3:05 pm est
01/31/12 - A-Fast Antivirus is a rogue anti-spyware program that uses
misleading methods to
scare users into thinking that their
computers are infected with malware. This scareware is
through the use of Trojans and various malicious websites such as fake online
scanners. Once installed, A-Fast Antivirus will simulate a system scan and report numerous
infections. Then it will prompt you to pay for a full version of the program to remove the infections
which don't even exist. Furthermore, A-Fast Antivirus will display fake security
alerts and pop-ups
from Windows taskbar stating that your computer
is not protected or under attack from a remote
of those fake security alerts read:
To Continue working in unprotected mode
is very dangerous. Viruses can damage your
data and work on your computer. Click here to protect your computer.
Critical System Warning!
Your system is probably
infected with a version of Trojan-Spy.HTML.Visafraud.a. This may
result in website access passwords being stolen from Internet Explorer, Mozilla Firefox,
Outlook etc. Click Yes to scan and remove threats (recommended).
The rogue program also blocks legitimate anti-malware programs and system tools such as task
manager stating that it's infected. A-Fast Antivirus is a scam. Don't buy this bogus program.
Instead, please use the removal instructions below to remove A-Fast Antivirus from
as soon as possible. You can also use one of the
automatic removal tools listed below to
eradicate his parasite from
your system as soon as possible.
Removal guide for A-Fast Antivirus:
When removing A-Fast Antivirus, reboot your computer into Safe Mode with Networking at first
(Just reboot a machine and before Windows is launched start tapping F8 button.
You will see a
table with this option). Then, login as the same
user you were previously using in the normal
Windows mode, download
Spyware Doctor anti-spyware and save it on your desktop. Make sure
nstall it and update the program before performing a scan. Now you will have to choose
performing full system scan, the program will list and offer to remove all the detected malware.
If the A-Fast Antivirus still blocks legitimate anti-malware programs, please use
of the the
following erials to activate A-Fast Antivirus. Then
you will be able to use an anti-malware program
to emove the
• Changes browser settings
• Shows commercial adverts
• Connects itself
to the internet
• Stays resident in background
2:54 pm est
01/31/12 - HomeSiteUrls.com/Security/ hijacker loads falsified security warnings and offers fake
for deleting the non-existent threats. It provides two options: downloading anti
-spyware, anti-virus and closing the
alert. No matter what is chosen by the user,
HomeSiteUrls.com/Security redirects the browser to a sale page of random,
HomeSiteUrls.com/Security promotes various fraudulent tools: Windows Antivirus 2008, Win
2008, Ultimate Antivirus and some others. The worst thing about
HomeSiteUrls.com/Security hijacker is its persistence.
If it loads the warning message, no
matter what the user clicks, he/she is forced to visit fraudulent security websites.
browser hijacker may also present itself as
HomeSiteUrls.com/Security/vista or HomeSiteUrls.com/Security/xp. Please
use one of the
automatic removal tools listed below to eradicate this parasite from your system as soon as
• Changes browser settings
• Shows commercial adverts
• Connects itself to the internet
• Stays resident in background
2:33 pm est
01/31/12 - Clickbank, also known as FakeMessage, is an adware parasite that continuously
displays fake Windows
error messages. Once the user clicks on such a message, Clickbank
opens a web site that attempts to install suspicious
applications. The threat must be manually
installed. It automatically runs on every Windows startup. Use one of the automatic
tools to eradicate this parasite from your system.
• Connects itself to the internet
• Hides from the user
• Stays resident in background
Protect Your Critical Data (Disaster Recovery in the Cloud)
12:06 am est
01/28/12 - Tape Backup is Dead
The vast majority of businesses rely on tape backup as their sole data protection technology.
has shown me that tape backup is expensive, difficult, slow to recover files From,
and must be administered centrally (onsite). The tape media must be carried Offsite and it is
subject to failure. How do I know this…I was a contract Storage Area Network Administrator
(Backup and Recovery) in a DoD Disaster Recovery Center for over 7 years. We recovered
of Unix and about 60% of Windows platform data (on all affected entities) after Hurricane Katrina.
Tape’s days are numbered—the
limitations, unreliability and expense of these systems is giving
way to the rapid evolution of online backup. The DoD
cost of the contract
we had was $110.00
per Administrator per hour. Most packages for your Business are predetermined and not
scalable to your business. Your locked
in to whatYou probably
do not need. When the budget
cuts came, backup admins were eliminated. Experience has shown me that:
- 15% of all tape backups fail
- 10 – 50% of all subsequent restores from tape
Restoring dat from tape older than 5 years fails 40 – 50% of the time
- 34% of companies never test
a restore from tape
Of the companies that do test a restore from tape, 77% experienced failure
- 7 out of 10 small firms that
experience a major data loss are out of business in one year
- A 10 degree temperature change can reduce the life of
a tape by 10 or more years.Backup Touches
Backup To The Cloud
Unlike many technology services, everyone needs data backup. Your business and consumer
clients may not all need
other services like Exchange hosting (Email hosting), web applications,
and the like. However, every single computer
requires an effective backup solution.
Whether you’ve learned from experience or by hearing of someone else’s misfortune, You know
how important it is to back up your data. Although hardware storage devices (such as portable
hard drives) can create an extra copy of files, they are susceptible to physical damage and can
be easily lost. When your files are backed up using a cloud-based service, you can be sure they
won’t be misplaced or lost in a fire or flood. They are particularly useful for small offices that need
offsite storage for backups.
Cloud services use the Web
to transfer your files to a data center in a different Geographic
location. An Internet connection and a computer are all you need to retrieve Your data. Accounts
are available at a variety of price points, and generally the rates are Tied to how much capacity is
offered by the service. Many will offer a small amount Of space free, however. For example, SOS
Online Backup offers
a 14 day trial and charges $79.95 to buy for 50 - 100GB of data you upload
annually. SOS Online also offers typical online
backup features, such as automatic backup
scheduling and the ability to share files with others.
SOS recently added support for backing up a variety
of mobile and handheld devices, including
iPhones, iPads and Android devices, for an additional monthly fee.
SOS protects the privacy of your data in
triplicate, encrypting your information on your computer,
in transit and when received. You can also add a private password
that no one has access to
except you so your files are 100 percent protected. This feature is called SOS UltraSafe and
restricts the access to your password – even to SOS employees.
The company has 11 Data Centers worldwide that
uses 256-bit AES and 128-bit encryption
methods across a SSL link, providing redundant storage in
multiple physical locations during file
transmission.. With this added protection, your data is safe even if something
happens to one of
the company's servers; your information is still secure and accessible from another SOS server.
SOS provides more than adequate security and surpasses many services with its encryption
To give you
a better idea of how online services work, we’ll show you how to set up an account,Get Started
back up your data, and use
other features available to you in SOS Online.
Download the SOS Online Backup installation file from
-software-download.htm Although SOS Online saves your files to the Web, you control your
preferences And backups from a client you download to your computer.
the program From the SOS Online home page:
For Windows Vista
& 7 users:
the SOS installation file (i.e. SOS V4.x.x.x.exe) to your local drive. (E.g. Desktop)`
click on the SOS installation file, and choose “Run as Administrator”. For XP & other users:
- Save the SOS installation file (i.e. SOS V4.x.x.x.exe) to your
local drive. (E.g. Desktop)
- Double click on the SOS installation file. Note: It is recommended to install SOS Online Backup software client in
the default directory.
When the installation is complete prepare to Run SOS Online Now. Select Finish. The program is
now on your computer.
Once the program
is installed, the setup process will begin. Begin Your Backup How do you know if the software has been
an online backup
- Launch SOS Online Backup from
the launch icon on your desktop and log in.
Once logged-in, select Backup Online.
- Run through the wizard selecting only a couple of small files and run the backup with the option to ‘return to Wizard mode’
selected. - Verify an online backup
- Once the backup completes, go to ‘Advanced’ menu on the top right
side of the user interface
and select ‘Classic View’.- You
will see three tabs, ‘Storage View’, ‘Backup Mode’
and ‘Options’.- Select the ‘Options’
tab, and then ‘Backup History’.
- In the ‘Backup History’ view, you will be able to view the backup
activity to verify
that a backup has taken place.- Launch
an online restore
‘Classic View’ Click on ‘Tools’, and then ‘Run Wizard’.
for the software to collect account data (ie. what has been uploaded to the SOS servers).
- Press ‘Next’ and you should see the file(s)
you have uploaded
you can select what you wish to recover.
through the remainder of the Wizard to recover your selections.
