Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Behavior to Stay Safer Online > NetSparsh - Viral Content you Love & Share

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. It is extremely important to make sure this program is updated at least once a week, and all drives are scanned. Viruses usually are used to destroy your Data or Hardware. Where as Trojans are used to gain remote access into your system. Always scan any new files you receive as well, even if they are off a friend, you don't know where those files originated from. ALWAYS use a little common sense when on the Internet as well. Don't accept files from an entrusted source. Don't go to web sites you have received spam for, they can be infected with viruses or asking you to download files that are infected. Always go only to official sites (i.e... If you ask for a web address for Norton and someone says, that is obviously not an official site). Keep in mind that an Antivirus will only detect known viruses. It is possible that someone can create a new virus or manipulate an existing Virus or Trojan to the point it will no longer be detected by an Antivirus. As each unknown virus is discovered it is then added into the Antivirus database. Always create rescue disks for your Antivirus program, these will enable you to access your computer through MS-DOS if you are unable to access it through windows. If you do not have an Antivirus program try the HouseCall free online virus scan the link if on the top right side of this page. Also never run 2 different Antivirus . By using two different Antivirus software, sometimes the rule sets can cause conflicts in each other.. or think the other is a virus.. which can also give false positives (meaning it detects a file as a Virus or Trojan, when it isn't one).. or not detect viruses as it should. Always delete files you do not remember downloading.

2. Importance of a Trojan scanner: A Trojan scanner is exclusively designed to guard against Trojan horses. A Trojan is a method of intrusion into a system. It is a malicious, security breaking program that is disguised as something harmless. A Trojan can grant complete access to your system to unknown parties, allowing them to commit criminal offenses with your Internet connection. If those offenses are investigated the trail will lead right to you. It also possible for them to get personal or business data and some passwords memorized within your computer. The Cleaner is a good Trojan scanner located on Never open any file or download a file off an entrusted source, spammed web sites being one of them. It is very common for someone to set up a web site, then spam that web site saying you are infected with some virus or Trojan download this fix, or saying they have some great password cracking program, etc. Then you fall for it and your infected. Never use any war tools that require you to install something that brings up a warning on your Antivirus, why not to do this will be explained more on the IRC Newbie page. Always delete files you do not remember downloading.

3. Importance of running a Firewall: A Firewall is one of your best defenses of being hacked. That is if your using a good Firewall and have it configured right. ZoneAlarm free download is a decent Firewall. Although I would recommend ZoneAlarm Pro, which blocks a lot of commonly used hacking attempts. Another one I would not recommend is BlackIce, if you see that one run like there is no tomorrow (gives a lot of false positives). Ultimately though I would recommend running at least one Firewall, even if your computer is connected behind a gateway/router. When looking into firewalls it is a good idea to check what features it has. While one may block a number of hacking attempts, it may not block ads or cookies. Make sure to get all the details before deciding on a Firewall to purchase.

Also if you on Windows XP you can configure the Firewall they have built into it, go to start menu ... control panel ..... click network connections ..... double click local area connections ..go to properties ... then select the advanced tab. There you will find the XP Firewall and can enable it. You can also click on the link they provide to learn more about it. Never run 2 firewalls unless one is a software and the other a hardware. Security threats such as those dealing on the application level (your Operating System).. software Firewall can analyze that data better. Whereas hardware better analyzes incoming data from the Internet (snifters, etc.). If you have your own server.. good idea to choose a good one of each (hardware and software). If I am not running a Firewall but would like to see what connections my computer has open how do I do that? Simply go to your start menu under programs or programs/accessories you will find the MS-DOS prompt/Command prompt once you have that open type the command "netstat -an" without the quotations. There is will list the protocol of the connection TCP/UDP, the local address and foreign address, as well as the state which will show either as listening or established. Keep in mind that any connection to the Internet will show up there.

4. Importance of Windows Updates: It is extremely important to update windows. If you are not sure how to, just go to your start menu, then to programs you will see Windows Update there. Windows critical updates are related to security issues within Windows itself. These security issues can be exploited by hackers, these issues can also cause you to get infected easier with a virus if you are a Outlook Express user. As vulnerabilities are detected in Windows critical updates are released for them.
Always be sure to update Windows on a regular basis.

5. Safer Passwords: Never have Windows remember your passwords. If you ever do get an intruder on your system passwords saved in Windows can be retrieved. Instead what I recommend is saving all your passwords to notepad then saving them on a floppy disk. A simple copy and paste to use your passwords for any sites you visit, or accounts you may have online. Never use simple passwords such as names of places, things or people. Also do not use passwords that consist of either all letters or all numbers. The best passwords to have should have a combination of letters and numbers(e.g. g74npw2m5), when possible, use symbols (e.g. #^&%!). If the password is case sensitive, then use upper and lower case . Also make sure that the letters and numbers you use are not in clusters on your keyboard (within same general area on keyboard). Make your passwords longer then you may normally make them. Doing this will make any passwords you have harder for an outside party to crack. Apply this to anything you do on the Internet that requires a password. This one I speak from experience on, my last website on a free host, the password was cracked and the content of those pages changed. For many things available on the Internet you require Username and a password, if someone knows your Username or can figure it out, that is half their battle. So make the other half of their battle as difficult as possible. On Irc including characters in your passwords such as ¤, å, ¥, § ,etc... will help even more, to make your passwords harder to crack. Never use any of the following for your passwords (in whole or part): your name or a pet's name, girlfriend, boyfriend. Anything relating to any hobbies you have. Numbers dealing with you, relatives, friends, family, etc. (birthdays ,Social Insurance Number, significant dates, etc.). All of this can and WILL come back to haunt you.

