Narrow your search
Optimize your images and change their size.
Browse the Web and more with Netscape's browser suite.
Surf the Net with pop-up filtering, tabbed navigation, and automatic page-scrolling.
Browse the Web with the latest version of Communicator.
Get the latest version of this comprehensive set of Internet tools including a browser, chat client and much more.
Download movies, music, applications, and archives from alt.binaries newsgroups.
Query multiple search engines at once, and find test proxy servers.
Download and decode binary files from Usenet Newsgroups automatically.
Remove traces of your Internet activity and other sensitive data from your PC securely.
Download and decode Usenet messages and images in the background.
Starting next month, the software maker will phase out support for the older discussion hubs, pointing users instead to its various Web-based forums.
Microsoft released the first IE back in 1995, but arguably the browser has never been more important to Redmond's future.
Security expert who poked holes in Microsoft says the company has raised the bar in software development and talks about the shifting threat landscape.
Verizon, Sprint, and Time Warner Cable agree to block Internet newsgroups and Web sites nationwide that disseminate child pornography, according to The New York Times.
The BBC recently took time out of its busy schedule to explain -- in graphic form -- what copy protection is, and how it will affect us. We spotted a problem
McAfee researcher talks with CNET News about the spread of Melissa 10 years ago, how the author was tracked down, and how it differs from the today's Conficker worm.
We love Blu-ray as much as the next tech site, but just because you love something doesn't mean you can't point out its obvious and annoying flaws. All feedback is a gift you know
Cox Communications plans to implement a testing period of bandwidth management plan to fight congested Internet traffic.
A researcher has found a nearly invisible way to redirect network traffic through an attacker's network using existing network protocols.
The software maker shifts its personal finance product to online-only sales with less frequent updates. Could it be a canary in the coal mine?