Antivirus Sitemap - Page 1 2016-09-26

Why Is My Internet Explorer 11 Is So Slow?
Once you upgrade to Internet Explorer 11, here's how to manage performance, increase speed and make sure you only get cookies and pop-ups you want.

Windows Security Guides
Windows security tips windows how-to guides secure your pc xp windows 7 vista

How to Tell if Your Antivirus Is Working
When malware gets onto the system, one of the first things it may do is disable your antivirus scanner. Here's how to check if yours is working.

How To Prevent Spyware from Infecting Your Computer
Due to the seriousness of spyware, it is highly recommended you take the following measures to prevent it​ from overtaking your system.

Top Ways to Get Infected Online
Staying safe online takes more than just installing a few security programs. To protect both you and your computer, here are the habits you need to avoid.

What’s a Trojan Horse Virus?
A Trojan does not replicate. Viruses do. That fact alone means there can never be a

What Is a Boot Sector Virus?
A boot-sector or Master Boot Record virus takes control when the computer boots up. Here's how it works.

How to Disable AVG When It Crashes Your Computer
The systemic problem of AVG crashing Windows computers is almost an annual occurrence. Here's how to recover from an AVG crash.

What Is the Malware Known as Sirefef?
Sirefef is a severe malware that can cause damage to your computer in a variety of ways. Learn about the dangers and how to prevent it.

Online Virus Scanner Options
There are several online virus scanners from which to choose and many use the same antivirus engine of their installed counterparts. Learn more.

Malware Information
From Mary Landesman, your guide to Antivirus Software, common malware, security vulnerabilities that lead to infection, and other computer-related threats.

Autorun Worms: How to Remove Autorun Malware
Autorun worms spread from USB/thumb drives as well as fixed and mapped drives. Here's how to remove an autorun worm.

How to Avoid Package Tracking Scams
Package delivery and shipping scams are all too common. This simple tip will keep you from being fooled.

How to Exclude Programs from DEP
DEP can cause conflicts with legitimate programs. If this happens to you, here's how to disable DEP for specific applications.

What is Antivirus Software?
You've been told to run antivirus software and so you do. But do you really know what antivirus software is?

What Are the Differences Between Adware and Spyware?
To avoid adware & spyware, you'll want to play close attention to both the licensing agreement of free downloads and the security settings in your browser.

AAAAAAA@AAA.AAA hoax
Like its predecessor !0000, the AAAAAAA@AAA.AAA tip is doomed to failure. Worse, it can leave you less protected than you were before.​

Viruses Explained
What is a virus, worm, trojan? What is a bot, a botnet, a zombie? All this and more explained by Mary Landesman, your About.com guide to Antivirus.

What Is a Logic Bomb? Explanation & Prevention
Logic bombs are malware that execute in response to specific events. Learn more about logic bombs and how you can avoid this attack.

Clean, Quarantine, or Delete?
If your antivirus encounters an infected file, there are generally three options available: clean, quarantine, or delete. Learn which to choose.

Do You Really Need Mac Antivirus Software?
Do you really need Mac antivirus software? Get the answer to that and other frequently asked questions about Mac viruses.

Firefox Redirect Virus - Prevention and Removal
Firefox Redirect Virus causes unwanted results by redirecting your Internet searches. Follow these steps to help you remove it.

Do You Suspect Your Email Account Has Been Hacked?
Are friends and family complaining of receiving email you never sent? Is it malware? A hacker? Here's how to tell.

Step-by-step instructions for removing the FBI Virus
The FBI Ransomware can take your PC hostage by forcing you to pay a ransom in order to free your computer. Avoid from becoming a victim.

How to Remove the FBI Virus - Safe Mode With Networking
How to remove the FBI Virus -- Safe Mode With Networking. Page 2.

How to remove the FBI Virus -- Using Updated Anti-virus software
How to remove the FBI Virus -- Using Updated Anti-virus software

Remove the FBI Virus
Remove the FBI Virus. Antivirus.

What Is a Keylogger Trojan?
Keyloggers may record all keystrokes, or they may be sophisticated enough to monitor for specific activity. Learn more.

How to Delete a Service in Windows 7, Vista, or XP
Whether cleaning up after an antivirus removal or attempting to remove the malware manually, knowing how to delete a service will help.

Mac Security Tips
Mac OS X has many built-in security mechanisms, but that doesn't mean that Macs can't be infected by malware. These security tips from About.com guide Mary Landesman will help ensure your Mac is safe from malware and unauthorized intrusion.

How to Exclude Files and Folders from Norton Antivirus
Here's how to exclude a file or folder from scanning by Norton AntiVirus and Norton Internet Security.

How to Disable AutoComplete in Firefox
Here's how to clear the sensitive data stored by AutoComplete and how to disable the feature to protect yourself from compromise.

Prevent Adobe Reader From Opening PDFs in Browsers
Make this one small tweak, and henceforth you'll be notified if a website tries to open a PDF in your browser.

EICAR Test File: Make Sure Your Antivirus is Working
EICAR is not a virus. EICAR is a special file used to test antivirus software. Here's how to make an EICAR file to test your virus protection.

Your PC Is Infected Logmein Phone Scam
Someone phones you claiming to be from Microsoft, or an antivirus company, or some random tech support facility. But there's a catch. Learn more.

Top Malware Threats and How to Protect Yourself
Unlike legitimate software, malware is installed on your computer without your consent. Here are the latest malware threats you should be aware of:

Examples of the Most Damaging Malware
Some malware does more damage than others. For details, see this list of the most damaging types, including viruses, Trojans and more.

Virus Signature Definition and Uses
In the antivirus world, a signature is an algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus.

The Best Mac Antivirus Software
Mac viruses really do exist. Fortunately, there are several excellent Mac antivirus offerings - and some are even free.

Mac Security Guides
Are Macs immune to malware? How do you secure Mac OS X? The answer to those and other Mac malware questions.

Seven Deadly Sins: Evernote Tips You Should Avoid
So-called cloud-based services like Evernote provide convenience that may come with a price: increased risk of data and identity theft. Stay secure.

How to Remove GoogleUpdate.exe
Google applications may install an update mechanism named googleupdate.exe, googleupdater.exe, or something similar. Learn the common install locations.

Best Antivirus for Netbooks and Older PCs
Older PCs and netbooks often have limited system resources available. Finding the right antivirus that won't slow down these older systems is key.

