What the Tech logo
Please visit our forums for help with malware removal or any tech support question. Take me to the forums!

The Heur.Dropper virus is a low threat level trojan that has a reputation to cripple anti-virus products such as AVG.

While it is not one of the most malicious pieces of malware to have on your computer, it should still be removed before it causes any performance issues or worse!

Read more on How to Remove the Heur.Dropper Virus

The Heur.Dropper virus is a low threat level trojan that has a reputation to cripple anti-virus products such as AVG. While it is not one of the most malicious pieces of malware to have on your computer, it should still be removed before it causes any performance issues or worse!

Facebook profile pages are still growing with more and more people of all age groups joining the social networking giant.

If you are someone who would like to protect some of their information, you should be no stranger to the privacy settings of Facebook, which helps hide, restrict and limit the viewing capabilities of the different networks you may be a part of.

If you are trying to hide your Facebook profile or make it private, there are settings to explore that can help make you invisible to anyone except for friends so you can save yourself some embarrassing moments.

Read more on How to Make a Facebook Profile Private

Facebook profile pages are still growing with more and more people of all age groups joining the social networking giant. If you are someone who would like to protect some of their information, you should be no stranger to the privacy settings of Facebook, which helps hide, restrict and limit the viewing capabilities of the [...]

Microsoft Security Essentials 2.0 was announced as the new successor to the original Security Essentials suite found on many Windows computers.? Microsoft was aiming to develop a more comprehensive piece of software that was lighter, faster and easier to use while cutting out some of the unnecessary features from the original security suite

While I was a fan of the old suite due to its integration with the Microsoft operating system, I never found it to be one of the best options out there in its class.? The new Security Essentials 2.0 however is taking Microsoft’s name in security to the top.

Read more about Microsoft Security Essentials 2.0

Microsoft Security Essentials 2.0 was announced as the new successor to the original Security Essentials suite found on many Windows computers.? Microsoft was aiming to develop a more comprehensive piece of software that was lighter, faster and easier to use while cutting out some of the unnecessary features from the original security suite While I [...]

  • Comments Off

Cell phones are becoming increasingly common for the young and old, with each age group relying on their mobile device for more and more types of usage.

Whether you use your cell phone to make calls and text, or you’re right up there with the latest technology surfing the web, paying bills, looking into the night sky on where the moon will be tonight…cell phone viruses are becoming real and its important to understand how to protect yourself against them.

Read more about Cell Phone Viruses

Cell phones are becoming increasingly common for the young and old, with each age group relying on their mobile device for more and more types of usage. Whether you use your cell phone to make calls and text, or you’re right up there with the latest technology surfing the web, paying bills, looking into the [...]

  • Comments Off

Adding a password on your phone will definitely help keep unwanted ‘text’ readers or snoopers away from your personal and private life.

If you’re looking to put a little more wall up besides the slide to unlock feature on most Android phones, I suggest you use some of the cool ways Google has created to lock your phone.

Gear up to privatize your phone again!

Read more on How to Password Protect your Android Phone

Adding a password on your phone will definitely help keep unwanted ‘text’ readers or snoopers away from your personal and private life. If you’re looking to put a little more wall up besides the slide to unlock feature on most Android phones, I suggest you use some of the cool ways Google has created to [...]

  • Comments Off

Forgotten passwords are a pain on any level, from email accounts to IM accounts.? Out of all the account passwords you could forget, the worst, by far, has to be the password to log into your computer!

I’d like to point out that EVERYONE should have a password to login to their computer and never should use the excuse that they will forget it as a reason not to have one.

Resetting a password in Mac OS X is incredibly simple.? The tools you will need: the installation disk that came with your computer.

Read more on How to Reset a Password in Mac OS X

Forgotten passwords are a pain on any level, from email accounts to IM accounts.? Out of all the account passwords you could forget, the worst, by far, has to be the password to log into your computer! I’d like to point out that EVERYONE should have a password to login to their computer and never [...]

  • Comments Off

How to Lock a Mac

So you’re leaving your desk, but you need to keep your computer running…how do you make sure your files are protected?? Locking your computer while not in use is a great way to prevent unwanted user entry and is a perfect solution to keeping peeping-toms off your computer!

Mac’s are a bit different than Windows when it comes to locking the user profile; I think Windows does it a lot better and easier, but nevertheless a Mac can do the same thing with just some tweaking.

How to Lock a Mac

So you’re leaving your desk, but you need to keep your computer running…how do you make sure your files are protected?? Locking your computer while not in use is a great way to prevent unwanted user entry and is a perfect solution to keeping peeping-toms off your computer! Mac’s are a bit different than Windows [...]

  • Comments Off

Everyone sends links over the internet and unfortunately people click on them too trustingly.? To be honest, I scan links from some of my closest friends as their computers could be compromised and viruses could be sending false links using their email accounts without them knowing.

If you’ve ever received a link and were suspicious about it, it’s better to be safe than sorry and scan the link/source to identify if the URL could be harmful to your machine.? In previous years, one solution would be to download a file and then scan it with a local anti-virus but why even put your computer at that risk…scan it online!

Read more about using VirusTotal to Scan URLs and Links

Everyone sends links over the internet and unfortunately people click on them too trustingly.? To be honest, I scan links from some of my closest friends as their computers could be compromised and viruses could be sending false links using their email accounts without them knowing. If you’ve ever received a link and were suspicious [...]

  • Comments Off

Ever use a public computer to check email or view some private data that involves a user name and password?? I’m sure you have felt paranoid at some point and always double check to make sure you are completely logged out

Avoid that paranoia and try running a browser completely off your thumb USB drive to avoid storing any data on a public machine!

How to Safely Use the Internet on a Public Computer

Ever use a public computer to check email or view some private data that involves a user name and password?? I’m sure you have felt paranoid at some point and always double check to make sure you are completely logged out Avoid that paranoia and try running a browser completely off your thumb USB drive [...]

  • Comments Off

The Kill.AV Trojan virus is a low threat but a threat nonetheless.? The virus is a low threat as it won’t due much to your machine but it will open up a window for other adaware and spyware to download itself onto your computer.

The Trojan Kill.AV can include a keylogger to monitor what you are typing and send it back to a third party such as credit card numbers and passwords to some of your most private accounts.

To remove Kill.AV from your computer, try the following steps.

Read more on How to Remove Kill.AV

The Kill.AV Trojan virus is a low threat but a threat nonetheless.? The virus is a low threat as it won’t due much to your machine but it will open up a window for other adaware and spyware to download itself onto your computer. The Trojan Kill.AV can include a keylogger to monitor what you [...]

  • Comments Off
« Previous Entries  Next Page »

Recent Entries