Malware applications in Android Market, how to detect them and how to help eliminate them - video tutorial

Hi friends, in today's tutorial we will learn what to do and what we can do when we detect malicious applications, such as malware, in the Android Market. I'm doing this tutorial because while browsing Android Market I found some malicious applications that have nothing to do in the Market. These are "published" by the same user as… [Read more...]

How to find out the phone number of the person who calls us with a hidden number - video tutorial

Hello friends, in today's tutorial we will see how we can find out who is calling us with a hidden number. I think there is no person who has not faced such a dilemma. Most people have suffered at least once in their life to be called or beep-forgotten in the middle of the night by unknown numbers and those who call with a hidden number, often do not know the limits and become… [Read more...]

Security in the browser, how we can see the characters of the passwords under the stars - video tutorial

Hi friends, in today's tutorial we will talk about security, browsers, passwords and how we can see the password under the stars in the password fields when we log on to sites. When is it useful for us to be able to see the characters under the stars entered in the password / password field? [Read more...]

Eraser, safe deletion of data without being recovered - video tutorial

Hi friends, in today's tutorial we will talk about securely deleting data from a hard drive, external hard drive, USB stick or memory card. As you know, when we delete a file from the hard drive it is sent to the recycle bin. [Read more...]

Predator, software that together with a USB stick can quickly lock and unlock the computer - video tutorial

Hi friends, in this video tutorial I will introduce you to an interesting program, it is called Predator and it can help us turn a usb stick into a computer key, from now on we can lock and unlock your pc almost instantly without inserting it in standby or hibernation. Predator uses the usb stick to store a "key" file, this file is read at… [Read more...]

KeyFreeze, software that allows you to lock the keyboard and mouse for security - video tutorial

In today's tutorial I will present a very small software that in some situations is useful. The program is called Key Freeze and with its help we can completely block our mouse and keyboard, ie we can no longer use the computer. How would this program help us? If you are visited by someone and you urgently need to leave computer is [Read more...]

How to delete a Yahoo Mail or Gmail account - video tutorial

Hi friends, in today's tutorial we will learn how to delete your Yahoo Mail account or Gmail account. Probably many of us have had a Yahoo Mail or Gmail account since we were little and the PC seemed like a game. Now we have grown up, some of us are more serious, we have entered a business and we would like to have a new e-mail address to represent us, an address… [Read more...]

Process Explorer, the best service monitoring software, a muscle task manager - video tutorial

Hi friends, today we will introduce you to Process Explorer, this is a process monitoring software that runs in the background in Windows. With the help of Process Explorer we can quickly identify any process or service that runs invisibly in the background. Viruses have such a behavior, they run in the background, the user can not notice them, sometimes not even a… [Read more...]

Some tips to make sure you download what you "need" from torrents - video tutorial

Hi friends, in today's tutorial we will talk about torrents. Specifically, we will see what to consider when downloading from torrents, how to avoid torrents uploaded by malicious uploads, more precisely from fake torrents and how we realize if what we download is what what interests us. Surely everyone uses in a way… [Read more...]

How to prevent computer infection from CDs / DVDs or USB sticks with Panda USB Vaccine - video tutorial

Hello friends, in today's tutorial we will learn how to protect our computer against the most exploited method of computer infection. Specifically, it is about the vulnerable function of Auto Run (Windows XP) or Auto Play (as it was renamed in Windows Vista and 7) existing in any Windows operating system. We know very well that when we enter… [Read more...]