Security

Protect Windows XP from zero-day flaw in HCP protocol

Earlier this week was Microsoft's Patch Tuesday for June--a busy Patch Tuesday with ten new security bulletins fixing 34 different vulnerabilities. However, there is now a publicly disclosed vulnerability with potentially dire consequences that didn'...

How to foil Web browser 'tabnapping'

A new, incredibly sneaky identity-theft tactic surfaced earlier this week when Mozilla's Aza Raskin, the creative lead of Firefox, unveiled what's become known as "tabnapping."

Keep your personal data off the market

In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay h...

Facebook's new features: How to protect your privacy

Protecting your privacy on Facebook can feel like a full-time job. The social network has made a habit of tweaking its privacy policies with some regularity -- and in many cases, it's up to you to take proactive steps in order to keep your info out...

The ultimate guide to Windows 7 security

Windows 7 has been warmly received and swiftly adopted by businesses, with the result that many IT admins are now struggling with the platform's new security features. In addition to changes to User Account Control, BitLocker, and other features inhe...

One or two anti-malware programs?

A reader asked if it's really a good idea to supplement your regular antivirus program with something like SuperAntiSpyware or Malwarebytes Anti-Malware. I've recommended doing just that in the past.

Lose the Trojan

A reader asked the Answer Line forum how she can remove a Trojan from an infected .dll file called infamiqayoq.dll. Her security software quarantined the file, but now she gets an error message every time she boots.

How to: Deal with temporary slowdowns

There's nothing pretty about software overburdening your CPU and slowing everything down. And finding and fixing the cause isn't always an easy task. These suggestions will hopefully help.

Google Buzz: A privacy checklist

If you've heard of Google Buzz, chances are you've also heard about some of the privacy concerns that surround it. The social media service offers some cool ways to share photos, links, status messages, and more with fellow Google Buzz users. But if ...

Is your Linksys or Netgear router open to attack?

If you have a Linksys model WRT160N or Netgear RP614v4 router, it may be time to worry a little. At least according to a report out of Defcon from The Register. The vulnerability is based on CSRF, or cross-site request forgery, an issue with the cPan...

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?