I have been a long time user of the fabulous Avast anti-virus, simply because it has never let me down. It must have protected me […]
Read moreCategory: Security
How to Detect and Remove eDell Root Certificate Vulnerability
If you have bought a Dell notebook computer recently then perhaps you are affected with a serious vulnerability. In their newer laptop computers, Dell has […]
Read moreClean Malware Infections with Trend Micro Anti-Threat Toolkit
Coming across malicious software (or malware in short) is bad news for both the home users as well as businesses. The malware infections can damage […]
Read moreChrome Cleanup Tool Removes Malicious Software from Chrome
If you are seeing sneaky pop-ups, unintended search engine redirects, undesired toolbars or some other suspicious activities in Chrome browser, then perhaps some sort of malicious software has […]
Read moreApply Password Protection to Microsoft Office Documents
Some of the Microsoft Office documents have sensitive or private information and thus need to be protected from being accessed by just about any person. […]
Read moreRemove the Password Protection from Microsoft Office Documents
Microsoft Office allows you to password protect various documents that it supports so that not just anybody can open and view these documents. When you password […]
Read moreAvira Vulnerability Checker : Check Android Devices for Serialization Vulnerability
Android has been the most popular operating system for mobile devices and tablet computers for many years now. Consequently, it has also become a new […]
Read moreRemove Antivirus Products from Windows with ESET AV Remover
When you buy a new Windows PC, it comes pre-loaded with tons of bloatware and usually a trial version of an anti-virus product is one […]
Read moreStagefright Vulnerability in Android : Detection & Mitigation
Stagefright is the name of a new vulnerability that is being called the most serious vulnerability found in Android till date. The stagefright vulnerability is considered […]
Read moreRook Milano Checks Your PC for Existence of Hacking Team Binaries
Recently an underworld firm known by the name of Hacking Team got hacked by some other hacker who got away with hundreds of gigabytes of the […]
Read more