Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,633 Topics
- 11,599 Replies
Fact or Myth: Older, slower antivirus software is better and more thorough than the faster Webroot SecureAnywhere
[b][u]MYTH[/u][/b] [b][u] [/u][/b] Ever since the launch of Webroot SecureAnywhere (WSA), one of the biggest concerns we have seen is that the scans are "too fast to be doing anything effectively." Having worked in support since well before the launch of WSA, I cannot tell you how many times I have seen this topic come up due to a popular misconception that a fast scan is somehow less thorough. [b]To explain why this is a myth rather than a fact, I'll first explain how older, conventional detection models work.[/b] When you first install a program that relies on one of those models, the program first imports tens to hundreds of megabytes of detection definitions from a central server. The installation is slow and cantankerous. If you're on a slower-speed connection, this initial stage can prove insurmountable at times. Believe it or not, some people still use dial-up. There are some parts of the world that unfortunately still don't have a choice.&nb
T-rays, sounds more science fiction than cutting edge wireless tech. In a recent article regarding the future of wireless communication found [url=http://www.bbc.co.uk/news/science-environment-18072618]Here[/url], researchers in Japan have smashed the record for wireless data transmission in the terahertz band, an uncharted part of the electro-magnetic spectrum.
[url=http://www.redorbit.com/news/technology/1112534189/portable-virus-powered-recharging-source-on-the-horizon/]Researchers have discovered a way to generate electricity from a genetically engineered virus.[/url] Once this technology is perfected, you will be able to power devices through basic kinetic actions like walking up stairs or opening a door. You could conceivably power your laptop just by walking around with it. That's a virus I wouldn't mind having!
Alright Webroot Community, I need your help. I'm buying a new TV and I have to admit, it's been awhile since I've shopped for one. Jim even made fun of me when I said, "Since when do TVs have 3D?!?" So that being said, I'd love your advice. What are some "must have" features? What should I stay away from? [b]What I know I want: [/b] LED - Flat screen Moderately priced 1080p vertical resolution 120 Hz refresh rate [b]What I know I DON'T need:[/b] 3D (seriously...3D?) [b]What I don't know if I need:[/b] "Smart TV" - I do love the idea of internet cable vs regular cable though... PC input vs. USB port DVI imports Brand Any advice?
Hello Members! Avoid tech support phone scams Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following: [list] [*]Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software. [*]Take control of your computer remotely and adjust settings to leave your computer vulnerable. [*]Request credit card information so they can bill you for phony services. [*]Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there. [/list]Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fix
Samsung unveiled its Galaxy S3 smartphone earlier today...How cool is it? Check out this [url=http://www.digitalspy.com/tech/news/a379900/samsung-galaxy-s3-smartphone-unveiled.html]one[/url] (of many) articles and post what you think. I, personally, have a love-hate relationship with smartphones. On the one hand, I am intrigued by new releases. With their ever-more-sleek designs, abundance of new features, and polished operating systems, major mobile phone (can I even call it that anymore?) manufacturers usually do a good job of impressing (and convincing) consumers to dish out hundreds of dollars for their latest and greatest. On the other hand, however, few smartphones actually live up to the hype. As features turn out less cool than originally marketed and operating systems prove to be laggy and sluggish, your once super-fast-top-of-the-line smartphone gets lost and forgotten amongst a sea of other smartphones with comparable features and cosmetics. But to me, the most frustrati
This is very much a myth. Some security suites crow about blocking WiFi Intruders and tout this as a critical function. In reality, not only is it Mostly Useless™, but it can have some seriously bad unintended side effects. A WiFi Intruder is a device connected to your private Wireless network without your permission. While it SOUNDS scary, and actually is dangerous, there are a lot of things to consider before taking action. First and most important, the chances of having an intruder when your router is properly secured are next to none. Open WiFi or WEP encryption do not count as “properly secured” and WPA is not quite as good as WPA2. With WPA2 encryption, somebody would need to work very hard to get into your network and would need to really know what they’re doing. It’s not an easy (and often not even possible) process. If they know how to do that, nothing but shutting down your computer will help. But you’re also more
Starcraft players will find Google's new easter egg quite amusing. Zerg Rush is also a term used in rooting an Android. I actually used Zerg Rush myself when rooting my Samsung Conquer. I love Google's easter eggs. I only know of a few others though. Has anybody seen any other ones?