Share a File Share a Folder
If you want to back
up multiple computers (or a hardware storage device, such as a Portable
drive), SOS Online can sync your data so all your files are accounted for And there are no
duplicates. It also supports multiple operating systems (in case you Have a Windows computer
at work and a Mac at home for example.) Note you don’t Have to download the SOS Online
program on each computer you want to sync, but you Will use the same account information. All
you need is your username and password and any
Web enabled device….Windows, Mac,
Facebook, iphone, android…Just enter your current account information
To share a file/folder, you can use MyAccount facility which is available from our websiteAccessing Your Files Online
(https://myaccount.sosonlinebackup.com ). Log in to your account using your username and
password and then select the “Online Recovery” link. There
will be a list of machines from which
you have done your backup so far, drill down to which files/folders you want to
share and then
select the “SHARE/RECOVER” link on the right of the table.
SOS online can not directly back up SQL, Exchange, SAGE, Intrit, QuickBooks & Quicken and
MYOB files if they
Bandwidth is dependent upon the internet speed of the user. Some ISP’s high speed internet is
the actual bandwidth available to the user affecting transfer speeds. A high
speed network of 100mbps may only have a
throughput of 39mbps if the bandwidth is shared
(based on the number of your housemates or neighbors that are online
and their activities).
Security scans use lots of bandwidth which will degrande throughput if they are run during
transfers. Business class networks usually do not experience these problems but they can if the
Systems Admins schedule
scans during backup. Check your ISP’s speed.
need to find a single file or restore all your files to a new computer, You
your collection of backed up data from the SOS Online Web site. From the home page, select
My Login link and then enter your username and password. From here you will be able
the files you have backed up and stored in your SOS
If you need to restore files or folders to your computer, follow the instructions for the data
you want to download to your computer.
SOS Online is one of many cloud based backup solutions.
Be proactive and find a cloud
Based backup solution
that will work for you, because if you wait until you need a
of your files it’s already too late.
Mac OS X Quick Fixes
9:16 am est
Your Mac crashes
01/25/12 - Macs
have a reputation for reliability. They are complicated machines that still
encounter problems. Presented here are a
batch of routine problems that Mac users face and
what you can do about Them.
working on your Mac, when the screen suddenly goes dim, and a message
Appears in several languages. It says, “You need to restart your computer”.
This is a rare
but it is a particularly nasty problem. The immediate solution is to simply follow
The Instructions provided and restart your Mac. Most
likely, this is a transient glitch in the
System that you will not see again.
If the crash occurs with great frequency,
then you have a problem. The cause is the recent
Installation of faulty software. Applications can install items called kernel extensions, which
Add features to the core of
the operating system. Check the Extensions folder for anything
That looks like it came from any software you installed recently. To find the folder,
Go to the folder. Then type ‘System/Library/Extensions’ and press ‘ENTER’. If you
Can identify the culprit, refer
to that application’s developers site for an update or to file a
Bug report. Until you find a resolution, move the kernel extension to the trash
Solution. An alarming occurrence
with the Mac is the ‘Quit Unexpectedly’ message. While
Working with any program on the Mac, if it suffers an error, it can simply die,
any unsaved data along with it.
In the days prior to Mac OS X, such an event
indicated a fundamental instability in the OS,
And experience would quickly teach you to reboot immediately to save further problems.
Thanks to Mac OS X‘s Unix foundation,
applications run in their own protected memory
Space and have little chance of taking out the operating system when they crash. Like Unix,
Life goes on without the need to reboot.
You can file a report to Apple… This feature allows you to send general information about
Your system’s specifications,
along with the ‘stack trace’ (a gibberish of text that only makes
Sense to programmers) of the crash to Apple. The company
then makes that information
Available to the developer, who can determine the cause of the crash and fix it. If you don’t
Mind taking the time, filing
a report can improve the quality of the software you use.
You improperly ejected a drive
when you have a lot going on with your Mac, you will unplug a hard
Drive or pull a USB key out without properly ejecting it. You will get a message
Disk was not ejected properly. Now, earlier versions of Mac OS X take a more stern tone,
Advising you of the risk of damage to the
drive. The latest version of OS X takes a more
Reassuring tone, saying instead that any damage will be automatically repaired when the
Drive is reconnected.
risk of prematurely ejecting a hard drive is interrupting a write operation on that drive.
If you were in the midst of
saving a file while you unplugged the drive, it is likely that the file
Will be corrupted. The operating system also performs various file management tasks
interrupting these tasks could theoretically render the entire file system unusable.
this happens, do not panic… you probably still have a perfectly safe drive on your hands.
Reconnect the drive and check any files you
were attempting to save to the drive. The next
Time, eject the drive properly by holding the ‘CTRL’ key down while clicking the drive icon
And then choosing ‘EJECT”.
You can not play videos with a .AVI extension
video formats the Mac can not play outside of the box. Those videos with an
.AVI file extension are susceptible. AVI (Audio-Video Interleaved)
is a file container format,
which usually contains video encoded with DivX or XviD. The Mac can not play these files.
is an easy and free solution. Visit www.perian.org and download the free Quick Time
Plug-in. This software installs as a System Preference
pane; once in place, your existing Quick
Time Player application can play a broad variety of video formats, including .AVI’s.
The Finder can’t complete the operation because some data in ‘<Filename>’ can’t
Be read or written (Error code-36)
Explanation. During a file, you suddenly run into thei error message… Error 36 is a common
the Mac OS, and a search on Google will yield multiple (possible) causes.
Essentially, the error stems from a problem either reading the file being copied
or writing to
file’s new location.
Solution. To diagnose
the cause of the problem, start with the source file. Is the drive on
Which the file is located still connected and available? You might see this message
suddenly disappears from the network. Confirm as well that the destination drive is
Connected and available. You might also try duplicating
the file (Command-D) to create
A new copy in the same location as the source file, then moving that new version to the
all is well with your file locations, check the source file itself. In many cases, this
Error is triggered by corruption
in the file. Try opening it in the file’s default application and
confirm that everything works properly.
all else fails,you may be dealing with a permissions or hard drive issue. Try opening the
“Disk Utility” application (find
it by navigating to ‘Applications’ and then ‘Utilities’) and,
with the target disk selected, click ‘Repair
Disk Permissions’. While you’re here, you can
also attempt a verification of the drive itself by clicking ‘Confirm Disk’.
There is no default application specified
to open the document <document name>.
You have received a file from a friend via e-mail. It has a generic icon, and
When you double-click it to view the contents,
you receive this error message. The message
Will prompt you to locate the application that can work with this type of file, but in my
Experience, if you are getting this message,
you are unlikely to have such an application on
Solution. In many cases,
there is little you can do, but respond to your friend, asking for
The file in a format that you can open. If you are unsure what applications belong
check an online resource such as FILExt (filext.com), where you can enter the file
Extension of the file and see a definition , as well
as a list of applications known to work
When sharing .ZIP files with PC users, you receive complaints about .DS_Store
If you have ever shared files with Windows using colleagues, you have probably
Exulted in the Mac’s built –in support
for creating and opening .ZIP archives. A simple
‘Right’ click or ‘CTRL’ click on a group of files or a folder will reveal the option (Compress
to create a single compressed file that you can readily email to others.
Windows users might complain if they receive a compressed folder from you, because
Alongside those handy files you’ve sent are
files that you don’t see. They’re called .DS_Store,
And there is one in every folder.
don’t see this file on the Mac because of that period preceding the file name; it’s a
Signal to the Finder that this is a hidden
file (Linux and Unix users will recognize this practice).
The Desktop Services Store keeps track of positioning and other options for a particular
to say, this file has no value once it’s placed on a Windows user’s computer,
And it can be safely deleted.
You may wish to avoid the nuisance caused by seeing these files. There is a way to strip them
From directories before you
create your .ZIP archive.
Open the ‘Terminal’ application via ‘Applications’ and ‘Utilities’.
On the newly opened command line, type the command ‘cd’ followed by the file
Path of the folder you
are archiving. The tilde (~) represents your home directory,
So you don’t need to type that portion of the file path. For example, if
is on the desktop , type ‘cd’ ~/Desktop and press ‘ENTER’.
the following command, where <your_dir> is the name of the directory you
Wish to remove the .DS_Store files from: find
<your _dir> -type f –name
.DS_Store –print0 | xargs -0 rm.
Continuing from our example
above, if you’re working with a file named Photos –type f –name
.DS_Store –print0 | xargs -0 rm and press ‘ENTER’.
