Saturday, May 19, 2007

Off Topic - Perfect Spot For Alerts

This post has NOTHING TO DO WITH PC Security.

That's why it is a perfect topic for this blog.

In 1996, a little girl, Amber Hagerman was outdoors riding her bike. Amber was from Arlington Texas, USA. Someone snatched her from her play in 1996, kidnapping her - and later, brutally murdered Amber.

In 1996, there was no Code Amber Alert system in effect in the USA. People saw Amber with an adult but didn't know that the person was her kidnapper - or that later on, Amber would be killed by this person. Had people known about a recent kidnapping, through a Code Amber Alert system, they would have known to call the law enforcement authorities and Amber might have been located before harm had been done.

I'm placing the Canadian and the American Code Amber Alert System real-time tickers on this blog because I think that everyone should be aware of them - not just people who might be browsing the internet about topics like 'child safety,' 'child kidnappings,' and 'preventing child abductions.'

Perhaps you'll be browsing the Net about home business information and home business start up info, PC Security and Antivirus programs - and will see an Alert in progress that pertains to your geographical area. Maybe you'll read a description from the ticker-message that tells what a kidnapper looks like. Maybe you'll run to the store to grab munchies before you settle in to install new PC Security software, knowing that once you start the job, you'd better not leave your house. Perhaps, while you're at the store you'll see the kidnapper and remember the description from the ticker-message you saw just a few minutes before you left your house.

Then - you can place a call to your local law enforcement people and maybe by that you will help a child!

Stranger - much stranger things have happened!

Anyhow - I am placing the tickers in the regular column on the left, so please, check them out once in a while.

*Note - if the message in the background is a Yellow/Amber colour, that means that an ALERT - a CODE AMBER ALERT - is currently in progress! That means that someone just kidnapped/abducted a child recently and that child has not yet been recovered. Please pay attention to an Amber Alert like this - at least long enough to find out if the Kidnapping/Abduction took place in your region.

If you see the tickers in a non-functioning state, please contact me so that I can find out why the tickers are down. Occasionally the Code Amber Organization site will be doing maintenance but I'd hate to have the tickers go down for any other reason than Code Amber doing updating.

Thanks in advance!

BetterTextAds.com

Saturday, April 21, 2007

What Parents Should Know

Parental Peace of Mind

The invention of the Internet has made a few specific parenting jobs that much more complex. Though we want our children to experience the vast wealth of knowledge available on the Internet and communicate with their friends online (frees up the telephone), we also worry about their safety. Unfortunately, the World Wide Web can expose our children to inappropriate and harmful material, obscene pop-up ads, and even sexual predators.

Research indicates that 1 in 5 children aged 10 to 17 have received a sexual solicitation over the Internet. This is not what parents want to hear, but it is something that parents need to face head-on!

We need to take steps to ensure that when our children access the web, they can do so safely. Internet filters are crucial to protect your children.

One tool that can assist us in this goal is Internet Parental Control software. One of the top names in parental control software is ContentWatch, and if the Big Mouse himself recommends this product, then it has to be good.

If Disney feels good enough to install three of the ContentWatch products in their Disney Dream Desk PC, it has to be worthy. After all, they are willing to stake their reputation on it.

Internetfilterreviews.com rated ContentProtect 2.0 the #1 Internet filtering software. It is easy to install, configure, and customize. If you do have any problems, ContentWatch provides unlimited toll-free technical support.

ContentProtect can block pornography, hate sites, questionable chat rooms, and other known dangers of the Internet. You can even configure ContentProtect to block online game and gambling sites, and make it so your children can only install and play computer games with parental ratings that you deem appropriate. Other features include: Integration with Safe Search features in popular search engines Reports of your children's internet activity Logs of your child's chat room and instant messages Reports if your child tries to remove or disable protection Filters bad content on Peer-to-Peer networks and other areas Password protected access for parents Customizable restrictions for each family member. Automatic software updates at no additional cost.

ContentWatch provides a two-week, no-obligation free trial of the full version. The product costs $39.99 per seat (installs on only one computer).

This is a one time purchase price which will give you unlimited use of the service. You never have to renew a subscription or pay any additional membership fees for use of the program. It seems like a reasonable price for a little parental peace of mind.

Is your computer safe for your kids to play on?



Fast Growing Crime - ID Theft

Name, Rank, and Social Security Number Identity theft is the fastest growing crime in the U.S.

The U.S. Secret Service has estimated that consumers nationwide lose $745 million to identity theft each year. According to the Identity Theft Resource Center, the average victim spends 607 hours and averages $1,000 just to clear their credit records.

