Security Information |
|
Virus Nightmare..Lessons Learned
I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info. The most important thing for me to save are my Outlook Express emails and my Roboform passwords. That way I can at least access all the places I need, to download and re-install all the software I use. Thankfully I was able to still access my Laptop and very, very slowly(the system was painfully slow because of the damge done by the virus) start a process of trying to save my system without having to reformat the whole disk. I say thankfully because after a virus attack not everyone is able to even access the system. I tried anti-virus software, I attempted to fix things using the various "malicious advertising" expulsion applications(Ad-aware, Spybot etc.). All to no avail. After almost three days I resigned myself to the fact that it would have to be a re-format which means restoring my Laptop to factory settings. What a nightmare! First of all I made a backup of my Outlook express email software, emails, account settings etc. For this I downloaded a great little free trial software application called Outlook Express Back Up Wizard, a free trial can be downloaded here:http://www.outlook-express-backup.com/ This software met by needs better than others I tried. If you don't use Outlook Express then you can download others by searching here:http://www.google.com/search?sourceid=navclient&ie=UTF-8&rls=RNWE,RNWE:2004-35,RNWE:en&q=email+backup+free+downloads The I did a search for some backup software to back up the files that I could and also to use for future occasions. After trying a few that either wouldn't work on my system, or didn't back up to the medium that I wanted(CD Rom Discs) I found a great tool that just did the trick and in fact I plan to buy as soon as the free trial is up. The software is called "NTI Backup Now 4 Deluxe Suite" and it is so straightforward that even a tech dummy like me found it simple. Again you can use the full version for 30 days free:http://www.ntius.com/ I added my Roboform(www.roboform.com) passwords, my Internet Explorer favourites, my Outlook Express backup, my Microsoft Money backup files(For accounting purposes), as many software installation files as I had and most of the files and folders that I have used recently. Of course what I also ralised is that I have not kept the Install files of loads of the software that I have on my Laptop. Bad mistake! This means that I will have to go search for these again to download to my reformatted system. What I will do in future is save every Install file in it's own folder with passwords, serial numbers and any other useful info in a notepad file alongside them. The hard lesson I have learned is to make sure in future I do frequent backups of my system. I have been online since 1998 and never had any major problems. This is the first and I foolishly underestimated the damage a virus could do. My next step is to get an external drive to use as a backup and as I mentioned to use it frequently. I hope this has given you some food for thought. As I sign off here I am going to insert my Toshiba Product Recovery CD-Rom. If I had taken the necessary precautions I wouldn't have just lost three days of my time. Three days I could have been putting to better use. Ah well, there is positive in every bad situation. Or at least that's what I keep telling myself:-). Mal Keenan is editor and publisher of Home Business Tips Newsletter:http://www.home-business-tips-newsletter.com/For more help and support from Mal Keenan visit his online training site:http://www.pluginprofitstraining.com
MORE RESOURCES: Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal He’s a Security Guard at the Met. Now His Work Is Showing There. The New York Times Why does Trump want Greenland and the Panama Canal so badly? One reason may surprise you - USA TODAY Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data ABC News Remarks at a UN Security Council Briefing on Nonproliferation and the Democratic People’s Republic of Korea United States Mission to the United Nations Sweet Security Partners with Illustria to Offer Proactive Open-Source Supply Chain Risk Management GlobeNewswire Krebs on Security – In-depth security news and investigation Krebs on Security One week later: New Orleans debates security, memorial grows, more chemicals found FOX 8 Local First New in 2025: Counties Should Prepare Now for the Upcoming HIPAA Security Rule Update National Association of Counties Special ops forces seek to manage digital footprints, achieve ‘security through obscurity’ DefenseScoop Pope to celebrate Jubilees for Communications, security forces Vatican News - English White House program to certify the security of IoT devices goes live Cybersecurity Dive U.S. citizen denied entry into Poland after security staff object to handwritten notes in passport ABC News Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations Stowaways on planes and inside landing gear raise worries about aviation security The Associated Press Brillion Achieves SOC 2 Type 2 Compliance, Reinforcing Commitment to Data Security and Privacy Business Wire Opinion | Biden’s ‘security’ concern about TikTok and U.S. Steel is doubly specious The Washington Post New Orleans Homeland Security criticized during terror attack probe WDSU New Orleans Border security is national security Foundation for Defense of Democracies The Rio Treaty's Security Pact and Unintended Consequences of Threatening Canada, Greenland, and Panama Just Security Tidal Cyber Acquires Zero-Shot Security to Enhance Threat Intelligence Mapping Capabilities Business Wire Swimlane Hero helps solve complex security operations problems Help Net Security Security guard catches DJ molesting 12-year-old boy at California mall, officials say Sacramento Bee Who is Acronis’ New Chief Information Security Officer? Cyber Magazine UN aviation agency confirms recruitment database security breach BleepingComputer Fort Smith Public Schools to integrate AI gun detection software in security cameras Northwest Arkansas Democrat-Gazette AITX's RAD-R Welcomes Steve Danelon as President, Strengthening Leadership for Residential Security Solutions GlobeNewswire Orange Bowl pep rally security includes surveillance cams, law enforcement on the ground - CBS Miami Update on former Vigo County Security Annex demolition MyWabashValley.com Security Industry Association Welcomes New Perimeter Security Subcommittee Leaders Security Sales & Integration BreachLock Unveils Unified Security Testing Platform for PTaaS, ASM, Continuous Pentesting, and Red Teaming PR Newswire Alois Brunner, the Nazi ‘butcher’ who trained Syrian security Al Jazeera English Marine Corps bases take increased security posture The Island News – Beaufort, SC When It Comes to Security, Europe Is Whistling Past the Graveyard World Politics Review Synology Launches ActiveProtect: Simplifying Enterprise Data Protection with Unmatched Security, and Scalability Business Wire Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data The Associated Press Security consultant denied profiteering in defamation case against CNN WMBB - mypanhandle.com Security and Sanctions in Post-Assad Syria The National Interest Online 2025 Security Industry Predictions: Jon Adams, Vice President of Sales, DMP Security Sales & Integration Eric Trager tapped for Mideast slot on Trump’s National Security Council The Times of Israel Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Washington Township Police to launch security risk assessment program for businesses Bellefontaine Examiner New Orleans hires consultant to review security after Bourbon Street attack. See who has the job. NOLA.com New Orleans attack prompts tighter security in D.C. ahead of inauguration, Carter funeral The Chicago Cusader Newark Airport makes list of Top 10 craziest security catches New Jersey 101.5 FM Base steps up security measures following terrorist attacks Mountain Home News |
RELATED ARTICLES
Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. Steganography - The Art Of Deception & Concealment The Message Must Get Through-----------------------------The year is 300A.D. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Identity Theft Article - A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. Protecting Your Identity On The Internet Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Viruses and Worms: The Problems and Their Solutions History and BackgroundThe virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Computer-Virus Writers: A Few Bats In The Belfry? "Male. Obsessed with computers. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. |
home | site map |
© 2006 |