After an ebb of only one patch in Microsoft's previous regular cycle, the flow resumed in force.
Samples of documents used in carefully prepared targeted attacks make clear that while a suspicious eye is a great security tool, some especially dangerous attacks might slide right by you.
A PC World reader asked the Answer Line forum about the six or seven svchost.exe processes that turn up in Task Manager.
These easy tips will help you clear your system of clutter, improve its performance, and keep it free from malware and other security threats. You can also protect your kids through safe search software and a time management device.
My nine-year-old daughter knows how to use Google. And as someone who just accidentally landed on a porn site after typing what he thought was the URL for a sporting-goods store, I realize it's time to take steps.
Last, Wednesday I showed you kid-friendly search engine Quintura, and we also looked at the kid-friendly Web browser KIDO'Z. Today it's time for the big gun: OpenDNS. It's a server-level filter that promises to protect your kids from online violence,...
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up...
IP video surveillance is becoming the security solution of choice due to the latest H.264 compression technology and declining prices for IP cameras. The converged world of voice, video and data has officially arrived.
Your digital photo files hold all sorts of interesting information. You probably know that you can find the date and time taken, date modified, and exposure information in your photo's metadata.
SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encrypt your email connection so that your password and messages are scrambled to eavesdroppers. If you're only connecting through a wired, office PC, you'll face little exposure with non-e...
A new threat that comes under the guise of a genuine antivirus program has become increasingly prevalent over the past year. Offering to locate and remove malware from your PC, this rogue will actually install a Trojan on your unsuspecting system. Th...
Latest News Articles
- Target says 40 million cards likely skimmed in security breach
- Jolla stocks new online store with Sailfish smartphones for Europe
- LTE to make spectrum-rich richer in 2014: Analysys Mason
- Guide: Last-minute Christmas gifts
- Acer focuses on cloud services to revive business
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- SecurityView all »
- Software and ServicesView all »
- Servers & StorageView all »
- Desktop PCsView all »
- NotebooksView all »