Setting a Login Password for Mac OS X 10.5 and 10.6
Setting login passwords is easy on Mac OS X 10.5 (Leopard) and 10.6 (Snow Leopard). Just follow these step-by-step instructions.

How to Edit the HOSTS File in Windows 7, Vista, and XP
It's a good idea to check the HOSTS file periodically. Here's how to find - and edit - the HOSTS file on Windows 7, Vista, and XP.

How to Disable Add-Ons in Internet Explorer 6 & 7
While legitimate toolbars and other browser helper objects (BHOs) are fine, some aren't so legit or - at least - their presence is questionable. Learn more.

Remove Viruses in Windows ME, XP, Windows 7 and Vista
Here are 3 easy steps to remove viruses and malware cleanly and efficiently in Windows systems ME, XP, 7 and Vista by disabling system restore.

Windows Tutorials
From Mary Landesman, your guide to Antivirus Software, tips and tutorials to help broaden your knowledge of Windows and help you better defend your PC.

Running Antivirus Software in Safe Mode
Removing a Windows virus can be tricky. Here's a walk-through of what you'll need to do in order to remove malware from your computer.

What Do Botnets Do?
Viruses, worms, and Trojans have evolved far beyond the childish pranks of yesteryear. Today's attackers are serious criminals, and your system spells international currency.

Is Your Computer Part of a Botnet?
Botnets are used for a variety of criminal purposes. Learn more about botnets and how to prevent your computer from getting infected with one.

Botnet Size - How Big Are Botnets?
How big are botnets? Huge. According to some research, botnet operators are controlling a population roughly the size of Guatemala. Learn more about botnets and how to prevent your computer from getting infected with one.

Bots and Antivirus - Will Antivirus Software Protect My Computer From Bots?
The vast majority of new viruses, worms, trojans and other malicious software may not be detected by most antivirus or antispyware scanners until after (a) it's been discovered and (b) you've applied the necessary updates.

Common Botnets - What Are the Most Common Botnets?
Botnets are used for everything from spam and phishing attacks to distributed denial-of-service attacks. Learn more about the most common botnets.

iLivid Virus Information and Prevention
The iLivid virus presents itself as a tool called

Spybot Antivirus - Protecting the HOSTS File
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites.

Spybot Search & Destroy: Tools
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites. Here's how to thwart these unwanted modifications to the HOSTS file.

Spybot Search & Destroy: HOSTS file viewer
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites. Here's how to thwart these unwanted modifications to the HOSTS file.

Spybot Search & Destroy: TeaTimer & SDHelper
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites. Here's how to thwart these unwanted modifications to the HOSTS file.

Spybot Search & Destroy: System Startup
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites. Here's how to thwart these unwanted modifications to the HOSTS file.

Spybot Search & Destroy: IE Tweaks
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites. Here's how to thwart these unwanted modifications to the HOSTS file.

Spybot Search & Destroy: Advanced Mode
Viruses and spyware use the HOSTS file to block access to antivirus and security websites, or redirect attempts to visit other websites. Here's how to thwart these unwanted modifications to the HOSTS file.

Creating and Maintaining a Strong Password System
Unless unique passwords are used for each site, it takes only the compromise of a single site's credentials to have a toppling domino effect..

How to Find Hidden Apps on Android
If you have an Android smartphone, it's possible you have Hidden Administrator Apps lurking inside. Here's what they and how to find and get rid of them.

Removing a Virus After Computer Operation Fails
Antivirus software can be a powerful ally in removing most of today's malware with ease. Here's how to win against viruses and other intruders.

McAfee LiveSafe
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. It gives you peace of mind by safeguarding all of your devices

McAfee LiveSafe Windows 8 Interface
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind by safeguarding your all of your devices, data, and identity while you stay connected. It delivers an expansive solution to security while providing a user-friendly Web-based dashboard that enables you to oversee security on all of your devices.

McAfee LiveSafe Unlimited Device Security
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind by safeguarding your all of your devices, data, and identity while you stay connected. It delivers an expansive solution to security while providing a user-friendly Web-based dashboard that enables you to oversee security on all of your devices.

McAfee SafeKey
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind by safeguarding your all of your devices, data, and identity while you stay connected. It delivers an expansive solution to security while providing a user-friendly Web-based dashboard that enables you to oversee security on all of your devices.

McAfee Personal Locker
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind by safeguarding your all of your devices, data, and identity while you stay connected. It delivers an expansive solution to security while providing a user-friendly Web-based dashboard that enables you to oversee security on all of your devices.

McAfee Anti-Theft
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind by safeguarding your all of your devices, data, and identity while you stay connected. It delivers an expansive solution to security while providing a user-friendly Web-based dashboard that enables you to oversee security on all of your devices.

McAfee LiveSafe My Account
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind by safeguarding your all of your devices, data, and identity while you stay connected. It delivers an expansive solution to security while providing a user-friendly Web-based dashboard that enables you to oversee security on all of your devices.

McAfee LiveSafe Pricing and Availability
McAfee and Intel have developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind by safeguarding your all of your devices, data, and identity while you stay connected. It delivers an expansive solution to security while providing a user-friendly Web-based dashboard that enables you to oversee security on all of your devices.

Free Virus Removal Tools, Tips, and Tricks
A list of free tools, tips, and tricks to get rid of viruses and keep them from getting back on your system.

Free Antivirus Software for Windows
The best free antivirus software for Windows PCs. Here are my top picks and reviews of the best free antivirus software for Windows.

Basic Information About Different Types of DDoS Attacks
Trojans are often used to launch Distributed Denial of Service (DDoS) attacks against targeted systems, but just what is a DDoS attack?

Antivirus Reviews - Mac
Even Macs need antivirus. Reviews of Mac antivirus software, user picks for best Mac antivirus, and other Mac security tools and tips.

Choose the Right Antivirus Software for Your PC
Choosing the right antivirus software to protect your system from viruses need not be a daunting tasks. Follow these tips to find antivirus software.

Sophos Anti-Virus for Mac Home Edition Review
Sophos Anti-Virus for Mac Home Edition offers business-grade protection free for home use. And the protection literally is business-grade.

Postcard from Hallmark Virus Hoax
The Postcard from Hallmark virus hoax is a knock-off on the old

What Is Stuxnet? - Computer Viruses and Worms
Stuxnet is a computer worm that targets the types of industrial control systems (ICS) that are used in infrastructure supporting facilities.

