HackAttack

P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.

What can we do about it? How can we be sure that we are properly protected against them?

A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control of your computer so that he can use it to send out hundreds of thousands of e-mails in your name with the intention of crashing your mail server.

This can get you into very serious trouble with the server. This is something that you do not want. How are you going to prove that you were not to blame?

How do the hackers do it? What tools do they use?

A port scanner. What is a port scanner? A port scanner can locate PCs that are on line and check for an open port. A hacker using a program such as 'Super Scan' can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of the trouble.

The main port that the hacker is interested in is port 80. This is the one that you use to log on to the internet.

I am not going to confuse you with all the various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.

There are a number of programs designed to show you what is going on inside your PC. I will give you a short list of some that are recommended by some of the program makers.

The one that I would not be without is: www.testmyfirewall.com As its name implies it will test your firewall for flaws and scan for open ports and any other security problems you may have. You do have a firewall, don't you?

Another one is: www.pestscan.com This will scan for any nasties that are already on the computer.

Lastly, I use: http://www.security.symantec.com This will run a security check of all my systems.

Don't put of what you should be doing today. Make sure that your protection is doing its job. Check that you have the latest version of whatever protection you are using. An out of date system is worse than useless. It gives a false sense of security and suddenly you find yourself in serious trouble with your ISP.

It is your responsibility to ensure that your computer will not cause problems for someone else. There are so many free systems out there that you have no excuse for not using one or more of them.

Be safe. Be happy. Be responsible. All the best. ?Bob?

---

Robert has been on line for over four years and earns a very good living from some of the very best affiliate programs on the web. This is one of his favorites. If you are interested in growing your very own opt-in mailing list in the shortest possible time, take a look now.

http://www.bz9.com/robjfar 'It's free.'

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Politico

Bolton names Commerce official as his national security deputy
Politico
“I selected her as deputy national security adviser because her expertise is broad-based and includes national security matters related to our alliances, defense posture, technology security, foreign security assistance and arms control,” Bolton said ...
White House announces new deputy national security advisorDefenseNews.com
John Bolton begins to shape National Security Council staffWashington Post

all 10 news articles »

Fortune

Twitter Bans Ads from Russian Computer Security Company Kaspersky Lab
Fortune
Twitter has banned ads on its service from Russian security software maker Kaspersky Lab, after the U.S. government prohibited agencies from using its products because of alleged ties to the Russian government. The ban, confirmed by Twitter to Reuters ...
Twitter banned Russian security firm Kaspersky Lab from buying adsTechCrunch
Kaspersky banned from advertising on Twitter over security fearsTelegraph.co.uk
Twitter Ads policies - Twitter for BusinessTwitter for Business
Reuters -Homeland Security -Kaspersky Lab -Ars Technica
all 38 news articles »

CryptoSlate

Crypto Trade Group Pressures SEC to Exempt Ethereum From Security Classification
CryptoSlate
An alliance of lawyers, venture capitalists, and entrepreneurs have recently met with the US Securities and Exchange Commission to petition for the creation of cryptocurrency “safe harbors” for specific cryptocurrencies and tokens, including Ethereum ...
US Regulators Asked Not to Classify Ethereum as a Security: NYT ...CCN

all 20 news articles »

TechRepublic

Upcoming Windows Defender feature will tell you when security fails
TechRepublic
All of the attestation is done by the secure kernel, the end result of which is security validation that an attacker or malware in the Windows kernel can't alter. Microsoft gives an example where "an app could ask Windows Defender System Guard to ...
Windows 10: Microsoft to boost Linux app security with Windows Defender firewallZDNet
Hackers can bypass the Windows 10 S lockdown due to security flawDigital Trends
Google discloses 'medium-severity' security flaw in Windows 10 SWindows Central
Naked Security -Chrome - Google -Monorail - The Chromium Projects
all 59 news articles »

Brookings Institution (blog)

Development for security: Lending for peace?
Brookings Institution (blog)
Two World Development Reports tackled the security-development nexus. The WDR 2011 explicitly argued that investments in citizen security and justice reform can help countries break recurring cycles of violence. The WDR 2017 surmised that good ...


WFAA.com

Italy ISD increasing security after school shooting
WFAA.com
Italy ISD increasing security after school shooting. "Italy ISD will always be the school that this happened to. What we're going to do is focus on prevention and response." Author: Monica Hernandez. Published: 8:54 PM CDT April 20, 2018. Updated: 9:07 ...


Rutland Herald

Rutland Town eyes poll security at school
Rutland Herald
Rutland Town Clerk Kirsten Hathaway said the alleged threat of violence at Fair Haven Union High School and violence at schools in other parts of the country has her thinking twice about security at Rutland Town Elementary School during townwide voting ...

and more »

Assessing Server Security
CIO
Analysts at Chicago financial firm William Blair believe that Equifax's costs tied to dealing with last year's data breach could run between $200 million and $300 million1 – and that figure is after insurance coverage is applied. While this was a ...

and more »

NewsChannel5.com

Maintaining Cyber Security On Student Devices
NewsChannel5.com
FRANKLIN, Tenn. - In order to keep students without access to the internet from falling behind, students will be able to take laptops home. But some are questioning what that means for their cyber security. It's why several school districts have moved ...

and more »

Ars Technica

When you go to a security conference, and its mobile app leaks your ...
Ars Technica
A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the ...
No way, RSA! Security conference's mobile app embarrassingly insecureThe Register

all 7 news articles »
Google News

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More