Via PC Magazine, I found the AMTSO website, which is designed to test your antivirus software for proper operation. I think this is good for two reasons. One, it gives you a chance to see if antivirus software is operating properly. Two, it gives you a chance to see how your browser and antivirus software behave when something bad is going on. Read More »Give your antivirus software a workout
When Microsoft Security Essentials first came out, it was an improvement in antivirus performance. Now, it’s middle of the pack, according to PC Magazine. That’s great. Vendors are finally taking performance seriously.
What that means is that by replacing MSE with F-Secure Anti-Virus 2013, Kaspersky Anti-Virus (2013), Sophos Anti-Virus 10.2, ESET NOD32 Antivirus 6, Norton Antivirus (2013), Avast Free Antivirus 8, or Bitdefender Antivirus Plus 2013, you can speed up your computer. Considering Norton Antivirus was once bottom-of-the-barrel in the performance arena, I see this as a good thing.
Of the bunch, Avast is the only freebie. Though if your ISP offers one of the others as part of your subscription, or you don’t mind paying for antivirus, the others are an option. But maybe, just maybe, if I replace Microsoft Security Essentials with Avast, Peggy will quit calling me at dinnertime and telling me my computer is slow. But I doubt it.Read More »Antivirus progress
PC Magazine is advocating a bring your own laptop, with your own software approach to business. It likens it to mechanics who bring their own tools.
The trouble is that while mechanical tools in a toolbox operate autonomously and don’t interfere with one another, software residing on a computer does.Read More »The trouble with bringing your own software
PC Magazine published a few tips for people looking to buy their own cable modems and ditch the monthly rental fee It’s also helpful if your existing modem quit working and you need a new one. Modems don’t last forever. It also contains a reminder: Make sure you know whether your modem is just a modem, or a combination device that routes as well.
It’s interesting that I read two things about buying Twitter publicity today: John C Dvorak’s experiment for PC Magazine and an interview with my classmate and friend Ken. The idea is that people buy Twitter followers to make themselves look bigger than they are, whether they’re celebrities trying to make themselves look like they’re on their way up rather than down, or, like the scam my friend discovered, indie book authors trying to build a following.
John C Dvorak is raving in PC Magazine about Netgear wireless routers and range extenders and how easy WPS makes it to set them up–and providing some very seriously flawed security advice along the way.
“Note that WPS is crackable by serious hackers using brute-force attack, but any SOHO user not dealing with government secrets should be fine.”
Read More »No, it doesn’t take a “serious hacker” to crack wi-fi through WPS
I saw the headline on Slashdot: Forensic evidence trying to prove whether MS-DOS contained code lifted from CP/M. That got my attention, as the connection between MS-DOS and its predecessor, CP/M, is one of the great unsolved mysteries of computing.
Unfortunately, the forensic evidence doesn’t prove a lot.