Your browser is obsolete!

The page may not load correctly.

09.07

Install updates if you want to keep your system healthy

Dr.Web successfully detects malicious programs that exploit these vulnerabilities. [Неуёмный Обыватель]

Comments: 12

29.06

Does all code pass the smell test?

Cyber hackers prey on old disabled kill employees all let God sort them out [Lucky]

Comments: 4

07.06

To delete or not to delete

Any operating system is packed with a huge number of applications that most people don't need. [razgen]

Comments: 9

06.06

False evidence

Thanks for the article. Very useful information. [razgen]

Comments: 9

29.05

My folders are your folders!

Use a strong password for your user account. [razgen]

Comments: 9

28.05

Inside my computer

Don't forget and read corresponding instructions and guides. [razgen]

Comments: 9

24.05

When permissions must be restricted

It was useful to read this article. [razgen]

Comments: 2

21.05

Inexperienced hackers

Follow the basic security recommendations. [razgen]

Comments: 2

17.05

We beg to differ

An anti-virus uses three detection techniques: signature-based scanning, behaviour analysis, and reputation analysis. [razgen]

Comments: 2

16.05

Configure your windows

Very useful and informative article, Thank you. [razgen]

Comments: 2

14.05

Little cybercriminals

The criminal must always be punished. [razgen]

Comments: 3

30.04

Generous to a fault

Use a regular phone and everything will be fine. [razgen]

Comments: 2

23.04

Similar but not the same

Dr.Web CureIt! is just an ordinary Dr.Web anti-virus scanner. [razgen]

Comments: 2

17.04

Living pictures

Malicious code can lurk even in image files. [razgen]

Comments: 2

15.04

Misers pay twice

Preventive Protection technologies Dr.Web Security Space can neutralise any threats. [razgen]

Comments: 2

04.04

Real threats to virtual machines

An anti-virus must be up and running on “both sides of the fence”—on the guest VM and in the host operating system. [razgen]

Comments: 2

01.04

Throw the baby out with the bathwater?

It was useful to read this article. [razgen]

Comments: 2

24.03

A micro target for a macro attack

You never know, whenever I want to learn something I always read the documentations first, this way when I start using the product I know the pitfalls and the best practice, and when I encounters problems I know where to look at. [copyright]

Comments: 5

24.03

Hello!

I heavily rely on Gmail's spam filter, however from time to time spam do go through.. [copyright]

Comments: 4

24.03

Escape advertising

And for iOS devices if you use Safari you can use Firefox Focus to block advertisements. [copyright]

Comments: 5

24.03

Script kiddies on the offensive

Precisely why we need a good anti-virus software. [copyright]

Comments: 4

21.03

Judge by deeds or intentions?

No legitimate anti-virus will scan a system without your consent. [razgen]

Comments: 2

21.03

Wipe the slate clean? No way!

It was interesting to read this article. [razgen]

Comments: 2

15.03

Password cracked in two hours

Even if you have verified that your password is not among those that have been leaked, do not lower your guard. [Неуёмный Обыватель]

Comments: 2

15.03

Hunting for backups

من الأفضل أن تضئ شمعة بدلاًمن لعن الظلام راااائع جدا [ابونادر]

Comments: 4