Theives who steal Identiies use a number of different methods to retrieve your personal information without you knowing. They may be able to gain your information from businesses or other institutions by stealing it. They may bribe an employee who has access to records. They may get information by hacking into records. Maybe they will end up just plain conning the information out of employees. Once identity thieves have your personal information, they may easily use it to commit an act of fraud or theft using your name.

How can you tell if you have become a victim of identity theft?

Some signs include unexplained charges or withdrawals from your financial accounts

Bills or other mail stop arriving because the thief might have submitted a change of address

Perhaps a credit application is denied you for no apparent reason

Debt collectors may begin calling you about merchandise or services you didn’t buy.

Your computer can be a goldmine to anyone who is in the practice of stealing identities. Your computer contains a wealth of personal information for an identity thief to play with.

To protect yourself and your computer against identity theft consider:

Updating virus protection software frequently.

Consider setting your virus protection software to update automatically.

The Windows XP operating system also can be set to check for patches automatically.

Windows XP will also download the patches to your computer automatically.

Do not opening files sent to you by strangers

Do not click on hyperlinks

Do not download programs from people or companies you don’t know.

Use a firewall program, particularly if you are on high speed Internet connections

High Speed cable or DSL leaves your computer attached to the internet 24h a day.

Make sure you firewall against intruders if your machine will be conneted 24h/day

Only provide personal or financial information through secured websites.

While not fool proof, a lock icon on the browser’s status bar or a URL for a website that begins "https:" (the "s" stands for secure), may provide additional security.

Stop storing financial information on your laptop, unless this is absolutely necessary.

Delete all the personal information stored on a computer before disposing of it.

Use a "wipe" utility program to overwrite the entire hard drive.

Check with an anti-fraud education organization such as CardCops (www.cardcops.com).

Card Cops runs a web site designed to help consumers determine whether their credit card numbers may have been stolen or not. They monitor Internet "chat rooms" where identity thieves gather. Here, the thieves illicitly trade and sell stolen credit card numbers. CardCops turns pertinent information over to law enforcement authorities. The authorities will also allow consumers to access a database to see whether individual card numbers may have been stolen.
In the first two months of operation, the site identified more than 100,000 stolen credit cards.

As with any crime, you can not completely control whether you will become a victim, but you can take steps to minimize your risk by remaining diligent and by minimizing outside access to your personal information.

Phishing Not As Great As Fishing

If you've never received a 'phishing' email (and that's NOT an invitation to go 'fishing,' either!), then you're one of the lucky few!

If you have received email from a 'phisher' - asking you to visit a familiar website to verify or update personal information, then you NEED TO STOP - before you even respond or get thinking about your accounts, money, or anything else. DO NOT CLICK on ANYTHING within the email!

A phishing attempt/email might ask you to

* verify information at a common site you may use such as paypal, e-Gold, eBay, etc.

*upgrade for some special DEAL at any common site - an autosurf, traffic exchange, money exchange service, almost ANY KIND OF SITE!

*update your info

*update or provide your banking information

*update or provide your credit card number, social security or social insurance numbers, etc.

Often, you'll think that you recognize the business name mentioned in the email - and you'll think that everything must be okay - since the email mentions a company that you're familiar with.....

DON'T FALL FOR IT!

Don't clik on the 'take me there' link and - especially do NOT provide the information that the email asks you to give!

The link will only lead to a bogus website or other web location (blog, chatsite, forum, etc) that APPEARS TO BE the site you think it is, as described in the email. This site was created by someone whose sole purpose is to steal your personal information! The site may even look JUST LIKE the original...but be assured that it is NOT the site you think it is no matter how professional the site may look - no matter that is looks just like the one you've been led to think it is.

Phishing (pronounced as "fishing") is defined as the act of sending an email that falsely claims to the recipient that you are acting on behalf or that you own an established business. The "Phisher's" intent is to scam the recipient into surrendering their private information, thus, ultimately stealing the recipient's identity.

It is not alwayss as easy as you might think to spot an email send by a phisher who is phishing for information. At first glance, the email may look like it is from a legitimate company.

The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail.

The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.

Many phishers are professional criminals. They have spent a lot of time in creating emails that look authentic.

Users need to review all emails requesting personal information carefully.

When reviewing your email remember that the "From Field" can be easily changed by the sender.

While it may look like it is coming from a .com you do business with, looks can be deceiving.

Also - keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails.

Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.

How to check the legitimacy of a link:

Hover your mouse over the link - without actually clicking

Look to the bottom left-hand of your computer screen.

The website address to which you are about to be taken will show up in a small viewing area.


Finally, follow these three important rules:

* Never, ever, click the links within the text of the e-mail.
* Always delete such an e-mail immediately.
* Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well.

