Monthly Archives: July 2008

Free Internet Child Protection – Parental Control Bar

There is little doubt that the Internet neighborhood can provide a rich educational and cultural experience for children of all ages and backgrounds.

But would you drop your child off in a neighborhood where more than half of the buildings were adult stores, and it was potentially full of predators? Well of course you wouldn’t.

But if you let your child explore the Internet unsupervised, or without having communicated to your child information concerning potential on-line dangers, this is close to what you’re doing.

According to the FBI in the United States, the following are some of the most important positive actions, you as a parent, can take to reduce your child’s possible victimization on the Internet.

  • Communicate, and talk to your child about potential on-line dangers.
  • Spend time with your children on-line. Have them teach you about their favorite on-line destinations.
  • Keep the computer in a common room in the house, not in your child’s bedroom.
  • Utilize parental controls provided by your service provider and/or blocking software.

Since computer-sex offenders are a very real danger on the Internet, the FBI suggests that you instruct your children to:

  • Never arrange a face-to-face meeting with someone they met on- line.
  • Never upload (post) pictures of themselves onto the Internet or an on-line service to people they do not personally know.
  • Never give out identifying information such as their name, home address, school name, or telephone number.
  • Never download pictures from an unknown source; there is a good chance there could be sexually explicit images.
  • Never respond to messages or bulletin board postings that are suggestive, obscene, belligerent, or harassing.

An important aspect of ensuring that your child is safe while using the Internet, (recommended by the FBI and child safety experts/organizations) is the installation of parental control software.

Parental controls will provide you with the advantage of being able to:

  • Block access to materials (text and pictures) identified as inappropriate for kids.
  • Permit access only to materials specifically approved as safe for kids.
  • Specify what types of materials are appropriate for your child.
  • Monitor your child’s activity on the Internet by storing names of sites and/or snapshots of material seen by your child on the computer for you to view later.
  • Set different restrictions for each family member.
  • Limit results of an Internet search to content appropriate for kids.
  • Enforce time limits set by parents.

ParentalControl Bar, a browser toolbar, is a free solution available as a download on the Internet. ParentalControl Bar is provided free of charge to the public by WRAAC.org, a non-profit organization dedicated to providing free, effective internet control tools.

ParentalControl Bar Features

Child/Parent Mode

This status indicator makes it easy to tell if your computer is in Child-Mode or Parent-Mode. When in Child-Mode, control features are enabled and web sites are blocked based on your parental settings. When in Parent-Mode, control features are disabled and you, the parent, have unrestricted access to the Internet.

Parental Password

A single password makes it easy for you, the parent, to enable or disable Child-Mode. There is a hint to help you remember your password, or if you forget it completely have it sent to a parental email address.

Help Menu

Clicking this button opens the toolbar menu where parents can access tutorials, help menus or change your password.

Change Parental Settings

Clicking this button opens the parental settings menu where you can specify the types of content you wish to block your family from accessing in Child-Mode. You can also manage your personal list of ‘blocked’ and ‘child-safe’ sites from this menu.

Easily Block Adult Sites

The toolbar helps block a significant amount of adult-oriented websites. In addition, you may select specific sites to block by clicking this button. Once you have added a website to the ‘blocked sites’ list it is only accessible in Parent-Mode

Parental Alert

When the toolbar is in Child-Mode, this parental alert blocks your child from accessing adult-oriented websites (based on your parental settings).

Add Web Site to Safe List

Clicking this button adds the website you are currently visiting to the ’safe site’ list. Once a website is added to the ’safe site’ list it can be accessed from either Child-Mode or Parent-Mode (regardless of site label).

For parents looking for a cost-effective tool to help give their children controlled freedom on the Internet, Parental Control Bar is a safe way to go.

System requirements: Windows 98/ME/2000/XP, Internet Explorer 5.5+, FireFox 1.5+, Safari 10.4+

Download at: WRAAC.org

For more information on Internet safety issues for parents and /children/teenagers, visit CNET. This site includes information on the following.