This command uses the ‘Find’ utility to do a search through the given folder for files named
.DS_Store. It then forwards
the results of the find to another utility, which deletes the file.
(If this Terminal stuff is too scary, you can use a free little utility by IntraArts
available at www.intrarts.com/software.html). You can now safely zip up the files, and
Your Windows using friends should have little
to complain about.
The Dock acts up
Solution. The Dock is a vital component of the Mac OS X. It serves as both the place to
View your currently
running applications and to store both applications and files for easy
Retrieval. While this tool has its odd points, for the most part, the Dock serves
The Dock actually handles more than it appears. In addition to the strip that sits
on the edge
your display, the Dock also runs the Dashboard, the Mac’s widget system, as well as the
Application Switcher, which activates with
the Command-TAB keyboard shortcut.
These three apparently different systems can
put a lot of burden on a little system utility.
From supposedly running applications in the Dock that aren’t actually open, to a frozen
Application Switcher, problems
sometimes just pop up.
The good news is that a fix is really simple. Open
up the ‘Terminal’ application again and
Issue this single command: ‘killall Dock’. This command force quits
the Dock application,
Which automatically restarts. This usually fixes any problems you may have.
What Android Permissions Mean
2:09 pm est
01/23/12 - Installing Where’s My Droid and Password protecting your system is not The only type
security users should become familiar with. Rogue Wi-Fi networks and cracking as a
result of using one are a growing
phenomena. Crackers will set up a network in a hotspot, such
as the book store, airport, library etc, and wait for nearby
users to log in. Once connected, it’s
possible for the intruders to access everything on your device. The key for the user is to never
use unfamiliar networks; only use those that
request a password, and avoid logging into personal
accounts (Bank, etc) while surfing in a hotspot. Try an app like
Wi-Fi Buddy to map
out what’s out there.
Full Internet Access
Many apps require internet access. But how like is it that
a Soduku app will really need full
internet access to the web? Security sense will help you avoid some rogue apps if
you use a
little common sense.
Video calling apps like Skype (securely) allows you to call
and message any of your friends on
Skype for free from your device wherever you are. There are also search apps (such
search app for Android) that enable instant contact with search results… requiring this
is understandable. However, malicious apps might use this to dial premium-rate
Modify or delete SD card contents
This permission option allows the app to modify data on your
SD memory card. While this can be
malicious in some instances, a lot of apps do require it to function. Some quick background
checks on the app, such as looking at reviews and checking the developer's website can help
you establish whether or
not it is friendly.
Find (GPS) Location Coarse (Network Based) Location
This option effeectively allows the app to track your location,
and is therefore probably more of a
privacy issue rather than a security one. Enabling this is fine when used as part
of a GPS related
app, but otherwise there is not really a legitimate reason for an app to be able to track you.
Read Contact Data, Read Calendar Data
This is fine for social networking apps such as Facebook and
WhatsApp, but otherwise you
should beware. Do you really want to give a game access to your contacts and your calendar?
How To Spot Malicious Apps
With all the information and personal data we can now store
on our phones they are valuable
targets for data theft and cracking and one of the simple ways this can be done is by
such activity within an app. Spotting such apps can be quite easy though. Look out for what the
to use when its open. is your 3G suddenly becoming active when you use an app that
requires neither? These could be early
signs that the app in question is trying to have a peek at
App Store Safety
Only download from trusted sources (Droid Market, Original
Vendor (AVG)). The filtering and
approval process offers users great protection and usually weeds out any apps that cause
to systems. Before You download check out the developers site. If it doesn't look professional,
do not download.
Read The Reviews
Look at the most recent reviews and see what other consumers
Windows 7 Quick Fixes
4:51 pm est
01/22/12 - Microsoft’s Windows 7’s knack for running without problems is a testament to it’s
Even Though it has a good reputation, problems do occur. Solving common
Win7 problems requires Some basic troubleshooting,
but most of these problems have
relatively easy solutions that can Get you back to your regular computing activities
in no time.
The screen is black when you start Win7
Solution. This panic inducing problem is often attributed to minor problems with your graphics
the cable that connects it to the monitor. First, check that your monitor is plugged into
A power socket and that the
monitor cable (either Video Graphics Array (VGA) or Digital Visual
Interface (DVI)) is firmly connected to both the monitor
and your computer’s graphics Port. If the
monitor flickers when moving the cable itself , so try a replacement
cable if you have one.
Another possibility is that your graphics card’s drivers
need to be updated (this is particularly
Likely if you just installed Win7 and are booting into the operating system
for the first time).
Restart your computer and press the ‘F8’ key during the boot process. When the ‘Advanced
Boot Options’ screen appears, use the arrow keys to highlight ‘Enable Low Resolution Video
press ‘Enter’, and wait for Win7 to start. When it does, visit your graphics Card
site and download the latest drivers for your card. Install the drivers And
restart Win7. If your computer has integrated
graphics instead of a discrete graphics Card, use
‘Windows Update’ (click ‘Start’, click ‘All
Programs’, and click ‘Windows Update’) to obtain the
most recent drivers.
2. When upgrading from
Vista, the Win7 installation process stops at 62%
Solution. Win7 can hang at various points during
the installation process for different reasons,
But one problem occurs more often than others. If your installation stops
at precisely 62%, it’s
Likely because a service has stopped responding. To fix the problem, restart your computer
let it roll back to Vista. Once you’re back in Vista, click ‘START’, right click ‘COMPUTER’
click ‘PROPERTIES’, Select ‘Advanced System Settings on the left menu. Choose the
tab, click ‘Environment Variables’, and click the ‘New’ button under ‘System
Next, type ‘MIG_UPGRADE_IGNORE_PLUGINS’ in the
‘Variable Name’ field, type
‘IphlpsvcMigPlugin.dll’ in the ‘Varible Value’ field,
and then click ‘OK’. Click ‘OK’ to close the
‘Environment Variables box, click ‘OK’
to close the ‘System Properties’ box, and then shut
down your computer. Repeat the Win7 upgrade process.
unable to join a homegroup
Solution. Win7 has eased the home networking
process through its use of homegroups, which
Help automate network creation. However, if you’re unable to join
a homegroup on your Network,
first make sure that a homegroup actually exists. If the homegroup was created On another
computer, check to make sure the homegroup has been created on that computer And that it is
turned on. After verifying
that the homegroup does exist, check that you’re Connected to the
network by clicking the Network icon in your
Taskbar. If you’re not, click ‘Start’. Open the
‘Control Panel’, click ‘Network’
and ‘Internet’, and open the ‘Network and Sharing Center’. Click
‘Connect To A Network’
and follow the instructions to connect to your Local network.
If you’re still unable to connect to the homegroup, make
sure your network location is set to
‘Home’ by opening the ‘Network And Sharing Center’, clicking
‘Public Network’ (or ‘Work
Network’), and then clicking ‘Home Network’. You can also
check to see if ‘Network Discovery’
is turned off, which would prevent you from accessing the home network.
In the Left panel of the
‘Network And Sharing Center’, click ‘Change Advanced Sharing Settings’,Click
the ‘Down’ arrow
button to expand the ‘Home Or Work’ profile, and select the ‘Turn On Network
button. Click ‘Save Changes’ when finished.
If you’re still having problems, make sure the required
homegroup-related services are Running.
Click ‘Start’, open the ‘Control Panel’, select ‘System
And Security’, select ‘Administrative
Tools’, and double click ‘Services’ (You may be prompted
for an Admin password here, so make
sure you have it handy before trying this step). Scroll to the ‘Homegroup Provider’
the ‘Name’ column and make sure “Started” appears under the ‘Status’
column. If it doesn’t,
double click the ‘Homegroup Provider’ entry, click the ‘Start’ button,
and click ’OK’. Repeat this
process for the ‘Peer Networking Grouping’ service.
4. Windows is unable to install
Solution. In most cases, the Win7 update process is seamless
as it downloads and installs
Important updates in the background. However, the OS occasionally encounters problems With
the update process and cannot install certain updates. If this happens, try manually Updating by
clicking ‘All Programs’, and clicking ‘Windows Update’. In the left pane, click
For Updates’, and then click ‘Install Updates’ after Windows Finds the important update
it was previously unable to install. Note that some Updates require you to accept
the Microsoft Software License Terms,
so be sure to Accept the terms to ensure a successful
Some updates can require a hefty amount of hard drive capacity,
so Windows might have
Problems if your primary hard drive is running low on space. If you have 500MB or less Of drive
space left, run ‘Disk Cleanup’ in the ‘Search’ box, and press ‘Enter’. Select Your primary
(usually C:) in the dropdown menu and click ‘OK’. Follow the Instructions to delete unnecessary
5. Win7 returns a message
that access is denied when you try to open a file
Solution. If Windows prevents you from opening a file
or folder, check that you have Permission
to open it. ‘Right click’ the file or folder, click ‘Properties’,
choose the ‘Security’ tab, and click
‘Users’ under ‘Group Or User Names’. Under ‘Permissions’,
you’ll see the permissions for
‘Users’ (as opposed to Administrators) for that particular file or folder.
