Home     |    Special Interest Groups    |    Tech Tips    |    The Personal Computer Show 
 Board of Directors    |    Members Area     |    Mission Statement    |    Membership 
nyacc logo
Tech Tips
March, April, May 2012
January 2012

Routers released since 2007 support an easy setup mode called Wireless Protected Setup (WPS) designed for end users that are not able to login to the router and configure, WPA and its options. The problem, discovered at the end of 2011, is that WPS is broken and a persistent attacker can use WPS to learn the password for the wireless network. On some routers, even when WPS appears to be disabled, it is not and the router is still vulnerable to attack. For more see: WiFi Routers: Oldies are Goodies   January 10, 2012

May and June 2011

12 reasons not to use Internet Explorer, ever   June 30, 2011

Five approaches for defending a Windows PC prove their worth   June 21, 2011

Defending yourself from the Flash Player   June 6, 2011

The New York Times fails readers again   June 4, 2011

Why the bad guys are winning   June 1, 2011

Defending against Firefox extensions that may spy on you   May 25, 2011

April 2011

The big data breach at Email Service Provider Epsilon prompted some blogs by our webmaster.

May - July 2009

Malicous software can be very good at defending itself. Thus, the best way to remove it, is not to let it run in the first place. You can do this by booting the machine from a CD and running an operating system on the CD that treats the C disk as a data disk. See this series of articles by our webmaster:

The Best Way to Remove Viruses, Spyware and other Malware (Part 1) May 19, 2009

How to Remove Malware: Booting from a CD (Part 2) June 16,2009

The Best Way to Remove Viruses and Malware: The Clean-Up (Part 3) July 20,2009

January 2009

Our webmaster, Michael Horowitz, has a Defensive Computing blog at Computerworld.com with assorted tech tips, including a series of articles on protecting your computer from USB flash drives that contain malware. The Conficker worm is among many others that spread by infecting a USB flash drive.

 Home     |    Special Interest Groups    |    Tech Tips    |    The Personal Computer Show 
 Board of Directors    |    Members Area     |    Mission Statement    |    Membership 
Send website feedback to michael at nyacc.org