How to Delete Temporary Internet Files and Cookies
Internet Explorer caches are web pages you visit and cookies coming from those pages. Keep the cache small and clear it often. Here's how.

ClamXav -- Free Mac Antivirus Software Review
ClamXav is based on the open source ClamAV virus scanner. Popular among open source fans, it lags in comparison to commercial antivirus software.

Understanding the Sality Virus and What To Do About It
Sality is the name of a family of viruses that infect exe and scr files. It can replicate to other drives that it finds. Here's how to get rid of it.

How File Viruses Infect Executable Files
A file virus infects executable files by writing its own code into some part of the file. Often the file cannot be fixed and must be deleted.

Life Owner / Mail Server Report Hoax
The Life Owner / Mail Server Report hoax is yet another bogus email warning that gets fueled by confusingly worded references.

Trojan - What Is a Trojan Horse
A Trojan is a self-contained malicious program that is different from a virus but can have the same kind of effect on your computer.

Display Hidden Files and Folders on Mac OS X
By default, Mac OS X hides critical system files and folders. It may be necessary to view hidden files and folders. Here's how to enable file viewing.

How to Boot Into Safe Mode
Booting in Safe Mode on your PC prevents extraneous services and programs - including most malware - from loading at startup.

How to Remove Mac Scareware
At the end of the day, Mac scareware is just another app and it's trivially easy to remove. Here's how.

Protect Your Computer From Viruses and Malware
Computer viruses are still a big problem especially with software downloaded from the internet. Protect yourself, your computer, and your data.

5 Things I Like About McAfee’s LiveSafe
Earlier this year, McAfee and Intel developed a comprehensive security solution called McAfee LiveSafe. McAfee LiveSafe gives you peace of mind.

What is Malware?
A detailed explanation of malware, which includes viruses, trojan horses, logic bombs, spyware, worms, and rootkits.

Popular Phishing Scams and What To Do About Them
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.

Phishing scams
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.

Phishing scams
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.

Phishing scams
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.

Phishing scams
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.

Phishing scams
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.

Phishing scams
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.

IRS Tax Refund Phishing Scam
A security flaw on a US government website has been exploited by a phishing scam claiming to be an IRS refund notification. The phishing email claims the recipient is eligible for a tax refund of $571.94.

Phishing scams
Look over the following examples of phishing scams to familiarize yourself with the clever techniques used.

Frequently Asked Questions About Antivirus Software
Answers to frequently asked antivirus questions

Top Spyware Scanners
Spyware surreptitiously monitors your computer and Internet use, while adware can bombard your PC with unwanted advertising. Both pose a drain on your bandwidth and can lead to loss of security.

"Page Cannot Be Displayed" and "Cannot Find Server" Errors
Troubleshooting

Bitdefender, Romania, and the Dragon-Wolf
Can a country help define a company? And can a product help explain a people? If it's Bitdefender and Romania, the answer is a fortunate yes.

Google Play - Virus and Computer Safety Concerns
Is Google Play Safe from Malware?

Top Cyber Threats for 2014
McAfee has kicked off its annual list of the biggest cyber threats anticipated to take effect in 2014. The following are McAfee’s Top Cyber Threats for 2014:

- By Category
An index of categories in the

Antivirus Vendors
From Mary Landesman, your guide to Antivirus Software, an alphabetical listing of antivirus vendors offering a wide range of features and services.

Phishing & Online Scams
From Mary Landesman, your guide to Antivirus Software, tips to help avoid email scams and phishing. Familiarize yourself with the techniques used in these email scams to avoid becoming a victim of credit card or identity theft.

Types of Viruses
From Mary Landesman, your guide to Antivirus Software, resources providing information on the types of viruses as well as the platforms they affect.

Antivirus Reviews - Windows; The Best Antivirus Software for Windows
Antivirus software reviews for Windows. Top Internet security suites and user reviews for best antivirus software for Windows.

Blended threats
As if one payload weren't enough, viruses now often contain worms and Trojans. Melissa and LoveLetter are just two of this type.

Amiga viruses
Even Amiga systems have viruses to worry about. The Amiga Downloads Center features Amiga antivirus software, Amiga virus information, and other virus-related info pertinent to Amiga computers.

Linux & Unix Viruses
From Mary Landesman, your guide to Antivirus Software, resources for Linux and Unix users. Viruses don't just infect PC's; Linux and Unix users should also take precaution. Discover what viruses affect Unix/Linux users and how to defend against them.

Macintosh viruses
Even Macintosh computers can be infected by viruses. Learn how to defend against the next Mac attack.

Macro viruses
Macro viruses continue to threaten Microsoft Office users. Find out what you can do to protect yourself.

Linux & Unix viruses
Even Linux and UNIX users can be affected by computer viruses, worms, and Trojans. Discover which viruses affect UNIX and Linux and how to prevent them.

Antivirus Vendor Whitepapers
What better way to educate yourself about malicious code than to read the papers written by virus researchers charged with protecting against viruses?

Antivirus for Wireless and PDA viruses
Wireless or not, infections can still get through. What are the risks and what can you do to stop viruses from infecting your device?

Essential Addons for Antivirus
Antivirus software addons - from behavior blocking to phishing filters, these technologies can help your antivirus do a better job of catching malware.

Antivirus Glossary of Terms
Virus terms and definitions can sometimes be confusing. Use the antivirus glossary to learn what the various malicious code terms really mean.

Hoax Encyclopedia
From Mary Landesman, your guide to Antivirus Software, resources to help stem the flow of virus hoaxes and myths. Learn about some of the more common hoaxes and how to spot new ones.

Free Antivirus - The Best Free Antivirus Software for Windows and Mac
The best free antivirus software for Windows and Mac.

Scareware & Fake AV
Perhaps best described as scareware, rogue scanners report non-existent infections in order to trick the user into purchasing full versions of the bogus product. Those who fall for the scam and purchase the rogue scanner may become victim of credit card fraud. Here's a list of the most common rogue antivirus and antispyware scanners.

Spyware and Adware
From Mary Landesman, your guide to Antivirus Software, spyware and adware information, spyware scanners, free tools and tips to help stop adware and spyware.

Virus Repair How-To Guides
To make manual inspection and removal more difficult, malware often disables access to Task Manager, the Registry, and other system features. Here's how to correct the unwanted system modifications.

