After an ebb of only one patch in Microsoft's previous regular cycle, the flow resumed in force.
Samples of documents used in carefully prepared targeted attacks make clear that while a suspicious eye is a great security tool, some especially dangerous attacks might slide right by you.
A PC World reader asked the Answer Line forum about the six or seven svchost.exe processes that turn up in Task Manager.
These easy tips will help you clear your system of clutter, improve its performance, and keep it free from malware and other security threats. You can also protect your kids through safe search software and a time management device.
My nine-year-old daughter knows how to use Google. And as someone who just accidentally landed on a porn site after typing what he thought was the URL for a sporting-goods store, I realize it's time to take steps.
Last, Wednesday I showed you kid-friendly search engine Quintura, and we also looked at the kid-friendly Web browser KIDO'Z. Today it's time for the big gun: OpenDNS. It's a server-level filter that promises to protect your kids from online violence,...
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up...
IP video surveillance is becoming the security solution of choice due to the latest H.264 compression technology and declining prices for IP cameras. The converged world of voice, video and data has officially arrived.
Your digital photo files hold all sorts of interesting information. You probably know that you can find the date and time taken, date modified, and exposure information in your photo's metadata.
SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encrypt your email connection so that your password and messages are scrambled to eavesdroppers. If you're only connecting through a wired, office PC, you'll face little exposure with non-e...
A new threat that comes under the guise of a genuine antivirus program has become increasingly prevalent over the past year. Offering to locate and remove malware from your PC, this rogue will actually install a Trojan on your unsuspecting system. Th...
Most Popular Reviews
- 1 HP Stream 11 laptop
- 2 B&O BeoPlay A2 portable Bluetooth speaker
- 3 Acer Chromebook 11 (CB3-111)
- 4 Asus Zenbook UX303LN Ultrabook
- 5 Samsung's Galaxy Alpha review: A peek into the Galaxy S6
Best Deals on GoodGearGuide
Latest News Articles
- Hackers target Tor as PlayStation disruption continues
- Connected, self-driving cars in the front seat at CES
- MIT unifies Web development in a single, speedy new language
- Google, Microsoft, Sony make 'The Interview' available online
- Experts: FCC will adopt net neutrality rules in early 2015
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.