MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
December 30, 2009
Twitter Blacklists 370 Shoddy Passwords To protect its users from themselves, Twitter is preventing new users from selecting some common or easily hacked passwords for their accounts. mark for My Articles similar articles
PC Magazine
November 2, 2004
Neil J. Rubenking
Revealing Passwords The passwords saved on your computer are more vulnerable than you think. mark for My Articles similar articles
PC World
April 2003
Anne Kandra
Consumer Watch: Manage Passwords Safely -- and Simply Plagued by a plethora of passwords? Here's how to deal with them without driving yourself nuts. mark for My Articles similar articles
PC Magazine
November 11, 2003
M. David Stone
Merge? No, and Don't Ask Again How to manage an annoying Office feature -- or get rid of it. mark for My Articles similar articles
PC Magazine
May 2, 2003
Neil J. Rubenking
Solutions Special Report: Inside a "PayPal" Scam Beware of any e-mail that asks for personal information. Here's why. mark for My Articles similar articles
PC Magazine
November 30, 2004
Neil J. Rubenking
Closing a Hole in OE Identity Protection The mail client in Windows 9x versions can leave your correspondence unprotected. mark for My Articles similar articles
Information Today
November 4, 2014
DataNumen Offers Free Password-Recovery Tool DataNumen, Inc. released a free Windows-based utility, DataNumen Outlook Password Recovery, which recovers passwords from encrypted Outlook files. mark for My Articles similar articles
PC World
August 21, 2006
Steve Bass
Hassle-Free PC: Find Old E-Mail Messages Quickly Edit subject lines to making finding old e-mails easier... Supercharge Outlook searches... Stop annoying printer pop-ups... mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
PC World
December 2003
Andrew Brandt
Privacy Watch: A Latte, a Wi-Fi Link, and a Hacker That person sipping coffee at the next table could be hacking your log-in info as you type. mark for My Articles similar articles
Technology Research News
August 10, 2005
Kimberly Patch
Plug-in Protects Passwords Researchers have created a browser plug-in, dubbed PwdHash, that produces a different password for each website you visit without requiring the you to remember more than a single password. mark for My Articles similar articles
Inc.
August 2008
Ryan Underwood
Technology Tools: E-mail's Little Helpers Getting more out of Outlook, plus more tools for managing e-mail. mark for My Articles similar articles
PC World
June 2003
Stuart J. Johnston
Leaky Windows Keep the Hackers Out. Plus: Take care of performance problems caused by the XP service pack. mark for My Articles similar articles
Inc.
November 1, 2009
Michael Fitzgerald
Are Your Passwords Too Weak? Hacked passwords can compromise company data security. Strategies for creating the best passwords mark for My Articles similar articles
PC Magazine
August 31, 2010
Eric Griffith
Password Protection: How to Create Strong Passwords Every password you have is important. Every one. Here's how to make your passwords uncrackable. mark for My Articles similar articles
PC World
September 2004
Andrew Brandt
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. mark for My Articles similar articles
InternetNews
December 23, 2004
Brian Livingston
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. mark for My Articles similar articles
PC World
May 2003
Stuart J. Johnston
Bugs and Fixes: Fix Your Browser and Shop Safely Yet another patch for Internet Explorer to keep your data secure. mark for My Articles similar articles
PC World
November 22, 2006
Lincoln Spector
Answer Line: Keep Your Secrets: A Safe, Easy Way to Encrypt Files Set up an encrypted safe in your PC... Customize your Office dialog boxes... Printing your screen... A tool to track your security updates... mark for My Articles similar articles
PC World
April 23, 2001
Stuart J. Johnston
Bugs and Fixes: Risky Downloads Detect stolen digital certificates; patch a dangerous security hole in Outlook... mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles
InternetNews
May 18, 2004
Ryan Naraine
Outlook 2003 Bypass Flaw Reported Researchers warn of a bug in Microsoft Outlook 2003 that could allow malicious hackers to perform illegal actions through e-mails. mark for My Articles similar articles
PC Magazine
April 6, 2004
Peter Suciu
Press to Pass The APC Biometric Password Manager doesn't just put your online passwords at your fingertips, it uses your fingerprints to remember passwords for you. mark for My Articles similar articles
PC Magazine
July 1, 2003
Neil J. Rubenking
Password-Protect the Outlook Express In-Box Is there a way to make the Outlook Express in-box private, using a password? mark for My Articles similar articles
Popular Mechanics
April 2009
Seth Porges
How to Make Your Webmail Secure Web-mail users need to be especially careful when it comes to their cyber security. Here's how. mark for My Articles similar articles
PC Magazine
February 17, 2004
Neil J. Rubenking
Accented Characters in E-Mail I use my computer primarily in English, but I frequently correspond with others in Spanish and French. How can I type accented letters into Outlook e-mail messages? mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. mark for My Articles similar articles
