About ArunKumar@TWC

Arun Kumar is a Microsoft MVP alumnus, obsessed with technology, especially the Internet. He deals with the multimedia content needs of training and corporate houses. Follow him on Twitter @PowercutIN

What To Do When Facebook Account Is Hacked

How do you know if your Facebook Account is hacked? You know you are hacked if you see unusual activity in your account. This may mean posts that you never made, messages you did not send and stuff like that. […]

What To Do If Your Google Account Is Hacked

One of the worst things that can happen to you online is getting your Google account hacked. Owing to the fact that all your Google services – Gmail, YouTube, Google Plus, Adsense and more – are connected to the Google […]

What to do when your Twitter Account is Hacked

What happens when your Twitter account is hacked? The hacker may start sending malicious links, spam and direct messages to your followers. She or he may start spamming on others’ followers with tweets you wouldn’t even dare to send. In other […]

Remote Administration Tools – Emerging Threats

We are not talking about the rodents. RAT stands for Remote Administration Tools. While the intentions behind creating such tools was to offer remote support, they are now being increasingly used to spy on others, as well as to control […]

Dangers of Internet of Things – Security Issues

Internet of Things (IoT) is about smart appliances that have a computer chip at the core and are connected to the Internet for functioning. An example can be a remotely triggered smart oven that heats up the food inside by […]

PCmover Express for Windows Review and Screenshots

Since Windows XP end of support will occur on April, 18th, you may want to buy a new computer, as it will not be advisable to stay with Windows XP after end of support. When you buy a new computer, […]

Windows 8.1: The Anti Malware Operating System

We all use one or more antivirus software, Internet Security Suite or a Firewall software on our Windows computer. We keep them updated, go for zero-day patches, and keep hunting forbetter combination of anti-malware for better protections. But what most anti-malware […]

Bring Your Own Device Policy and Program best practices -2

Bring Your Own Device is a system where people can use a single mobile device for both business/office and personal work – from anywhere. The very definition creates several issues, the foremost being Security, as the employees would be roaming […]

KProxy: Free anonymous web proxy

The best thing about KProxy is that you do not have to install it. That means you do not have to go clean registry after uninstalling the program to remove all traces. This review of KProxy checks out the claims […]

E-Waste Problem, Hazards and Solutions

In most part of the world, underground water is not drinkable directly. Long ago, people simply used to draw up water from wells and drink it. But now, you have to use some sort of filter to purify the water […]

Keep Your Browsing Private With JonDoFox For Firefox

We have been covering privacy related software in our quest for best privacy provider for Windows operating systems. After a lot of research, we can conclude that best privacy system for Windows is one that combines one or more software […]

Discuss – Top Free Firewalls For Windows 10

Firewalls, no doubt, are one of the most important components of your computer (network). You know you need a firewall so that your computer (network) is not visible on the Internet to the bad guys. These are bad guys who […]

image not found

New Google Search Engine Ranking Factors

The year 2012-13 witnessed Google’s Panda and Penguin updates destroy age-old keyword based SEO techniques. As these new Google search algorithms continue to perplex webmasters and compels them to adopt emerging SEO trends, website owners and businesses gear up to […]