What the Tech logo
Please visit our forums for help with malware removal or any tech support question. Take me to the forums!

Ever wonder what’s going on in the tech world?? Rumors, gossip.every other field has it, celebrities, science, politics; so why not the technology group.

I’ve been scouring the web the past couple days looking for the most popular stories/rumors/news/facts and have compiled a list of some bullet points I thought the readers would find interesting to read.

Check out some of these cool facts and tidbits, they make great conversation starters and are cool oddities to know to increase your computer protection/user knowledge!

Read more Tech Gossip

Ever wonder what’s going on in the tech world?? Rumors, gossip.every other field has it, celebrities, science, politics; so why not the technology group. I’ve been scouring the web the past couple days looking for the most popular stories/rumors/news/facts and have compiled a list of some bullet points I thought the readers would find interesting [...]

  • Comments Off

Do all firewalls have a separate function? They function the same in their basic modes, but they have differences which make worth noting. Most firewalls are the same. I first want to give information about what firewalls are exactly. Then, in showing the difference between three firewalls so you may see what is wrapped in these network defense programs.

Read more on the differences between firewalls

Do all firewalls have a separate function? They function the same in their basic modes, but they have differences which make worth noting. Most firewalls are the same. I first want to give information about what firewalls are exactly. Then, in showing the difference between three firewalls so you may see what is wrapped in [...]

Once done over the telephone, is now widespread like wildfire all over the internet. What is it, you ask? Phishing

Phishing is criminally fraudulent robbery of personal information through the basis of cracking or asking for passwords. Its tactics are a subcategory of those related to identity theft. Instead of personal one-on-one telephone calls, every single employee of the gross companies have access to the Internet where they can control up to millions of people with the simple click of a mouse. I remember, and maybe you do too, back when AOL had a serious crisis where users were being asked to give out their password. Information was stolen and money was gained for the gross companies.

Read more on Phishing

Once done over the telephone, is now widespread like wildfire all over the internet. What is it, you ask? Phishing Phishing is criminally fraudulent robbery of personal information through the basis of cracking or asking for passwords. Its tactics are a subcategory of those related to identity theft. Instead of personal one-on-one telephone calls, every [...]

  • Comments Off

Theres a new dynamic duo in town, fighting spyware, malware, viruses and infections better then any combination put together. They’ve become the new replacement for the old alliance between spybot and ad-aware; except they weren’t blessed with such easy names…

Check out the top pair of trusted geek computer protection software and make sure you have these two on your computer. I have some inside information that our beloved head geek and owner of What The Tech runs this same combination!

Find out whats the best combination of software for computer protection?

Theres a new dynamic duo in town, fighting spyware, malware, viruses and infections better then any combination put together. They’ve become the new replacement for the old alliance between spybot and ad-aware; except they weren’t blessed with such easy names… Check out the top pair of trusted geek computer protection software and make sure you [...]

I just got a new computer from the Holiday festivities and now that it’s all plugged in, I’m scared to go online without a good anti-virus; I’ve seen what it could do to a machine (explaining the new one for the holidays!)? What is the best type of anti-virus out there?? I haven’t heard the best about some of the most market available Norton and McAfee.? Any help?!

It’s pretty shocking how terrible these anti-virus giants (Norton especially) are on your mainframes.? While only offering sub-par protection at best, they hog immense amounts of system resources, in particular: RAM.? Most computers are not equip with large amounts of RAM, thus slowing down the performance of the average machine.? It makes tasks like checking email quite tedious exponentially increasing time.

I highly recommend a number of free options as well as one market standard choice.? These programs use very little RAM and do not bog down the processor…

Check out some recommended anti-virus solutions?

I just got a new computer from the Holiday festivities and now that it’s all plugged in, I’m scared to go online without a good anti-virus; I’ve seen what it could do to a machine (explaining the new one for the holidays!)? What is the best type of anti-virus out there?? I haven’t heard the [...]

I’m trying to empty some files from the Windows Recycle Bin, but I can’t! Where can I find the recycle bin on my hard drive?

For many of us, the handy icon shortcut on our desktop is what we?ve come to rely on for our recycling needs, but others seek out the actual physical location on the C drive.

The folder resides at C:\Recycler but it is a hidden/protected operating system folder so there are settings that need to be changed before you are able to view it.

Here’s some simple instructions to get to the folder:

Read the answer to “Where is the Windows Recycle Bin?” ?

I’m trying to empty some files from the Windows Recycle Bin, but I can’t! Where can I find the recycle bin on my hard drive? For many of us, the handy icon shortcut on our desktop is what we?ve come to rely on for our recycling needs, but others seek out the actual physical location [...]

Merijn, the creator of HijackThis recently sold the popular application used to remove malware to Trend Micro. In addition to improvements like support for Windows Vista, they’ve added a deceptively titled “AnalyzeThis” button. While the average user likely thinks the AnalyzeThis button provides helpful information for diagnosing their log, it’s main purpose is to send the HJT log data to Trend Micro. Unfortunately, unless you carefully read the Trend Micro End User License Agreement, you would probably never know that the AnalyzeThis button submits the data from your HijackThis log to Trend Micro for use by them and their partners.

The Anti-Spware Coalition defines spyware as the following:

Read the rest of this entry »

Merijn, the creator of HijackThis recently sold the popular application used to remove malware to Trend Micro. In addition to improvements like support for Windows Vista, they’ve added a deceptively titled “AnalyzeThis” button. While the average user likely thinks the AnalyzeThis button provides helpful information for diagnosing their log, it’s main purpose is to send [...]

  

Recent Entries