Is your machine not what it used to be? We look at some of the common causes and remedies to a slow PC.
Viewing entries tagged
In case you missed it, the 11th of February was a notable day for a couple of reasons. Firstly, the European Union funded Safer Internet Day was held in order to raise awareness of the dangers of using online technology. Also on the 11th, the Electronic Frontier Foundation marked the day by voicing their disapproval of the NSA’s increasing surveillance of internet activity.
A Twitter username, you might think, isn’t very important. If you can’t have the one you originally want, just stick a couple of underscores in and it’s more or less the same. The lengths that some people have gone to in order to get the name they want though suggests that Twitter usernames are more significant than they first appear.
When an employee leaves a company there is a lot of work to be done to ensure a smooth transition for whoever will take their place, however one of the procedures that is often overlooked is the reclaiming or wiping of company IT. There are plenty of reasons to have a firm company IT policy in place as there could be financial, logistical and privacy issues on the departure of an employee.
The premise of an ad blocker is a very simple one; installed as an add-on to your browser, you are able to browse websites without having to endure annoying adverts or pop ups. There is a big debate over whether or not this is the right thing to do though. Although you are enjoying a more pleasant online experience, you could in fact be harming your favourite websites in the process.
Cryptolocker is the vicious ransomware that is shutting PC users out of their personal files and charging them large fees in return for a passkey to access them again. The virus has spread quickly over the past year and the estimated figures of infected units have been revealed by Dell Secureworks.
In one of our posts on internet security, we covered the increasing threat of a new type of ransomware called Cryptolocker. The malware, when installed on a user’s computer, encrypts their files and then demands payment to decrypt them. The user is presented with a timer that counts down and an ominous message explaining that if payment isn’t received before the timer reaches zero, all of the files will be destroyed with no chance of them ever being recovered.