MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
March 18, 2001
Top 5 Cookie Managers Block cookie files, or choose to accept them, before they reach your hard drive. mark for My Articles similar articles
PC World
October 2002
Andrew Brandt
Privacy Watch: How to Surf Without Leaving a Trace Worried that someone may be looking over your shoulder -- in the virtual sense -- as you browse the Web? If so, you don't have to be an online agoraphobe any longer: New tools from old hands in Web privacy will let you surf with complete anonymity. mark for My Articles similar articles
PC World
April 2003
Scott Spanbauer
Internet Tips: Protect Your PC and Data With the Security Checklist Follow these essential steps for your PC security. mark for My Articles similar articles
PC World
March 26, 2001
Dennis O'Reilly
Three Tools That Make Cookies More Palatable Some Internet cookies are helpful, some are harmful. These three tools help you distinguish friend from foe... mark for My Articles similar articles
PC World
April 6, 2001
Sean Captain
SafeWeb's Anonymous Browsing Service Free, Web-based service covers your surfing tracks and foils privacy-stealing code... mark for My Articles similar articles
Salon.com
May 7, 2001
Scott Rosenberg
Defending the cookie monster There are lots worse things in the world than Web sites leaving cookies on your computer... mark for My Articles similar articles
PC World
August 5, 2002
Kim Zetter
Trojan Horse Technology Exploits IE Researchers show a tool that could admit hackers by pretending to be a trusted Microsoft application. mark for My Articles similar articles
New Architect
April 2002
Al Williams
A Cookie by Any Other Name Is it safe to use cookies again? mark for My Articles similar articles
PC World
March 8, 2002
Lincoln Spector
ZoneAlarm Evolves Into Full Security Tool Update adds better protection from intruders, cookies, and invasive ads... mark for My Articles similar articles
JavaWorld
April 2002
Sonal Bansal
A recipe for cookie management Client-side HTTP state management is important for creating Java applications that need to interact with Web applications like browser-based email or online banking services. This article presents a cookie library for robust and easy client-side HTTP state management in Java... mark for My Articles similar articles
PC World
April 2006
Scott Spanbauer
Take Charge of What Web Sites Know About You Control cookies, clear your download history, and take other steps to keep snoops off your online trail. mark for My Articles similar articles
PC World
June 1, 2000
Matt Lake
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. mark for My Articles similar articles
PC World
May 2001
Stan Miastkowski
Fortress PC Snoops, hackers, and viruses abound online. We identify all the tools you need to defend yourself against these hazards... mark for My Articles similar articles
PC World
January 3, 2002
Joris Evers
Peer-to-Peer Apps Shared Trojan Horse Popular file-swapping programs installed spyware software even if users opted out, companies admit... mark for My Articles similar articles
PC World
September 2004
Stan Miastkowski
Cut the Clutter and Add Power to Your Browser Web browsers can use substantial amounts of computer resources, and their temporary files can hog huge amounts of disk space. Updates, add-ons, housekeeping--and even using an alternative browser--can improve your surfing experience. mark for My Articles similar articles
PC World
January 2003
Scott Spanbauer
Protect Yourself -- Clear Your Cookies and History Keep your Web browsing private... stream music with PeerCast... control ads in Mozilla. mark for My Articles similar articles
InternetNews
July 14, 2004
Ryan Naraine
Microsoft Releases New Tool to Zap Download.Ject The cleanup from last month's malware attack continues. mark for My Articles similar articles
PC World
November 2000
Steve Bass
Fight for Your Online Privacy Software to protect against bad cookies and people trying to hack into your computer. mark for My Articles similar articles
PC World
June 2002
Robert Luhn
PC Security in the Zone ZoneAlarm Pro 3 protects your PC from hackers and blocks ads, cookies, and spyware... mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
PC World
September 2001
Scott Spanbauer
Internet Tips: Simple Instant Messaging With a Universal Client Use a universal client for instant messaging, crumble cookies selectively, de-brand Outlook Express... mark for My Articles similar articles
PC World
November 2001
Scott Spanbauer
Internet Tips: Free Tool Nabs Web Bugs Stalk and block clear-GIF Web bugs, use IE's P3P to crumble cookies, e-mail long URLs with ease... mark for My Articles similar articles
InternetNews
December 19, 2007
Trojan Found in Google Text Ads BitDefender says ads placed by Google in Web pages are being hijacked by Trojan software that replaces the intended text with ads from a different provider. mark for My Articles similar articles
PC World
May 2002
Andrew Brandt
New Tools Take the Bite Out of Cookies Two cookie managers quietly do your bidding... mark for My Articles similar articles
IEEE Spectrum
November 2005
Lauren Aaronson
For Love of Money Malicious hacking takes an ominous turn in the form of targeted Trojan attacks, in which an e-mail attachment looks innocuous but conceals a dangerous cargo and is more likely to be opened because the subject line contains language calculated to lure a particular recipient into opening it. mark for My Articles similar articles
JavaWorld
January 2001
Thomas E. Davis & Craig Walker
Take control of the servlet environment, Part 3 Browser cookies are wolves in sheep's clothing. Developers use these incredibly simple and useful mechanisms to create Web-based applications that rely on the persistence of sessions. However, cookies feature an odd little problem in relation to subdomains... mark for My Articles similar articles