Hey Guys, I just stumbled upon a fairly cool article on Yahoo about (see title), so I thought I'd share it: [url=http://news.yahoo.com/ridiculously-automated-dorm-room-draws-official-school-inquiry-170317304.html]Sweet Dorm Room![/url] Just in case you don't feel like reading much, here's your brief synopsis... Armed with a Mac Book Air, iPad, iPhone, and about $200 worth of store-bought electronic equipment, Cal Berkeley Freshman Derek Low decked out his dorm room to cater towards today's technology standards (modestly speaking). Dubbed "BRAD" (Berkeley Ridiculously Automated Dorm), the room features an array of futuristic amenities such as automatic window shades, voice-activated lights (which can be set to different modes like "sleep", "homework" and "romantic"), and an "emergency party button", which I am sure is the college crowd pleaser. And BRAD's idea of an alarm combines drawing back the curtains and turning on the ligh
[b]Myth![/b] While “%14lugnut_(1776)-tutu” is better than “pass*word,” you’re still not completely safe. No matter how creative or intellectualized your password, there’s someone (or something) out there devoting 24 hours a day, 7 days a week, to breaking your weak code. Hackers also use [url=http://blog.webroot.com/category/malware/keyloggers/]keyloggers[/url], which can snatch and monitor keypad activity. Encrypt all you want – there’s still a chance your password will be passed along. [u][b]If you want some password help, check out these 3 options:[/b][/u] [b][/b] 1. Use phrases These examples let you use phrases that either mean something to you, or you associate with a type of website. For example: [i]2BorNot2B_ThatIsThe?[/i] (To be or not to be, that is the question – from Shakespeare) 2. Use your artistic side You don’t have to think of it just as the numbers you see, it can also be a canvas to draw on. [i]1qazdrfvgy7[/i], is really
[b]Myth! [/b] [url=http://www.webroot.com/En_US/consumer-products-antivirus.html]Antivirus protection[/url] is a slicker in the storm and it’s great that you have it for inclement “conditions.” However, a new virus enters the web-o-sphere quicker than you can say, “Trojan-says-what?” Buy software that updates definitions regularly, preferably automatically. Also, antivirus software only stops viruses from infecting your system while you browse, which is great, but it’s not going to save you from a hacker’s super-smart coding hat trick. Get a multilayered solution that sweeps, firewalls, and safeguards.
[b]Myth![/b] More than [url=http://www.sophos.com/medialibrary/Gated%20Assets/white%20papers/sophosmythsforsafewebbrowsingwpna.pdf]83 percent of malware hosting sites[/url] are “trusted.” You’re more likely to be attacked by visiting a legit shopping or general lifestyle site than you are an adult or gambling site. Go ahead and do whatever you need to do with this information, but do it safely. If you're in need of protection, click on that fancy Webroot logo at the top of your screen and view our products.
[b]As the mobile device industry continues to boom, we should all take a moment to make sure our devices and personal information are secured from threats.[/b] Here are some basic steps to get you started: [b]Smartphones need to be updated when security fixes are developed[/b]. Though basic phones generally don’t get updated, smartphones are essentially computers and they may need updates. While some updates simply provide you with cooler functionality and upgraded features, others fix critical security vulnerabilities that you do not want to be exposed to. Your service provider should notify you whenever an update is available; ignore these at your own peril. [b]Security software is a must for smartphone users.[/b] The mobile malware market is booming -and because few users protect these devices they are particularly attractive to hackers and cybercriminals. The fixes phone manufacturers make to their operating systems do not protect you from other types of m
[b]Back up everything on any device you intend to bring[/b] Laptops aren’t the only data-rich devices we carry around anymore. Increasingly, we’re carrying sensitive data on our MP3 players, portable hard drives and thumbdrives, and smartphones (and the tiny memory cards inside of them), simply because it’s convenient to do so. Don’t wait until disaster strikes and you realize you’ve left your iPhone in a taxi in another state (or worse, another country). [url=http://www.webroot.com/En_US/consumer-products-secureanywhere-complete.html]Back up everything[/url], as if you might never see the device again, before you hit the road. You should also password protect your devices. If you have a laptop, set up a login to access your desktop. If you have a mobile device, set up your access code. It may also be a good idea to install an app that [url=http://www.webroot.com/En_US/consumer-products-mobile-security-android-phone.html]remotely wipes[/url] your data—just in case
If your computer is connected to the internet, you have probably noticed Windows Update notifications in your system tray. While you may understand the necessity of Windows Updates, many people are unaware that Adobe and Java updates are just as important for your computer's function and security. In a recent post to the [url=http://blog.webroot.com/2012/01/11/adobe-issues-a-patch-for-critical-security-holes-in-reader-and-acrobat/]Webroot Threat Blog[/url], our Internet Security Experts recommended downloading Windows, Adobe, and Java updates as soon as they are available. Malware writers are always looking for easy ways to get around your computer’s security. According to a study by [url=http://www.theregister.co.uk/2011/09/28/window_malware_infection_exposed/]CSIS Security Group[/url], 99.8 % of all virus/malware infections can be attributed to un-patched Adobe, Java, QuickTime, Internet Explorer and Windows updates. They exploit common 3rd-party plugins, including those mention
