![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Behavior to Stay Safer Online
1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. It is extremely important to make sure this program is updated at least once a week, and all drives are scanned. Viruses usually are used to destroy your Data or Hardware. Where as Trojans are used to gain remote access into your system. Always scan any new files you receive as well, even if they are off a friend, you don't know where those files originated from. ALWAYS use a little common sense when on the Internet as well. Don't accept files from an entrusted source. Don't go to web sites you have received spam for, they can be infected with viruses or asking you to download files that are infected. Always go only to official sites (i.e... If you ask for a web address for Norton and someone says ww.nortfix.com, that is obviously not an official site). Keep in mind that an Antivirus will only detect known viruses. It is possible that someone can create a new virus or manipulate an existing Virus or Trojan to the point it will no longer be detected by an Antivirus. As each unknown virus is discovered it is then added into the Antivirus database. Always create rescue disks for your Antivirus program, these will enable you to access your computer through MS-DOS if you are unable to access it through windows. If you do not have an Antivirus program try the HouseCall free online virus scan the link if on the top right side of this page. Also never run 2 different Antivirus . By using two different Antivirus software, sometimes the rule sets can cause conflicts in each other.. or think the other is a virus.. which can also give false positives (meaning it detects a file as a Virus or Trojan, when it isn't one).. or not detect viruses as it should. Always delete files you do not remember downloading. 2. Importance of a Trojan scanner: A Trojan scanner is exclusively designed to guard against Trojan horses. A Trojan is a method of intrusion into a system. It is a malicious, security breaking program that is disguised as something harmless. A Trojan can grant complete access to your system to unknown parties, allowing them to commit criminal offenses with your Internet connection. If those offenses are investigated the trail will lead right to you. It also possible for them to get personal or business data and some passwords memorized within your computer. The Cleaner is a good Trojan scanner located on www.moosoft.com. Never open any file or download a file off an entrusted source, spammed web sites being one of them. It is very common for someone to set up a web site, then spam that web site saying you are infected with some virus or Trojan download this fix, or saying they have some great password cracking program, etc. Then you fall for it and your infected. Never use any war tools that require you to install something that brings up a warning on your Antivirus, why not to do this will be explained more on the IRC Newbie page. Always delete files you do not remember downloading. 3. Importance of running a Firewall: A Firewall is one of your best defenses of being hacked. That is if your using a good Firewall and have it configured right. ZoneAlarm free download is a decent Firewall. Although I would recommend ZoneAlarm Pro, which blocks a lot of commonly used hacking attempts. Another one I would not recommend is BlackIce, if you see that one run like there is no tomorrow (gives a lot of false positives). Ultimately though I would recommend running at least one Firewall, even if your computer is connected behind a gateway/router. When looking into firewalls it is a good idea to check what features it has. While one may block a number of hacking attempts, it may not block ads or cookies. Make sure to get all the details before deciding on a Firewall to purchase. Also if you on Windows XP you can configure the Firewall they have built into it, go to start menu ... control panel ..... click network connections ..... double click local area connections ..go to properties ... then select the advanced tab. There you will find the XP Firewall and can enable it. You can also click on the link they provide to learn more about it. Never run 2 firewalls unless one is a software and the other a hardware. Security threats such as those dealing on the application level (your Operating System).. software Firewall can analyze that data better. Whereas hardware better analyzes incoming data from the Internet (snifters, etc.). If you have your own server.. good idea to choose a good one of each (hardware and software). If I am not running a Firewall but would like to see what connections my computer has open how do I do that? Simply go to your start menu under programs or programs/accessories you will find the MS-DOS prompt/Command prompt once you have that open type the command "netstat -an" without the quotations. There is will list the protocol of the connection TCP/UDP, the local address and foreign address, as well as the state which will show either as listening or established. Keep in mind that any connection to the Internet will show up there. 