technology

Several months ago, I wrote about some of the online services that make available to users a “daily deal” of commercial PC and MAC software either for free or deeply discounted. Recently, SharewareOnSale.com offered, for very brief periods of time, name brand software from Norton, BitDefender, IObit and other well-known software publishers.

shadow
Ira Wilsker

Virtually all new laptop (notebook) computers, tablets and smart phones now include some type of webcam (web connected video camera). Some of the newer desktop monitors incorporate an integral webcam, and millions of computer users have an external webcam connected to their computers, typically mounted on the top of the monitor and pointed at the user. External webcams, often only requiring a USB connection, can frequently be purchased for under $20.

There are many legitimate uses for Webcams, as well as some illicit or criminal uses that webcam owners need to be aware of.

shadow

If you have listened to the news recently, you are well aware that there is a major controversy about at least nine major Internet and phone companies turning over a massive number of records to the National Security Agency (NSA). I’ll make no attempt here to politicize or judge what has occurred regarding; instead, I’ll review the privacy policies of some of the major players in cyberspace.

shadow

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Countless times in this column over the years, I have recommended free standing anti-malware software from MalwareBytes, SuperAntiSpyware and Emsisoft. I have now had an opportunity to experiment with another newly released competing product, Malware Fighter 2 from IObit, and my first impressions are positive.

shadow

Some suspicious computer users believe that, while they are away, others are accessing their computer, running unauthorized software or malware. Other wary users may find it interesting seeing what other people have done on a particular computer, what programs they may have run, what documents were viewed, and when the computer was booted and shut down. If a computer was infected by malware, it may often be of great interest to see what was being run on the computer at the time of infestation, and even identify the malware and its payload.

shadow

Let’s face it. Most computer users are inherently lazy. In order to make things easy on ourselves, we often use the same simple password on multiple websites and devices.

shadow

While some blame the economy, competition or technological change for the decline of Microsoft and its flagship operating system Windows, there is no doubt that Microsoft’s current offering, Windows 8, is nowhere even close to meeting its sales projections. This has also hurt others in the industry dependent of the sales of Windows based computers, including manufacturers such as Dell and HP, as well as Intel and other component makers.

shadow
Ira Wilsker

Americans are a generous people. In times of disaster or crisis, countless Americans have always heeded an internal call to do good and contribute to those in need. The recent terrorism in Boston, which resulted in at least three dead from the bombings, as well as over 170 injured, many losing limbs, has encouraged Americans to open their hearts and wallets to help. Donations are also pouring in to help the family of the murdered MIT campus police officer and a critically wounded Boston Transit officer, allegedly at the hands of the two suspected bombers.

shadow