[b]Set up automatic bill-pay for your regular bills before you leave[/b] Being able to pay all of your bills online may leave you complacent about doing so in a public place, but you really shouldn’t be logging into your bank and cutting electronic checks for your utility bills while you’re on the road. Most banks offer free automatic bill payment services. Take advantage of them if they’re available, so you don’t miss a monthly charge. If, for some reason, you can’t set up automatic bill payment, try paying off your bills just before you leave, or pay more than the monthly total if you’ll still be travelling during the end of your next billing cycle. If you must pay a bill online while you’re on vacation, create a temporary password and change it as soon as you return home. ([url=http://community.webroot.com/t5/Rumors-and-Myths/Fact-or-Myth-quot-My-password-is-fine-and-doesn-t-need-to-change/m-p/524/highlight/true#M12]Click here for help with passwords[/url])
It can be tempting to take advantage of free WiFi access points in airports, hotels, or in cafes, but resist the urge to use those connections to do anything other than browse for a map or train schedule. Unsecured wireless connections — such as the open ones that some businesses provide as a service — can also leave you vulnerable to wireless snooping of your logins, email messages, or instant messages by other travelers or guests. The same can be said for untrusted computers in hotel business centers or cybercafés, which are magnets for data-stealing malware. If the connection doesn’t ask you to provide a WPA key, assume the connection is not secure, and treat it as such. If you must use a free wireless connection, turn off any programs that automatically connect to the Internet (such as email clients or file-sharing tools) before you hook up, and try to access sites by typing “https” at the beginning of the URL. Lastly, please don’t use the untrustworthy PC in t
[b]Myth![/b] It may seem fun to brag to friends and acquaintances on social networks about your upcoming trip to a beach-party paradise, but you might want to resist the temptation to call too much attention to the fact that you’re leaving behind an empty, unattended apartment or house for weeks at a time. Burglars have already begun to turn to Facebook and Twitter to find homes that may be vacant during a holiday absence. Don’t make their job any easier for them by giving them your travel itinerary. Of course, if you feel compelled to post vacation snaps on the road, modify your privacy settings so only your closest friends see those notifications. At least then you’ll have a starting point for the police when they begin investigating the burglary of your home. And speaking of social networks, it’s a best practice to copy and paste links instead of clicking on social sharing icons while you’re on vacation. Using these icons opens the risk of [url=http://blog.webro
Today's work environment demands at least a basic understanding of computer skills ([url=Read the fact sheet on digital literacy here: http://www.digitalliteracy.gov/sites/digitalliteracy.gov/files/Digital_Literacy_Fact_Sheet_051311.pdf]check out this fact sheet[/url]). And it's never too late to learn these skills, no matter what age you are. If you or someone you know would like to learn the basics of digital literacy - right down to the mouse click - there is a great place to start. [url=http://www.digitalliteracy.gov/content/learner]DigitalLiteracy.gov[/url] is collaboration of government and other entities that aim to "enhance the tools necessary to learn computer and Internet skills needed in today’s global work environment." Among the many tools available, you can also find [url=http://www.digitalliteracy.gov/content/workforce]job resources[/url] and even an [url=http://tech.tln.lib.mi.us/tutor/]online user tutorial[/url] to walk you throug
Just an interesting article, I am not really for or against, just an interesting concept. As with all tech, it may go no where or it might actually gain some traction. If it does gain traction, the need for Security will be higher than ever! [url=http://money.cnn.com/2012/02/28/technology/boot_to_gecko/index.htm]http://money.cnn.com/2012/02/28/technology/boot_to_gecko/index.htm[/url] -Keith
Anyone know how to get rid of the search browser hijacker? It is search-milk.net. I downloaded Webroot Anywhere 2012 last week, but I can't get it to find it...wondering if it I need an additional program from Webroot? The reading I have done thus far, has said this is a bad malware/spyware program. Help.
[b]Fact![/b] According to our partners at the Juniper Networks Mobile Threat Center, there was a 3,325 percent jump in malware targeting the Android platform over the last 7 months. To find out where the majority of malicious apps were found and which malware type was the most popular, read the full story from the Webroot Threat Blog. [url=http://blog.webroot.com/2012/02/17/report-3325-increase-in-malware-targeting-the-android-os/]>> Read More[/url]
Online browsing and social media sites [url=http://www.pewinternet.org/Reports/2010/Reputation-Management.aspx]play a central role[/url] in building your identity online. This means that kids are especially susceptible to publishing regrettable content online. If you have a teen who is active online, here are some way to keep them from crossing over to the proverbial Dark Side: [b][u]Teach them that they are searchable online[/u] [/b]The Pew Internet Project found that “two thirds of online teens are content creators–meaning they create videos, post photos, write blogs and message boards." While these activities serve as a way to participate in social networking, teens run the risk of posting something they might later regret. According to one study, 19% of adults use search engines to discover a person's professional contacts (coworkers, competition, etc), and 11% use Google as a tool to weed out applicants for jobs. The bottom lin
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.