Options that trick you into installing potentially unwanted programs are common during the setup of free tools and programs. Here's how to spot them and keep them off your system.
Stories by Lincoln Spector
After reading The Best of Both Worlds: An SSD and a HDD, George McCluney asked if it's possible to combine both drives on a laptop.
MikeWik's PC got infected with rogue malware. He asked the Antivirus & Security Software forum for help.
Terry Marshall asked if he could move his old hard drive, unchanged, to his new home-built PC, boot his existing, "very stable" XP installation, and skip Windows 7 altogether.
Tom Guthrie wants to selectively remove the usernames, passwords, and other bits of text from his browser's AutoFill -- or AutoComplete -- feature.
Diane asked where on her hard drive she could find her downloaded email messages. She uses Windows Live Mail.
LiveBrianD asked the Networking forum what will happen to the Internet when we run out of IPv4 addresses.
Brad asked the Desktops forum for advice before switching from Windows 7 to Ubuntu Linux
USANomad asked the Answer Line forum if people can eavesdrop on Voice Over Internet Protocol (VOID) phone calls.
Ata Amiri asked if using two separate backup program will interfere with incremental backups.
Reader Bballgurl84life's laptop battery isn't charging.
On the same day that Verizon and Apple made highly-expected tech history on one coast, a newly revamped museum made tech history visible, tangible, and fun on the other.
Ericuse165 asked the Windows forum if it's wise to upgrade his netbook's OS from Windows 7 Starter to a more powerful version.
Laptops can be stolen. Neoflyer asked the PCWorld.com Answer Line forum for tips on protecting them.
Android phones can do more than just answer calls and take pictures. Like digital Swiss army knives, they concentrate a lot of utilities into a compact, pocket-size device. Straight out of the box, your Android phone is a still and video camera, an address book, a GPS navigator, and even a phone.
- National Manager of Security - We are looking for a strong Leader - Syd CBD NSW
- Accessability Tester ACT
- Senior Java Developer NSW
- Application Developer - FileNet WA
- Application Developer - FileNet NSW
- Solutions Architect - Data Centre/ Network NSW
- Cloud Solution Architect - Financial Services - Continuous Integration NSW
- Level 3 Engineer NSW
- Checkpoint Firewall and VPN NSW
- Microsoft Systems Engineer VIC