Botnets are a new reality that seems to have somehow imperceptibly swooped upon us. In fact, the first documented botnet – a network of bots – was created as early as 2001. Today some botnets include tens of millions of machines. And these computers perform the tasks they are given in complete ignorance of their… Continue reading What is a Botnet: Signs Your Computer Is Part Of A Botnet
Facebook finally responses to 2000 questions from US lawmakers and answers are quite interesting! Last month the New York Times revealed that Facebook had given device makers deep access to data on Facebook users and their friends, via device-integrated APIs. The number and scope of the partnerships raised fresh privacy concerns about how Facebook (man)handles… Continue reading Facebook gives US lawmakers the names of 52 firms it gave deep data access to
15 years ago it was hard to imagine that personal devices will be so widespread. Nowadays, you can see a smartphone even in the hand of the homeless. There is no need to say that the average age when the children get a phone decreased from 16-18 to 12-13. But any usage of smartphones is… Continue reading Age restrictions and children : what is important
Most of us know what a web browser is. If anyone does not know, the browser is the program we use to log on to the Internet (the most popular browsers are MS Edge, Google Chrome, Firefox, etc.) Browsers use extensions – special small software modules that configure them. Typically, extensions allow you to extend… Continue reading Browser Extensions: Are They Safe?
Google is an iconic search engine. You use it everyday, as well as 4.39 billion people who are connected to the Internet, use it, too. But there are a lot of functions which are always present inside of Google, that can make searching much easier or comfortable in one step. However, more than a 20%… Continue reading Unknown Google tricks for better searching
What makes the best computer security habits? Because you may do something along the lines of securing your computer from various malicious kinds of things like installing antivirus software and doing regular scans but it may not be enough. In fact, antivirus software deals with direct results of your good or bad security habits. The… Continue reading BEST COMPUTER SECURITY HABITS
The first hacking attacks and realization of the danger of trusting information to the digital media became a shock to computer users. That’s when the question of data protection rose, and the development of the first antivirus programs began. And that was even before the Internet became a usual thing. Nowadays, when every home is… Continue reading 10 Working Tips to Protect Your Personal Data