If ‘Read’ and/or ‘Write’ are
not selected under ‘Allow’, you’ll need to log
in with an administrator account to access the file or
folder or have the administrator of that computer change the permissions
for the file or folder. If
you have an admin account, you can choose to change the permissions yourself for your user
account. To do so, choose ‘Users’, click ‘Edit’ on the ‘Security’ tab, click to select
appropriate permissions, and click ‘OK’.
6. Win7 prevents you
from logging in to your computer because your user
account Is locked out.
Solution. If someone tries to log in to your account
too many times when using an Invalid
password, Win7 will lock the account. Assuming you have a separate admin Account
(and it is
highly recommended that you do for security purposes), you can Log in to Windows using that
account and unlock the user account. Click ‘Start’, type
‘lusrmgr.msc’ in the
‘Search’ box, and press ‘Enter’ to launch The ‘Local Users
And Groups’ utility. Click to select
the ‘Users’ entry in the left pane, And double click the locked
account in the right pane. On the
‘General’ tab, click To deselect ‘Account Is Locked Out’, click
‘OK’, close the ‘Local Users And
Group’ utility, and log out of Windows . Log back in using
the user account.
7. Win7 does not start
after being in Sleep Mode
Solution. Microsoft’s latest OS includes a wealth
of power saving options, but they Don’t always
work as designed, especially when the OS is paired with certain
Motherboards. If Win7 refuses
to start after being in Sleep Mode, you can tweak The power options to prevent Win7 from
sleeping. Reboot your computer and Open the ‘Control Panel’, select ‘System And Security’,
‘Power Options’. Next to your selected ‘Power Plan’ (for example, Balanced), click ‘Change
Plan Settings’, select ‘Never’ in the drop down menu beside ‘Put The Computer To Sleep’, and
then click ‘Change Advanced Power Settings’. Click to expand the ‘Sleep’ entry, click to expand
the ‘Allow Hybrid Sleep’ entry, click ‘On’, and change the setting in the drop down menu to ‘Off’.
If you want your computer to go to sleep after a certain period,
this solution will Serve only as a
work around. Because this problem is often related to outdated Motherboard software,
your motherboard manufacturer’s Web site for A BIOS (Basic Input/Output) update.
8. You’re unable
to print from a printer connected to your homegroup
Solution. First, check that the printer is plugged in
and turned on. Next, make Sure that the
person who connected the printer to the homegroup didn’t change The sharing
if the printer is no longer shared, you won’t have Access to it through the homegroup. If the
printer is active and being shared Through the homegroup, try printing directly to the printer from
the computer To
which it is connected. If the printer doesn’t print from the host computer, You’ll
need to troubleshoot
the printer connection instead of the homegroup Issue. If none of these
steps work, try rebooting both the host computer
and Your computer. You can also try leaving
the homegroup and rejoining.
9. You cannot open or
copy files from the Web
Solution. Win7 is serious about security because plenty
of threats exist on the Internet.
Traditionally, Microsoft has been the lowest flying fruit for crackers And cybercriminals.
Win7 security controls are set too strictly, they Can prevent you from accessing files on the
Web. To fix this
problem, click ‘Start’, type ‘Internet Options’ in the ‘Search’ box, and press
Choose the ‘Security’ tab, select the ‘Internet’ zone, and move the slider under
Level For This Zone’ to a lower level. For example, if the slider is set to ‘High’, move it to
High’. Click ‘OK when finished. If you’re still
having problems opening or copying Web
files after changing this Level, move the security slider to a lower level. If
this problem is
occurring Only with a particular site, return to the ‘Security’ tab in the ‘Internet
box and click the ‘Trusted Sites’ zone. Next, click the ‘Sites’ Button
, copy the site’s URL to the
‘Add This Website To The Zone’ field, Click ‘Add’, click ‘Close’,
and click ‘OK’.
10. More Win7 solutions
Solution. Microsoft Fix It ( support.microsoft.com/fixit )
provides a wide range of Automated
wizards that run diagnostics on your computer to find and solve issues. So if your
system slow down, they have helpful wizards available.
Win 7 Total Security 2012
4:26 pm est
01/22/12 - Win 7 Total Security 2012 is a fake antivirus parasite
that belongs to the fakerean
malware family. The parasite changes names according to the Windows Operating System
(OS) version (it is targeting), thus the same parasite might have Vista or XP instead of Win 7 in
name. The parasite
infects a user system through infected websites, fake shareware or cracked
downloads or by various system vulnerabilities.
Once the system is infected, Win 7 Total
Security 2012 fake antivirus will cause havoc on the system.
Initially, this rogue will display alerts that your system is severely infected.
It will suggest you run
a scan, during which Win 7 Total Security 2012 will display multiple infections that can not
fixed without the user purchasing updates through this rogue. However, all the detection this
are fake. The files are either not infected or harmless. You should remove Win 7
Total Security 2012 because it
prevents your PC from performing normal operations.
7 Total security 2012 will try to block your legitimate programs from launching. There are
couple ways how to launch
1. From another user account on Windows 7
2. Launching as administrator by right-clicking
on executable and choosing from menu
3. Renaming the executable
to something else, like iexplore.exe so Win 7 Total Security 2012
will not block it.
4. Launching anti-malware programs from safe mode with networking.
5. Stopping Win 7 Total Security 2012 processes with task manager or other
6. Using codes like 3425-814615-3990
or 9443-077673-5028 to disable malware.
This will allow running legitimate anti-malware programs and completely clean your PC
from Win 7 Total
You can also use one of the automatic removal tools below to eradicate this parasite.
You Need Security Suites, Encryption and a Better Password
7:00 am est
01/19/12 - An unscrupulous Storage Facility in Ohio stole my life in 2008 (claiming I had not paid
fees) I was in NC at the time. (They even have TV programs now which glorify this
unregulated form of piracy.) Family
photo albums, my daughter's doll colection, my son's
baseball (football, basketball) card collection, his Hot Wheel car
collection, my wife's Wedding
Dress, Ball Gowns, shoes and purses, love letters and my military awards, uniforms, medals,
memorabilia, papers (it's legalized home invasion)... My children were both on active duty in the
was not a good time to be an American (Support The Troops). I served these
people for 21 years. The Attourney General
of Ohio advised me to get a Lawyer. I was betrayed!
This is the danger we face in our digital life (Invasion). Protect
A 2010 report released from McAfee estimates that cybercriminals
stole $1 trillion from users and
companies via the internet in 2008. Examples of major security breaches are numerous.
Albert Gonzalez, ringleader of 'Operation Get Rich or Die Tryin' group of crackers
the Security of computer systems that TJX and Heartland Payment Systems operated in 2007
stole credit and debit card numbers to the tune of $200 million dollars got 20 years in
prison. He stole credit card
numbers and cash from ATM's. Gonzalez's prison sentence is the
longest stint a cracker has received in U.S. history and
covers three seperate convictions.
In 2011, hackers caused mayhem at banks, online gaming
networks, universities and healthcare
insurers, stealing the personal data of millions of customers. Sometimes the hacks
politically motivated. More often, cybercriminals were after data that could be used in phishing
scams or credit-card fraud.
Armed with viruses, Trojans and worms, crackers penetrated
the defenses of Citigroup and
brought down Sony's PlayStation Network. And while money remained the number one motive,
ideology drove extremists to raise havoc with San Francisco's subway system.
The Ponemon Institute calculates the average time for
a corporation to restore its reputation
following a headline-grabbing security breach is one year, with the loss to the
value of its brand
ranging from $184 million to $330 million. So lockdown those computers and keep a close eye
network traffic, as hackers are unlikely to be less determined in 2012.
In August, the Internet activist group Anonymous attacked
the web site of San Francisco's
subway system, spilling on the web the contact information of hundreds of the site's
The hack drew national attention because Anonymous was
retaliating against BART shutting
down cell phone service during protest against police shootings. Critics accused the
violating free speech, while BART officials claimed it was necessary to prevent protesters from
police locations. The data stolen from the BART database included names,
addresses, phone numbers and e-mail accounts.
