A Field Guide To Malware In 2016

Malware is used for a wide variety purposes from sleazy business practices to blatant crime. Discussions of malware often mix up the technology of malware and their uses. You will see below that the same technology can be used to direct ads to you that normally you would not see, or steal your credentials to your online banking account. It’s …

6

A Guide To Avoiding Ransomware (Part 1)

Ransomware is malicious software that allows a hacker to access an individual or company computer, encrypt your data resident on it and then demand some form of payment to decrypt it. This lets hackers hold your data hostage – and hence the term “ransom”. Victims can regain access to their files only by paying the ransom, or by restoring from a backup that was hopefully not on a network that was accessible to the compromised computer.

1

Let Your Child Explore Your Computer Without Worries — Use A Virtual Machine

A virtual machine makes it possible for your child to explore your computer freely without fears of configuration problems or lost files. If things do stop working, you can delete the virtual machine, restore from a backup, and the child is back with a working machine in just a few minutes You create a Virtual Machine by running another operating …

TretFlix Released: Pre-Installed Usenet Tools

Tretflix is a pre-installed and pre-configured application and OS environment that runs on any standard x86 desktop or server. It runs inside a virtual machine (such as the free VMWare ESXi v5.0+). It contains popular Usenet tools configured for an easy “out of the box” user experience. When combined with the built-in Plex Media Server, Tretflix is a great way …