Six Easy Ways to Tell if a Computer Really Has a Virus
We've all been there - you get an alert from your virus scanner warning that a particular file is infected. Sometimes the alert reappears even after you've told the antivirus scanner to remove the infection. Or maybe you just have reason to believe the virus alert may be a false positive. Here are the six things you'll want to consider to determine how to handle a virus alert.

Boot Sector Virus Repair and Creating a System Disk
Boot sector virus repair. Antivirus Software.

Information about the Ammyy.com Scam
Someone claiming to be from Microsoft phones you at home and tells you their logs are picking up an infection from your computer. To gain credibility, the phone

History of Malware; The First 25 Years
In January 2011, Brain - the first PC-based malware - turned 25 years old. (It's worth noting that the first computer virus was actually a Mac virus, Elk Cloner, in 1982). Following is a brief history of the first 25 years of malware evolution.

Timeline - Brief History of Malware
The volume of malware is merely a by-product of distribution and purpose. This can best be seen by tracking the number of known samples based on the era in which it occurred. Page 2.

Sircam Virus
SirCam worm rapidly spreading

Email credit card scams
Credit card scams have always been around but the Internet has allowed these scams to reach a far greater audience and potentially cause even more damage than in the past.

Virus descriptions
Welcome to the virus information center. Here you will find virus descriptions and profiles of common viruses and other malicious code affecting PC's, Mac's, Unix systems, and Wireless Devices, as well as active content threats exploiting browser and email security vulnerabilites.

Disable Windows Remote Desktop to Prevent Remote Attacks
You should disable Windows Remote Desktop to protect your computer from unwanted remote login. Follow these instructions to learn how.

How a Blackhole RAT Can Take Control of Your Computer
Don't let malicious software get access to your machine. Knowing what's being installed is your best line of defense to not losing security of your computer.

Virus Writing Class Fails Reality Test
A recent Newsweek article discusses a Sonoma State University course in virus writing. The magazine story sensationalizes the course's impact, even going so far

Firefox Redirect Virus Removal
Firefox Redirect Virus causes unwanted results by redirecting your Internet searches. Follow these steps to help you remove the Firefox Redirect Virus.

9 Computer Safety Tips: Fending Off Viruses, Malware
Computer security need not be daunting. Here a few simply steps that will keep you computing more safely.

ESET Mobile Security for Android -- Free Version
You can have peace of mind while online with ESET Mobile Security. ESET’s proven NOD32 technology enables you to download apps that are safe and will discover potentially dangerous apps. The following Antivirus features are available with the free version of ESET Mobile Security.

CipherShed: TrueCrypt's Replacement
CipherShed is a new replacement tool for TrueCrypt. CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process.

How to Remove the MS Removal Tool
The MS Removal Tool is a fake antivirus malware application that will infect your system when executed. MS Removal Tool is a variant of Win32/Winwebsec. Like other Win32/Winwebsec rogue anti-spyware programs, MS Removal Tool displays fake security alerts and scan results in attempt to deceive you into thinking your computer is infected. The following instructions may help you remove the MS Removal Tool from your system.

Safe Mode
The MS Removal Tool is a fake antivirus malware application that will infect your system when executed. MS Removal Tool is a variant of Win32/Winwebsec. Like other Win32/Winwebsec rogue anti-spyware programs, MS Removal Tool displays fake security alerts and scan results in attempt to deceive you into thinking your computer is infected. The following instructions may help you remove the MS Removal Tool from your system.

Launch Command Prompt
The MS Removal Tool is a fake antivirus malware application that will infect your system when executed. MS Removal Tool is a variant of Win32/Winwebsec. Like other Win32/Winwebsec rogue anti-spyware programs, MS Removal Tool displays fake security alerts and scan results in attempt to deceive you into thinking your computer is infected. The following instructions may help you remove the MS Removal Tool from your system.

Prevention
The MS Removal Tool is a fake antivirus malware application that will infect your system when executed. MS Removal Tool is a variant of Win32/Winwebsec. Like other Win32/Winwebsec rogue anti-spyware programs, MS Removal Tool displays fake security alerts and scan results in attempt to deceive you into thinking your computer is infected. The following instructions may help you remove the MS Removal Tool from your system.

Blog


How to Remove Adware and Spyware
Getting stubborn adware and spyware off your PC can be frustrating. However, there are steps you can take to make the process easier and more effective.

How to Disable Autorun - USB Drives
The Windows autorun feature enables CDs to play automatically when inserted in the drive. Removable and thumb drives use the same autorun feature to load files when the drives are plugged into the USB port. Malware relies on this autorun feature to spread from thumb drive to PC. Here's how to disable the autorun feature to prevent malware from spreading.

The Ten Most Common Online Scams
Just as the Internet makes it easier for legitimate pursuits, it also makes it easier for scammers, con artists, and other online miscreants to carry out their virtual crimes - impacting our real life finances, security, and peace of mind. These Internet scams are constantly evolving - here are the most common today.

Best Windows Antivirus Software
A list of top antivirus software based on its virus detection abilities, features, and breadth of protection. All tests performed on Windows 7 (32-bit).

How to Edit the HOSTS File on a Mac
The HOSTS file supersedes DNS for domain name to IP address resolution. Make sure you know what is in your HOSTS file; unwanted entries could be a sign of malware or other malicious intrusion. Here's how to check the HOSTS file on Mac OS X.

Free Antivirus Downloads for Windows
Free antivirus and antispyware software for Windows 7, Vista and Windows XP. Best free antivirus software to guard against viruses, trojans, worms, and spyware.

SmitFraudFix Antivirus Tool Removes Zlob Trojan: Review
SmitFraudFix is a free antivirus tool that removes the Zlob downloader trojan and the rogue scanner software that Zlob typically installs.

How to Enable Folder Options in Windows Explorer
Malware often drops itself as a hidden file and then disables the Folder Options menu in Windows Explorer so you can't change the settings to view hidden files and folders. If you are unable to access the Tools | Folder Options in Windows Explorer, here's how to modify the registry to regain access to the Folder Options menu.

How to Configure the Mac OS X Firewall
Firewalls are must-have protection, regardless of the operating system or hardware you choose. All versions of Mac OS X include a built-in firewall, but you will need to enable it or make a few tweaks for optimum security.

Panda Cloud Antivirus Software Explained
This free cloud-based scanner takes all the processing off your PC, giving you a lighter, faster, and more proactive protection.

How to Disable Automatic Wireless Connections
Here's how to beef up your wireless safety by disabling automatic wireless connections.