4. Importance of Windows Updates: It is extremely important to update windows. If you are not sure how to, just go to your start menu, then to programs you will see Windows Update there. Windows critical updates are related to security issues within Windows itself. These security issues can be exploited by hackers, these issues can also cause you to get infected easier with a virus if you are a Outlook Express user. As vulnerabilities are detected in Windows critical updates are released for them. 5. Safer Passwords: Never have Windows remember your passwords. If you ever do get an intruder on your system passwords saved in Windows can be retrieved. Instead what I recommend is saving all your passwords to notepad then saving them on a floppy disk. A simple copy and paste to use your passwords for any sites you visit, or accounts you may have online. Never use simple passwords such as names of places, things or people. Also do not use passwords that consist of either all letters or all numbers. The best passwords to have should have a combination of letters and numbers(e.g. g74npw2m5), when possible, use symbols (e.g. #^&%!). If the password is case sensitive, then use upper and lower case . Also make sure that the letters and numbers you use are not in clusters on your keyboard (within same general area on keyboard). Make your passwords longer then you may normally make them. Doing this will make any passwords you have harder for an outside party to crack. Apply this to anything you do on the Internet that requires a password. This one I speak from experience on, my last website on a free host, the password was cracked and the content of those pages changed. For many things available on the Internet you require Username and a password, if someone knows your Username or can figure it out, that is half their battle. So make the other half of their battle as difficult as possible. On Irc including characters in your passwords such as ¤, å, ¥, § ,etc... will help even more, to make your passwords harder to crack. Never use any of the following for your passwords (in whole or part): your name or a pet's name, girlfriend, boyfriend. Anything relating to any hobbies you have. Numbers dealing with you, relatives, friends, family, etc. (birthdays ,Social Insurance Number, significant dates, etc.). All of this can and WILL come back to haunt you. 6. What is Spyware?: Software that is installed on your computer/or a virus, which gathers information about you without your consent or knowledge of it. This information can end up in the hands of advertisers, spam e-mail lists, and other interested parties. It can gather information from cookies on your computer. Cookies can store information about websites you have visited, to develop a general idea of your online activity. Cookies generally store information such as preferences from websites, and they are stored on the hard drive of your computer. If your not comfortable with the idea of someone getting any information about your online activities, as most people are. There are programs out there that can be used for either removing cookies from sites you have visited as well as programs that will detect and remove known spyware programs. Lavasoft Ad-aware is a good program for removing spyware programs. Window Washer is an excellent program for removing a lot of your online history (cookies/temp Internet files... etc...). For people who use Kazaa, don't be surprised if that shows up on an Ad-aware scan, It will. Once you remove the spyware detected, Kazaa will fail to work without it. A suggestion for future use, switch to Kazaa Lite.
MORE RESOURCES: Why NHIs Are Security's Most Dangerous Blind Spot The Hacker News Inside the Fiasco at the National Security Council The Atlantic Signalgate lessons learned: If creating a culture of security is the goal, America is screwed theregister.com Belarus Weekly: Russian, Belarusian security services plan violent attacks on Belarusian diaspora The Kyiv Independent Britain Lifts Sanctions on Syrian Security Agencies The New York Times Summit on the Future of Energy Security IEA – International Energy Agency Defense Officials Outline AI's Strategic Role in National Security U.S. Department of Defense (.gov) Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations (.gov) NSSC Investors Have Opportunity to Lead Napco Security Technologies, Inc. Securities Fraud Lawsuit with the Schall Law Firm Business Wire He was