Don't-Miss Security software Stories

hackers

4 ways to prepare for and fend off DDoS attacks

Distributed Denial of Service events and other cyber-attacks are an unfortunate inevitability of doing business on the Web.

Prepare an old PC for a new owner

James R. Miller has a new computer and will be donating his old one. He asked for advice about preparing his old PC for the transition.

Malware or false positive?

Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?

How to activate Windows Defender in Windows 8

Microsoft's stock Windows Defender app protects your Windows 8 PC against all sorts of nasties, but OEMs can disable the software to install an antivirus trial. Here's how to turn it back on.

TrueCrypt vs. encrypted .zip files

Trinu, who keeps sensitive data inside AES-encrypted .zip archives, asked the Answer Line forum about the advantages and disadvantages of switching to TrueCrypt.

Why isn't a program malware if it installs additional, unwanted software?

The iLivid installation routine put several unwanted programs on Threaddy's computer. Why didn't Norton block the program as malware?

The Malicious Safety OneCare Essential Defender: Straightening out Microsoft's confusing security tools

Microsoft has released a confusing selection of security programs over the years. Deborah Armstrong asked me to make sense of them.

PC security: Your essential software toolbox

Don't fall victim! With these tools, services and tips, you can protect yourself against malware, phishing and theft.

password

Learn to use strong passwords

Passwords protect every part of your online life. If you don't treat them properly, you're exposing yourself to a whole mess of trouble.

How to encrypt your cloud storage for free

BoxCryptor is a freemium, easy-to-use encryption program that can help you keep your data private in the cloud.

Tablet Encryption 101

Thinking about encrypting your Apple or Android tablet? The process can be daunting, but here's how to do it.

How to Protect Your Artistic Works With a Creative Commons License

These alternative licenses improve on existing copyright law by enabling content owners to promote the sharing and dissemination of their works.

How To Secure Your BIOS

You’ve password-protected your computer, but it remains vulnerable to mischief until you’ve done the same for your BIOS.

on techhive.com