What are Social Engineering Attacks?
A social engineering attack is one in which the intended victim is somehow tricked into doing the attacker's bidding. An example would be responding to a

Monitoring DNS Traffic for Threats
You can use several techniques to monitor DNS traffic for security threats. The following methods will enable you to monitor traffic via DNS and will allow you to pinpoint cyber threats.

Host Intrusion Protection Software (HIPS)
Host Intrusion Protection Software, or HIPS, provides rule and behavior-based system monitoring to guard against unwanted changes.

Basics for Before You Buy Antivirus Software
Antivirus software is one of the most important software programs on your PC. Make sure you know how to select and use it properly. Find out which products fared best and made the Top Picks list.

Password Safety Tips
So you've created a strong password system following the tips outlined in

Remote Access Trojan / Remote Administration Tool (RAT)
RATs, or Remote Access Trojans, provide a

Using Your Laptop at Starbucks: Is it Safe?
Wireless Internet access is available at most coffee shops, bookstores, airports, and hotels around the world. But how safe is it

Check your Trusted Sites List
Some spyware and adware will add miscreant links to your Internet Explorer Trusted Sites Zone. This may allow the sites to run with fewer security restrictions. Make sure you periodically check the Trusted Sites Zone list to ensure only sites you have specifically added are included. Here's how.

Microsoft/AOL E-Mail Tracking
Is Bill Gates really promising big bucks as part of an email beta test?

Description and Removal for Antivirus Master
Antivirus Master is classified as a rogue scanner, a category of scam software sometimes referred to as scareware. Rogue scanners masquerade as antivirus, antivirus, or other security software, claiming the user's system is infected in order to trick them into paying for a full version.

Reset Internet Explorer Start & Search Pages
Spyware and adware often change your browser Start and Search pages to point to unwanted websites. Even if you've removed the infestation responsible, you may still need to reset the web settings. Here's how to do this in Internet Explorer.

Drive-by Downloads
Drive-by Downloads are malicious attacks that can infect your computer. Learn more about this threat.

Software Review: BitDefender Antivirus for Mac
BitDefender Antivirus for Mac detects both Mac and Windows malware. Features include realtime on-access virus protection with the ability to perform full system virus scans, quick scans of critical system areas, as well as scheduled scanning. The quarantine feature in BitDefender Antivirus for Mac safely isolates suspect infected files for forwarding to the BitDefender Antivirus Lab for analysis.

SpyGuard - Description and Removal Information
SpyGuard is a rogue scanner, a category of scam software sometimes referred to as scareware. Learn how to prevent unintended installation and removal tools.

Killing the Winlogon Process to Remove Malware
Malware often hooks into the Winlogon process, enabling the malware to load even in Safe Mode. Removing malware load points from Winlogon may require shutting down the Winlogon process. Here's how.

Computer Worms- Meaning, Myths and Protection
New email worms can quickly outpace antivirus signature updates. Follow these tips to prevent the spread of fast moving worms.

Bootable Rescue CDs With Antivirus Scanners
A few antivirus vendors offer excellent (and free) rescue CDs that will enable you to boot, scan, and repair an infected machine.

Top Android Antivirus Applications
One way to secure your identity and protect your device from malware attacks is by using a mobile security application. The following are some of the highest ranked Android security applications which are rated by Google Play users.

Top Paid Antivirus Software
Combating malware is a never ending process. Cybercriminals continuously deploy new threats with intention of infecting your computer and gaining access to your system. One of the most effective methods of malware prevention is to have an antivirus software installed on your computer. With so many different antivirus applications available, it is easy to feel overwhelmed when selecting a solution that best fits your needs. The following list includes top paid antivirus solutions.

5 Ways to Keep Your PC Safe from Suspicious.Emit
Suspicious.Emit; computer virus; new computer viruses; malware; Prevent Suspicous.Emit

Top Free Antivirus Software
Combating malware is a never ending process. Cybercriminals continuously deploy new threats with intention of infecting your computer and gaining access to your system. One of the most effective methods of malware prevention is to have an antivirus software installed on your computer. If you’re on a tight budget, you will be surprised that plenty of free antivirus software can provide more than adequate protection and may be more effective in malware detection than their paid-for counterparts.

How to Enable Task Manager for Malware Removal
To make manual inspection and removal more difficult, malware often disables access to Task Manager. Fortunately, a few quick registry edits are usually all that are needed to regain control. Here's how.

How to Disable Java in Firefox
Java is fast becoming one of the most targeted third-party applications for malicious exploit via the Web. One easy thing you can do to avoid this method of attack is simply disable Java. When you do need it for that website game or calculator, just re-enable it (but be sure to turn it back off when you're done).

Best Free Antivirus Software for Mac Users
Social engineering scams are putting Mac users at risk of malware infection. To help keep you safe on even the tightest budget, here are the top picks for the best free Mac antivirus software.

Autorun FAQ: How Autorun Works and How to Disable It
Autorun is one of those 'convenience' features in Windows that can cause more harm than good. Essentially, Following are frequently asked questions about the Autorun component, including why Autorun can be dangerous and how it can be disabled.

Free PDF Readers: Alternatives to Adobe / Acrobat
Malicious PDF files that exploit vulnerabilities in Adobe Reader / Acrobat were the most common cause of drive-by malware infections in 2009 and remains the highest in 2010. Use one of these free alternative PDF readers to lower your risk of infection and stay safer online.

Recover Missing System Files Using Windows Console
On occasion a valid system file can be inadvertently deleted or quarantined. Sometimes, the results can seem disastrous - a looping blue screen each time you try to boot up the PC. Other times, a stop error with a cryptic message may be the result. Here's how to replace the missing file(s) to get your system operational again.

How to View Hidden Files and Folders
By default, Windows does not display hidden files and folders. Here's how to change the default settings so you can view hidden files and folders.

Social Engineering - Top Five Reasons People Fall Victim to Social Engineering Attacks
The Internet is built on anonymity, and that makes it easy for cybercriminals to masquerade as anyone or anything. To avoid becoming thei next victim of a social engineering attack, you must learn to filter through the available clues and make the right decisions. To help you do just that, here are the top 5 reasons that otherwise sensible people fall victim to social engineering attacks.

Bitdefender Internet Security Suite: Antivirus Software Review
Bitdefender Internet Security 2012 offers some important new features that emphasize usability and social networking safety.

