Tech Tips Home
The Best Tech Tips And Daily Deals
Newsletter On The Internet!

WorldStart Tech Tip And Store Search
Email: Password: Login Remember Me
Buy Worldstarts Internet security survial guide

Archive for the ‘Security Help’ Category

Removing McAfee

Friday, October 1st, 2010

Walt from OK asks: How do I remove McAfee from my computer completely so I can install a different anti-virus?

McAfee offers products for home and business users alike. Both can be removed from any computer, but sometimes it takes more than just a few steps. Products available

Google Alarm and Ghostery

Wednesday, September 29th, 2010

When I was a kid, all of my friends had big brothers. They were always spying on us; when we had a slumber party, when we were talking on the phone, when we were at a slumber party talking on the phone…”Total lack of respect”, a friend of mine complained when she caught her brother under her bed.

I never had a brother, big or little. Thus… Continue reading

Internet Security

Tuesday, September 28th, 2010

The Internet has been called the “new frontier” and in many ways, it is. This “information superhighway” has caused concerns with personal privacy, and connected computer systems around the world (resulting in additional security measures), have provided hackers an opportunity to prey on innocent victims everywhere.

Here are a few of our tips to protect yourself and your computer while surfing the web. 

Security Certificates

Tuesday, September 21st, 2010

Ted asks:

I have a really weird problem. This afternoon I went to log in to my Facebook account and I got this warning that it was a bad website. I started going to other sites and got the same thing. Yesterday my computer was fine, and today I am getting “There is a problem with this website’s security certificate”. What’s going on?!

Aren’t… Continue reading

How to Get Rid of About Blank

Thursday, September 16th, 2010

Ray asks:

What is “about blank” and how do you get rid of it? Do I need to?

Thanks for the question Ray! About:blank is a two edged sword, it seems. On one hand, about:blank is part of every browser. If you open your browser now and type about:blank into your address bar, you will most likely get a blank white page. If you… Continue reading

Keep Your Computer Safe

Tuesday, September 14th, 2010

Henry R. asks:

I have been reading your articles on malware and I realize that I need to take precautions, as well as be informed. Do you know of any programs that will do all of the things needed to make sure this stuff doesn’t get on my computer? And if it does, what program can I use to get rid of whatever it is?

Malware Causes Plane Crash

Tuesday, August 24th, 2010

So we talk a lot about malware here at WS. In most cases it’s a warning about new types of attacks or how to remove a specific type of bug or maybe a new program that helps to remove these nasty little pieces of software.

In any case, the worst situation that one could face when it comes to malware is getting their computer destroyed or having their identity stolen.… Continue reading

Secure Your Wireless Network

Tuesday, July 13th, 2010

Many would like to have a secured network, however most have no inclination as to how they would accomplish such a goal. What they may not be aware of, is that there is two major layers of security to a network that protect computers against attacks. Each individual layer adds additional protection to stop people from gaining access to your network. More importantly, it prevents them from having access to… Continue reading


Tuesday, July 6th, 2010

Dean F. Asks:
The other day I had a box pop-up on my screen that said my computer was infected (it didn’t say with what) and that I needed to do an immediate scan with their online scanner and then purchase the program to get rid of it. I thought it was from Microsoft, but I didn’t click on it because I have my own anti-virus and anti-spyware protection

Securing your Drive with Bitlocker

Thursday, July 1st, 2010

Securing and encrypting your files is often either expensive or uncertain. If you own Windows 7 Enterprise or Windows 7 Ultimate, however, then you already have a free way to secure your drive, included in your operating system. These versions of Windows 7 include BitLocker, Microsoft’s drive encryption software – and if you own a business, work in an office, or just want file security, encrypting your files… Continue reading

Spyware and Adware Prevention

Monday, June 28th, 2010

Spyware – adware – What can I do to prevent this junk from getting on my computer?

And junk it is.

I have had my more than my share of spyware, malware, this-ware, that-ware, so I have really bumped my computer up security-wise.

Below are tips to prevent you from contacting anything you don’t want to. If you… Continue reading

All About Rootkits

Thursday, June 17th, 2010

Here’s an article dedicated to Rootkits and how you can get rid of them! Continue reading

New Twitter Spam Threats

Tuesday, June 15th, 2010

Here’s a head up for those of you that have twitter accounts.

It seems that there has been an increasing number of fake twitter emails traveling around the web. These emails appear to come from twitter and have a number of different subjects. Some begin by telling you that you need to change your twitter password. Others will tell you that someone is trying to break into your twitter… Continue reading

Spyware Terms

Thursday, June 10th, 2010

Frank from Ohio asks:

I did a spyware scan the other day and it turns out that I had some “Trojans” and “tracking cookies” on my computer (my program got rid of them). I have no idea what a Trojan is; as a matter of fact, I don’t understand what a lot of things mean in regards of

Can a Virus Destroy Hardware?

Thursday, May 27th, 2010

In the past, I have contacted several viruses on my computer. I got one the other day and had to completely wipe my hard drive and reinstall Windows. Since then, my printer doesn’t work. This may be stupid, but did the virus destroy my printer? Can viruses damage your hardware?

