Internet tips articles
Showing page 8 of 17 - There are 508 Internet tips articles
-
- 2007-11-13 22:16:19 - Ipv6 - next step in ip security
- IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.IPv6, Primar...
-
- 2007-11-13 22:16:19 - Is the internet insecure because of you?
- Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Recently Google has admitted their organisation holds user data indefinitely. This causes concerns as now we know Google has information on us that we do not want anyone to know about.We can simply blame this all on t...
-
- 2007-11-13 22:16:19 - Five excellent indie encryption and security solutions you have not heard about
- 1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes, immediately notifying you when a change is made to confirm you want to keep or reject the change. This saves you from lots of headaches. (A "Computer Setting Firewall" is an excellent description.)2. CleverCrypt Enhanced http://www.deprice.com/clevercryptenhanced.htmUsin...
-
- 2007-11-13 22:16:19 - Web browsing - collected information
- You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.There are a few main pieces of information that get saved when you surf the web, this i...
-
- 2007-11-13 22:16:19 - Its war i tell you!
- There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. But how many people do that ...
-
- 2007-11-13 22:16:19 - Is spyware watching you?
- Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, but I felt secure since I carry anti-virus software and a firewall (both by Norton).At his suggestion - and to my surprise - I ran a program called "Spy Sweeper" and fo...
-
- 2007-11-13 22:16:19 - Scams ? be aware ? and report when necessary
- The Internet is a vast International Network of people and businesses ? and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam ? to take your dollars and run. Scams ? the human mind can be either pure or devious ? and it is the devious mind that you have to look out for and be aware of at all time.The easy mark...
-
- 2007-11-13 22:16:19 - What is hacking? are you a hacker?
- WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose.For those who don't know better, a hacker, by wrong-definition, can be anything from a computer-user ...
-
- 2007-11-13 22:16:19 - 3 steps to ending scams and virus problems
- Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Victim? In many cases add the word "willing." The media's point of view and how they choose to portray these occurrences always makes me chuckle.In the past decade...
-
- 2007-11-13 22:16:19 - Three-pronged trojan attack threatens security on the internet
- Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names of a modern day version of The Three Musketeers. These are Trojans engineered for a hacker attack that will infect computers and open them for use in further attacks."Combating computer viruses is essentially a game of hide and seek," says Govind Rammurthy, CEO, MicroWorld Technologies...
-
- 2007-11-13 22:16:19 - Reporting internet scams
- When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. The money those victims lost totaled nearly $5 billion.That number of victims and their losses are probably much higher be...
-
- 2007-11-13 22:16:19 - 5 tips for an unbreakable password
- Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake.There are certain specific guidelines you need to follow t...
-
- 2007-11-13 22:16:19 - How can someone get private information from my computer?
- From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Minnesota U.S.A.Dear Evan,Hackers can get your private information from your computer in a number of ways. Here are the top wa...
-
- 2007-11-13 22:16:19 - Spyware ? your web browser is the culprit!
- My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't.After extensive testing and no further symptoms I returned the computer to my client's home...
-
- 2007-11-13 22:16:19 - Spyware is not like a nosy neighbor
- Remember the television show about the nosy neighbor Mrs. Kravitz always peeking out her window or over the fence, sometimes even knocking on the door just to find out what was going on in her neighborhood? If you don't wait a month or so and the DVD or the movie will be out. Let's move on.Spyware is not anything like Mrs. Kravitz, it won't knock on the door and ask permission to be downloa...
-
- 2007-11-13 22:16:19 - Do you know what your kids are doing online?
- It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. We often hear about missing children, but only occasionally do we actually hear of a chat room connection.Chat rooms are very popular because they are an easy way to talk to others ...
-
- 2007-11-13 22:16:19 - Phishing: an interesting twist on a common scam
- After Two Security Assessments I Must Be Secure, Right? --------------------------------------- Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. When the final...
-
- 2007-11-13 22:16:19 - Free spyware removal - its not as easy as it sounds
- Nobody wants to pay to remove spyware. At the very least, I don't. The blasted stuff shouldn't be on my computer anyway, so what ever would make me want to shell out cash to get rid of something that I shouldn't have in the first place?Spyware removal tools come in many different forms, and from many different places. Lavasoft's Ad-Aware is from Sweden, and Spybot: Search and Destroy is fro...
-
- 2007-11-13 22:16:19 - Spyware attacks! windows safe mode is no longer safe
- Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Following the scan, which usually takes fourty minutes or longer if you scan the entire system, you are hit with the "access denied" error. Frustrating, for sure, but being the savvy computer user that you are you decide to boot to safe mode to take care...
-
- 2007-11-13 22:16:19 - Firewalls: what they are and why you must have one!
- A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. A good firewall will help protect you from malicious attacks of spyware, adware, malware, worms, trojans, and hackers.Firewalls are security mechanisms that control who can access and send data thru y...
-
- 2007-11-13 22:16:19 - Ransom trojan uses cryptography for malicious purpose
- Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Though crimes have been committed via the Internet almost from its very launch, now cybercriminals have become dangerous as never before.We've been warned lots of times about stealing data -- identity theft, phishing scams and pharming; we hav...
-
- 2007-11-13 22:16:19 - Make money online - defend against the latest scam
- First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.Now I will give you some solutions you can choose from. But, unfortunately, all of them have some...
-
- 2007-11-13 22:16:19 - Make money online - latest scam disclosed
- Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste ...
-
- 2007-11-13 22:16:19 - Why corporations need to worry about phishing
- Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster.To view examples of phishing em...
-
- 2007-11-13 22:16:19 - Sarbanes-oxley: a cross-industry email compliance challenge
- Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. Companies that must comply with SOX are U.S. p...
-
- 2007-11-13 22:16:19 - Crack the code - thats a direct challenge
- I Challenge You To Crack The Code ------------------------------------- I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. During the initial meeting, one of the key technical staff presented me with a challenge; He handed over the NTLM hash of the domain Administrator account and challenged ...
-
- 2007-11-13 22:16:19 - Identity theft -- 10 simple ways to protect your good name!
- Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. It can result in untold financial and legal problems that may literally ruin your peace of mind and/or your life. Someone gaining control of your most personal details can reck havoc and result in dire consequences fo...
-
- 2007-11-13 22:16:19 - Phishing, fraudulent, and malicious websites
- Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living.The Internet, in particular, means for us boundless opportunities in life and business ? but also lots of dangers unheard of just a decade ago. We should be aware of these dangers if we want to use th...
-
- 2007-11-13 22:16:19 - Is that free stuff like an ipod or desktop computer really free?
- Have you seen the web site, www.freestuff.com? Or have you been turned on to www.freeipods.com? Or maybe some friend sent you an email suggesting you log on to one of these sites and take advantage of one of its numerous "free offers."Well, before you start the process of getting that "free" iPod, I'll take you through what's required. Then, you can decide for yourself h...
-
- 2007-11-13 22:16:19 - Mail forwarding - why would you do it?
- First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic.Mail forwarding: is a service that allows you to have your mail sent to a “mailbox” and then they will forward it off to your location. This mail is generally sent in bulk to the recipient and is very useful if you travel, or donR...