Dennis Faas

Wed
11
Jan
Dennis Faas's picture

Keylogger

Keystroke logging (often called keylogging ) is a diagnostic used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems. Such systems are also highly useful for law ... enforcement and espionage -- for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. Keystroke logging can be achieved by both hardware and software means. Commercially available systems include devices which are attached to the keyboard cable (and thus are instantly installable, but visible if the ... (view more)

Wed
11
Jan
Dennis Faas's picture

Can a Keylogger intercept cut and paste?

Infopackets Reader Windy H. writes: " Dear Dennis, I keep important information (such as credit card numbers) stored on my PC. The sensitive information, however, is disguised in such a way that if someone were to 'break in' to my PC, they would ... never realize that it is my credit card number. Question: I always go back to my repository program to cut and paste my credit card number into order forms when I make a purchase online. If there was a stealth Keylogger installed on my system, would it be able to detect the numbers I am entering? " My response: The short answer is "yes ... (view more)

Wed
11
Jan
Dennis Faas's picture

Power AutoPlay Menu Creator Review

Synopsis: Create your very own AutoPlay CD in less than 10 simple steps! Power AutoPlay Menu Creator Professional is a powerful, easy to use tool for creating an interactive CD Menu whenever you insert a disc into a Windows PC. With Power AutoPlay ... Menu Creator, you can create menus, launch applications, open documents, play movies, open web site, send an email, run built-in slide shows, and much more! No programming experience is necessary because Power AutoPlay Menu Creator runs on 'drag and drop' technology! What is AutoPlay? From Windows 95 and later, Microsoft Windows offers a CD AutoPlay ... (view more)

Tue
10
Jan
Dennis Faas's picture

Rootkit

A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. These tools are intended to conceal running processes, files or system data, which helps an intruder maintain ... access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. A computer with a rootkit on it is called a rooted computer. Functions of a rootkit A rootkit typically hides logins, processes, files, and logs and may include software to intercept ... (view more)

Tue
10
Jan
Dennis Faas's picture

Backup Premium v2.0 Review

Synopsis: Need a reliable, secure, and equally flexible solution to backup your valuable data? Look no further -- Backup Premium v2.0 is the answer! With its well-designed user interface and flexible built-in scheduler, wide media support, and data ... integrity testing, Backup Premium v2.0 makes archiving data as pleasant as it is simple! Backup Premium 2.0: Screenshots Click to view: Page 1 | Page 2 | Page 3. Backup Premium 2.0: Features Drilldown Wide Support for Backup Medium, including: external and internal hard drives, network drives (including SAN, NAS, and LAN locations), all types of ... (view more)

Fri
06
Jan
Dennis Faas's picture

Print Head

A computer printer is a computer peripheral device that produces a hard copy (permanent human-readable text and/or graphics, usually on paper) from data stored in a computer connected to it. The world's first computer printer was a 19th-century ... mechanically driven apparatus invented by Charles Babbage for his Difference Engine. Methods of image creation The medium for most printers is paper, so they are usually classified according to the method of image creation: Toner-based printers Laser printers refer to the method used to adhere toner to the media. The advent of cost-effective, precision ... (view more)

Fri
06
Jan
Dennis Faas's picture

Clean Epson Print Head

Infopackets Reader George S. writes: " Dear Dennis, Since I can't seem to get a response from Epson, I wonder if you have any information about the approximate print head life of a low priced printer like the Epson C66. I have printed about 5,000 ... pages in black, using the normal text mode, and now the print head seems to be showing signs of wear. Is this about normal? " My response: Printing 5,000 pages should not cause your printer to wear-out prematurely. My best guess is that your print head is clogged with ink (rather than worn away). If you used an ink refill as opposed to ... (view more)

Fri
06
Jan
Dennis Faas's picture

Print Designer Gold v8 Review

Synopsis: Label Software, Business Card Software and more -- all with one program! With Print Designer Gold v8, you can create Business Cards, Mailing Labels, Envelopes, Post Cards, CD Labels, DVD Labels, Signs and more. Business users will love ... Print Designer for creating great looking business cards, mailing labels, envelopes, post cards, promotional mailers and more from your existing databases. And Home Users will love Print Designer Gold for labeling CD and DVD and collections, create personalized address labels, custom envelopes, custom post cards, invitations, and much, much more! ... (view more)

Wed
04
Jan
Dennis Faas's picture

Trojan Horse Computing

In the context of computer software, a Trojan horse is a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan horse. In the siege of Troy, the Greeks left a large wooden horse outside ... the city. The Trojans were convinced that it was a gift, and moved the horse to a place within the city walls. It turned out that the horse was hollow, containing Greek soldiers who opened the city gates of Troy at night, making it possible for the Greek army to pillage the city. Trojan horse programs work in a similar way: they may look useful or ... (view more)

Wed
04
Jan
Dennis Faas's picture

Remove SpyAxe (Removal Instructions), Part 2

Infopackets Reader 'Waseem' writes: " Dear Dennis, Thank you (and especially Nick Tyrrell) for your SpyAxe removal instructions. I did as instructed and now I can sleep in comfort knowing that my system has finally gotten rid of that malicious and ... highly annoying Spy Axe Trojan! Question: Can you please tell me how I can get my computer to load up quickly on start up and open the desktop items more rapidly. It seems as if I'm waiting forever for things to load. My Operating System is Windows XP. " Similarly, Alastair B. writes: " Mostly I just want to say many thanks for your ... (view more)

Pages

Subscribe to RSS - Dennis Faas