Anonymous also inserted its own logo on the
agency's web site. BART officials said the web site was separate from the
that run the subway. Those systems were not affected.
In May, Health Net reported a security breach that compromised
the personal information of more
than 2.7 million current and past policy holders. The problem was reported two months
which manages the insurer's IT systems, told the company nine server drivers were missing from
At the time, the medical information breach was the third
largest in the Privacy Rights
Clearinghouse database, which tracks breaches across the nation. The incident was the second
time since May 2009 the Woodland Hills, Calif.-based company could not account for customer
medical and financial information.
In the prior case, a portable disk drive with medical and
financial data on 1.5 million customers went missing.
The University of Wisconsin, Milwaukee, reported in August
that a computer virus may have
exposed the names and social security numbers of 75,000 students and staff. The university's
staff discovered the malware in May. University officials said the virus was most likely planted in
to steal research documents, not personal information that could be used in identity
scams. The infected server ran software
for managing confidential information for several
departments. The system was shut down immediately after the discovery
and local and federal
police were called. The university says it has put additional security measures in place as a
result of the hack.
As if being unemployed wasn't bad enough, up to 210,000
Massachusetts jobless also had to
contend with having their personal data exposed. The state's Executive Office of Labor
Workforce Development reported in May that a virus had been discovered in the department's
names, addresses and social security numbers to thieves. State officials
acknowledged that although the virus was discovered
shortly after it entered the department's
computer systems, engineers failed to completely eradicate the malware. The
data breach also
affected about 1,200 Massachusetts employers who filed quarterly reports using the agency's
The virus infected 1,500 computers in the agency's unemployment office.
In September, Vacationland Vendors, a Wisconsin Dells,
Wis.-based supplier of arcade
equipment and vending machines, reported that a hacker stole credit and debit card numbers
from card-processing systems. The Privacy Rights Clearinghouse said 40,000 people were
affected by the break-in. Vacationland
said the hacker had gained access to credit and debit
card transactions from Dec. 12, 2008, to May 25, 2011, at Wilderness
Resorts in Wisconsin and
Tennessee. The intrusion occurred through Vacationland's point-of-sale systems.
The theft was not an inside job, according to Vacationland,
which hired an outside consultant to
help prevent future hacks. Vacationland apologized for the security breach and advised
affected by the hack to notify card issuers and call a major credit agency, such as Equifax,
TransUnion, to have a fraud alert placed on their files.
In July, Kiplinger Washington Editors reported that a
hacker had stolen the user names,
passwords and encrypted credit card numbers of as many as 142,000 subscribers of the
publishers various newsletters, including the Kiplinger Letter. The company acknowledged a two
-week delay in notifying
customers, saying that it took that long to determine the extent of the
damage. The Washington, D.C.-based company said
at the time that it wasn't sure whether
other data was stolen. While the credit-card numbers were encrypted, Kiplinger
protection wasn't foolproof and recommended subscribers request new cards. The company
risk of identity theft was small because of the type of data available to the criminal.
In June, a cyber-attack that compromised the personal
information of 1.3 million subscribers of
Sega's online gaming network forced the Japanese video-game maker to shut down
Thieves stole names, birth dates, e-mail addresses and encrypted passwords before the
was detected. No credit card numbers or other payment data were stolen, according to
Sega. The company said
it was "deeply sorry" for failing to prevent the breach of its Sega Pass
network and promised to
strengthen security. Because video-game companies hold a large
amount of financial and personal data from
customers, they have become a prime target for
hackers, experts say.
Citigroup was one of several high-profile companies that
failed to turn back a cyber-attack in
2011. The bank reported in June that 1 percent, or 210,000, of its 21 million card
their personal data compromised by hackers. The stolen information included names, account
e-mail addresses. The banks said other identifying information, such
as birth dates
and social security numbers, was untouched. While the data stolen was limited, security
said it was enough to be used in phishing attacks and other social-engineering schemes.
Citigroup did not release details
on how the breach occurred. The attack brought increased
scrutiny from the FDIC and other federal regulators who were
considering a systemic overhaul of
the banking industry's security and data protection systems.
In May, Fidelity National Information Services reported
that profits had taken a hit from a $13
million loss due to "unauthorized activities." While the prepaid debit
card processor provided few
details, media reports said a group of criminals had hacked the company's network and gained
access to its central database where card balances are kept.
The criminals then obtained 22 legitimate prepaid cards,
and made copies that were shipped to
conspirators in Greece, Russia, Spain, Sweden, Ukraine and the United Kingdom. Having
penetrated Jacksonville, Fla.-based, Fidelity's systems, the crooks were able to increase the
balances of the cards,
making it possible for their partners to withdraw cash from dozens of
ATMs during a 24-hour period. No arrests have been
made in the sophisticated heist.
Sony had the dishonor this year of topping CRN's list
of Biggest Security Stories Of 2011, as well
as the list of top security breaches. In April, a massive cyber-attack on
the entertainment Sony's
PlayStation Network and Qriocity services led to the compromise of 77 million user accounts.
hacking the Japanese company's database, thieves made off with scads of personally identifying
including date of birth, e-mail and home addresses and login credentials.
While credit-card data appeared to be safe at first,
the company later acknowledged that 12
million credit card numbers were unencrypted and could easily be read. After restoring
services, Sony had to take down the PlayStation Network in May, because of a snafu in the
password reset system
that hackers had started to exploit. Sony expected the breach to lower
operating profit by $178 million. Dozens of class-action
lawsuits were filed against the company.
In January 2012 Zappos' website was hacked, compromising
the personal information
of millions of customers.
Zappos.com has taken pains to assure customers that their credit card information is safe after a
which was reported over the weekend, compromised information of up to 24 million
customers, including names, mailing
and billing addresses, phone numbers, truncated credit
card numbers and “cryptographically scrambled” passwords.
Consumers shouldn’t be
complacent when it comes to how their online data is encrypted, stored and sometimes left
vulnerable. Crackers could do plenty of damage with the information they did grab.
“Some of these details are what constitutes authentication
at a call center or website. This
means a crook with access to, say, a person’s mailing address might be able to
go online and
pretend to be that person — and then possibly find out their credit card information or other
Zappos sent customers an email over the weekend instructing
them to change their passwords to
try and prevent further compromising of their personal information. The retailer, which
by Amazon, also recommended that customers change their passwords if they used their
Zappos password on
It appears that the hack might have been the work of
“malicious code” that infected one or more
servers, as opposed to an all-out attack on the retailer’s
main site. But the bad news, is that
reading between the lines
leads him to suspect customers’ passwords could be exposed. “You
look for certain words,” how the company
described the exposed information. In communication
with customers, Zappos didn’t say that the compromised passwords
were encrypted, only
“cryptographically scrambled,” a virtually meaningless term that could indicate crackers
able to easily figure out the actual passwords.
In an increasingly sophisticated criminal marketplace,
crackers will keep files on victims,
accruing pieces of information a little bit at a time until they have a profile
they can use to open
fraudulent accounts. “The thing people need to understand is the crime of identity theft isn’t
about credit card data.
The most important step consumers can take is to use
a variety of passwords for their online
shopping. Reusing the same passwords for multiple accounts heightens your chances
your identity stolen. Another important, although easy, step is to create separate email accounts
your online retail activity and online financial services communication. That way, even if
crackers gets into a retailer
site, they won’t be able to trace that identity to your bank account
or credit card.
This is the continuance of a very powerful Industry:
- Cyber crime is the fastest growing crime today according to the Federal Trade
- Cyber crime cost $67 billion dollars in 2009.
- Over 90% of all companies
experience data breach in one form or another.
- Cyber thieves attack individuals, corporations
and institutions, no one is safe.
- Social networking sites have become fertile
playground for crackers and cyber
- More than 11 million
Americans were victims of identity theft last year.
- In the UK one cyber crime
is committed every 10 seconds.
- Protect your client?s electronic information,
it?s the law.
- Sensitive laptops stolen from Fla. [a health insurance provider]
200,000. Feb 2010.
- Payroll processing firm Ceridian
Corp. hacked ? Feb 2010.
- Crackers access Iowa Racing and Gaming Commission database
? Feb 2010.
- Laptop containing UCSF medical school patient information stolen ?
- Thief steals 57 hard drives from BlueCross BlueShield
of Tennessee ? January
- Financial services firm notifies 1.2
million of data breach ? January 2010.
- An external drive containing the
sensitive data of thousands of patients was
stolen from an employee of health insurance provider Kaiser Permanent
- A cracker recently accessed a computer server hosting
the online banking system
of Long Island, N.Y.-based Suffolk County National Bank (SCNB), putting thousands
of customer's login information at risk. ?January 2010.
