technology

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Some suspicious computer users believe that, while they are away, others are accessing their computer, running unauthorized software or malware. Other wary users may find it interesting seeing what other people have done on a particular computer, what programs they may have run, what documents were viewed, and when the computer was booted and shut down. If a computer was infected by malware, it may often be of great interest to see what was being run on the computer at the time of infestation, and even identify the malware and its payload.

shadow

Let’s face it. Most computer users are inherently lazy. In order to make things easy on ourselves, we often use the same simple password on multiple websites and devices.

shadow

While some blame the economy, competition or technological change for the decline of Microsoft and its flagship operating system Windows, there is no doubt that Microsoft’s current offering, Windows 8, is nowhere even close to meeting its sales projections. This has also hurt others in the industry dependent of the sales of Windows based computers, including manufacturers such as Dell and HP, as well as Intel and other component makers.

shadow
Ira Wilsker

Americans are a generous people. In times of disaster or crisis, countless Americans have always heeded an internal call to do good and contribute to those in need. The recent terrorism in Boston, which resulted in at least three dead from the bombings, as well as over 170 injured, many losing limbs, has encouraged Americans to open their hearts and wallets to help. Donations are also pouring in to help the family of the murdered MIT campus police officer and a critically wounded Boston Transit officer, allegedly at the hands of the two suspected bombers.

shadow

I was one of several presenters at a recent Taylor Career Center Business and Technology Summit. My topic was new computing technologies currently on the market making existing technologies obsolete.

shadow

However we personally feel about it, Facebook has become enormously popular. But one issue facing Facebook, as well as many other social networking and online services, is the privacy and security of its users. Sadly, the small percentage of the global population that wants to commit a variety of cybercrimes has found that social networking services are a fertile hunting ground, and Facebook is no exception.

shadow

Android powered smart devices, including smart phones and tablets, are currently outselling the other major smart operating systems by a huge margin. While published figures differ, some pundits allege that Android devices outsell Apple’s iOS and Microsoft’s Windows (smart device versions) by factors of between three or seven to one. According to Wikipedia, as of October 2012, Android powered smart phones had captured 75 percent of the market, with more than 500 million devices currently using Android.

shadow

One of the most frequent requests that I get from readers of this column has to do with removal of malware from infected computers. Most frequently, I have recommended the free versions of MalwareBytes (malwarebytes.org) and SuperAntiSpyware (superantispyware.com). I typically suggest downloading, updating and running one, and then repeating the same cycle with the other in order to reasonably ensure that the computer is free of malware.

shadow

The major search engines, along with most of their competitors, use a linear type of search results. The user simply types a search term, which promptly displays a linear listing of results, with little indication of how those results displayed are connected to each other.

shadow