Seedabutor.B
Seedabutor.B is a malicious drive-by download attack. Learn how to remove this malware.

Antivirus Software Technology
Threats are abundant with information systems. One nasty virus can cripple your machine, steal your personal information, and infect other devices. Protecting your computer from malware is perhaps the most important aspect of computer ownership. The first step in protecting your system is understanding how antivirus software operate.

AVG AntiVirus FREE
Mobile devices are increasingly targeted by cyber criminals and malware. In addition, mobile devices are vulnerable to theft or loss, which can put you in danger as someone can access your personal information. For Android users, one of the best security applications is AVG AntiVirus FREE.

Additional Features for avast! Mobile Security
With a market flooded with a variety of mobile antivirus applications, it can be overwhelming when selecting a solution that is good for you, whether you decide to download a free application or pay for a security solution. avast! Mobile Security provides an excellent security solution for your Android phone and/or tablet. In addition to its core features, avast! Mobile Security provides the anti-theft and remote features.

Changes to Shell Open Command
Malware can load from a variety of different places on your PC. In addition to the more common modifications to Windows auto start entry points, malware may leverage the shell open command. This allows it to register itself as the handler for certain file types and thus the virus, worm or Trojan loads when any of these file types are called.

Safer Online Banking: Trusteer Rapport
Trusteer Rapport adds an important layer of security - when you access a designated site, Rapport kicks in to uber defense mode, preventing the local behaviors that can compromise your online security.

Man in the Middle and Redirection Attacks
Man-in-the-middle attacks intercept communications between two points. During the interception, the MITM may record or even modify the communications between the two points.

Is your PC a zombie?
In the computer world, a Trojan can be used to turn your PC into their own computing matter - effectively turning it into a zombie machine.

Virus Writing 101
The University of Calgary has decided to add Virus Writing 101 to their course offerings.

What is JS/Psyme (and How to Get Rid of It)
Many users have experienced repeated warnings of infection by Psyme each time they open their browser. Depending on the antivirus in use, the name given in the warning may be any of the following: Downloader.Psyme (Symantec), Troj/Psyme (Sophos), Trojan.VBS.KillAV (Kaspersky), TrojanDownloader.VBS.Psyme (CA),Trojan.Downloader.JS.Psyme (Kaspersky), VBS/Petch.A (F-Prot), VBS/Psyme (McAfee)

What is the Storm Worm
The so-called Storm worm is actually not a worm, but rather a family of Trojans that typically include a backdoor, SMTP relay, P2P communications, email harvester, downloader, and often a rootkit.

Email banking scams
Emails falsely claiming to be from the likes of Citibank, NatWest, and other reputable banking entities attempt to entice recipients into divulging their ATM/Debit card and PIN numbers.

Internet voting plan flawed, experts warn
Internet voting plan flawed, experts warn

Internet voting plan flawed, experts warn
Internet voting plan flawed, experts warn. Page 2.

eBay & PayPal scams
ebay paypal scams and phishing email

What Is a Virus?
What is a virus? In today's computing environment, a better question might be what is malware?

HIPS and Behavior Blocking
A host intrusion prevention system (HIPS) monitors each activity a program attempts and (depending on configuration) prompts the user for action or responds based on pre-defined criteria. Behavior blockers monitor and profile whole program behavior. When a collection of behaviors tips the scale, the behavior blocker will (depending on configuration) alert the user or take action against the entire program based on pre-defined criteria.

USB Antivirus Software: Portable Protection
USB-installed antivirus makes a lot of sense, combining a viable storage option with the ability to efficiently scan a system that's had its antivirus disabled, or has antivirus that cannot remove a particular threat. Two products to look at: Verbatim Store 'n' Go U3 Smart Drive and SanDisk's Cruzer Titanium USB drive.

Build Your Own (Free) Security Suite for Windows
Security suites typically combine antivirus, antispyware, and a firewall with value-added features such as antispam and phishing filters. But full blown suites can be pricey. Fortunately for those on a budget, it is entirely possible to build your own free security suite without spending a dime.

Scareware: The Free Antivirus Download That Can Kill Your System
Scareware is advertised as a free antivirus download or free online scan. Once on the system, the scareware typically displays false virus alerts, with instructions to buy the

How to Prevent Email Worms and Viruses
How to prevent email worms and viruses

Executable file extensions
By default, file extensions cannot be viewed in Windows. Viruses routinely take advantage of this security oversight.

Greeting Card Scams
Be aware of scams that masquerade as greeting cards. It may just be a trap laid to launch trojans onto the computers of the unsuspecting.

Symptoms of a Virus Infection
A lot of today's malware goes to great lengths to avoid notice. But some viruses exhibit symptoms that might as well be a banner advertising the infection. Here are a few of the most common tell-tale symptoms of a virus infection.

Why is Internet Safety Important?
Why is Internet Safety Important? Today's malware is vastly different from yesteryear's virus. No longer a form of digital graffiti, modern malware is all about money. Your money, that is. This change in intent has also led to a corresponding change in tactics.

Preventing Adware & Spyware
Considering the lengths some companies will go to in order to ensure their adware/spyware cannot be easily removed, the best protection is prevention. Fortunately, preventing adware and spyware is simple enough and if you're willing to apply a little elbow grease it won't cost you a dime.

Spybot Search and Destroy
Spybot Search and Destroy, a.k.a. Spybot-S&D (or just plain Spybot), is one of the most capable anti-spyware packages available. It is also free.

Free Rootkit Scanners
Use one of these free rootkit scanners to sniff out hidden malware.

Best Antivirus Software - Readers Choice Awards for Best Antivirus for 2011
The 2011 Readers' Choice Awards are complete. You nominated. You voted. And now we've tallied those votes and are pleased to announce the winners for Best Antivirus for Windows, Best Antivirus for Mac, Best Internet Security Suite, and Best Free Antivirus.

Best Antivirus for Windows - Readers Choice Awards 2011
In July 2010, GFI acquired Sunbelt Software, developers of VIPRE Antivirus. Wonder if they knew then that they were acquiring an extremely loyal fan base as well. Early in the polls voters proclaimed VIPRE Antivirus the best antivirus for Windows, a lead VIPRE maintained throughout the voting cycle. Page 2.

Best Antivirus for Mac - Readers Choice Awards 2011
It's not surprising that Intego VirusBarrier established and held the lead for Best Mac Antivirus. After all, Intego has been doing nothing but Mac security from the get-go. At 59% of total votes, readers' overwhelmingly gave Intego a virtual high five. Page 3.

