P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.
What can we do about it? How can we be sure that we are properly protected against them?
A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control of your computer so that he can use it to send out hundreds of thousands of e-mails in your name with the intention of crashing your mail server.
This can get you into very serious trouble with the server. This is something that you do not want. How are you going to prove that you were not to blame?
How do the hackers do it? What tools do they use?
A port scanner. What is a port scanner? A port scanner can locate PCs that are on line and check for an open port. A hacker using a program such as 'Super Scan' can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of the trouble.
The main port that the hacker is interested in is port 80. This is the one that you use to log on to the internet.
I am not going to confuse you with all the various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.
There are a number of programs designed to show you what is going on inside your PC. I will give you a short list of some that are recommended by some of the program makers.
The one that I would not be without is: www.testmyfirewall.com As its name implies it will test your firewall for flaws and scan for open ports and any other security problems you may have. You do have a firewall, don't you?
Another one is: www.pestscan.com This will scan for any nasties that are already on the computer.
Lastly, I use: http://www.security.symantec.com This will run a security check of all my systems.
Don't put of what you should be doing today. Make sure that your protection is doing its job. Check that you have the latest version of whatever protection you are using. An out of date system is worse than useless. It gives a false sense of security and suddenly you find yourself in serious trouble with your ISP.
It is your responsibility to ensure that your computer will not cause problems for someone else. There are so many free systems out there that you have no excuse for not using one or more of them.
Be safe. Be happy. Be responsible. All the best. ?Bob?
---
Robert has been on line for over four years and earns a very good living from some of the very best affiliate programs on the web. This is one of his favorites. If you are interested in growing your very own opt-in mailing list in the shortest possible time, take a look now.
http://www.bz9.com/robjfar 'It's free.'
![]() |
|
![]() |
|
![]() |
|
![]() |
At this point, if you've got the whole "turning the... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
A couple of days ago, I was searching for a... Read More
The top five online scams on the Internet hit nearly... Read More
Today,on most internet user's computers, we have the ability to... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
So called phishers try to catch the information about the... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
I am the victim of an internet scam. It is... Read More
First of all we need to get some terms stated.... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Business on the internet is getting down right shameless. This... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Millions of people make purchases online, but many people are... Read More
There are several basic concepts to keep in mind when... Read More
If you have used a Windows machine for a while,... Read More
A couple of years back, I paid my dues the... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Working from home has its advantages, including no commute, a... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
If you use the internet, you have probably been infected... Read More
As more people are logging onto the Internet everyday, Network... Read More
There is no doubt that "how-to articles" have become a... Read More
In recent days, I was one of the unfortunate persons... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
In today's times spyware is a very serious issue and... Read More
Identity theft rates one of the fastest growing crimes in... Read More
With the advent of the World Wide Web, a whole... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
A couple of years back, I paid my dues the... Read More
So called phishers try to catch the information about the... Read More
Be careful of sites that promise to send you "instant... Read More
The money being spent online is steadily growing. With billions... Read More
Viruses are, however, not the only malicious software programs out... Read More
Paypal is a great site and is used by many... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
They're out there. Individuals trying to make a quick buck... Read More
This is the second in a series of articles highlighting... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Today the internet is a mine field of malicious code... Read More
If you run any type of Internet business, Adware and... Read More
Working from home has its advantages, including no commute, a... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
This is the second in a series of articles highlighting... Read More
You can detect spyware online using free spyware cleaners and... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Every now and then you can read about a new... Read More
During the release of a new software product specialized to... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Microsoft routinely releases new security updates, many of which are... Read More
History and BackgroundThe virus was one of the first ever... Read More
Do you sometimes notice your computer running slower. Is your... Read More
The first thing people think about when defending their computers... Read More
First the basic definition of Spyware: It is a type... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
In a word, no - an email message has always... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Identity theft is one of the most common criminal acts... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Pharming is one of the latest online scams and rapidly... Read More
Internet Security |