  • Developing safe and smart Internet citizens
  • Parents, tech outdo lawmakers on Internet safety
  • Parental controls that keep tabs on young Web surfers
  • User-generated videos challenge parental controls
  • Growing concerns over cyber bullying
  • Readers address online safety for kids

25 Comments

Filed under Browser add-ons, Firefox Add-ons, Freeware, Interconnectivity, Internet Explorer Add-ons, Internet Safety, Internet Safety for Children, Internet Safety Tools, Online Safety, Safari add-ons, Safe Surfing, Software, Windows Tips and Tools

Free A-squared HiJackFree – Detect/Remove Malware

There are plenty of good anti-malware products, but experienced computer users’ realize that to ensure maximum safety, it’s important to have layered defenses in the ongoing fight against malware.

Given the virtual epidemic of malware currently circulating on the Internet, no single anti-malware tool is likely to identify and remove all of the millions of rogue malware that infests the cyber world.

A recent study carried out by PandaLabs of more than 1.5 million users, revealed that 23% of home computers with up-to-date security solution installed were infected by malware. Current data indicates that this situation has not improved

If you are an experienced/advanced computer user and you’re looking for a program to strengthen your anti-malware resources, then HiJackFree is one that’s worth taking a look at. This free application, from EMSI Software, offers a potent layer of additional protection to add to your major anti-malware programs.

The program operates as a detailed system analysis tool that can help you in the detection and removal of Hijackers, Spyware, Adware, Trojans, Worms, and other malware. It doesn’t offer live protection but instead, it examines your system, determines if it’s been infected, and then allows you to eradicate the malware.

Quick facts:

Analyzes the system configuration using live online analysis

Manages all types of Autoruns on your system

Controls all Explorer and Browser plug-ins (BHOs, Toolbars, etc.)

Manages all running Processes and their associated modules

Controls all Services, even those Windows doesn’t display

Allows you to view open ports and the associated listening processes

Allows you to view all DNS entries in the hosts file

Manages installed Layered Service Providers

Multilingual – language packs for English, German, French, Spanish, Italian, Japanese and many more.

This is a worthwhile application to add to your anti-malware toolbox that impressed me with its performance on my test systems.

A-squared HiJackFree is free for private use only.

Last Update: May 12, 2008

Version: 3.1.0.16

System Requirements: Windows 98/Me/2000/XP/2003 Server/Vista

Download at: Download.com

3 Comments

Filed under Anti-Malware Tools, Malware Advisories, Windows Tips and Tools

Free KeyScrambler Personal – Defeat Keyloggers While Surfing

Cyber-crooks are relentless in their pursuit of your money and let’s face it – it’s all about the money. In the worst case scenario, your identity and your financial security can be severely compromised.

Despite the best efforts of AntiSpyware, AntiVirus, and other Internet security products, you still face substantial risks while surfing the Internet. One type of risk/danger that is rarely considered, or discussed, is the Keylogger.

A Keylogger is a form of spyware, which once installed on a computer, can record every keystroke that is made on that computer, and transmit those keystrokes back to a cyber criminal. The function of a Keylogger is to steal passwords, bank account numbers, and other personal information.

A Keylogger in action: The to_my_love.scr (to my love screensaver), is currently circulating on the Internet by way of a personal invitation email. Clicking “yes” when your computer asks whether you want to install this screensaver, installs a Worm/Keylogger on the machine.

This Keylogger is capable of stealing IM passwords, email passwords, bank account numbers, and confidential/financial information. Using IM, email, and other contact information from the now infected computer, the Worm/Keylogger goes on to infect other machines. That’s right, the computers of friends, family, and perhaps even co-workers.

Protect yourself with KeyScrambler Personal: KeyScrambler Personal is a free plug-in for FireFox, Internet Explorer, and Flock web browsers which protects all input you type into the browser from Keyloggers. This free version of KeyScrambler encrypts your keystrokes at the kernel driver level.

