Some tips from our webmaster:
Routers released since 2007 support an easy setup mode called Wireless Protected Setup (WPS) designed for end users that are not able to login to the router and configure, WPA and its options. The problem, discovered at the end of 2011, is that WPS is broken and a persistent attacker can use WPS to learn the password for the wireless network. On some routers, even when WPS appears to be disabled, it is not and the router is still vulnerable to attack. For more see: WiFi Routers: Oldies are Goodies January 10, 2012
12 reasons not to use Internet Explorer, ever June 30, 2011
Defending yourself from the Flash Player June 6, 2011
The New York Times fails readers again June 4, 2011
Why the bad guys are winning June 1, 2011
The big data breach at Email Service Provider Epsilon prompted some blogs by our webmaster.
Malicous software can be very good at defending itself. Thus, the best way to remove it, is not to let it run in the first place. You can do this by booting the machine from a CD and running an operating system on the CD that treats the C disk as a data disk. See this series of articles by our webmaster:
How to Remove Malware: Booting from a CD (Part 2) June 16,2009
Our webmaster, Michael Horowitz, has a Defensive Computing blog at Computerworld.com with assorted tech tips, including a series of articles on protecting your computer from USB flash drives that contain malware. The Conficker worm is among many others that spread by infecting a USB flash drive.