- A cracker
accessed the computer network of Eastern Washington University in
Cheney, Wash., placing sensitive student information
at risk like Social Security
numbers and birth dates for 130,000.
- Protecting Customers? Personal Information Is Not An Option, But Legal Obligation.
- Study Puts Identity Theft Cost at $54B in 2009.
- In December 2009, a cracker used a SQL (Structured
Query Language) Injection flaw
to break into a database the Rock You (www.rockyou.com), a maker of social
networking applications, used to store
user account information (in plain text
no less), including email addresses and passwords for 32 million users.
32 million passwords, less than 1% of the passwords users created when creating
were considered strong. The most popular password was 123456. Most
users also used identical or similar passwords
for all of their digital accounts.
- Days after the iPad debuted in 2009, a Group called Goate Security used a
security flaw in AT&T's
Web Site to expose about 114,000 email addresses of new
iPad users...including celebrities, media and technology
figures, and military
and elected officials who signed up for AT&T wireless 3G service. They exploited
the 'login' process.
- FBI arrested 100 peolple in October 2009 in the United States and Egypt accused
of scamming bank account numbers and other personal information from users as
part of "Operation
Phish Phry" with $1.5 million in stolen funds to fake
accounts. 33 U.S. residents were charged with wire,
bank, computer fraud,
identity theft and international money laundering.
- Research firm Javelin
estimates that more than 11 million Americans were victims
of identity theft last year, a 12 percent increase
that led to tens of billions
of dollars in costs.
Theft Is No. 1 Consumer Complaint ? according to the Federal Trade
- Medical Identity Theft Could Mean Life or Death to Its Victims -
HealthNewsDigest.com. The survey also
stated that 50 percent of large hospitals
experienced at least one data breach in 2009.
- Shell has been hit by a massive data breach - the contact database for 176,000
staff and contractors
at the firm has been copied and forwarded to lobbyists and
activists opposed to the company. Feb 16, 2010.
- Firewalls are not enough?..According to Richard Kirk,
UK Director for Fortify
Software because a firewall provides a gateway for users to explore the outside
world, it becomes the very doorway by which hackers gain entry.
- Crackers broke into computer systems at Wyndham Hotels & Resorts recently,
stealing sensitive customer
- Medical identity
theft is a rising problem in Nevada, and, once a thief gets
enough information they can pretend to be you and
get services in your name,
even medical care.
- Data security company Imperva warns that hackers have transformed and automated
their attacks to make
them more efficient and boost the profitability of their
- Imperva, the data security leader, today released a new report warning that
crackers have become industrialized
and represent an exponentially increased
threat to individuals, organizations and Government.
- Symantec's 2010 Enterprise Security study found that 75% of organizations
globally experienced cyber
attacks in the past 12 months.
- Symantec says 42% of organizations now rate security as their top concern, more
than natural disasters,
terrorism and traditional crime combined.
- Identity crime is on the rise as criminals become cyber savvy and fish around on
social networking sites
for personal information, experts say.
- Lockheed Martin plans to find new methods to predict and prevent wide-scale
cyber attacks carried out
to compromise classified information and passwords.
- HSBC was fined £3m by the Financial Services Authority for failing to properly
look after its customers'
information and private data, as such breaches led to
at least two losses of customer data.
- Crackers made off with at least 285 million electronic records in 2008. - A new
study by Verizon Communications
- Crackers broke into
computer systems at Wyndham Hotels & Resorts recently,
stealing sensitive customer data in 2009 and 2010.
500,000 members of BlueCross and BlueShield of Tennessee affected by data breach.
- FBI finds 90% of firms hit by Cybercrime.
- Cybercriminals still consider hotels easy targets for credit card info.
***Protect Yourself with one of the automated security suites listed below.
Ace Club Casino
6:56 am est
- Ace Club Casino is a new one Casino software using iGlobalMedia software.
From the Ace Club Casino developer:
The Company is committed to protecting your personal information and respecting your privacy
in accordance with
best business practices. By disclosing your personal information to
Company, you consent to the collection, storage,
transfer and processing of your personal
information for the purpose of completing your Account related transactions
and for Company's
internal administration and analysis. Further, to provide you with better service, Company will
inform you of changes,
new services and promotions that Company determines you may find
interesting. Moreover, Company has the right to access
and disclose your information as
necessary to properly operate Company systems, protect Company and other end users,
comply with any regulatory or governmental requests. Because of the complex and constantly
of our technology and business, Company does not guarantee error-free
performance regarding the privacy of your personally
identifiable information and Company shall
not be liable for any incidental, consequential or punitive damages relating
to the use or release
thereof. By accepting any prize and/or winnings from Company, you consent to the use of your
name and/or likeness for advertising and promotional purposes without additional compensation
except where prohibited
Ace Club Casino properties:
• Shows commercial adverts
To eradicate this parasite from your system, use one of the automated security suites below.
Access Your PC From Anywhere
10:43 am est
GoToMyPC, you have the freedom to:
• Work on your Mac or PC from home — in real
• Travel anywhere and use your computer remotely
• Access your files, programs, email and network
• Go mobile using a free GoToMyPC app, It’s easy to enjoy
the convenience of secure access
to your computer from any browser – or one of our mobile apps.
Whether you're across the room or across the globe, there are
various methods of remotely
accessing your box. If you know how to use a web browser, then you already have the know-how
to log into your, say, office PC from anywhere.
You may not already know this, but before the creation of remote
desktop applications that make
this sort of thing a piece of cake, users were already remotely logging into their boxes
One way of doing this is via FTP, which is an acronym for
File Transfer Protocol. Put simply,
you'd install an FTP server on the computer you'd wish to log into and ensure that
port, usually port 21, is open so that you can access it remotely. Once your FTP server is up and
on the host computer, you'd install and run an FTP client from a PC in a remote location,
10 feet way or 100 miles away,
for example. The FTP client communicates with the FTP server,
effectively letting you log into a directory structure
where you can transfer files to and fro. FTP is
not incredibly intuitive to use, but it's one of the first examples of
remotely accessing your
Another more arcane example is called telnet. The process is
basically the same as FTP: a
telnet server runs on the host computer while you'd log into it via a telnet client. Telnet
less intuitive than FTP since it's all text-based, so if you're not used to command-line tools, as
*NIX users are, you may dislike telnet from the get-go if you're a Windows user.
Nowadays, it's recommended that you
use the more secure SSH--secure shell--as it's less
prone to exploits than telnet and much safer to use from a security
As technology inevitably marches on and improves upon itself
evermore increasingly, the web
browser is becoming more and more the mother application to run all children applications
from, so to speak. Desktop apps are being elbowed aside to make room for more convenient,
web-based apps that execute
inside your favorite browser fluidly and without a hitch, as web
browsers are becoming more powerful and more intelligent
as processing power gets cheaper
and new coding techniques, not to mention standards, dictate the norm.
GoToMyPC is the number one remote PC program on the market and it works on Mac;s
PC's. It comes with a free 30 day trial and it is touted as a way to access your home or
from anywhere you please. You're not simply limited to a text-based shell
interface or a crude representation of a designated
file structure from a remote location, but
you're given the full power to access all of your precious files and all your
graphically. Distantly log in from your home PC into your work PC and grab your e-mails,
and applications. As long as your remote PC is internet-capable and has a web
browser installed, then you can access
your distant PC that's running GoToMyPC. Of course,
the issue of security and exploits pop up when anyone talks about
opening up an Internet
gateway into your PC; for peace of mind, GoToMyPC uses 128-bit AES encryption, so you can
relatively secure using this remote desktop solution.
beauty of GoToMyPC is that it installs over the web through a simple and sound process.
need to install or download any bloated applets to communicate with your host PC;
you can use any web browser to do this
task! A lot of desktop solutions have issues running
behind a firewall or proxy server, but GoToMyPC doesn't have any
problem running behind
most security software. One feature that comes in handy is the ability to allow guest access to
your remote PC, allowing you to set time limits for which guest access should expire for an
extra layer of security.
Transferring files and printing from a remote location has not been this
easy, so if you're in the market for a remote
desktop app, give GoToMyPC a test drive.
Removing a Trojan
9:13 am est
01/12/12 - If your computer
has a virus its security software can't detect of remove, it's time to
roll up your sleeves and go after the bug yourself.
Each month, we show you how to root out
deeply entenched viruses.
