How To Set Up An Instant Private Network With Remobo

Malware is a whole different ballgame, and is much more common and prevalent in today’s “internet” world. A common, everyday search can easily ring in loads of pop-ups, adware, and deeply buried malware, spying on keystrokes, monitoring cookies and just being down right annoying. The problem is that it’s always evolving, and many protective products can’t always prevent malicious activity. However, that doesn’t mean you shouldn’t attempt to block

Step 1: Go to “Start,” “Run,” (told you we use it a lot) and type regedit .Step 2: Navigate to the following: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionApps Path Step 3: Create a new folder/key under Apps Path. (Right-Click Apps Path and click “New,” “Key.”)Step 4: Title the new folder/key the name of the application, e.g. firefox.exe.Step 5: Right-Click the default string value (the thing automatically created in your new folder) and url click Modify .Step 6: Change the value to the path of the executable you are attempting to run. E.g. C:Program FilesMozilla Firefoxfirefox.exe .Step 7: Create a new “String Value” by right-clicking under the default value (the thing we just edited) and select “New,” “String Value.” Name it Path and enter the value as the same path you previously ente

Although not mandatory on all PCs, having some type of protection on your computer today is almost always a must. The problem that most tech savvy users have with them, is that most, just don’t work and most eat up way to many resources. Having a way to actually test some of the options out there, is a fantastic way to make your final decision. So you try it out…Download the latest AVG, Symantec or NOD32 trial and see which comes out on top with each of these to

Simply download and install. It will try to install a BitTorrent client (which will be required later as you will see) so if you already have your own, you can say no to this. While setting up the virtual network driver Windows will warn you. Click ‘continue’ and you should be good to

A contingent requirement lead me to the “˜discovery’ of Research feature in Microsoft Word 2007 . Since Office 2003, this feature has been a quite presence. Perhaps, not used as frequently because for most of us a browser is more second nature. But a Research feature within the Office suite has its own value

Nearly every single file on your computer contains some type of personal information – either information about the user, information on setting e.g. time, date, etc. In any case, it may be good to remove some of this information before making it available to the public, such as uploading a video or image onl

One of the most ridiculous features of Vista are the continuous “confirmation” messages. Messages that pop up nearly every time you attempt to run any unknown application. Almost all of which are completely unnecessary, and waste time. Here is how you can disable these annoying uac notifications, quickly and eas

7. Now, all you need to do is double-click on the loc.bat file and the folder should have an icon that looks like the control panel. If you click on the folder it should redirect you to the Control Panel and thus you have locked the fol

Most of us fire up Microsoft Word for our run of the mill document needs. Most of us don’t peek under the hood to see and use the other ready at hand tools that are just a few clicks away. I too accuse myself of this common shortcoming. It is perhaps a dire need or a serendipitous event that lead me to exploit a feature until now igno

The majority of the time you end up relying on on another product to get the annoyingware off of your machine. So now you’ve got a $60 bloated product eating up resources on your machine and doing absolutely nothing to protect

Vista is riddled with an extremely large amount of “security” measures that may, or may not, be helpful. Running Vista as an Administrator may help, but did you know there is an even higher Administrator? Well, there is! All you need to do to unlock it is the follow

An IT security group based in Europe called Eicar has come with a few different tools to test the effectiveness of your preferred AntiVirus application. There a few individual files to download and run, along with a ZIPPED file that will test your AV software and their ability to scan for viruses deeply embedded into other files. I should point out that Eicar does have a disclai

Step 3: Change the following values to whatever you like: TITLE HERE – Add the text that you want to be shows, ex. John’s PC ICON HERE – The image that is used as a brand logo. It must be a .ico and 24×24. ( E.g. C:\mylogo.ico. The has to be replaced by two \’s. ) FUNCTION HERE – This should be replaced with the function that will be used when clicked. ( E.g. A website, a windows executable, etc. http://google.com will redirect to Google when clicked. )Step 4: Save the file as brand.reg and double-click it. Now, simply log off and back on and you should have your own branded version of Wind

Facebook
Twitter
LinkedIn
Email

Leave a Reply

Your email address will not be published. Required fields are marked *