Best Internet Security Suite - Readers' Choice Awards
Folks on a budget will no doubt be thrilled to discover that readers' favorite Internet Security Suite is absolutely free: Comodo Internet Security swept the category with 42% of votes. The overwhelming support for Comodo is perhaps all the more cool when one considers the mission of Comodo's CEO and founder - to ensure everyone has the right to a trusted Internet. Page 4.

Best Free Antivirus - Readers' Choice Awards
Avira AntiVir Personal offers premium antivirus protection for no cost to home users. Given the stellar protection AntiVir offers, it's no wonder 62% of readers declared Avira AntiVir Personal their favorite free antivirus. Page 5.

Uninstall BitDefender
How to uninstall BitDefender. Antivirus Software.

Accessing the System Registry
How to open the System Registry. Antivirus Software.

Backing up the System Registry
How to backup the system registry

International Lottery Winner Scam
The International Lottery Winner scam attempts to trick recipients into believing they have won large sums of cash, and then bilks them out of their own dough in a similar fashion to the Nigerian 419 scam.

How to Access the Windows Control Panel
The Windows Control Panel provides access to a host of useful management tools, including the Add/Remove Programs feature, printer controls, User Accounts management and network configuration. Here's how to access the Control Panel in Windows XP default and classic modes as well as Windows Vista.

VirusBarrier Express: Mac Antivirus Review
VirusBarrier Express from Intego is a free on-demand Mac antivirus. VirusBarrier Express scans for Mac malware only, so it's most suited for Mac only users. The lack of realtime on-access protection could be a plus or minus, depending on your needs.

VirusBarrier X6: Mac Antivirus Review
Intego VirusBarrier X6 provides realtime signature-based and behavior-based scanning for Mac malware and on-demand scanning for Windows-based malware. This not only keeps your Mac computer virus-free, it also guards against your inadvertently passing malware on to your Windows friends.

Little Snitch for Mac
Little Snitch for Mac is a permission-based firewall that lets you monitor outbound Internet connections and set the policy you desire on a case-by-case basis.

Activity Monitor: How to Quit Processes in Mac OS X
Removing malware from a Mac computer often requires ending the active process of the malware first. To quit a process using Activity Monitor in Mac OS X, follow these steps.

How to Access Task Manager
The Windows Task Manager is a built-in utility that lets you view the running processes, applications, services, and users on your computer. There are a few different ways to launch the Windows Task Manager. Here are the two simplest methods.

Data Execution Prevention: How to Enable DEP in IE7
If enabled, DEP (Data Execution Prevention) can prevent malicious code execution that occurs as a result of buffer overflows or similar browser attacks. Here's how to enable DEP in Internet Explorer v7.

How to Reset Internet Explorer Settings
Sometimes, despite our best efforts, something happens that causes Internet Explorer to become unstable. Fortunately, Internet Explorer 7 offers an easy-to-use feature that deletes all temporary files, disables add-ons, and resets changed settings back to their defaults. Here's how to reset Internet Explorer v7 settings.

How to Disable IFrames in Internet Explorer
Malicious iframes planted on compromised websites pose big problems for Web surfers. Fortunately, Internet Explorer v6 and above includes a feature that can help protect against malicious iframes. But use with caution - there are many legitimate uses for iframes and IE doesn't distinguish between these.

How to Enable Windows Automatic Updates
Microsoft provides an automatic update feature for Windows - but unfortunately malware often disables it. Make sure Windows automatic updates are configured properly by following these steps.

False Positive: Antivirus Glossary
False positives occur when a pattern of code in the file matches the same pattern contained in a virus signature.

Make Adobe Reader and Acrobat Safer to Use
ulnerabilities in Adobe Reader and Adobe Acrobat are the number one most common infection vector, bar none. Making sure you stay up-to-date with the latest version of Adobe products is imperative, but not foolproof. To use Adobe Reader (and Acrobat) safely, you need to make a few tweaks to its settings. Following are the must-make security changes you need to make in Adobe Reader and/or Adobe Acrobat.

Mac Antivirus Software Reviews: MacScan Antispyware for Macs
MacScan from SecureMac is designed to guard against spyware-related threats targeting Mac users. While its scope is limited, such focused protection isn't necessarily a bad thing.

Mac Antivirus Software Reviews: McAfee VirusScan for Mac
McAfee VirusScan for Mac (formerly known as Virex) can be used as a standalone virus scanner for Mac or integrated with McAfee ePolicy Orchestrator (ePO) for enterprise management.

Mac Antivirus Software Reviews: Intego VirusBarrier X5
VirusBarrier provides realtime signature-based and behavior-based scanning and guards against both Mac-specific and Windows-based malware.

Antivirus Software Reviews: Norton Internet Security 2011 Review
Symantec's Norton Internet Security 2011 is a feature-packed umbrella of protection for your PC. In addition to antivirus, antispyware, antiphishing, and a firewall, Norton Internet Security Suite 2011 also provides file reputation analysis (including the Web address of any downloaded files), spam filtering, identity theft protection, and parental controls.

Avira AntiVir Premium Review
Avira AntiVir Premium provides a full complement of features, including specialized Web and email protection, anti-rootkit technology, and anti-phishing. Avira AntiVir Premium also provides a feature to easily make a bootable rescue CD, which can come in very handy during times of system trouble.

NOD32 Antivirus Review
At $40 (USD) for a single one-year's license, ESET's NOD32 Antivirus is one of the priciest antivirus scanners on the market.

AVG Anti-Virus plus Firewall Edition
AVG Anti-Virus plus Firewall Edition is light on resources, heavy on protection. The firewall provides permission-based access control reminiscent of the popular ZoneAlarm firewall. The high level of control and customization will appeal to the most advanced users, while less savvy users will find the Basic interface simple to understand and use.

Antivirus Software Review: AVAST 4 Home Edition
AVAST 4 Home Edition provides free antivirus protection for Windows XP/2000/NT/ME/98

AVG Rescue CD: Antivirus Review
The free AVG Rescue CD combines a bootable rescue platform with antivirus and system utilities to help ferret out even the most stubborn infections. Utilities include a file manager (Midnight Commander), Windows Registry Editor, a text editor, and various drive recovery and network diagnostic tools.

