Similar Articles |
|
PC World March 18, 2001 |
Top 5 Cookie Managers Block cookie files, or choose to accept them, before they reach your hard drive. |
PC World October 2002 Andrew Brandt |
Privacy Watch: How to Surf Without Leaving a Trace Worried that someone may be looking over your shoulder -- in the virtual sense -- as you browse the Web? If so, you don't have to be an online agoraphobe any longer: New tools from old hands in Web privacy will let you surf with complete anonymity. |
PC World April 2003 Scott Spanbauer |
Internet Tips: Protect Your PC and Data With the Security Checklist Follow these essential steps for your PC security. |
PC World March 26, 2001 Dennis O'Reilly |
Three Tools That Make Cookies More Palatable Some Internet cookies are helpful, some are harmful. These three tools help you distinguish friend from foe... |
PC World April 6, 2001 Sean Captain |
SafeWeb's Anonymous Browsing Service Free, Web-based service covers your surfing tracks and foils privacy-stealing code... |
Salon.com May 7, 2001 Scott Rosenberg |
Defending the cookie monster There are lots worse things in the world than Web sites leaving cookies on your computer... |
PC World August 5, 2002 Kim Zetter |
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application. |
New Architect April 2002 Al Williams |
A Cookie by Any Other Name Is it safe to use cookies again? |
PC World March 8, 2002 Lincoln Spector |
ZoneAlarm Evolves Into Full Security Tool Update adds better protection from intruders, cookies, and invasive ads... |
JavaWorld April 2002 Sonal Bansal |
A recipe for cookie management Client-side HTTP state management is important for creating Java applications that need to interact with Web applications like browser-based email or online banking services. This article presents a cookie library for robust and easy client-side HTTP state management in Java... |
PC World April 2006 Scott Spanbauer |
Take Charge of What Web Sites Know About You Control cookies, clear your download history, and take other steps to keep snoops off your online trail. |
PC World June 1, 2000 Matt Lake |
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. |
PC World May 2001 Stan Miastkowski |
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... |
PC World January 3, 2002 Joris Evers |
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... |
PC World September 2004 Stan Miastkowski |
Cut the Clutter and Add Power to Your Browser Web browsers can use substantial amounts of computer resources, and their temporary files can hog huge amounts of disk space. Updates, add-ons, housekeeping--and even using an alternative browser--can improve your surfing experience. |
PC World January 2003 Scott Spanbauer |
Protect Yourself -- Clear Your Cookies and History Keep your Web browsing private... stream music with PeerCast... control ads in Mozilla. |
InternetNews July 14, 2004 Ryan Naraine |
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. |
PC World November 2000 Steve Bass |
Fight for Your Online Privacy Software to protect against bad cookies and people trying to hack into your computer. |
PC World June 2002 Robert Luhn |
PC Security in the Zone ZoneAlarm Pro 3 protects your PC from hackers and blocks ads, cookies, and spyware... |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
PC World September 2001 Scott Spanbauer |
Internet Tips: Simple Instant Messaging With a Universal Client Use a universal client for instant messaging, crumble cookies selectively, de-brand Outlook Express... |
PC World November 2001 Scott Spanbauer |
Internet Tips: Free Tool Nabs Web Bugs Stalk and block clear-GIF Web bugs, use IE's P3P to crumble cookies, e-mail long URLs with ease... |
InternetNews December 19, 2007 |
Trojan Found in Google Text Ads BitDefender says ads placed by Google in Web pages are being hijacked by Trojan software that replaces the intended text with ads from a different provider. |
PC World May 2002 Andrew Brandt |
New Tools Take the Bite Out of Cookies Two cookie managers quietly do your bidding... |
IEEE Spectrum November 2005 Lauren Aaronson |
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. |
JavaWorld January 2001 Thomas E. Davis & Craig Walker |
