How not to infect infected sites and viruses - sandboxie

How not to get infected on infected sites and viruses - sandboxie How not to get infected on infected sites and viruses - sandboxie In recent years people have been dealing more with viruses, spyware but also other malicious programs of new type that have become more and more sophisticated, and which can hardly be intercepted by a… [Read more...]

How to block the misuse of BITCOIN on your PC

How to block abusive BITCOIN mining on PC What is abusive BITCOIN mining? Lately, due to the ever-increasing price of BITCOIN, hackers are looking for increasingly interesting methods of mining BITCOIN. The last method is to use the processing power of several computers, through software or web scripts, which transforms… [Read more...]

STOP invasion of privacy on the Microsoft WINDOWS 10

STOP privacy violation on WINDOWS 10 by Microsoft What is this tutorial about? In this tutorial I will show you how to disable all settings that violate your privacy on Windows 10 by Microsoft, by massively collecting usage, browsing, preferences, location, etc. STOP breaching privacy on WINDOWS 10 by ... [Read more...]

Android permissions 6 Marshmallow

With the launch of Android 6 Marshmallow, this mobile operating system has received granular settings for the permissions granted to applications; a long-awaited feature on Android; it was already on iOS. With the new settings, we can control in detail, how much the "tentacles" can extend their applications. Most of the time, applications ask for naked permissions, not being ... [Read more...]

DNS poisoning method commonly used by hackers

DNS poisoning is a method by which hackers leave the impression that they have taken control of certain known sites or not. DNS is the protocol that bridges the domain name and IP address, because any site in this world has one or more IP addresses. When we type "google.com" in our browser, our computer has three options for finding out ... [Read more...]

Zemana AntiLogger or how we protect against data theft and spying software - video tutorial

Hi friends, in today's tutorial we will talk about the measures we can take against data theft. The most dangerous infections are those of Keylogger type, software that can record what we write on the keyboard. Keyloggers can be from the simplest, easily detectable to the most complex, very difficult to identify. They can also exist in… [Read more...]

Elimination of ransomware infections with Malwarebytes type - video tutorial

Hi friends, in today's tutorial we will talk about Malwarebytes as we got infected with ransomware. A new type of infection is circulating on the Internet, blocking the user's navigation by redirecting to a site where a message "Your computer has been blocked" is displayed, informing you that it has illegally downloaded content. [Read more...]

First for Microsoft, Windows 8 comes with preinstalled antivirus - video tutorial

Hi friends, in this video tutorial we will talk about the antivirus that comes preinstalled on Windows 8, yes you heard right, for the first time Microsoft puts in the Windows operating system an antivirus. The antivirus in Windows 8 is called Defender and although it may seem familiar, I assure you it is not about the old Defender, which was in fact an antispyware. ... [Read more...]

Offline means Cleaners (to boot) and use it Windows Defender Offline Tool - Video Tutorial

Hi friends, in today's tutorial we will talk about scanning your computer for viruses. We will do this in Offline or boot mode. To accomplish what we have proposed, we will use the Microsoft tool called Windows Defender Offline Tool available for free download and when I say free it means that we will not need the windows we download ... [Read more...]

How to prevent infecting your computer from CD / DVDs or USB sticks with Panda USB Vaccine - video tutorial

Hi friends, in today's tutorial we will learn how to protect our computer against the most exploited method of computer infection. Specifically, this is the vulnerable feature of Auto Run (Windows XP) or Auto Play (as it was renamed in Windows Vista and 7) that exists in any Windows operating system. We know very well that when we introduce ... [Read more...]