an undercover cop and Dennis Rodman’s security guard. Now, he keeps the Phillies safe Police1 RSAC highlights security markets in transition SiliconANGLE New Security Perimeter Around Mt. Kolang Gaz La Secret Nuclear Tunnel Complexes Institute for Science and International Security (ISIS) Everything You Need to Know About the Air Defenses Protecting World Leaders at the Pope’s Funeral The Aviationist Remarks at a UN Security Council Briefing on Haiti United States Mission to the United Nations (.gov) California security firm CEO, workers charged after woman forcibly removed from Republican town hall Los Angeles Times Joint Press Statement on United States-Japan-Republic of Korea Trilateral Security Coopera U.S. Department of Defense (.gov) Punxsutawney native begins serving as special assistant in Department of Homeland Security The Courier Express Social Security warns: Update to Login.gov or risk losing payments Fingerlakes1.com NSA targets OT cyber risks with new smart controller security standards for national security systems Industrial Cyber Ukraine, allies working on security guarantees potentially similar to NATO Article 5, Zelensky says The Kyiv Independent NSA Publishes Recommendations for Smart Controller Security Controls and Technical Require National Security Agency (.gov) Legislature should provide lobbyists with key fobs to bypass new Capitol security screening The Alaska Landmine Yes, You Can Take Water Through Airport Security—Here's How Travel + Leisure US House Committee subpoenas Chinese state telecoms over data privacy, national security concerns Industrial Cyber UN Security Council condemns Jammu and Kashmir terror attack Department of Political and Peacebuilding Affairs Linux 'io_uring' security blindspot allows stealthy rootkit attacks BleepingComputer ATA Transportation Security Council Recognizes Fleets American Trucking Associations Palestinian supporters confront far-right Israeli security minister as he leaves an event near Yale CNN National Security Commission on Emerging Biotechnology’s Final Report Includes Recommendations to Boost Economy and Protect National Security NatLawReview.com D51 security officials discuss increased assault, weapon incidents in schools The Grand Junction Daily Sentinel Anton’s Security Blog Quarterly Q1 2025 Security Boulevard Two state officials follow Noem to Homeland Security; Rhoden names new tribal relations head South Dakota Searchlight Iran’s minister attends Pope Francis’ funeral under heavy US security presence ایران اینترنشنال How To Build A Data Center Security Strategy For 2025 And Beyond CybersecurityNews Mobile Applications: A Cesspool of Security Issues Dark Reading Homeland Security, Riverside County deputies raid business in Pomona FOX 11 Los Angeles Get to know new security leaders at OSU-CHS Oklahoma State University Safeguarding Your Corporate Leaders Against Rising Security Threats: FP’s Guide on Executive Protection Fisher Phillips Local Advocates, Officials and Faith Leaders Speak Out Against Homeland Security Letter Falsely Telling Thousands They Must Leave US River Journal Online Exploding Cargo. Hacked GPS Devices. Spoofed Coordinates. Inside New Security Threats in the Skies. Vanity Fair Allegiant flight attendant finds bomb threat just before St. Pete-Clearwater International departure: Sheriff FOX 13 Tampa Bay Rome Health to install new security systems Rome Sentinel Hyosung Urges Operators of All ATMs to Follow Previous Security Guidance Due to Large-Scale Cyberattacks Business Wire US security agency TSA seizes mobile phone charger because it looks like a Call of Duty Monkey Bomb Eurogamer Charging your phone at the airport? Security expert says you might be inviting hackers in The Economic Times Israeli Security Chief Accuses Netanyahu of Making Improper Requests The New York Times Fiesta goers can expect increased security at main events Texas Public Radio Were Taunton schools, City Hall internet outages caused by 'security breach'? What we know Taunton Daily Gazette Court grants NM Tech student temporary restraining order against Homeland Security Source New Mexico TP-Link under DOJ investigation for alleged predatory pricing practices and national security concerns Tom's Hardware Security Alert: Los Cabos and La Paz, Baja California Sur U.S. Embassy & Consulates in Mexico (.gov) DOJ’s Data Security Program Final Rules Effective – Implications for Telecom Providers NatLawReview.com New Mexico Tech doctoral student challenges Homeland Security's termination of his student status Source New Mexico The impressive security measures at Pope Francis' funeral, from anti-drone bazookas to Eurofighters Euronews.com |
![]() |
![]() |
![]() |
RELATED ARTICLES
Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. ![]() |
home | site map |
© 2006 |