Trojan-Spy.Win32.Zbot.gen is that nasty piece of malware every computer user
Although often classified as a Trojan, Trojan-Spy.Win32.Zbot.gen has
been known to use backdoor security exploits to
sneak its way onto a system.
Once there, Trojan-Spy.Win32.Zbot.gen sits in the background, recording key-
and, according to some, taking screenshots of your PC. Captured data
can include such sensitive information as credit
card data, username and pass-
word combinations, and other highly sensitive information of a personal or
Is It On
Trojan-Spy.Win32.Zbot.gen is designed to run in the background
and be as
unobtrusive as possible. As a result, symptoms can be extremely hard to spot.
Obviously, if you're having
problems with identity theft, you should thoroughly
scan your system. If you have a lot of malware on your PC, this malware
well be on your scanner's list of found problems.
You should begin by searching for and removing the files created by
Trojan-Spy.Win32.Zbot.gen. Some of the resident
files may not appear on the
The first file you must locate is '1053.exe'
Go to the 'Start' menu and click 'Search'
Click 'All Files and Folders'
on the left side of the 'Search Results' window
or Part of the Filename' type '1053.exe'
arrow next to the 'More Advanced Options'
Make sure there is a check next to 'Search System Folders' and Search
Hidden Files and Folders.
Click the 'Search' button to begin the search.
Windows Vista and Windows 7
Type '1053.exe' in the 'Search Programs and Files' field in the 'Start' menu
and press 'Enter'.
*If you don't receive initial results, click the Computer button under 'Search
you're using WinXP, Vista or Win7, if you rerceive any results,
'Right-Click' the result and select 'Delete' while pressing
the 'SHIFT' key to
permanently delete the file and skip the 'Recycle Bin'.
Repeat the steps for each of the following files:
additional files are located in the Windows System folder. The exact location
of this folder depends on the version of
Windows you're running, but you can use
a variable consistent across all versions of Windows to quickly point you in
Open 'My Computer'
In the Address bar, type %SYSTEM% and press 'ENTER'.
and remove the following files:
To remove the last file, click the Drivers folder in your Windows System folder.
Search for and delete:
Now you must remove a few Registry entries. In the left side
of the Registry Editor
Right click the Network value on the right side of the Registry
Editor and select
'Delete'. Next select the 'Winlogon=%System% subfolder and remove:
You have now eradicated this parasite from your system. This is just one trojan out
of the multitude that are
floating around the net (each with its own character-
istics). You can attack them (one by one) or you can eliminate
a trojan fast with
one of the automated removal tools listed below.
2:14 pm est
01/07/11 - Most Web links are harmless. but some of them are designed to pose as normal
links to lure you
into dangerous territory. This makes it difficult to predict whether your friend's
email links to the cute web video
that's promised or to a malicious web site. To avoid becoming a
victim of a malicious link, some have turned to programs
that inspect web sites and assign them
Don't Fall Victim
According to the IBM X-Force
2011 Trend and Risk Report, malicious links grew by 345% in 2011
from the previous year, which means cybercriminals have
found a profitable business model. For
example, phishing schemes (http://www.phishtrackers.com) found in messages include a link
that is similar to a legitimate company's
URL (uniform resource locator) to track victims into
going to a malicious Web site. Once at the malicious web site (which
often looks much like the
company's site), victims share information , such as usernames and passwords. Cybercriminals
are also able to download malware onto your computer if you click a bad link.
These links appear in all types of messaging, including email, chat and social networking.
Programs such as McAfee's Site Advisor Plus (www.mcafee.com) can help thwart these
criminals through both Web site safety ratings
and anti-phishing features. When you get an
email from what seems to be a legitimate source (such as your bank or your
company), SiteAdvisor Plus lets you know whether the attached link will really take you to the
site. SiteAdvisor Plus can also block connections to sites and downloads it deems
unsafe. That's particularly useful
when you plan to give personal information to the site you are
Know Before You Go
The Web safety ratings from SiteAdvisor Plus lets you see whether a Web site has
any risks before you click it.
When your seach query nets results on popular
search engines, SiteAdvisor Plus adds an icon next to each of the results
signals whether the site could be harmful.
If you get a green circle with a check mark in the middle, the Web site has been
verified and is safe. The yellow
icon with an exclamation point indicates you
should proceed to the Web site with cauion. A red circle with an X means
Web site is known to be malicious. The same icons are used for links that show
up in emails, instant messenger
messages, and social networking messages. When
SiteAdvisor labels a Wev site, you can move the mouse cursor over the
top of the
icon to find out more about the threats associated with that site.
SiteAdvisor Plus also adds a button to your browser's address bar to rate the
URL's you enter. The button's colot
code is simple: Green indicates a safe,
legitimate site, yellow, cauions that the site may (or may not be) be legitimate:
and red denotes it is a malicious site.
The Web has created new and easy ways
to do everyday things, such as gather
information, shop and bank. However, it is important to make sure you're doing
these things safely and protection yourself from fraud or malware. You can best
protect yourself with Web safety programs
that guide you toward safe sites and
help you steer clear of the malicious ones.
Windows, Linux and Mac OS Password Protection
5:53 pm est
01/06/12 - Let Password Dragon do your heavy lifting
Most people now have a slew of passwords they must remember
online-banking, social networking, and many sites and services. Some people
have dozens or even hundreds
of online accounts.
In these cases I have seen users applying the same password
accounts (give or take a digit or two). That makes it easy to remember but
it's very insecure. A cybercriminal
can crack one website with weak security
to get your password and unlock your entire digital life.
On the other hand, if you use a different password on each
you sign up for a new service or membership, you have a very slim chance at
remembering very many
There are a few tricks to get around the problem of remembering
but you can use a password manager such as Password Dragon (freeware
www.passworddragon.com) to do the remembering for you.
You can download Password Dragon for free. During the installation
be prompted to create a Master Password. Choose this password wisely because
it will be the key to all
of your personal data. It must be both very strong
(with a variety of letters, numbers and symbols) and also memorable,
you forget. Do not write it down as all of the information you enter into
Password Dragon is protected by this
Once the program is installed, it can be launched from a usb
Password Dragon is a free, easy and secure password
manager that works on Windows,
Mac and Linux. View the screenshot.
First of all it’s free. No strings attached. Password
Manager does not contain
any spyware or ad-ware.
The application is very intuitive, user friendly and easy to use. Password
Management has never been so secure and
Files are encrypted with BlowfishJ
algorithm. Remember only the master password.
Works on Windows, Mac and Unix as this is written in Java. Can be launched
directly from USB thumb drive.
Organize all your userid, password, url and notes information in one file
Store additional information using the 10 additional customizable attributes
Data files are encrypted with BlowfishJ algorithm
Command line extension. Ability to view records from the command line without
Available in Multi Language.
Built-in random flexible password generator
Copy UserId and password to clipboard
Password Strength indicator
files are automatically backed up.
Inactive timeout. i.e Lock the aplication if not used for x minutes
File Locking Facility
Launch URL from the application
Either Choose browser for URL launch or use system default browser.
Records can be grouped using user defined categories. Very flexible category
Import records from text file
all/selected records to text,HTML and XML file
Search records on all/specific columns
Record sorting based on column names.
Password can be masked in the main table and in the record view.
Ability to specify the startup sort order and startup category
Ability to choose the look and feel. (Kunststoff Look and Feel is the default.)
FREE: First of all it’s free. Password Manager is a freeware.
EASY: The application is very intutive, user friendly and easy to use.
SECURE: Files are encrypted
with BlowfishJ algorithm. Remember only the master
Works on Windows, Mac and Unix as this is written in Java. Can
be launched directly from USB
Store all your userid, password, url, notes, custom attributes etc. in an
Must be launched
from a usb drive
Nice program. Simple and platform-independent. I have it on my USB-Stick
Encrypt Important Data
10:39 am est
01/06/12 - Protect Your Files
Medical records, tax documents and other files with personal information are often stored on
computers. If you don't encrypt files that include personal information, you risk making
yourself an easy target for
cybercriminals. Encrypted folders, which are referred to as vaults, can
lock down your information, so it's unavailable
to anyone without your password.
Encrypt-Stick is the most advanced
portable security application available on the market today.
Encrypt-Stick software converts your USB flash drive into
a personal vault and the key to
access and secure your private files. Encrypt-Stick requires a serial numbered
USB flash drive
to run. It gives you the ability to create unlimited invisible encrypted vaults on an unlimited
of computers, removable hard drives or networked drives. If a vault is burned to a
DVD/CD you can securely access it
using the original USB used to create the vault. Encrypt
-Stick provides you with the highest level of protection from
identity theft, hackers, phishers and
will never leave a footprint on the host computer.