F-Secure Internet Security Suite 2010/2011 Review
Review of F-Secure Internet Security Suite 2010/2010. Families that need to control Internet access for younger children and teens will find much to like about F-Secure Internet Security 2010. Parental controls can be set to accommodate various user types, including time limits imposed on Web surfing.

Review: McAfee SiteAdvisor
McAfee SiteAdvisor is the virtual equivalent of the school crossing guard, helping to ensure safe navigation of the web.

Sandboxie Review
The Sandboxie tagline

How to Easily Remove the MonaRonaDona 'Virus'
The MonaRonaDona 'virus' is a self-advertised 'virus' that isn't even a virus at all. It's a non-replicating program (i.e., a Trojan) that loads when Windows is started, changing the Internet Explorer title bar to read MonaRonaDona and displaying a message which blocks access to your legitimate running programs.

How to Remove SecurityTool Scareware
securitytool scareware rogue scanner process explorer safe mode registry editor securitytool rogue scareware regedit blocked task manager security tool

Microsoft Malicious Software Removal Tool (MSRT)
The Microsoft Malicious Software Removal Tool (MSRT) is a very accessible (and free) adjunct to existing antivirus protection, but it is not a replacement for antivirus and its detection data is not indicative of overall malware infection rates or of overall malware prevalance.

Amazon Phishing Scam
Phishing scams are disguised as correspondence from valid financial or eCommerce providers. The email typically uses fear tactics in an effort to entice the intended victim into visiting a fraudulent website. Here's an example of a phishing scam targeting Amazon.com customers.

Mac Antivirus Software Reviews: PC Tools iAntiVirus for Mac
PC Tools iAntiVirus offers solid Mac antivirus free for home use. iAntiVirus guards against Mac only malware - a focus that helps keep performance costs and system impact low but may not be the best choice in a mixed Mac/Windows environment.

Configure Password Security Settings in Mac OS X 10.5 and 10.6
So you've setup your login password and disabled the guest account. There's just one more set of password tweaks you need to make to secure your new Mac. Here's how to configure the general security settings to take full advantage of your system password.

Disable Guest Account in Mac OS X 10.5 and 10.6
Unless you plan on sharing your MacBook or iMac with random people, there's really no good reason to have an active guest account. Follow these steps to disable the guest login account on Mac OS X 10.5 and 10.6.

Storm Worm
The Storm worm spreads via email, using a variety of subject lines and message text that may masquerade as news articles or other current events.

Zeus Botnet
Zeus, often spelled ZeuS, is a crimeware botnet typically engaged in data theft. Zeus is also often referred to as Zbot. Zeus is not a single botnet nor a single trojan, but rather refers to an entire family of trojans and their respective botnets.

Phishing Filters and Anti-Phishing Toolbars
Phishing filters and toolbars are designed to protect the web surfer from socially engineered phishing scams which try to trick the intended victim into visiting a fraudulent website disguised to look like a valid eCommerce or banking site. Use one of these phishing filters when browsing to help prevent being fooled by a phishing scam.

Online Virus Sandbox
Years ago, if your antivirus detected a virus, chances are you'd find a pretty complete description of that threat in any number of virus encyclopedias. Today, however, with a few tens of thousands of malware being dissected each day, it's very rare to find a meaningful virus description. Fortunately, if you need specific details on what a particular bit of malware does, there are several online virus sandboxes that can give you a quick answer.

Auto Start Entry Points for Windows
Following is a list of the autostart entry points in Windows, including startup folders, registry keys, and ini files.

Stuxnet: How does the Stuxnet worm spread?
Stuxnet is a computer worm that targets the types of industrial control systems (ICS) that are commonly used in infrastructure supporting facilities (i.e. power plants, water treatment facilities, gas lines, etc). Often, these devices are not network or Internet connected. So how does Stuxnet get to these devices?

Prevent Viruses - Tools, Tips, and Tricks for Preventing Computer Viruses
Antivirus software is must-have protection. Keep it installed, enabled, and up-to-date at all times. But though antivirus software is critical, alone it's not enough to keep you protected. Follow sound security practices, install a firewall, and use other adjunct protection in combination with your own common sense.

Remove Viruses - Tips, Tricks, and Tools for Removing Computer Viruses
Viruses, worms, trojans, spyware, and adware -- today's malware comes in many different flavors, and it can sometimes take more than a simple antivirus scan to remove. These resources provide the information, tools, and techniques to help you ferret out and remove the infection from your computer.

Antivirus for Gamers
Most everyone realizes that antivirus and firewalls are must-have protection. But when protection interferes with online gaming, it can be sorely tempting to disable that protection in favor of uninterrupted play. These antivirus scanners tackle the unique problems of gamers so you can play without sacrificing performance or protection.

Free Firewall Protection for Windows
A firewall offers important security protection, but only if its configured properly and used appropriately. Windows XP and Windows Vista both include built-in firewalls, but the protection they offer is limited - you'll want to upgrade to a standalone firewall to get full protection. Following is a list of the best free firewall apps for Windows.

Best Internet Security Suites for 2011
An Internet Security Suite is a sound investment for your Windows PC, but it can be pricey. Finding the best Internet Security Suite that offers the most protection for your hard earned money is important. To save you time, money, and heartache, we've poured over the results of AV-Test.org's extensive testing of Internet Security Suites and provided our top picks for the best Internet Security Suites for 2011.

Wireless Security
From Mary Landesman, your guide to Antivirus Software, resources to help protect your PDA and other wireless devices.

Antivirus software and resources for DOS.
Don't let your older DOS system succumb to a computer virus. Antivirus software and security resources for DOS.

Free firewall software
While antivirus software is a must, a personal firewall is no less of a necessity. Fortunately, free firewall software is available.

Free virus removal tools
Free virus removal tools offered by various antivirus vendors

Computer and Online Security Books
The Internet groups all of us into one big global neighborhood. In the interests of being a good neighbor - and keeping safe - these books should serve as required reading for anyone contemplating an online experience.

Content Filtering
From Mary Landesman, your guide to Antivirus Software, a comprehensive listing of content filtering applications for the gateway, desktop, and Internet.

Malware
Malware is short for "malicious software" and is an umbrella term used to refer to viruses, worms, trojans, spyware, adware, and other forms of malicious code. Malware can be spread by any means a normal file might be shared - including between drives, over the network, and via the Internet. Much of today's malware is spread via websites (typically compromised legitimate sites), email, social networking sites such as Facebook or MySpace, and instant messaging.