Categories

Posts by Pieter Arntz

I’m a Microsoft MVP in consumer security and have been fighting malware for over a decade. My blog posts usually provide background information about malware, security and privacy.

Memory scan

Why do anti-viruses and Malwarebytes Anti-Malware scan your computer’s memory?

The RTLO method

RTLO can be used to spoof fake extensions. Learn how malware writers are using this old trick to spread malware.

File extensions

Learn how malware writers, including those who made Cryptolocker, trick users using file extensions.

Security: Finding the balance

A computer system can never be 100 percent secure. But there are steps you can take to be as safe and secure as you possibly can be.

Hiding in plain sight

A lot of programs we install on our computer are automatically run when Windows starts. But this behavior is also copied by malware writers to pass security checks.

In computers, are random numbers really random?

Computers do not work easily with truly random numbers and it pays off to understand how pseudo-random numbers are used and created.

Encryption: types of secure communication and storage

Security is, or should be, a major concern on the internet, learn how encryption keeps your sensitive info safe.

How to encrypt files and folders

Encrypting files and folders is a way to protect them from unwanted access. Although modern Windows versions do have built-in options to store files in an encrypted format on your hard disk, you may be looking for another option.

How to encrypt your email

Given recent worries about data-leaks and other privacy issues, it might be handy to have some tools to make it harder for third parties to unravel your data. One such method is encryption.

What are Trojans?

Computer Trojans, like the mythical horse of the Trojan war, often disguise themselves as something useful or at least innocent. Once inside, however, they often download and install other vicious malware.

Malwarebytes Anti-Malware protection modules

Malwarebytes Anti-Malware Pro vs Free? The Pro offers a protection module that utilizes different methods to stop malware, before it can hurt your system or compromise your data.

Malware today is so numerous and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But,if […]

Surfing by proxy

Proxy (the authority to act for someone else)  is a term that we use, when related to computers, to describe using a third party between the user and the internet. Looking at the reasons to use a proxy will help us further on, when we look at the different kinds of proxies, and related methods. […]

Hoaxes

A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we use for a fake warning. Since they are not only annoying and confusing, but sometimes even potentially harmful, they deserve some attention.

Law Against Cookies

In May  2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g. using cookies, or gain access to information stored in the terminal equipment of a subscriber or user. One year later, in May 2012 the law was updated in the sense that implied consent was […]

Text Popups

What is a text popup? A text popup is a link that opens a popup box containing advertisements, usually prompted by a mouse-over. Where do they come from? As a moderator on a few forums and as an amateur web-designer, I often get complaints from people asking me to remove the annoying text popups or […]

Sandbox Sensitivity

This article is meant to give you an overview of how sandboxes are used and why malware writers try to avoid their code to run on them. It will also list some methods that are in use to make malware sandbox-sensitive. Without going into much detail it will also give you an idea of the […]

Subscribe to our YouTube Channel