When you type on your keyboard, the input travels along a path within the operating system before it arrives at your browser. Keyloggers plant themselves along this path and observe and record your keystrokes. The compromised information is then sent to the cyber criminal who will exploit your passwords, bank account numbers, and other personal information.

By encrypting your keystrokes at the keyboard driver level, deep within the operating system, a Keylogger is beaten since it can only record the encrypted keys which are indecipherable.

Unlike AntiVirus and AntiSpyware programs that depend on recognition to remove Keyloggers that they know about, KeyScrambler will protect you from both known and unknown Keyloggers.

Quick facts:

Protects user input in all parts of the browser against key-loggers.

Protects login credentials, credit card numbers, passwords, search terms and more

Works with IE, FireFox, and Flock: Java, Flash, PDF Forms

Email protection including Yahoo, Hotmail, and Gmail.

No learning curve.

Protects against Keyloggers even on security compromised computers

Requires no effort on your part after installation

In the top 5 FireFox Extensions for security and privacy

System Requirements: Windows 2000, 2003, XP, and Vista (32-bit and 64-bit)

Download at: QFX Software

For full, free, system Keylogger protection checkout Are You Being Tracked? – Get Snoop Free Privacy Shield on this Blog.

4 Comments

Filed under Anti-Keyloggers, Browser add-ons, Encryption, Encryption Software, Firefox Add-ons, Free Security Programs, Freeware, Interconnectivity, Internet Explorer Add-ons, Internet Safety, Internet Safety Tools, Online Safety, Safari add-ons, Safe Surfing, Spyware - Adware Protection, System Security, trojans, Viruses, Windows Tips and Tools

The Myth of the Computer Security Savvy Generation

We continuously hear and read that we, in North America, are computer literate and how wonderfully technically competent this new generation of computer/connected device users is. Sadly, nothing could be further from the truth. This is a myth.

People love myths. It seems that we will buy into any myth provided it agrees with, or reinforces, our already held misconceptions. Myths of course, get their status precisely because they do reinforce our beliefs, properly held or not.

Well, let me be the one to shatter this myth for you. Nothing, and I mean absolutely nothing, could be further from the truth.

We know that anecdotal evidence, while interesting, does not always tell the tale. On the other hand, gather enough anecdotal evidence and one may have enough data to propose a theory, that can withstand probing and prodding.

Since I’m involved in Internet and system security, and write on these issues for both my personal Blogs, and for the website Makeuseof.com, I’m the “go to” guy for my friends, their friends, my neighborhood; the list goes on.

These opportunities to deal with average/typical computer users, as opposed to corporate users, have provided many opportunities to develop anecdotal evidence on the abysmal state of a typical computer users understanding of even minor technical issues but most particularly, computer security.

As a tech/geek, I am in touch with hundreds of other techs/geeks from all over the world on a fairly consistent basis. This contact provides all of us with the opportunity to exchange information on the world of technology. Of course, like most people, we don’t always agree on the relevancy, or the truth, of the information being discussed.

One undisputed reality however, that we all agree on, is the lack of knowledge exhibited by typical computer users, and most importantly, the lack of knowledge concerning the need to secure their machines against the ever increasing risks to their privacy and their financial security on the Internet. Essentially, we’re in agreement that the old expression, slightly modified, covers it “they simple don’t know what they don’t know.”

So anecdotally I can tell you, there’s a major lack of knowledge and skill relating to computers/connected devices, security and technology in general in North America.

The role of a poor quality education, and functional illiteracy, in all of this cannot be underestimated. There is no doubt that functional illiteracy severely limits interaction with information and communication technologies (e.g. using a personal computer working with a word processor, a web browser, a spreadsheet application, or using a mobile phone efficiently).

In the United States it’s estimated that 40-44 million (28-30% of adults) are functionally illiterate, in other words, they cannot read for content. In fact, it’s not uncommon that first year college students are required to take a course in remedial reading.

There was no surprise then in reading that the American Council of Life Insurers reports that 75% of the Fortune 500 companies provide some level of remedial literacy training for their workers. How’s that for literacy in a technology driven world?

