Posts Tagged ‘Spyware Removal’


Make sure your network is secure and has a strong password.

Is your computer well-protected?

Your computer contains more personal information than you may realize. If you have ever purchased anything online, for example, your credit card number, billing address and other information are often stored automatically into your computer's...Read More

Leave a Comment

Path.com is hoping to create a digital "journal" that can be share with family and close friends.

Path: the “virtual journal”

A new social network app is gaining popularity: Path.com. Created in 2010 by Facebook's Dave Morin, Shawn Fanning (the founder of Napster) and famed developer Dustin Mierau, Path is described as a "virtual journal" of sorts.

...Read More

Leave a Comment

Before buying a new computer, many people check out online reviews to see what others think, but those aren't always accurate, either.

How to spot fake online reviews

Whether it's a desktop or smartphone, when you're considering purchasing a new piece of technology, you want to know about what others think of it. A great way to do so is to check out the online reviews of the product to get some feedba...Read More

Leave a Comment

SOPA seeks to stop online piracy, but some of its aggressive components have online companies worried.

Why is everybody up in arms about SOPA?

Perhaps one of the most popular acronyms thrown around these days is the word SOPA, which stands for the Stop Online Piracy Act. It's one of three bills (there are two others, PIPA and OPEN) being considered by Congress that seek to put a sto...Read More

Leave a Comment

They aren't exactly sugar cookies - Web cookies are small text files that allow websites to "remember" you.

Cookies: The pros and cons

No, this article isn't about chocolate chip or sugar cookies - the cookie we're referring to is what's known as a Web cookie, which is a small text file that is automatically inserted into your hard drive by a Web page server.

<...Read More

Leave a Comment

Advertising companies use browsing information to create personalized ads.

Websites may be leaking browsing information to third parties

Regardless of how many spyware removal programs computer users install, they may not be totally protected from internet threats, as some websites may be ...Read More

Leave a Comment

Businesses use firewalls to protect entire networks of computers from security breaches.

Firewalls on the front line of cyber defense

The Department of Homeland Security (DHS) has declared October National Cyber Security Awareness Month. In the ongoing 21st century war against computer hackers, one of the first lines of defense is a strong firewall. Networks that lack a firewall...Read More

Leave a Comment

Impostors posing as Microsoft employees contact users with unsolicited phone calls and emails.

Security alert: Microsoft impostor scam

Computer owners in Canada, Great Britain, South Africa and the United States are among the most recent victims of an elaborate scam that uses the Microsoft brand name as a ruse to steal information from unsuspecting computer users. In some instanc...Read More

Leave a Comment

Laptops can be locked externally or through software to prevent theft.

Software can help relieve fears of laptop theft and misplacement

Laptop computers, smartphones and tablets are becoming more popular among American consumers, which suggests an increased risk that these devices could be lost or stolen. The cost of replacing these products is high, but Read More

Leave a Comment

There are a few steps to take when bringing home a new computer

Steps to take when bringing home a new computer

The excitement of buying a new computer can encourage anyone to start playing with their new machine the moment they tear it out of the box. However, users should take a few steps before they start using their new computer.

Install ...Read More

Leave a Comment

Geeks On-site Computer Repair Service | (240) 426-6691 | (877) 433-5766 | 10908 Barn Wood Lane | Potomac, MD 20854