Ira Wilsker's archive

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Some suspicious computer users believe that, while they are away, others are accessing their computer, running unauthorized software or malware. Other wary users may find it interesting seeing what other people have done on a particular computer, what programs they may have run, what documents were viewed, and when the computer was booted and shut down. If a computer was infected by malware, it may often be of great interest to see what was being run on the computer at the time of infestation, and even identify the malware and its payload.

shadow

Let’s face it. Most computer users are inherently lazy. In order to make things easy on ourselves, we often use the same simple password on multiple websites and devices.

shadow

While some blame the economy, competition or technological change for the decline of Microsoft and its flagship operating system Windows, there is no doubt that Microsoft’s current offering, Windows 8, is nowhere even close to meeting its sales projections. This has also hurt others in the industry dependent of the sales of Windows based computers, including manufacturers such as Dell and HP, as well as Intel and other component makers.

shadow