It is one week ago that the latest Internet Explorer security problem came known. A security hole that offers hackers complete access to your computer, including all data stored on your hard disk. Of course, such news don’t spread a good feeling. Since last night, the security hole is finally closed. But how can you secure your own computer?
Cloud Computing is everywhere these days. Microsoft has launched Windows Azure, Chrome OS also focuses on your data in the web. But what is it all about? What possibilities and disadvantages does cloud computing have? Finally: Who can or should use it?
Many people send texts, spreadsheets, photos and videos—while not knowing that they contain much information that other people can discover with ease and that might be indiscreet. Who has collaborated on the text? How often has it been revised? What camera and aperture has been used to take the photo?