If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. Then find out through your safe members area if there was, indeed, some kind of request sent out - for you to update your details.

Beware of Intelligent Explorer Plug-Ins

Just what is Intelligent Explorer? For your safety, you really need to know!

Know your browser! READ anything that looks like upgrade or update options that might pop up at unusual times or in unusual manners - especially if you have been randomly surfing online.

Most security suites - provide 'scheduling' options for when they'll look for, download and install updates. KNOW WHEN these times are set - and if an upgrade or update occurs beyond the time that you have set in your 'scheduling' - BE SUSPICIOUS and don't just click to update, install, upgrade, or any other thing that a pop-up might ask.

A program called 'Intelligent Explorer' is a suspicious program as such! It is a NIGHTMARE! And it usually gets INTO your system by tricking you with a pop up window that asks you to upgrade, update or add further protection to your computer or browsers.

It will load and install a product called Intelligent Explorer on your computer. Afterward you'll have an extra 'toolbar' connected to your browsers.

According to some 'security tip' forums I visit,

BullGuard, CWShredder and Ad-Aware (normally considered very top-end, excellent protection programs) won't help you to easily remove "Intelligent Explorer" once you're infected. They can 'detect' but not solve your problem - as this malicious-ware re-writes itself and moves itself around!

Spy-bot software also seems to be of no help in removing this menace!

The malware toolbar makes your system allow OTHER and MORE DOWNLOADS that you DO NOT WANT on your computer.

The Intelligent Explorer plug-in is JUST PLAIN NASTY!!!

This plug-in is a PRIME EXAMPLE of why you should be diligent about reading TOS agreements before you load ANYTHING onto your machine.
In this program's terms, you grant the right for other things to be downloaded onto your computer - once you have initially 'clicked okay'!

Here's a small portion of their TOS:

"You grant to us the right, exercisable by us until you uninstall the Software or this agreement is otherwise terminated, to provide to you the Service of downloading and causing to be displayed advertising material on your computer, through ‘pop-up’ or other display while you use your browser. You acknowledge and agree that installation of the Software may automatically modify toolbars and other settings of your browser. By installing the Software you agree to such modifications."

(go to http://www.ieplugin.com/terms.html to read it in its entirety)

The company, IBC incorporated, is incorporated in Belize. This is an example of a really DRASTIC license! One end user found highly objectionable pop-up advertisements generated by this software bundled with Intelligent Explorer. In short, the ads were of the 'extreme pornography' variety!

Intelligent Explorer is a plug-in, which can create a new home page, as well as start up and endless loop of pop-ups. You can remove the view bar, but then starting up Internet Explorer will only cause it to reappear again (it re-writes itself so that it never really 'leaves' - just the first copy goes away when you 'uninstall' by regular methods).

One forum writer/poster who installed this toolbar said,

"I asked some friends to help, and no one could tell me what to do. This is what I did: I bought a copy of a program called XoftSpy and it removed the software. It took two scans and a reboot to do it. This is not an advertisement for this product. They advertised it was free, which it was to run, but then I had to buy it to actually fix anything. It cost me $40 and I am sure that there are freeware products out there as well, but that is what ended the nightmare for me."

So - at a $40 cost, including a huge headache, the above user was finally able to get rid of the problem.

Other spyware products I have seen out there include spybot, NoAdware, Spyware Eliminator, Pal Spyware Remover, and Spyware C.O.P. Let the buyer beware!

These programs often provide the function they claim - but also install other bundled items all during one nice and neat installation.........that YOU INITIATE by clicking 'I Agree' or 'Yes' too quickly. The other items are what will cause you nightmares.

Again - Read all TOS agreements - many spyware applications can be bundled into or attached to ANY SOFTWARE PRODUCT.....and again -

BUYER BEWARE!

Who Fights AntiViruses?

These are 'The Good Guys' in the Anti-virus battle:

Everyone in the United States has heard of the leading antivirus vendors Symantec, Mcafee, Computer Associates, and Trend Micro.

These companies have market-leading presence, particularly in the United States. Microsoft is also becoming a key player in this market.

Microsoft acquired intellectual property and technology from GeCad software in 2003. The GeCad company's home-base is in Bucharest, Romania.

Microsoft also Pelican Software, which had a behavior based security as well as Giant Company Software for spyware and Sybari Software, which manages virus, spam, and phishing filtering.

A lot of discussion has centered on whether or not Microsoft has come into its own as a dominant factor in the antivirus market - by way of simply bundling its security technologies along with operating systems - at no charge.

This 'bundling' technique applied in other markets - such as word processing and Internet browsers.

Of course there are a number of antivirus vendors who also play in this market.

