ie8 fix

How To

Don't be the next victim of Internet scammers

Don't be the next victim of Internet scammers

Tough economic times are a boon to the crooks who prowl the Internet looking for their next victims. They know how eager (desperate?) so many of us have become in our quest to remain solvent.

It seems not a day passes without the appearance of some new Internet scam. Unfortunately, many of the ruses people fall victim to are older than the Internet itself.

Wiring money and Internet purchases don't mix
Take, for example, the bogus cashier's check. In last week's Santa Rosa Press-Democrat, Cathy Bussewitz wrote about Bart Edson's disastrous attempt to sell an antique more

How to protect your Gmail account from state-sponsored hacking

How to protect your Gmail account from state-sponsored hacking

This week, Google began warning users of "state-sponsored attacks" -- if Google detects malicious attempts to access your account, a prominent warning will appear at the top of your Gmail inbox.

Scary, but the warnings do not necessarily mean that the government-related hacker accessed your account. Instead, your account may have simply been targeted, and Google wants you to take extra security measures.

When such attacks occur and user accounts become vulnerable, it's important that all users take precaution. So, even if you have not yet received the warning, follow this guide to ensure your account is not compromised.more

The guide to password security (and why you should care)

The guide to password security (and why you should care)

In a better world, vulnerable accounts like banks, medical records, e-mail, and cloud drives would be protected with biometric systems. A swipe of a finger or a retina scan would allow access to your most important data.

Alas, eight-or-more-character passwords still dominate Web service log-ins. Anything from your investment portfolio to your Facebook account is simply accessed with an e-mail address (or username) and a few characters.

Yet, many Internet users continue to use easy-to-guess passwords like "123456," "qwerty," or their first names. Even worse, users repeat the same password (or a variation of one) across many accounts, putting themselves

more

How to spot dangerous links before you click them

How to spot dangerous links before you click them

You probably got to this page by clicking a link. Links are the ties that bind the Web. But each click is also a leap of faith. How do you know you're going to the page you think you're going to?

Google search results let you preview pages before you follow the link, but elsewhere the best you can do is hover over the link to see at the bottom of the browser the URL of the page the link will open. (See below for more on free browser add-ons that rate the security of links in search more

Two free Mac antivirus apps compared

Two free Mac antivirus apps compared

Recent malware attacks targeting Macs haven't tarnished the machine's reputation as the safer alternative to a Windows PC. But for many Mac users, the Flashback Trojan has dispelled the myth of Mac invulnerability.

The most recent Java-based iteration of Flashback appears to be easy to catch: just visit the wrong Web page and your machine's infected, as Josh Lowensohn describes in his Flashback FAQ.

The more

How to delete yourself from the Internet

How to delete yourself from the Internet

The Internet companies that power your online life know that data equals money, and they're becoming bolder about using that data to track you. If they get their way, your every online step would be not only irrevocable, but traceable back to you. Fortunately, there are some positive steps you can take to reclaim your online history for yourself.

The online privacy software company Abine, which makes Do Not Track Plus, also offers a service called DeleteMe, which removes your data from numerous tracking sites and keeps it from coming back. In an unusual gesture, though, they've made more

Six tips to make your Mac safer

Six tips to make your Mac safer

The Flashback Trojan went viral last week, infecting an estimated 1 percent of OS X computers worldwide. While the infection rate has subsided since then, that doesn't mean Mac owners should return to complacency.

It doesn't mean that there's cause for panic, either. Here are some common sense, effective tips for safeguarding your Mac against more malware.

  • Get a security suite: You can stop rolling your eyes now. Concerns about security suite performance generally come from the way that most security programs used to tie Windows into knots. While the Windows suites have gotten significantly better, their
  • more

    How to switch to a standard user account in OS X

    How to switch to a standard user account in OS X

    One of the commonly recommended safe-computing practices is to run your day-to-day activities in a standard user account and reserve administrative accounts purely for installing applications, adjusting system settings, and otherwise reconfiguring the system. This setup helps prevent mishaps performed in a standard account from affecting global system resources. For instance, a malware attack or bug in an application will have easier access to the Applications folder, global Library folders, and other resources open to admin accounts. Therefore, by using an account with standard permissions you will help prevent problems or dangers from affecting system resources without your explicit permission.more

    iCam is the cheap, easy way to get remote video surveillance

    iCam is the cheap, easy way to get remote video surveillance

    Video surveillance, often associated with bank-robbing and 7-11s, isn't just for retailers. Thanks to dirt-cheap apps like iCam, anyone with a computer and smartphone can set up their own video surveillance with little effort and without breaking the bank.

    When you're on vacation, traveling for work, or even want to set up baby monitoring, iCam provides the tools to turn your computer's Webcam (or an IP camera) into a surveillance camera that you can monitor remotely with your smartphone or tablet.

    You'll spend $5 total, and get access to features like motion detection, multi-camera monitoring, audio

    more

    How to reinstall OS X after malware infection

    How to reinstall OS X after malware infection

    The recent Flashback malware for OS X has caused a bit of a stir in the Mac community, and while it has only affected a fraction of the OS X install base, it still has had people who have indeed found the malware on their systems writing in to CNET and on the Apple Discussion boards.

    For the most part, people have been finding the malware on their systems by having an antivirus scanner or reverse firewall such as Little Snitch installed, and have either been given an alert that the malware was either found or a program file with more

    • Recently Viewed Products
    • My Lists
    • My Software Updates
    • Promo
    • Log In | Join CNET