Take control of the servlet environment, Part 3 Browser cookies are wolves in sheep's clothing. Developers use these incredibly simple and useful mechanisms to create Web-based applications that rely on the persistence of sessions. However, cookies feature an odd little problem in relation to subdomains... |
PC World April 2001 Cameron Crouch & Sean Captain |
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... |
PC Magazine February 1, 2008 Eric Griffith |
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. |
Popular Mechanics January 2009 Joe Pappalardo |
Four Ways to Fight Back Against Cyber Attacks Your webcam, cell phone, web browsers, and personal e-mails are all vulnerable to attack from thieves in cyberspace. Here are four ways to fight back. |
PC World August 2002 Scott Spanbauer |
Internet Tips: Listen to a World of Radio Stations on the Internet Don't limit your choice of media players or music... How to manage cookies with various browsers... |
InternetNews December 21, 2007 Sean Gallagher |
With Google/DoubleClick Approved, is Privacy Dead? The Google-DoubleClick merger creates a uniquely large single lightning rod for privacy activists to get up in arms over. |
PC World September 26, 2007 Lincoln Spector |
Identify Tracking Cookies in Firefox Find out what entity is responsible for each cookie you accumulate while surfing the Net. |
PC World May 16, 2002 Sam Costello |
Fake Xbox Emulator Hid Trojan Horse Host Angelfire removes Web site that secretly downloaded adware... |
PC World September 26, 2007 Erik Larkin |
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. |
PC Magazine November 2, 2005 Michael J. Steinhart |
Maximum Security: 94 Essential Tips for Staying Safe Dozens of our best security tips and pointers, broken down by category: system, networking and wireless, e-mail, Web surfing, malware, and mobile. |
PC World May 2001 Brad Grimes |
Privacy Matters Marketers would love to find out all about you and your online activities. But what personal data should you let them obtain? We report on recent developments in Net surveillance and their effect on you... |
PC World May 2005 Scott Spanbauer |
It's Time to Update Your Internet Security Arsenal Every tool you need to secure your Windows PC is free on the Internet. Here's where they are. |
PC Magazine March 6, 2007 |
No Peeking at Suspect E-Mail Don't peek at the pictures in spam e-mails. If you look, you're potentially giving personal information to the sender and, of course, inviting more spam. |
PC World May 2003 Stuart J. Johnston |
Bugs and Fixes: Fix Your Browser and Shop Safely Yet another patch for Internet Explorer to keep your data secure. |
PC Magazine November 2, 2005 Matthew D. Sarrel |
Cookies and PIE You know to be wary of cookies. Could persistent indentification elements be a bigger threat? |
PC World April 2003 Zetter & Tweney |
Internet Fixes Sneakier spam, wilier worms, more aggravating ads... no wonder it feels like your PC is under assault. Fight back with these simple steps for keeping the latest pests at bay. |
PC Magazine September 13, 2006 |
Read E-Mail Cautiously Short trick in Outlook to not viewing every e-mail in your queue. |
PC World May 9, 2002 Brian Sullivan |
'Cute' Trojan Horse Spreading by E-Mail Worm has been rated low risk, but could damage firewall and security programs on infected PCs... |
PC Magazine October 5, 2004 Sheryl Canter |
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. |
PC Magazine June 5, 2008 |
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. |
PC World November 9, 2001 Jennifer DiSabatino |
IE Hole Reveals Users' Cookie Data Microsoft is working on patch, but for now malicious sites could siphon information from IE 5.5 and 6.0... |
PC Magazine February 2, 2005 Gottesman & Karagiannis |
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. |
PC World May 2003 Scott Spanbauer |
Internet Tips: Avoid the Side Effects of Security Updates Pay attention to the effects that IE 6's service pack creates... back up Outlook folders easily. |
PC World June 2004 Mary Landesman |
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. |
Search Engine Watch December 10, 2010 Marc Poirier |
Online Advertising: The End of Cookies? Regardless of how we track, it's what we do with the data that is the main issue. Privacy concerns aren't going away, so it's our responsibility as marketers to use the data we gather responsibly. |