P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.
What can we do about it? How can we be sure that we are properly protected against them?
A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control of your computer so that he can use it to send out hundreds of thousands of e-mails in your name with the intention of crashing your mail server.
This can get you into very serious trouble with the server. This is something that you do not want. How are you going to prove that you were not to blame?
How do the hackers do it? What tools do they use?
A port scanner. What is a port scanner? A port scanner can locate PCs that are on line and check for an open port. A hacker using a program such as 'Super Scan' can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of the trouble.
The main port that the hacker is interested in is port 80. This is the one that you use to log on to the internet.
I am not going to confuse you with all the various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.
There are a number of programs designed to show you what is going on inside your PC. I will give you a short list of some that are recommended by some of the program makers.
The one that I would not be without is: www.testmyfirewall.com As its name implies it will test your firewall for flaws and scan for open ports and any other security problems you may have. You do have a firewall, don't you?
Another one is: www.pestscan.com This will scan for any nasties that are already on the computer.
Lastly, I use: http://www.security.symantec.com This will run a security check of all my systems.
Don't put of what you should be doing today. Make sure that your protection is doing its job. Check that you have the latest version of whatever protection you are using. An out of date system is worse than useless. It gives a false sense of security and suddenly you find yourself in serious trouble with your ISP.
It is your responsibility to ensure that your computer will not cause problems for someone else. There are so many free systems out there that you have no excuse for not using one or more of them.
Be safe. Be happy. Be responsible. All the best. ?Bob?
---
Robert has been on line for over four years and earns a very good living from some of the very best affiliate programs on the web. This is one of his favorites. If you are interested in growing your very own opt-in mailing list in the shortest possible time, take a look now.
http://www.bz9.com/robjfar 'It's free.'
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Despite the current wave of identity theft and corporate security... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
A new variation of the Nigerian Scam theme ... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
You can detect spyware online using free spyware cleaners and... Read More
There has not been a time in the history of... Read More
This is the second in a series of articles highlighting... Read More
Nobody wants to pay to remove spyware. At the very... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
It's late. You've been scouring the web for that perfect... Read More
So called phishers try to catch the information about the... Read More
So you want to know who your kids are chatting... Read More
Well, if that would have been said to me by... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
There are folks out there who use their powers for... Read More
If you run any type of Internet business, Adware and... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
To blog or not to blog? Well, why not? Lots... Read More
Imagine this ? you open up your email box and... Read More
Business on the internet is getting down right shameless. This... Read More
Working from home has its advantages, including no commute, a... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
With the Internet entering our lives in such an explosive... Read More
Spyware is software that runs on a personal computer without... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
When we think of adware, what comes to mind are... Read More
1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Whether we like it or not, we are all living... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Identity theft is one of the most common criminal acts... Read More
Ok, you've got a computer, and you get online. You... Read More
There are folks out there who use their powers for... Read More
The trash folder in my main inbox hit 4000 today.... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Pharming is one of the latest online scams and rapidly... Read More
There you are busily typing away on your PC or... Read More
Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More
When it comes to reporting Internet scams most of us... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
File sharing on p2p is soaring despite the music and... Read More
There are several basic concepts to keep in mind when... Read More
|