HackAttack

P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.

What can we do about it? How can we be sure that we are properly protected against them?

A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control of your computer so that he can use it to send out hundreds of thousands of e-mails in your name with the intention of crashing your mail server.

This can get you into very serious trouble with the server. This is something that you do not want. How are you going to prove that you were not to blame?

How do the hackers do it? What tools do they use?

A port scanner. What is a port scanner? A port scanner can locate PCs that are on line and check for an open port. A hacker using a program such as 'Super Scan' can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of the trouble.

The main port that the hacker is interested in is port 80. This is the one that you use to log on to the internet.

I am not going to confuse you with all the various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.

There are a number of programs designed to show you what is going on inside your PC. I will give you a short list of some that are recommended by some of the program makers.

The one that I would not be without is: www.testmyfirewall.com As its name implies it will test your firewall for flaws and scan for open ports and any other security problems you may have. You do have a firewall, don't you?

Another one is: www.pestscan.com This will scan for any nasties that are already on the computer.

Lastly, I use: http://www.security.symantec.com This will run a security check of all my systems.

Don't put of what you should be doing today. Make sure that your protection is doing its job. Check that you have the latest version of whatever protection you are using. An out of date system is worse than useless. It gives a false sense of security and suddenly you find yourself in serious trouble with your ISP.

It is your responsibility to ensure that your computer will not cause problems for someone else. There are so many free systems out there that you have no excuse for not using one or more of them.

Be safe. Be happy. Be responsible. All the best. ?Bob?

---

Robert has been on line for over four years and earns a very good living from some of the very best affiliate programs on the web. This is one of his favorites. If you are interested in growing your very own opt-in mailing list in the shortest possible time, take a look now.

http://www.bz9.com/robjfar 'It's free.'

In The News:


pen paper and inkwell


cat break through


Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More