PC Magazine
February 1, 2008
Neil J. Rubenking
I'm Telling You for the Last Time . . . Not Really I've said it before and I'll keep saying it until everybody gets with the program: Don't click links in e-mail messages! mark for My Articles similar articles
PC World
June 2006
Scott Dunn
Security Is Up to You: Perfect Your Passwords Set up strong password policies for your PC's users... A freeware tool can give you greater control over passwords and more. mark for My Articles similar articles
T.H.E. Journal
December 2000
Sean Gallagan
Smart Passky Smart Passky is a hardware-based security application. Its primary security function is to protect passwords, log-in names, and other unique information that one would use to access Web pages... mark for My Articles similar articles
PC World
April 2003
Zetter & Tweney
Internet Fixes Sneakier spam, wilier worms, more aggravating ads... no wonder it feels like your PC is under assault. Fight back with these simple steps for keeping the latest pests at bay. mark for My Articles similar articles
BusinessWeek
May 30, 2005
Mara Der Hovanesian
Hackers And Phishers And Frauds, Oh My! How consumers can protect themselves against cybercrime. mark for My Articles similar articles
PC World
January 2001
Stuart J. Johnston
Bugs and Fixes: Prevent One-Click Hack Attacks More Internet Explorer and Windows security holes; HP Pavilion ID crisis... mark for My Articles similar articles
PC Magazine
February 17, 2004
M. David Stone
Retrieve Mail from Only Some Accounts I've just switched to Outlook 2003 and badly miss a feature I depended on in Outlook Express. mark for My Articles similar articles
Information Today
July 30, 2001
Paula J. Hane
Dialog Makes New Desktop Search Application Available Through Dialog IQ While it has not yet been announced or even rolled out officially to the Dialog sales force, Dialog IQ is now available. Dialog IQ is an easy-to-use desktop application designed for both corporate knowledge workers and inexperienced searchers... mark for My Articles similar articles
Fast Company
Chris Gayomali
All Your Most Pressing Heartbleed Questions Answered Heartbleed is the devastating two-year-old bug that was only revealed Monday. It is quickly snowballing into the single biggest security vulnerability in Internet history. Here's what you need to know about it mark for My Articles similar articles
PC World
March 2004
Andrew Brandt
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. mark for My Articles similar articles
CIO
April 1, 2004
Sarah D. Scalet
Phishing Pollutes E-Mail Stream It's the latest kind of Internet scam, one that's known as "phishing." Users are directed to a website and asked to enter their passwords. When they enter them the scammers capture the passwords for later use. mark for My Articles similar articles
The Family Room
November 2000
Audrey Okaneko
Protect Your Child With A Password Our children are equally precious to us and need our protection. But how do we protect them? When my kids were small we established a password, or codeword that only they and I knew. We chose something they could remember, yet not something easily guessed by a stranger... mark for My Articles similar articles
PC World
September 2002
Scott Dunn
Windows Tips: Keep Prying Eyes at Bay With Windows' Passwords Get the upper hand on Windows' password options. mark for My Articles similar articles
InternetNews
March 7, 2007
Brian Livingston
Will Outlook 2007 Wreck Your E-Mail? Outlook 2007 does a poor job of rendering HTML, but there are ways to work around the problems it creates. mark for My Articles similar articles
PC World
April 2004
Scott Spanbauer
Lock Down Your PC Hackers. Spammers. Even rogue coworkers and employees. How can you keep the bad guys out and the good data in? Safeguard your system's perimeter with these 29 beyond-the-basics security steps. mark for My Articles similar articles
Inc.
August 2005
David H. Freedman
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. mark for My Articles similar articles
PC Magazine
June 22, 2004
Neil J. Rubenking
Control Where Outlook Saves Attachments How to change the location that Outlook uses to store temporary copies of attachments when you choose to open them. mark for My Articles similar articles
InternetNews
May 26, 2006
Ed Sutherland
Microsoft Tells Word Users to Play it 'Safe' Rebounding from recent reports that China hackers are exploiting a zero-day vulnerability in Word to launch a Trojan horse, Microsoft is advising users to run the application in "safe mode." mark for My Articles similar articles
PC Magazine
March 7, 2008
Neil Randall
Using Outlook on Multiple Machines A variety of options let you use your Outlook 2007 messages, calendar items, contacts, and tasks in multiple locations. mark for My Articles similar articles
InternetNews
May 15, 2009
Alex Goldman
Facebook Attacks Threaten All Web Sites Why would users want your user name and password? Perhaps because it could give them access to your money and your e-mail. mark for My Articles similar articles
InternetNews
September 17, 2008
Richard Adhikari
Gov. Sarah Palin's Yahoo Mail Account Hacked Vice presidential candidate's e-mails, photos put up on Web. mark for My Articles similar articles