This Static Spot is open for sponsor

Click Here to Sponsor MCT Eric Post in Full Page

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
The Top Twelve Threats No Computer User Should Ignore by Kai Chandler
by: Kai Chandler
The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for
families and offers a rich vein of educational content.
However, there are potential dangers - welcome to the
seedy world of viruses, spam, trojans, pornography, spyware
and other nasties.

Here are the Top Twelve Threats No Computer User Should
Ignore:

1. Viruses - A computer program that copies itself. They
often disrupt your computer system or damage your data.
Viruses are usually received by email attachments so be
careful opening anything from a dubious source. They can
affect anyone, for example, the destructive Mydoom worm
affected one out of three small and mid-sized businesses.

2. Spyware - Sends information about you and your computer
to somebody else. Spyware may send the addresses of sites
you have visited or worse still, transmit personal
information. With today's concerns about identify theft
this is a real worry. For example, CoolWebSearch may hijack
web searches, home page, and other Internet Explorer
settings. Spyware is normally received as part of shareware
or freeware downloaded from the web.

3. IP Spoofing - A technique to gain unauthorized access
to computers, whereby the intruder sends messages to a
computer with an address indicating that the message is
coming from a trusted host.

4. Trojans - An apparently legitimate computer program
that is really intended to disrupt and damage computer
activity by sending information, perhaps even passwords
onto a third party without you knowing. As an example,
recent emails entitled "Osama Bin Laden Captured" attempted
to download the "Trj/Small.B." Trojan if the embedded URL
was clicked. This trojan attempts to hijack the PC.

5. Spam - Unsolicited mail often promoting products of a
dubious financial or sexual nature. Don't leave your email
address on websites and internet bulletin boards as they
are harvested by spammers.

6. Adware - puts advertisements on your screen. These take
many forms including popups, popunders and advertisements
that appear later, even if your browser is closed. Some are
sent using the Windows Messenger service which allows a
spammer to direct an advertisement straight to your
computer by sequentially sending messages to IP addresses.
Always irritating, they are also often of a pornographic
nature.

7. Diallers - for those of us still with dial up modems,
dialler programs redirect calls to a very expensive number.
You won't know until you get the bill.

8. Hijackers - Hijackers take control of your web browser
and may reset your home page, search bar and search pages.
They can redirect you to undesirable sites or stop you
going to particular sites.

9. Hackers - With so much personal data available online
to anyone with a password you must be sure your password is
secure. If you are using your mother's maiden name, your
cat's name or your birthday then your password is at risk.
Here are two tips for making a secure password. Method One -
pick two random unrelated three letter words and two
digits. Mix them up and what do you have? A secure password
such as "red19cat" or "hotpin73". Method Two - pick a short
sequence of words such as Now Is The Winter Of Our
Discontent Made Glorious' and you have a password of
"nitwoodmg". You could even change the I's and O's to
digits.

10. Phishing - Emails purporting to come from reliable
sources such as Paypal, Ebay or your bank. Often wanting
you to verify your account details, they can look very
realistic but are generally scams to harvest usernames and
passwords. Always open a new browser winder and type the
address there, rather than clicking on the link provided.

11. Hoaxes - Chain letters, scams, false alarms. At best
they take up time and bandwidth but at worst vulnerable can
be victims of fraud. Pass it on!

12. Stranger-danger - For those of us with children - do
you know what they actually do when they are online? Are
they working on homework tasks, downloading illegal music
or pornography? Or are they chatting to strangers in chat
rooms? You should consider blocking access to undesirable
sites and logging their activity with a surveillance tool.
Oh, and don't forget that where children are concerned,
computers should always be kept in a family room and never
in their bedroom.

Three Step Action Plan

There are three essential steps that should be taken to
ensure your PC is kept threat-free.

Firstly, be sensible when opening attachments or following
email instructions from apparently reputable sites.

Secondly, make sure you are using the latest service pack
of Windows as Microsoft is continually closing loopholes to
tighten up security.

Finally, there's a range of low cost tools such as
firewalls, antivirus, spam blockers and spyware killers
available. Like everything else they vary in quality and
you tend to get what you pay for so always do your research
first and perhaps try a free trial before getting your
credit card out.

http://www.surfcontrols.com specializes in providing
reviews and recommendations of top-rated tools to help
protect your online experience. There's a quick reference
list to dozens of top sites promoting different aspects of
safe surfing packed with useful information and there's
also a great set of top tips for safe surfing.

Copyright Kai Chandler (#12t5109)


About the author:
Kai Chandler is a project manager and journalist
particularly interested in tools and techniques to protect
his family and computer against spam, porn, viruses and
malware. As a father of two he is keen to ensure that
his children enjoy a safe surfing surfing experience. His
reviews of the very best parental internet filters,
anti-virus, anti-spam, anti-spyware and surveillance tools
are at http://www.surfcontrols.comIt's essential reading
for any parent and computer owner.


Circulated by Article Emporium

 



©2005 - All Rights Reserved

This Static Spot is open for sponsor

Data Recovery Information

Read Articles:

Microsoft’s Spyware Fight
How to find Adware removal that is re...
Microsoft Patch Management for Home U...
Registry Cleaners: Why do you need one?
The Webdesign Business - 5 Surefire W...
How To Remove Winfixer 2005 Plus Unwa...
Adware And The Case Against Bundled S...
Protect your self from Anti-Spyware f...
5 Critical Steps to Protecting Your C...
From Spyware with love!
Can You Survive In An Online World?
Windows vs. Linux, A Comparison
You Need a Spyware Remover!
The Quickest Way I Know To Secure You...
What's in a (TLD) name?
Is Your Music Player Spying On You?
The never ending Spyware……story
The Saga of the Annoying Adware

More Article Pages 1 - 2

Data Recovery - What Not to Do!

Data recovery is a tricky thing, and if you've somehow deleted or had your important files corrupted or lost due to human error, business espionage, faulty hardware or software or any other reason; the good news is that your lost data is probably recoverable. This article will show you a few things NOT to do when an event such as this occurs.

Don't run the drive anymore, or use the device. (MP3, portable storage, camera card, whatever) If you think it won't hurt to even just poke around the internet for a solution to this mess you've made/found, you're wrong! Don't install or run anything on the drive you hope to recover data from. Only access this drive again from a healthy PC with the software solution you're going to use. Since files are overwritten in the order they've been deleted, the last files that have been excised from your drive will be the first to be lost permanently. Even just surfing, with all the cookies and temporary internet files that are always being generated will often doom the process without you even knowing about it.

Don't use tools that may reside on your computer, such as Scandisk, or a boot record utility, as these will probably overwrite exactly the files you're seeking to get back.

In short, be careful! Your data may very well be recoverable, as long as you don't do something to erase it forever! Find a good data recovery software solution, and then follow the instructions to the letter, and you'll more than likely live to see your lost data return!

Keith Thompson is the webmaster at Data Recovery Service a site cenetered around helping you get back your lost data!



©2005 - All Rights Reserved

JV Blogs Visit free hit counter