The results of this function illiteracy can be seen in the overriding statement from a recent home computer security survey developed by National Cyber Security Alliance, and security firm McAfee: computer users are in need of a “reality check” when it comes to home computer security.

Based on the survey, McAfee and NCSA stated; while 98 percent of computer users agree that having up-to-date security software is important for system security, a significant number of the survey respondents have computers with security software that is incomplete, or dangerously out of date.

The results of this survey are consistent with my own anecdotal evidence, and I am confident that this survey does not overstate the case.

Highlights of the survey:

Ninety-two percent of those surveyed believed their anti-virus software was up to date, but in fact, only 51 percent had updated their anti-virus software within the past week.

Seventy-three percent of those surveyed believed they had a firewall installed and enabled, yet only 64 percent actually did.

Approximately 70 % of PC users believed they had anti-spyware software, but only 55 percent actually had it installed.

25% of survey participants believed they had anti-phishing software, but only 12 percent actually had the software.

Where do you fit in all this?

Computer security, especially while surfing the Internet has to be a priority; it cannot take a back seat to anything. It needs to be first and foremost in computer users’ minds as they interact with the Internet.

Most of us now store a large volume of confidential personal information on our home computers, including information concerning our personal finances, taxes, health, and perhaps personal documentation of other types.

So, it may well be that you need to take the time to survey your computer to insure that all relevant security applications have been installed, are up to date, and are operating correctly.

If you need to update or add additional security applications to your computer, then checkout The Top 10 Security Applications on this Blog for reviews and free security application downloads.

8 Comments

Filed under Freeware, Internet Safety, Living Life, Online Safety, Personal Perspective, Software, Spyware - Adware Protection, System Security, Windows Tips and Tools

Got a New Computer? – Stay Safe – Minimum Security Precautions

So you just got a new PC and, I know, you can hardly wait to put it through its paces; see what it can do, and hopefully just burn up the Internet.

Since you’re reading this, that’s a good indication that you’re aware that there are some fundamental precautions you need to take before you connect to the Internet with your new machine.

I know you’re smart enough to recognize that you should be reading this on your old machine.

Let’s review those fundamental precautions.

Patch your operating system. Download and install all available patches and service packs by connecting to Windows Update. According to Swedish security company Sophos, 50% of unpatched and unprotected systems will be infected with malicious code within 12 minutes of being connected to the Internet.

Install a firewall. Windows XP comes with a basic firewall, and if you are running Windows Vista, it comes with a more robust firewall (Windows Firewall) than XP, as well as anti-spyware utilities (Windows Defender). However, the consensus is; third party applications are usually more effective. Keep in mind that the XP firewall offers only minimal protection.

Choosing a firewall.

There are a number of free firewalls that are worth considering. The following are two that do the job particularly well.

Comodo Firewall Pro

The definitive free firewall, Comodo Firewall protects your system by defeating hackers and restricting unauthorized programs from accessing the Internet. I have been using this application for 14 months and I continue to feel very secure. It resists being forcibly terminated and it works as well, or better, than any firewall I’ve paid for. This is one I highly recommend. Amazing that it’s free!

Download Comodo Firewall Pro

ZoneAlarm

The free version of ZoneAlarm lacks the features of ZoneAlarm Pro’s firewall. Its program control asks you regularly whether to allow programs; for some this can be intrusive and annoying. But it’s been around forever it seems, and it can’t be shut down, or out, by mal-ware.

Download ZoneAlarm

Install anti-virus software.

There is no doubt that an unprotected computer will become infected by viruses and malware within minutes of first being connected to the Internet. There are many free versions of anti-virus software available and the programs that have a well justified reputation are listed below.

avast! 4 Home Edition

This anti virus app is a real fighter, scanning files on demand and on access, including email attachments. Let’s you know when it detects mal-ware through its shield function. An important feature is a boot-time scan option which removes mal-ware that can’t be remove any other way.

