Keep Kids Safe Online and prevent fraud with this simple tip that is completely free and doesn’t require any software!
Email Forwarding can be tricky but using this method you will avoid making embarrassing mistakes!
Heineken Light Lottery Promo email scam and what yours may look like.
Commercial Bank Peter P. Ekeh Scam for $25 million dollars
Intrusion Prevention made easy in five steps to help make your internet travels safe!
NTFS Streams can hide massive amounts of data or even a virus, find out how they work and how to find a Windows Stream!
5 easy steps to better web security that will help you stay secure during your internet travels.
Below we list free spyware removal programs that you can use to detect and remove spyware right now.
IPSec Policy is free and using it can make your security incredibly hard to penetrate. Below we show you how to install such a policy and provide you with a IPSec Policy download. IPSec is an acronym for Internet Protocol Security and enables encryption and firewall services (in the form of network access restrictions) for […]
We explain FTP (File Transfer Protocol) and what it is used for below.
Web View Vulnerability Remote Code Execution problem and fix.
Proxy sites sound great and help you hide your identity, but there dangers with proxy servers, we discuss those below.
Information about your IP Address and why you need it to visit internet sites.
We cover hacker blogs and list some of the more popular ones found on the internet.
Microsoft Windows Antispyware, now known as Windows Defender, is a fantastic free program that helps to defend your computer against spyware of all types.
Pay Pal Fraud is very common and there seems to be a new scam every day. We have examples below.
You have conducted our Online Port Scan and want to understand the results, this page will help.
WDRP Compliance emails seem to be all over, but are they real of a scam? We explain more below.
Looking for information on how to perform an email address search? We show you how to search emails below.
Free Virus Scan that you can perform online and make sure you are not infected!
This is a list of Internet Security Terms, some of which are used this site.
The information below covers the Office 2003 Hack and more.
Below we describe the DSO Exploit and provide you with information on how to remove it.
A quick and easy solution to fix VirtuMonde c in just a few steps.
Key Bump is a process also known as Bump Key and it is used by burglers to break into your home!
Internet Explorer Command Execution Vulnerability and information can be found below.
We describe 0x800a0007 Windows Update Error and associated fix for this Microsoft error.
Information and resources for those looking to Uninstall Media Player 10 beta
Office XP Easter Eggs are well known and below we talk about Microsoft products that have them.
This is the remaining list of port numbers and associated names. For the first part, see the port name page.
A list of common port numbers and their associated names to help you understand what might be running or listening on your open port.
Did you know that humans get Hacked as much as computers? It is called social engineering and it has been happening long before computers ever existed!
A sample letter to employees about how to be aware and look for an email virus that you can use.
Common questions and answers your company will face with internet usage.
We explain why it is so important to use patch management software!
Below we cover how to Disable MSN Messenger with easy to follow instructions and graphic examples to guide you through the process.
There are many Free Firewalls out there, but a number of them are free for only a limited time or have limited services. We cover the firewalls that are really free below.
This Free Spam Blocker is easy to install and will save you a ton of money! It saved me $13,000 and a lot of frustration!
NTFS Recovery can be easy with the right tools plus you can hide data, we’ll show you how below.
War Driving is a favorite pastime among hackers and if you know how to spot them, you’ll be shocked at their numbers!
You bought your wireless router and now you want to make sure you lock down wireless network security – no problem, let me show you how!
We describe Cdilla and its many dangerous faces such as cdac11ba.exe, C-Dilla, cdac11ba.
Below, we provide you with a easy step by step guide email relay testing.
Intrusion Detection Software and guide on installing an IDS for free.
We describe how to hide Microsoft’s IIS from post scanners or at least make it hard to read.
A simple way to test your email security and verify that it is safe to use.
Easy guide to setting up a Honeypot to catch hackers.
A easy to understand guide on how to lock down your network and keep it secure.
Port scanning and how you can scan your own ports to discover holes!
Internal IP address – NAT addresses and Private IP explained and why you should have a natted addy.
You should receive an email shortly asking you to verify your request for New Free Tools at AuditMyPC.com.