BitTorrent. uTorrent. The Pirate Bay. These are just a few of the many popular peer-to-peer (P2P) file sharing sites you’ve probably heard of. Since its increase in popularity in the late 1990s, P2P file sharing has had its fair share of backlash for enabling illegal activity. Run a Google News search on peer-to-peer file sharing, and you’d find headlines like:
“Barre man charged with promoting child pornography.”
“Is the free download of uTorrent legal?”
“Illegal downloaders in federal court’s crosshairs.”
There’s another aspect to P2P that has traditionally caused concern: computer security and privacy risks. Continue Reading… What You Need To Know About Peer-to-Peer File Sharing
Zombies are making a killing on TV (The Walking Dead), in movies (World War Z), and in books (Pride and Prejudice and Zombies). There’s even a zombie game/fitness app, Zombies, Run!
But zombies aren’t so entertaining if your computer becomes one.
Continue Reading… 8 Signs Your PC Might Be A Zombie
The password to your online account is like the key to your front door. How strong are your passwords? We’ll address some troubling facts about weak passwords and what you can do to make them stronger.
Continue Reading… Weak Passwords: Are You Making It Too Easy For Criminals?
Which is the most secure Web browser? Google Chrome? Mozilla Firefox? Microsoft’s Internet Explorer? It’s a simple question—but the answer is a bit complicated.
In a Fall 2013 poll, security-conscious browser users overwhelmingly voted Firefox as the most secure. But during the annual Pwn2own hacking contest in March 2014, Firefox was exploited four times with zero-day attacks, making it one of the least secure browsers.
Continue Reading… 5 Ways to Secure Your Web Browser
Did you know that a laptop is stolen every 53 seconds, and 97% of lost or stolen laptops are never recovered?
What would you do if your laptop is lost or stolen?
Continue Reading… Do You Know Where Your Laptop Is?