Download avast! 4 Home Edition

AVG Anti-Virus Free Edition

Similarly, this program scans files on access, on demand, and on schedule. Scans email; incoming and outgoing. For those on Vista, your in luck, it’s Vista-ready. I have been using this application since its release and it now forms part of my front line defenses. I recommend this one highly.

Download AVG Anti-Virus Free Edition

Install Spyware and Adware Software. It’s not only a virus that can put your computer down for the count, but a multitude of nasties freely floating on the Internet. Listed below are a number of free programs that offer very good protection against malware.

Ad-Aware 2008

Many software reviewers consider Ad-Aware 2008 Free as the best free spyware and adware remover available. It does a relatively good job of protecting against known data-mining, Trojans, dialers, malware, browser hijackers and tracking components. The only downside with the free version is real-time protection is not included.

Download Ad-Aware 2008

WinPatrol

Do you want to get a better understanding of what programs are being added to your computer? Then WinPatrol is the program for you. With WinPatrol, in your system tray, you can monitor system areas that are often changed by malicious programs. You can monitor your startup programs and services, cookies and current tasks. Should you need to, WinPatrol allows you to terminate processes and enable, or disable, startup programs. There are additional features that make WinPatrol a very powerful addition to your security applications.

Download WinPatrol

ThreatFire 3

ThreatFire 3 blocks mal-ware, including zero-day threats, by analyzing program behavior and it does a stellar job. Again, this is one of the security applications that forms part of my front line defenses. I have found it to have high success rate at blocking mal-ware based on analysis of behavior. I highly recommend this one!

Download ThreatFire 3

If you are now on the Internet, and you have not yet taking the precautions as outlined above, you are extremely vulnerable and it is critical that you take the following precautions:

Stop surfing the Web and patch your operating system. Only then download the protective software as noted above, or software that you are familiar with that will do an appropriate job of protecting your computer.

Do not visit any other websites until you have done this!

Additional security precautions:

Establish a password for the administrator account. Only you should have access to the administrator settings on your PC. Unfortunately, XP installs with open access to the administrator’s account. Be sure to change this.

Create a new password protected user account. Using this account for your general day-to-day activities adds another layer of protection to your computer. A user account does not have the same all-access permissions as your administrator account, and in many cases this extra layer of protection will restrict malware from gaining a foothold on your PC.

Good luck and safe surfing.

3 Comments

Filed under Anti-Malware Tools, Free Security Programs, Freeware, Interconnectivity, Internet Safety, Internet Safety Tools, Online Safety, Software, System File Protection, System Security, Windows Tips and Tools

The Best Free Word Processor – AbiWord – Multilingual MS Word Alternative

A friend called me recently and wondered if he could “borrow” my copy of MS Word so that he could update a saved copy of his resume in Microsoft Word format. It seems he no longer had access to Word.

I pointed out to him that he could simple download any one of the many free alternatives to Word that are available for download; most of which “save” and “open” in Word’s .doc format. It surprised me to learn that he was unaware that there are free alternatives to Word, of which, AbiWord is arguably one of the best of these light word processing applications.

AbiWord has been designed to integrate perfectly with the operating system it runs on, and there are many, including Windows, Linux, Mac OS X (PowerPC), ReactOS, and BeOS. This great application has been written to take advantage of the functionality provided by the system it runs on, such as image loading, or printing capabilities.

AbiWord is no slouch when it comes to being able to read and write all industry standard document types, like OpenOffice, Microsoft Word, WordPerfect, Rich Text Format, HTML web pages, and many more.

There’s no learning curve involved with AbiWord since it features a similar looking interface to Word, with it’s basic character formatting, paragraph alignment, spell checker, interactive rulers and tabs, styles, unlimited undo/redo, find and replace, and image support.

AbiWord has a very small resource footprint, which allows full functionality on systems that are not considered “State of the Art”. For those users with underpowered systems (by modern standards), this alternative light word processors should prove to be ideal.

I find AbiWord with its surprising amount of features and simple straightforward interface, to be the appropriate word processor I need running in the background while I’m on the Internet. Its small memory footprint, as opposed to memory hogging Microsoft Word, is ideal for most of my day to day work. In fact, portable AbiWord is my word processor of choice for my portable office on my USB key.