6. What is Spyware?: Software that is installed on your computer/or a virus, which gathers information about you without your consent or knowledge of it. This information can end up in the hands of advertisers, spam e-mail lists, and other interested parties. It can gather information from cookies on your computer. Cookies can store information about websites you have visited, to develop a general idea of your online activity. Cookies generally store information such as preferences from websites, and they are stored on the hard drive of your computer. If your not comfortable with the idea of someone getting any information about your online activities, as most people are. There are programs out there that can be used for either removing cookies from sites you have visited as well as programs that will detect and remove known spyware programs. Lavasoft Ad-aware is a good program for removing spyware programs. Window Washer is an excellent program for removing a lot of your online history (cookies/temp Internet files... etc...). For people who use Kazaa, don't be surprised if that shows up on an Ad-aware scan, It will. Once you remove the spyware detected, Kazaa will fail to work without it. A suggestion for future use, switch to Kazaa Lite.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

Business Insider

A Secret Service agent tackled a Chinese security official over the nuclear football when Trump visited China
Business Insider
Axios reported on Sunday that during President Donald Trump's trip to China in November, a Secret Service member tackled a Chinese security official. The incident reportedly began when Chinese detail tried to prevent the military aide carrying the ...
John Kelly and Secret Service agent scuffled with Chinese security officials over nuclear 'football' in Beijing ...The Japan Times
John Kelly and US Secret Service Reportedly Brawled With Chinese Security Guards Over Nuclear FootballMediaite

all 24 news articles »

Washington Post

The Munich Security Conference is one of the premier global forums, so what's with the malaise?
Washington Post
Numerous locals in Munich assured me that the winters there are normally sunny. This past weekend, however, the weather during the 2018 Munich Security Conference (MSC) was cold and gray. The climate inside the meetings was equally forbidding. As a ...
Opinion: Munich Security Conference – the end of diplomacy?Deutsche Welle
US Warns of 'Critical Time for Humanity' at Tense Security ConferenceVoice of America

all 133 news articles »

Fox News

Limbaugh suggests armed security is only answer to mass shootings at schools
Fox News
“We have armed security at every public entity except schools,” Limbaugh said. He spoke minutes after five students who survived last week's shooting at a Parkland, Fla., high school said they are organizing a nationwide demonstration on March 24 to ...
Rush Limbaugh admits his immigration fears are about voting, not securitySalon

all 24 news articles »


VIDEO: Florida school security guard pretends to shoot at students
DORAL, Fla. (WFLA) – A school security guard in Doral, Florida may lose his job over a six-second cellphone video that shows him pretending to point a gun at students, WSVN reports. In the video, the guard can be seen standing on the roof of Ronald ...
Video of South Florida high school security guard pretending to shoot at students surfacesBoston News, Weather, Sports | WHDH 7News
Florida security guard seen on video pretending to point gun at studentsKFSN-TV
Security guard caught on video pretending to point gun at kidsKTRK-TV

all 6 news articles »


Three Things Worrying the Global Security Establishment
In an otherwise reassuring speech, U.S. National Security Adviser H.R. McMaster defended plans to develop low-yield tactical nuclear missiles as a means to deter Russia, which is developing similar weapons. Both former NATO Secretary General Javier ...

and more »


Government agrees to up Medicare card privacy and security controls
The federal government has agreed to the 14 recommendations made by the independent review of health providers' access to Medicare card numbers, touting an individual's privacy and card information security. One recommendation made by the review in ...

Fox News

Flights delayed, canceled after man breaches security at Illinois airport
Fox News
A man was taken into custody for trying to ram an airport terminal in a stolen car, and then attempting to break into a police vehicle. (iStock). Several weekend flights were delayed or canceled at an Illinois airport after a man tried to use a stolen ...

and more »

Electric Vehicles May Raise India's Risk of Cyber-Security Breaches
India's dependence on imported components for electric vehicles could make the country vulnerable to cyber-security breaches, according to the government's chief policy think-tank. India should manufacture the majority of the parts needed for its ...

and more »


John Kelly overhauls White House security clearances
White House Chief of Staff John Kelly is overhauling the Trump administration's security clearance process for staff. The decision comes in the wake of the Rob Porter scandal and amid reports that dozens of White House officials, including Trump's son ...
Kelly Orders Changes to Security Clearance Process at White HouseNew York Magazine
Chief of Staff Orders an Overhaul for Security ClearancesNew York Times
Chief Of Staff Kelly Wants New White House Security Clearance RulesNPR
CNN -Axios -Salon -Washington Post
all 281 news articles »

The Intercept

Amidst Election Security Worries, Suddenly Paper Ballots Are ...
The Intercept
With election security worries, paper ballots may be a quick and simple solution.

and more »
Google News

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More