Software makers routinely sacrifice some security for the sake of usability, and Microsoft is no exception. Most of today's client-side threats come from users being tricked into running malicious Trojan horse executables and naively lowering the default defenses, such as by disabling UAC (User Account Control), turning off automatic patching, or deactivating the built-in Windows Firewall.
Sunday, April 28, 2013
Friday, April 19, 2013
It will be an awkward situation when someone else uses your computer in your absence and steals your private data. So here I will discuss about different ways to prevent Cut, Copy, Paste and Delete Operations in Windows to restrict this situation
Wednesday, April 17, 2013
Most drivers on the road would say they consider themselves to be safe motorists. But that doesn't mean they drive safely by any means, they assume that because they have not been in an accident that they must be doing things right. However, having not been in an accident should not be what determines a safe driver from an unsafe one.
Monday, April 15, 2013
Most people think that once they can make a car move, they are automatically qualified to drive a car or other vehicle on the road not knowing that there alot involve in driving. Here (Nigeria) in this part of the world where anyone can obtain a DRIVER'S LICENSE without undergoing a driving test. This post will teach you some basic safe driving tips for your everyday driving.
Sunday, April 14, 2013
Have you ever tried to use your previously working hard drive and you received an error message "Read Disk Error or Cyclic Redundancy Check" A Cyclic Redundancy Check (CRC) is an error checking technique used by computers, specifically the hard drives or optical disks (i.e DVD/CD). A Cyclic Redundancy Check error is caused when data on the hard-drive or DVD becomes corrupt.
Thursday, April 11, 2013
When you think about it, the most valuable thing on your computer or network is the data you create. After all, that data is the reason for having the computer and network in the first place. And it's the bits and bytes that make up that data, that are your first priority when putting protective strategies in place. Operating systems and applications can always be reinstalled, but user-created data is unique and if lost, may be irreplaceable.