players in cyberspace.

shadow

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Some suspicious computer users believe that, while they are away, others are accessing their computer, running unauthorized software or malware. Other wary users may find it interesting seeing what other people have done on a particular computer, what programs they may have run, what documents were viewed, and when the computer was booted and shut down. If a computer was infected by malware, it may often be of great interest to see what was being run on the computer at the time of infestation, and even identify the malware and its payload.

shadow