This Static Spot is open for sponsor

Click Here to Sponsor MCT Eric Post in Full Page

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
Does Microsoft Show Hackers How To Attack?
by: Jim Edwards
© Jim Edwards - All Rights reserved
http://www.thenetreporter.com
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

After another security hole recently surfaced in Microsoft's
Windows operating system, the software giant released a
patch this past Friday to plug the possibly devastating
"back door" which allows hackers to potentially seize
control of any pc running Windows.

The latest threat, "Download.Ject," infiltrates computers
after users surfing with Microsoft's "Internet Explorer" web
browser visit websites infected with the virus.

This newest security patch covers Windows XP, 2000, and
Windows Server 2003.

Several factors make this latest development more disturbing
than past discoveries of security problems with Internet
Explorer, currently the most dominant web browser on the
market.

First, it demonstrates very clearly that criminals
discovered they can use the power of viruses to very
profitably steal important bank, personal, and credit data
from people on a large scale.

Second, it took Microsoft what many would consider a very
long time to come up with a patch for this problem.

Before a fix appeared, Microsoft told everyone who uses
Internet Explorer to stick their finger in the dyke by
putting their web browser security settings on high,
rendering it impossible to view or use features on many
websites and web-based services.

Third, expect this to happen again as new holes open in the
future when Microsoft makes Windows more complicated, adds
layers of code, and generally makes the operating system
more complex.

This may sound like business as usual, however, I think
this story actually points to a much deeper problem, one for
which I'm not sure a simple solution exists.

Though free and reasonably reliable, many people do not
automatically update their Windows operating system through
the update service on Microsoft's website. (I won't even get
into how many people don't operate up-to-date anti-virus
protection.)

Whenever Microsoft publishes a security update, especially
for a highly publicized and obviously widespread security
breach, thousands of people will not immediately download
the update.

In fact, tens-of-thousands of users will not download these
security updates for days, weeks, even months (if ever).

So let me ask what seems like a very elementary question: By
publishing security updates that point out very obvious
flaws in their system, doesn't Microsoft also point the way
to exactly where the holes exist?

Let me put it another way.

Doesn't this rate the same as discovering that the local
bank vault won't lock and then announcing the details on the
front page of the paper along with the dates and times no
bank guard will be on duty?

After all, if tens-of-thousands of users won't immediately
get the Microsoft Security Patch, don't those patches show
hackers exactly which holes get plugged (and which,
logically, must already be open without the patch)?

It doesn't take a hacker with more than a basic set of
skills to recognize where and what holes got fixed and then
reverse-engineer how they can get into computers that don't
get updated.

Now, do I have a concrete, 100% bullet-proof answer to this
problem? Unfortunately, I don't have more than a common-
sense answer...

At this point, your best defense rates staying current on
the latest threats and how to defend against them.

Keep your anti-virus software current, your firewall up, and
your Windows software updated with the latest security
patches.

Though not a perfect solution, at least you'll have a
fighting chance to prevent, or at least minimize, any
possible threats.

For more information from Microsoft's website, go here
http://www.ebookfire.com/download-ject.html


About the author:
Jim Edwards is a syndicated newspaper columnist and the
co-author of an amazing new ebook that will teach you how
to use fr^e articles to quickly drive thousands of targeted
visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to
your website for weeks, even months... without spending a
dime on advertising! ==> http://www.turnwordsintotraffic.com



Circulated by Article Emporium

 



©2005 - All Rights Reserved

This Static Spot is open for sponsor

All About Computer Virus

Read Articles:


 5 Mac Security Tips You Can’t Live Without

 Looking after your Computer

 Computer Hardware Preventive Maintenance Softwa...

 How to reduce Computer problems?

 Internet Scams 101 -- Attacking You Through You...

 Anti Spam at the Enterprise Level

 The Difference Between Spyware and Viruses

 How to protect yourself from online attack

 Are You A Spam Zombie?

 Does it worth to backup emails from clients lik...

 Registry Cleaner: Protection for Your PC

 Reclaim Your PC from the Internet Spies

 The Quickest Way I Know To Secure Your PC-Safet...

 5 Critical Steps to Protecting Your Computer on...

 The Opera alternative

 How to Find What You Want with Google

 How to Increase Your Computer Speed Fast

 Malware: Computing's Dirty Dozen

 Is "Spyware" Watching You?

 5 Steps to Remove Spyware for Free

 Network Security 101

 Crouching Trojan, Hidden Malware

 Spyware - Is Your Computer Safe?

 Protect Your System From the Internet Evils

 Could Your Email Compromise Your Safety?

 How to Prevent Online Identity Theft

 Does Microsoft Show Hackers How To Attack?

 The Top Twelve Threats No Computer User Should ...

 COMPUTER COURTESY

 Hackers And Hoaxes

More Article Pages 1 - 2 - 3

 

Top 10 Ways To Protect Yourself From Computer Viruses
 by: Jim Faller

As more and more people are becoming comfortable using their computers at school, home or in the office it’s only a matter of time before they encounter a computer virus. Here are our top 10 steps to protect you from computer viruses.

Use a high quality anti-virus program. There are many different anti-virus computers programs on the market some of them are better than others. Look to reputable computer magazines or websites for ratings to help you find the one that matches your needs.

Always use your anti-virus software. Make sure your anti-virus software is always turned on and scanning, incoming and outgoing email messages, and any software programs you run.

Keep your antivirus programs up to date. Most programs come with a yearly subscription make sure you take advantage of the updates. More advanced programs allow you to schedule updates or full system scans for “off hours” like 2AM when you aren’t likely to be using your computer.

Keep your computer up to date. From time to time operating systems fall victim to security holes or issue updates. Make sure you check periodically to make sure you are running stable up to date versions of your software.

Backup your data regularly. Most windows computer users keep their documents in the “My documents” folder. This makes it easy to back up all of your important documents. Make weekly or monthly copies to CD or USB drives.

If you use floppy disks or USB drives on public computers like your school computer lab, Kinko’s, or even digital photo printing store make sure you scan them for viruses. Public computers are notorious for not being up to date and properly protected.

Be wary of email attachments. Treat any email attachment as potentially dangerous. Never open attachments from people you weren’t expecting. Also be careful of attachments from people you know but weren’t expecting. Many computer viruses replicate themselves by reading the contacts from an infected computer.

Use text email if possible. While HTML email is prettier and allows you more control over formatting it also can carry computer viruses. If you use text based email the only way to get a virus is by opening an attachment.

Use downloaded freeware and shareware files or software with caution. Try to download them from popular reputable sources that scan the programs before they are uploaded. To make sure you are safe scan the program before you install it on your computer.

Be wary of links in IM or instant messaging software. Don’t accept invitations from people you don’t know and never click a link from someone you don’t trust, they can easily redirect you to another website that will try to install a virus on your computer system.

© Computers.6ln.com, All Rights Reserved.



©2005 - All Rights Reserved

JV Blogs Visit free hit counter