Tearing Apart a Hard-Sell Anti-Virus Ad
I do believe you are talking about Avast! antivirus (which is free). If set to its default settings it will say "virus database updated" it is neat at first (like having your own star trek ship computer!) and annoying later on. But I doubt it is there to scare anyone.
I use Avast! because I grew up with McAfee and Symantec. They were terrible because they did the things you mentioned (slow your system to a crawl and made it impossible to uninstall the AV). I also got Avast! because it has the ability to check on 64 bit programs and most importantly it is FREE.
I still work with Symantec at work (Air Force) but it has been pushed to the side and it is updated by a centralized AF AV server that rarely needs maintenance. The processing power has also increased to a point where I do not notice the background virus checks.
Microsoft Plans Largest-Ever Patch Tuesday
Easy just switch to a security access protocol that doesn't require a password. Like a common access card or fingerprints. You would still use pins (much easier then complex passwords) and it would be expensive (equipment wise) at first but think about the amount of time you would save. Plus it is much more secure since it also gives authentication as well as access. Passwords are extremely prone to social engineering.
Suitable Naming Conventions For Workstations?
It depends if you are administrating a small company where you make the rules or a large company with directives.
For a small company with only one site, naming your machine is worthless. But, for a large company with thousands of workstations and several sites (that have portable workstations moving between them) it helps to have a concise naming system.
The best naming system is to have the first 2 letters be relevant to the site's name, then a simple 3 or 4 number account tracked by your supply depot, and the serial number or MAC address (if accounted for by supply) of the machine on the tail. This way you know (through a DNS/WINS lookup and a fancy network management tool like Cisco works) if a person from a different site connected to a port in your site or if a different account with your site decided to move to another part of your site. This is helpful if you need to track down a machine that is being bad even if it is off the network for a while.
Good naming conventions are extremely important for good network management.
Australian Police Plan Wardriving Mission
Yeah but any good security+ certified IT professional knows that even a locked down wireless network is never completely secured. Like a car there are ways around a wireless security. I used to go out with a team and would crack networks of clients to see if they were updating and standardizing their encryption keys. It was rare that we cracked them but the fact that we did shows that even a secure network is never too secure. And there are always new vulnerabilities. So even if they warn you that is not an excuse to throw you in jail.
Reading Google Chrome's Fine Print
The last thing on my mind when trying Chrome is the End user agreement. I like a lot of it's features and wish that firefox had them. But where is RSS? I simply cannot live without my syndications.