Becoming well known and establishing a firm market presence are companies like:

GriSoft - out of the Czech Republic

Sophos - in the United Kingdom

Panda Software - from Spain

Kaspersky - in Russia

SoftWin - in Romania

F-Secure - in Finland

Norman - in Norway

Arcabit - in Poland

VirusBuster - out of Hungary

and

AhnLab in South Korea.

It is not clear exactly where the industry is heading, but it is not doubted that everyone within this market faces a rapidly changing landscape. The amount of effort to find and provide fixes for viruses is staggering. Malicious programs are getting more complex and the number of them is increasing at an alarming rate. Many companies quickly find themselves without the resources to match efforts of those truly bent on creating havoc.

Some virus companies are getting of hundreds of new samples a day! Moreover, new viruses are getting "smarter" in that they propagate themselves quickly and they often hide themselves and are smart enough to move around in a system by renaming themselves in an effort to make it hard to remove them.

Not Just a Greek Myth - The Trojan Horse

We have all heard the term "Trojan Horse," but what exactly is it - aside from Greek Myth?

A Trojan Horse is a destructive program that masquerades as a harmless application (Just like Odysseus' harmless 'gift' horse that was accepted into the city of Troy). Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive.

One of the most dangerous examples of a Trojan is a program that promises to rid your computer of viruses - but instead - (the gift) introduces viruses into your computer (the army bursting OUT of the horse in the middle of the night to attack Troy/your computer) .

The Trojan can be engineered as extremely tricky.

Who hasn’t been online and had an advertisement pop up claiming to be able to rid your computer of some nasty virus?

Or - more frightening still - you receive an email that claims to be alerting you to a new virus that can threaten your computer! The sender promises to quickly eradicate, or protect, your computer from viruses if you simply download their "free", attached software into your computer. You may be skeptical but the software looks legitimate and the company sounds reputable.....

So how to you proceed?
...many people proceed by taking the advertisers up on their offer - just in case - and they download the software!

In doing so, a user has just potentially exposed his/herself to a gargantuan headache and a computer system to a sundry list of ailments!

When a Trojan is activated, several things can occur:

Some Trojans are more annoying than malicious.
Some of the less annoying Trojans may choose to change your desktop settings or add silly desktop icons.
More serious, malicious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware (such as viruses), spy on the user of a computer.
Trojan spyware can secretly report data to their makers - like browsing habits, passwords, credit car numbers, bank account details, etc.
Trojans may insert keyloggers to keep track of a user's keystrokes and gain 'the usual information' - passwords and credit card numbers, phish for bank account details (which can be used for criminal activities).
Trojan programs can even install a "backdoor" into your computer system so that the Trojan-maker/expert can come and go into and out of your computer at will and at his or her convenience!

To increase your odds of AVOIDING a Trojan - STOP TALKING TO GREEK PEOPLE AND DON'T ACCEPT GIFTS FROM GREEKS.....

Haha - okay - just joking. There's absolutely no fear to be had with any kind of people EXCEPT those who are designing and distributing Trojan software programs.

Here are some recommended guidelines for avoiding Trojan horse viruses

follow these guidelines. Remain diligent Trojans can infect your computer
#1 - Remain diligent in your use of ANTI-spyware and ANTI-virus softwares that are trusted. If you're using some antivirus programs already that have worked in the past - UPDATE those before you go looking around for the next greatest, latest softward - especially downloadable programs! (Remember - these are often the 'gift' of a virus).

Trojans can infect your computer through rogue websites, instant messaging, and emails that contain attachments.

Do not download anything into your computer unless you are 100 percent sure of its sender or source.

Ensure that your operating system is always up-to-date. If you are running a Microsoft Windows operating system, this is essential.

Install reliable anti-virus software. It is also important that you download any updates frequently to catch all new Trojan Horses, viruses, and worms.

Be sure that the anti-virus program that you choose can also scan e-mails and files downloaded through the internet.

Consider installing a firewall. A firewall is a system that prevents unauthorized use and access to your computer.

*note
A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular operating system updates and reliable anti-virus software, it can provide additional security and protection for your computer.

Nothing can absolutely guarantee the security of your computer 100 percent, however YOU SHOULD ALWAYS BE THINKING OF HOW TO MAKE IT MORE DIFFICULT FOR A VIRUS TO ENTER YOUR SYSTEM!

You can continue to improve your computer's security and decrease the possibility of infection by consistently following these guidelines, as a minimum measure to protecting yourself and your computer.

Last tip:

If you have previously 'not been interested' or 'haven't had the time' to learn more about PC Security, I recommend that you do whatever it takes to overcome your disinterest and the time-management issues that keep you from learning more about how to keep your computer (and your personal information) safe from malware-distributors, hackers, ID Theives and the like!