• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation

Prevent the latest exploit in Adobe Acrobat, Disable JavaScript

2009-02-20 by Jason

Prevent the latest exploit in Adobe Acrobat, Disable JavaScript

If you haven't heard already, there is a buffer overflow attack in the wild that exploits the fully-patched and latest versions of Adobe Acrobat and Adobe Reader, 8.3 and 9.0. The exploit can come in the form of opening a malicious or poisoned PDF file. You can read more about the specifics of the attack and how it works from an article at The Register. To summarize the … [Read more...]

Clean up your Context Menu

2009-02-20 by Jason

The context menu (what pops up when you right-click) is one of the most popular items to clutter; a lot of programs will add their shortcuts or filetypes to the menu when they get installed. It's also a very under-used, convenient location that you could put your frequently used functions and shortcuts. This post should show you how to tame the context menu and make it work for … [Read more...]

Sandboxie – Sandbox applications to keep your system safe

2009-02-10 by Jason

Sandboxie is another application developed with the intent to keep your computer safe. Sandboxie works by creating a, you guessed it, sandbox for applications to run in. Specifically, it addresses the problem of: "I downloaded this file and I'm not sure I trust it. I need to run it though. How do I find out if it's malicious or what changes it will make to my computer?" Besides … [Read more...]

Book Review: Exploiting Software – How to Break Code

2009-02-03 by Jason

Exploiting Software - How to Break Code by Greg Hoglund and Gary McGraw is an earlier work by the same authors of the previously reviewed Rootkits. This one dives into the security risks for poorly coded software. Copyright 2004, the book provides lots of examples of exploitable code from wrongfully used functions and improper coding methods five years ago. Despite its age (5 … [Read more...]

ThreatFire – Proactive Antivirus and Spyware Protection

2009-02-02 by Jason

What they call Behavioral Virus and spyware protection, I call proactive. Instead of being reactionary and delayed behind viruses and spyware, ThreatFire is able to analyze the behavioral habits of programs to determine if it is a virus before a definition (thumbprint identifying the virus) even exists. Chances are if it sounds like a virus and quacks like a virus, it's … [Read more...]

« Previous Page
Next Page »

Trending

  • iGoogle Supports Secure Gmail Again!
    In Media, Tech Solutions
  • Adobe Flash 10.3 Update Released With Privacy and Security Emphasis, Ability To Delete Flash Cookies
    In Security and Privacy, Software
  • All in an Internet minute
    In Infographics

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • Windows Server 2012: Installing Active Directory Users and Computers and Group Policy Management Console Windows Server 2012: Installing Active Directory Users and Computers and Group Policy Management Console
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Make Adobe Reader and Adobe Acrobat use “Print as Image” setting by default Make Adobe Reader and Adobe Acrobat use "Print as Image" setting by default
  • Setup your DFS namespace with DNS for compatibility in a mixed environment Setup your DFS namespace with DNS for compatibility in a mixed environment
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2026 · Magazine Pro Theme on Genesis Framework · WordPress · Log in