That is not a stupid question! It totally makes sense. There… Continue reading

Driver Power State Error Fix

Tuesday, May 18th, 2010

You’ve been working like a little trooper all morning and rightly decide you’ve earned yourself a coffee break. Having left a whole bunch of documents open on your computer, you’re horrified to find an error-filled blue screen waiting for you on your return. Anything not saved before you turned your back has disappeared into the ether.

Sound familiar?

There are a million… Continue reading

Why Not Outlook Express?

Friday, April 2nd, 2010

Quite awhile back I ran a tip from one of our writers pertaining to Outlook Express. At the end of the tip I commented on how I was surprised that anyone was still using OE as their mail client. Of course, I received a ton of e-mail on this from concerned readers as to why I was surprised.

Here’s the reason

Use Data Streams for Hidden Messages

Tuesday, March 30th, 2010

Everybody has secrets. In the computer world, secrets range from a simple password to an entire hard drive full of confidential information.

Of course, there are many ways to protect your secrets in cyberspace. You can use password managers, secure connections, hidden partitions and many other methods to protect them from prying eyes.

The problem with most of these methods is that they use… Continue reading

Tag Along Software

Thursday, March 11th, 2010

Never heard of it, have you? That’s because I’m making a name for it right now. If anyone out there has tried to download a program like Adobe Acrobat or Flash Player, you may have noticed there’s now a pre-selected option to also install additional program like McAfee Security Scan.

You don’t really need that, do you?

Yeah, me… Continue reading

In my last article, we discussed the basic definitions of copyright and plagiarism as applied to the Internet. Now we will go more in depth about the many free tools available to stop copyright infringement and plagiarism…

There are now many tools to catch plagiarists on the Internet. Some of the anti-plagiarism software is for sale but many are free of charge. One example… Continue reading

Windows XP Patch Problems

Monday, February 15th, 2010

Some Windows XP users have reported experiencing the Blue Screen of Death (BSOD) and/or endless reboots after installing a patch Microsoft released last Tuesday which aimed to fix a vulnerability in MS-DOS.

Now, this may not be affecting everyone, but we still thought it would be good to apprise you all of the situation. Don’t let this stop you from applying… Continue reading

Social Media Data Harvesting

Tuesday, February 9th, 2010

It seems like everything on the internet these days is “social”. Social media web sites like Facebook, Myspace and Twitter allow you to share interests, opinions, pictures and many other personal things with your friends on the Internet. While sharing these things with friends is what these sites are made for, it’s not just friends that can view your personal information.

Social media harvesting is a new… Continue reading

Data Fingerprinting

Tuesday, February 2nd, 2010

When you think about your internet security, what comes to mind? Do you think about Anti-Virus and firewalls? Cookies and IP addresses? What browser you are using? What Operating System do you have? All of these things can be legitimate concerns in the security world, and picking the right products can make or break your system’s safety. Combining the correct browser with the right plugins and an anonymous IP address… Continue reading

K9 Web protection

Thursday, January 21st, 2010

K9 Web Protection is free software that filters fraudulent, illicit, adult, and pornographic content. It is a great alternative to software that charges you for such service. This step by step tutorial will show you how to install K9 Web Protection on your computer.

Step 1- Download K9 Web Protection

The first thing you have to do is to download K9 Web Protection… Continue reading

Intel Anti-Theft Technology

Tuesday, January 12th, 2010

While wandering through the Intel display at CES this year, I came across some pretty exciting anti-theft technology that’s developing. I’m sure that many of you have heard of Lo-Jack. They are best known for providing tracking technology for recovering stolen cars. Well, it seems that Intel and Lo-Jack have been working together to provide a similar technology for laptops. Intel provides the hardware to make it work, and… Continue reading

The Morris Virus

Thursday, December 3rd, 2009

Robert Morris, a doctoral student at Cornell University, wrote one of the first computer viruses that spread itself via a network. When released, the virus would target VAX and Sun machines. Unlike some of today’s viruses, it was not designed to cause harm to the computer: when a computer was infected, the virus would duplicate itself every 90 seconds. This caused the computers to eventually slow down or crash as… Continue reading

Defining Malware

Friday, November 20th, 2009

Chad from IN asks:

What’s the difference between spyware, viruses, malware, adware and grayware?

Good question, Chad! While spyware, viruses, malware, adware and grayware are all bad, there are fundamental differences between the five which might help you combat them.

Firstly, let’s take a look at malware. Malware is

Free Newsletter Signup

Tech Tips Daily

Become a tech pro! Get the very best tech and computer help sent directly to your email every weekday!

Tech Tips Weekly

The week's best in tech and computer help. Get your issue sent to your email every Friday!

WorldStart's Daily Deals

The very best deals on the Internet! Get a new set of incredible sales every day of the week!

Just For Grins

Clean jokes, funny quotes, and hilarious comics. Sent 5 times a week straight to your email.


Love Worldstart? Refer A Friend!

Buy Worldstarts Internet security survial guide
WorldStart's Premium Membership

Tip Archive