If I can get your user name and password, I can easily break into and use your computer and network resources just as if I were you. Bruce Schneier wrote an article recently that discussed this issue. Many of the largest exploits are started with stolen credentials, the user name and password that we all use to access our computer, network, and online ...
JUN

On Wednesday we looked at the obvious, visual symptoms of a malware infection. Today we will explore some changes in performance that can indicate that your computer is infected.
A rare Tuesday post, but this is too important to wait. If you own a Lenovo computer, you need to uninstall the Lenovo Accelerator application. A recent 

Although my very first PC user experience was on an Apple IIe back in 1984, I have really been a Windows guy for the most part. Got on my first Windows PC back around 1991, and bought my first Windows PC (Windows 3.11) in 1994. I do have an iMac in my current computer collection. But lately I have been playing around more and more in the Linux platform, both Ubuntu ...
File this under Not Surprised.
This is not a gripe about Spell-Check, although I