As you can see from the picture below, this article was written on AbiWord.

Features:

Multi Platform

Internationalized

Advanced document layout options

Tables, bullets, lists, images, footnotes, endnotes and styles

Available in most common, and many not-so-common languages

Spell checker

Dictionaries for over 30 languages

Supports right-to-left, left-to-right, and mixed-mode text

The above feature allows support for languages like Hebrew and Arabic

Mail Merge capabilities

Download at: Download.com

4 Comments

Filed under Freeware, Mobile Applications, MS Word Alternatives, Open Source, Portable Applications, Productivity Software, Software, USB, Windows Tips and Tools

Is The Internet Broken? You Decide

Each time that you connect to the Internet you are wandering through a raucous neighborhood which has a reputation for being jam-packed with predators.

These predators are intent on stealing your money and personal information, installing damaging programs on your computer, or misleading you with an online scam.

Cyber-crooks are relentless in their pursuit of your money and “It’s all about the money,” according to Graham Cluley, senior technical consultant at Internet security firm Sophos. In the worst case scenario, your identity and your financial security can be severely compromised.

Looking at estimates provided by a number of Internet security companies, the consensus seems to be that there are over 11,000,000 malware programs currently in the ether. Various Internet security companies report having to deal with as many as 20,000 new versions of malware daily. Here’s the math; one new malware program every four seconds!

Since additional sophisticated threats are being developed, or are currently being deployed, some observers are of the opinion that the Internet is essentially broken. If you think this is an exaggeration, check this out and then you decide.

Tainted search engine results: Internet security gurus have known for some time that we can not rely on Internet search engine output to be untainted and free of potential harmful exposure to malware.

Cyber-crooks continue to be unrelenting in their chase to infect web search results, seeding malicious websites among the top results returned by these engines. When a potential victim visits one of these sites, the chances of downloading malicious code onto the computer by exploiting existing vulnerabilities, is extremely high.

Infected legitimate websites: According to an Internet security industry leader Sophos, over 90 percent of dangerous websites, that is – websites that are distributing Trojan horses and spyware – are legitimate sites that have been hacked through SQL injection.

It was reported recently that over sixteen thousand web pages were infected daily between January and June of this year; three times the rate of infection noted in the previous year. Work out the math, and you’ll find that’s one new infected legitimate website every five seconds!

More disturbing, seventy nine percent of compromised web pages tracked this year were on legitimate web sites; including web sites owned by Fortune 500 companies, government agencies and ironically, security vendors.

Drive-by downloads: Drive-by downloads are not new; they’ve been lurking around for years it seems, but they’ve become much more common and craftier recently.

If you’re unfamiliar with the term, drive-by download, they are essentially programs that automatically download and install on your computer without your knowledge.

This action can occur while visiting an infected web site, opening an infected HTML email, or by clicking on a deceptive popup window. Often, more than one program is downloaded; for example, file sharing with tracking spyware is very common. It’s important to remember that this can take place without warning, or your approval.

Rogue software: Unless you have had the bad experience of installing this type of malicious software, you may not be aware that such a class of software even exists. But it does; and regrettably, it is becoming more widespread. Most rogue software uses social engineering to convince users’ to download this type of malicious software.

A rogue security application is an application, usually found on free download and adult websites, or it can be installed from rogue security software websites, using Trojans or manipulating Internet browser security holes.

After the installation of rogue security software the program launches fake or false malware detection warnings. Rogue security applications, and there seems to be an epidemic of them on the Internet currently, are developed to mislead uninformed computer users’ into downloading and paying for the “full” version of this bogus software, based on the false malware positives generated by the application.

Even if the full program fee is paid, rogue software continues to run as a background process incessantly reporting those fake or false malware detection warnings. Over time, this type of software will essentially destroy the victim’s computer operating system, making the machine unusable.

Some types of rogue security software have the potential to collect private and personal information from an infected machine which could include passwords, credit card details, and other sensitive information.

