After an ebb of only one patch in Microsoft's previous regular cycle, the flow resumed in force.
Samples of documents used in carefully prepared targeted attacks make clear that while a suspicious eye is a great security tool, some especially dangerous attacks might slide right by you.
Mobile printing has never been easier. For a busy office, reliable and easy-to-use tools are essential. Samsung's latest smart printers are equipped for wireless printing from mobile devices. Find out more about what is all about.
A PC World reader asked the Answer Line forum about the six or seven svchost.exe processes that turn up in Task Manager.
These easy tips will help you clear your system of clutter, improve its performance, and keep it free from malware and other security threats. You can also protect your kids through safe search software and a time management device.
My nine-year-old daughter knows how to use Google. And as someone who just accidentally landed on a porn site after typing what he thought was the URL for a sporting-goods store, I realize it's time to take steps.
Last, Wednesday I showed you kid-friendly search engine Quintura, and we also looked at the kid-friendly Web browser KIDO'Z. Today it's time for the big gun: OpenDNS. It's a server-level filter that promises to protect your kids from online violence,...
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up...
IP video surveillance is becoming the security solution of choice due to the latest H.264 compression technology and declining prices for IP cameras. The converged world of voice, video and data has officially arrived.
Your digital photo files hold all sorts of interesting information. You probably know that you can find the date and time taken, date modified, and exposure information in your photo's metadata.
SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encrypt your email connection so that your password and messages are scrambled to eavesdroppers. If you're only connecting through a wired, office PC, you'll face little exposure with non-e...
A new threat that comes under the guise of a genuine antivirus program has become increasingly prevalent over the past year. Offering to locate and remove malware from your PC, this rogue will actually install a Trojan on your unsuspecting system. Th...
Latest News Articles
- Some SAP users remain unhappy with pricier Enterprise Support
- Twitter reports a rise in government data requests
- Report: CIA improperly accessed Senate computers
- French carrier Iliad offers to buy T-Mobile US
- PHP gets a formal specification, at last
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 How to play DVD movies on your Nintendo Wii
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.