Category Archives: Software

Protecting Yourself From Spyware

If you practice diligence and follow some basic rules then you will have a much better chance of preventing the ability of a malware application from infecting your computer. Most computer spyware today is installed without your knowledge when you visit a website or download an application that will place the application on your hard […]

This article is only available to members. Please Login or register.

VB.Net: Dynamic Usage Of Eventhandlers

WithEvents and Handles clause requires form us to declare the object variable and the event handler as we write our code, so linkage is created upon compilation. On the other hand, with AddHandler and RemoveHandler, linkage is created and removed at runtime, which is more flexible. Let’s assume that we want to load several MDI […]

This article is only available to members. Please Login or register.

Recent studies show that 9 out of 10 PCs are infected with Spyware

Spy Sweeper named PC Magazine’s Best of the Year 2004 for antispyware The very best AntiSpy program on the market – Webroot Spy Sweeper. Webroot Spy Sweeper was named best spyware remover 2004 by PC magazine and praised for it’s efficiency, speed and userfriendlyness. Spyware and malware are large problems for Internet users today and […]

This article is only available to members. Please Login or register.

Site Rubix: Can You Use It To Fire Your Boss?

Can Site Rubix really help you fire your boss? Yes, it can, but before we get into how, let’s consider why this might be a good idea, maybe even a great, life-transforming, cash-pumping, freedom-fighting idea. If you’re still working for someone, earning way below what you’re worth, and just making enough to keep food on […]

This article is only available to members. Please Login or register.

Use information from mobile phones in an investigation and as evidence

Extracting complete and unaltered information from mobie phones and smartphones is vital for any investigation. A cell phone can be a ‘black box’ providing invaluable information for a criminal investigation. A doubt in the authenticity of data extracted from the device immediately dismisses any value the data could have as court eidence, and negates its […]

This article is only available to members. Please Login or register.