Email scams: Email scams work because the Cyber-crooks responsible use social engineering as the hook; in other words they exploit our curiosity. The fact is, we are all pretty curious creatures and let’s face it, who doesn’t like surprise emails? I think it’s safe to say, we all love to receive good news emails.

It seems that more and more these days, I get phishing emails in my inboxes all designed to trick me into revealing financial information that can be used to steal my money.

If you’re unfamiliar with phishing, it is defined as the act of tricking unsuspecting Internet users into revealing sensitive or private information. In a phishing attack, the attacker creates a set of circumstances where the potential victims are convinced that they are dealing with an authorized party. It relies for its success on the principle that asking a large number of people for this information, will always deceive at least some of those people.

A personal example of how this works is as follows. According to a recent email (similar in form and content to 20+ I receive each month), my online banking privileges with Bank of America had been blocked due to security concerns. This looked like an official email and the enclosed link made it simple to get this problem solved with just a mouse click. What could be easier than that?

Clicking on the link would have redirected me to a spoof page, comparable to the original site, and I would then have begun the process whereby the scammers would have stripped me of all the confidential information I was willing to provide.

My financial and personal details, had I entered them, would then have been harvested by the cyber-crooks behind this fraudulent scheme who would then have used this information to commit identity and financial theft.

These types of attacks against financial institutions, and consumers, are occurring with such frequency that the IC³ (Internet Crime Complaint Center), has called the situation “alarming”, so you need to be extremely vigilant.

Being involved in computer security, I am amazed and frankly frustrated, at the lack of knowledge exhibited by most typical computer users, and most importantly, the lack of knowledge concerning the need to secure their machines against the ever increasing risks on the Internet.

We now live in the age of the “Interconnectedness of All Things” in which we are beginning to see the development and availability of large numbers of Internet connected devices. There is no doubt that this will lend new strength to computer-aided crime and in this new political environment we now live in, perhaps even terrorists.

This is by no means an exhaustive list of the dangers we are exposed to on the Internet. There are many more technical reasons why the Internet is becoming progressively more dangerous which are outside the scope of this article, but one worth mentioning is the recent discovery that the very backbone of the Internet DNS can be compromised.

The Domain Name System serves as the “phone book” for the Internet by translating human-readable computer hostnames, e.g. http://www.example.com, into IP addresses, e.g. 208.77.188.166, which networking equipment needs to deliver information.

So what do you think? Is the Internet broken and if so, how can it be saved?

Be kind to your friends, relatives, and associates and let them know that all of the above dangers are now epidemic on the Internet. In that way, it raises the level of protection for all of us.

Be aware of the following security risks on the Internet:

Trojan horse programs

Back door and remote administration programs

Denial of service

Being an intermediary for another attack

Unprotected Window shares

Mobile code (Java, JavaScript, and ActiveX)

Cross-site scripting

Email spoofing

Email-borne viruses

Hidden file extensions

Chat clients

Packet sniffing

Review the following actions you can take to protect your Internet connected computer system:

Install an Internet Browser add-on such as WOT (my personal favorite), which provides detailed test results on a site’s safety; protecting you from security threats including spyware, adware, spam, viruses, browser exploits, and online scams.

Don’t open unknown email attachments

Don’t run programs of unknown origin

Disable hidden filename extensions

Keep all applications (including your operating system) patched

Turn off your computer or disconnect from the network when not in use

Disable Java, JavaScript, and ActiveX if possible

Disable scripting features in email programs

Make regular backups of critical data

Make a boot disk in case your computer is damaged or compromised

Turn off file and printer sharing on the computer.

Install a personal firewall on the computer.

Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet.

Ensure the anti-virus software scans all e-mail attachments.

9 Comments

Filed under Firefox Add-ons, Freeware, Interconnectivity, Internet Explorer Add-ons, Internet Safety, internet scams, Online Banking, Online Safety, Rogue Software, Safe Surfing, Search Engines, System Security, trojans, Viruses, Windows Tips and Tools