Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
HackAttack > NetSparsh - Viral Content you Love & Share

HackAttack

P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.

What can we do about it? How can we be sure that we are properly protected against them?

A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control of your computer so that he can use it to send out hundreds of thousands of e-mails in your name with the intention of crashing your mail server.

This can get you into very serious trouble with the server. This is something that you do not want. How are you going to prove that you were not to blame?

How do the hackers do it? What tools do they use?

A port scanner. What is a port scanner? A port scanner can locate PCs that are on line and check for an open port. A hacker using a program such as 'Super Scan' can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of the trouble.

The main port that the hacker is interested in is port 80. This is the one that you use to log on to the internet.

I am not going to confuse you with all the various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.

There are a number of programs designed to show you what is going on inside your PC. I will give you a short list of some that are recommended by some of the program makers.

The one that I would not be without is: www.testmyfirewall.com As its name implies it will test your firewall for flaws and scan for open ports and any other security problems you may have. You do have a firewall, don't you?

Another one is: www.pestscan.com This will scan for any nasties that are already on the computer.

Lastly, I use: http://www.security.symantec.com This will run a security check of all my systems.

Don't put of what you should be doing today. Make sure that your protection is doing its job. Check that you have the latest version of whatever protection you are using. An out of date system is worse than useless. It gives a false sense of security and suddenly you find yourself in serious trouble with your ISP.

It is your responsibility to ensure that your computer will not cause problems for someone else. There are so many free systems out there that you have no excuse for not using one or more of them.

Be safe. Be happy. Be responsible. All the best. ?Bob?

---

Robert has been on line for over four years and earns a very good living from some of the very best affiliate programs on the web. This is one of his favorites. If you are interested in growing your very own opt-in mailing list in the shortest possible time, take a look now.

http://www.bz9.com/robjfar 'It's free.'

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

Security Images Show Khashoggi and Fiancée in His Final Hours
New York Times
ISTANBUL — In the continuing frenzy of media attention to the murder of Jamal Khashoggi before a much-anticipated statement by President Recep Tayyip Erdogan, Turkish media have published poignant photographs of Mr. Khashoggi and his fiancée in the ...

and more »

Healthcare Finance News

Can't afford a security chief? Here are the alternatives
Healthcare Finance News
Particularly for smaller hospitals and medical groups, hiring a full-time chief information security officer can be a stretch of the budget and resources. But patient data must still be protected because smaller organizations face many of the same ...

and more »

Mashable

Japan is the latest country to challenge Facebook to improve security
Mashable
Japan's ask of Facebook comes after the social media company revealed that a security breach compromised the personal data of 29 million users. It also follows a year of scandal about how the British political consulting and data firm Cambridge ...

and more »

Forbes

Google And Our National Security: Lost In The Cloud?
Forbes
The experts all agree. The Pentagon and the U.S. military's future depends on advanced weapons systems that will require cooperation with America's most advanced technology companies, including the major players in Silicon Valley. But what if Silicon ...


NBC4 Washington

Security guard shoots intruder in lobby of local Fox station in DC, police say
CBS News
The man kicked through the glass doors of WTTG's Wisconsin Avenue studios before he was shot once by the armed security guard in the lobby around 3 p.m., Washington Metropolitan Police second district commander Melvin Gresham said. The station ...
Security Guard Shoots Man Trying to Get Into WTTG, Washington, DC, Fox StationNBC4 Washington
Security guard shoots man trying to break in to FOX 5 buildingWTOP
Security guard shoots man trying to enter DC local news station, authorities sayWSB Radio
FOX 5 DC -WBAL Baltimore
all 108 news articles »

Washington Post

Macedonia: Lawmakers who backed new name get more security
Washington Post
Interior Minister Oliver Spasovski said Monday that all 80 parliament members who backed launching the constitutional amendment process needed for the change were getting extra security after several lawmakers and their families reported death threats.

and more »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: October 13–19
Council on Foreign Relations (blog)
Below is a visualization and description of some of the most significant incidents of political violence in Nigeria from October 13 to October 19, 2018. This update also represents violence related to Boko Haram in Cameroon, Chad, and Niger. These ...


Voice of America

Relative: Victim of Brutal Ugandan Security Arrest Still Missing
Voice of America
Uganda's security forces are under scrutiny after a video surfaced showing plain clothed officers brutally beating and arresting a civilian on the street. Uganda's army spokesman says the troops are facing a disciplinary committee but the family of the ...

and more »

Today.com

After a break-in, I tried Amazon's best-selling $64 security camera
Today.com
I've always thought security cameras were something only businesses had. I also thought my garage was a safe space to store my Felt Racing bike. But on a Monday morning this past August, I realized I was wrong, on both counts. Thieves got into my ...

Google News

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More