PC World
April 2001
Cameron Crouch & Sean Captain
Is Your PC Safe From the Enemy Within? Does your firewall have a hole in it? New updates fix a potentially disastrous flaw... mark for My Articles similar articles
PC Magazine
February 1, 2008
Eric Griffith
How to Reclaim Your Online Privacy We reveal the methods you need to surf, e-mail, IM, and more while reclaiming your ever-elusive online confidentiality. mark for My Articles similar articles
Popular Mechanics
January 2009
Joe Pappalardo
Four Ways to Fight Back Against Cyber Attacks Your webcam, cell phone, web browsers, and personal e-mails are all vulnerable to attack from thieves in cyberspace. Here are four ways to fight back. mark for My Articles similar articles
PC World
August 2002
Scott Spanbauer
Internet Tips: Listen to a World of Radio Stations on the Internet Don't limit your choice of media players or music... How to manage cookies with various browsers... mark for My Articles similar articles
InternetNews
December 21, 2007
Sean Gallagher
With Google/DoubleClick Approved, is Privacy Dead? The Google-DoubleClick merger creates a uniquely large single lightning rod for privacy activists to get up in arms over. mark for My Articles similar articles
PC World
September 26, 2007
Lincoln Spector
Identify Tracking Cookies in Firefox Find out what entity is responsible for each cookie you accumulate while surfing the Net. mark for My Articles similar articles
PC World
May 16, 2002
Sam Costello
Fake Xbox Emulator Hid Trojan Horse Host Angelfire removes Web site that secretly downloaded adware... mark for My Articles similar articles
PC World
September 26, 2007
Erik Larkin
Five of the Dirtiest Malware Tricks From disguising applets to look like part of Windows to co-opting security tools, Web crooks use a variety of methods to bypass your system's safeguards. mark for My Articles similar articles
PC Magazine
November 2, 2005
Michael J. Steinhart
Maximum Security: 94 Essential Tips for Staying Safe Dozens of our best security tips and pointers, broken down by category: system, networking and wireless, e-mail, Web surfing, malware, and mobile. mark for My Articles similar articles
PC World
May 2001
Brad Grimes
Privacy Matters Marketers would love to find out all about you and your online activities. But what personal data should you let them obtain? We report on recent developments in Net surveillance and their effect on you... mark for My Articles similar articles
PC World
May 2005
Scott Spanbauer
It's Time to Update Your Internet Security Arsenal Every tool you need to secure your Windows PC is free on the Internet. Here's where they are. mark for My Articles similar articles
PC Magazine
March 6, 2007
No Peeking at Suspect E-Mail Don't peek at the pictures in spam e-mails. If you look, you're potentially giving personal information to the sender and, of course, inviting more spam. mark for My Articles similar articles
PC World
May 2003
Stuart J. Johnston
Bugs and Fixes: Fix Your Browser and Shop Safely Yet another patch for Internet Explorer to keep your data secure. mark for My Articles similar articles
PC Magazine
November 2, 2005
Matthew D. Sarrel
Cookies and PIE You know to be wary of cookies. Could persistent indentification elements be a bigger threat? mark for My Articles similar articles
PC World
April 2003
Zetter & Tweney
Internet Fixes Sneakier spam, wilier worms, more aggravating ads... no wonder it feels like your PC is under assault. Fight back with these simple steps for keeping the latest pests at bay. mark for My Articles similar articles
PC Magazine
September 13, 2006
Read E-Mail Cautiously Short trick in Outlook to not viewing every e-mail in your queue. mark for My Articles similar articles
PC World
May 9, 2002
Brian Sullivan
'Cute' Trojan Horse Spreading by E-Mail Worm has been rated low risk, but could damage firewall and security programs on infected PCs... mark for My Articles similar articles
PC Magazine
October 5, 2004
Sheryl Canter
You Need a (Properly Configured) Firewall Firewalls protect you in ways that antivirus software cannot, but only if they're set up correctly. mark for My Articles similar articles
PC Magazine
June 5, 2008
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. mark for My Articles similar articles
PC World
November 9, 2001
Jennifer DiSabatino
IE Hole Reveals Users' Cookie Data Microsoft is working on patch, but for now malicious sites could siphon information from IE 5.5 and 6.0... mark for My Articles similar articles
PC Magazine
February 2, 2005
Gottesman & Karagiannis
A False Sense of Security Only 85 percent of the AOL/NCSA survey respondents were running antivirus software. Worse, while 71 percent of those people thought they were updating their protection at least weekly (including automatic updates), barely half of them actually were. mark for My Articles similar articles
PC World
May 2003
Scott Spanbauer
Internet Tips: Avoid the Side Effects of Security Updates Pay attention to the effects that IE 6's service pack creates... back up Outlook folders easily. mark for My Articles similar articles
PC World
June 2004
Mary Landesman
Bigger Threats, Better Defense Tests of 16 security tools, including firewalls, antivirus software, and anti-spyware programs, that aim to foil worms, viruses, spies, and hackers. mark for My Articles similar articles
Search Engine Watch
December 10, 2010
Marc Poirier
Online Advertising: The End of Cookies? Regardless of how we track, it's what we do with the data that is the main issue. Privacy concerns aren't going away, so it's our responsibility as marketers to use the data we gather responsibly. mark for My Articles similar articles