With a USB drive in your pocket you can carry around personal
notes, in-process documents
from work, or even top secret military communications. But a hole in that pocket
become a major security leak. Encrypt Stick 5.0 ($39.99 direct) equips any USB drive with a
encrypted vault for safe data transport. It can also serve as the key for any number of
local vaults on home or work
PCs, and it has a secure browser and password manager built in.
Note - Once you've activated your software on a particular USB drive you
can't move it to another
drive. Before you install Encrypt Stick, you'll want to select a high- quality USB drive
much storage capacity as you anticipate you'll ever need. Conveniently, you can install the Mac
and Windows versions of the software on the same USB drive and access your protected files
from either platform.
Once you've downloaded Encrpt Stick (or using an installation CD/DVD)
your ready to create an encrypted vault.
Creating An Encrypted Vault
The setup wizard walks you through the steps necessary to install and activate Encrypt Stick on
drive. During this process you'll create a strong master password, something that
you'll remember but that nobody
would guess. The password-entry box has a built-in password
strength meter to help you make a good choice.
Your home system probably doesn't have a malicious keylogger
running, but if you're worried you
can enter that strong password using Encrypt Stick's virtual keyboard. For added
against monitoring software the virtual keyboard scrambles the location of the characters.
Encrypt Stick uses your password, along with device-specific
information, to generate a unique
512-bit (polymorphic) encryption key. That means your files are protected by
authentication: something you have (the USB key), and something you know (the password).
access to protected data requires both.
The wizard includes a recommended optional step that makes
a local backup of the decryption
key. That way if you lose the USB drive containing Encrypt Stick, you can still recover
files stored on your computer. Files on the lost drive itself are gone, of course, but at least
else will be able to read them.
Vaults for File Protection
On initialization, Encrypt Stick creates an encrypted folder
right on the USB drive. When you've
entered the master password, you can freely move files into and out of this
folder or launch and
edit the files. Outside of the Encrypt Stick interface nothing is visible except encrypted filenames
and encrypted data.
You can also create any number of vaults on any PC or Mac to
protect local files on that system.
Encrypt Stick acts as a key to open these locked vaults. The product's
main window displays
available vaults in its upper portion and offers a view of the unencrypted main file system in its
To encrypt one or more files you simply drag them onto a vault. When you copy files into a vault,
Encrypt Stick offers to securely erase the originals. The help videos call
this "military wipe,"
implying a connection with the DoD standard for overwriting files before deletion. Basically,
erases the data and writes over it 7 times for the minimum DoD standard.I It also definitely
Recycle Bin, which is sufficient to foil casual recovery of secure files.
For additional security you can set Encrypt Stick to automatically
lock after a period of inactivity
(10 minutes by default) and require a periodic change of the main password (every
30 days by
default). This is near military grade encryption (in a commercial usb casing).
Encrypt Stick includes a built-in private browser. When you're
browsing from a "foreign" computer
your favorites, history, cached files, and all other browsing traces remain
on the device. Once
you unplug the device nothing remains on the host computer.
The private browser doesn't have every possible feature, but
it does support tabbed browsing, and
it can handle Flash and other popular content types. I was mildly
annoyed to find that Ctrl+Enter
in the address bar doesn't complete an address by adding "www." and ".com",
but I didn't find
any page that it couldn't display. I verified that no trace of surfing with the private browser
remains behind on a host system.
Encrypt Stick lacks the ability to take private browsing to
another level with the option to browse
using a fully encrypted secure session. This is what Intel Operators use when
connected through a compromised network in a shady Internet café (the bad guys won't be able
sniff out private data from your network packets).
Limited Password Management
Encrypt Stick also includes a password management system linked
to its private browser. You
can store any number of passwords and group them in a hierarchy of categories, but you'll
the work yourself—copying and pasting URLs from your browser and manually entering
username and password
data (with an option to use the virtual keyboard for passwords).
If you're setting up a new online account, you can use Encrypt
Stick to generate a strong
password. However, there's no provision to adjust the password generator to match a site's
password policies. Key Safe's password generator lets you set the length and choose which
character types to use. It
even includes an option to create passwords like "purrPler0ks"
that are easy to remember because you can pronounce
Full-powered password managers automatically capture login data as you log
in to a site
manually using a supported browser. I was surprised to find that Encrypt Stick doesn't offer
of automation, given that it has total control over the browser.
Key Safe also lacks most features of full-featured password
managers, but it does at least have
the ability to automatically launch IE, navigate to a saved page, and fill in the
With Encrypt Stick you must click a link to open the URL in the private browser, then right-click
the username and password fields individually to paste in the saved credentials. For some sites
this right-click process
didn't work; for others the "fill in" menu choices didn't appear.
You can import existing passwords from a .CSV file, but it's
not easy. To make use of a similar
feature in Key Safe I simply took a file exported from LastPass and rearranged the
to the order expected by the import facility. Key Safe can also import directly from several other
Getting my LastPass data into a form that Encrypt Stick would accept took half
an hour of
manual editing. I did succeed in the end, but only after requesting a sample of the correct format
ENC Security Systems' tech support.
Why didn't I just export a sample and study that to learn the
format? The export to .CSV feature
doesn't work. It produces a file, but the file is filled with gibberish.
After some experimentation I
determined that the "gibberish" is actually an encrypted copy of the password
data, not the
promised .CSV file. The password management feature could definitely use some work.
I also checked the help system to see if it would explain the
import process. Or rather, I tried.
There is in fact no help system, just a link to the product's online FAQ. To get
help for anything
that is not covered in the FAQ you have to e-mail tech support.
Working Out The Kinks
Encrypt Stick offers a good implementation of file protection
by encryption. It uses two-factor
authentication, and it can protect portable files on the device itself as
well as local files on any
number of other computers. The onboard private browser lets you surf the Web on a foreign
without any risk of leaving private data behind.
The password management doesn't seem as polished as the rest
of the product. It looks good,
but it lacks the automation that would make it actually useful. And its import/export
doesn't work quite right. If you're looking for a portable password manager, look elsewhere. Still,
need encryption-based protection for local files and portable files, with private
browsing as a bonus, Encrypt Stick
can be quite useful.
Turns any USB drive into secure portable storage. Can create local encrypted folders with two
-factor authentication. Private browser allows surfing on foreign PCs leaving no traces behind.
Includes password management. Virtual keyboard for safe password entry. Generates strong
Version 4.2 is freeware.
Password manager requires manual entry of all data. Limited
ability to automatically open
Web sites using saved credentials. Password import/export facility not
working correctly. Can't
configure password generator to match specific password policies.
Encrypt Stick 5.0 turns any USB drive into
secure portable storage for your important files. It
also serves as the key to unlock local encrypted
folders. An onboard private browser lets you
surf without leaving traces. Its weak point is the password
manager, which doesn't
seem quite finished. It's all good though... I have it on my USB stick. It
is 'AWESOME' !!!
2:55 am est
Q. How do I avoid rogue antispyware and antivirus software?
A. Make sure you 'Choose Industry Certified "Security Program"
If your PC is connected to
the internet, uses e-mail, has software of an unknown
installed and comes into contact with recordable media (jump drives, dvd's,
cd's, etc) Antispyware and Antivirus protection is a requirement. They help prevent
attacks through e-mail (and/or attachments sent with e-mail) and surfing the web.
They also help you eradicate infections which are the result
of security holes and
bugs in software. (The e-mail, web surfing
and software holes and bugs result in
the most serious internet
way to know you're purchasing a trustworthy application is to confirm that
you choose has earned certification from the leading labs.
from ICSA Labs, Virus Bulletin, West Coast Labs, the National
of Specialist Computer Retailers, and others all require antispyware/
antivirus programs to meet stringent requirements to receive certification.
Smartphone and Tablet
Tips to create a safe passcode.
Smartphones and tablets open the
door to your Work, friends, family, bank details, etc... No matter which device you use, follow these tips to keep your data secure.
1. Always use a passcode. If someone gets hold of your device, the person has immediate access to your apps and
2. Make your passcode difficult to guess. Codes such as 1234 or 2580 can be cracked in seconds. Go for something that’s
unique but easy for you to remember.
3. Longer is stronger. The longer the passcode, the harder it is to crack. Make yours a minimum of six
4. Mix numbers and letters. If your device allows, use a passcode that combines numbers, letters and punctuation. Avoid dictionary words and
choose a memorable combination.
5. Make it unique. Don’t use the same passcode for anything else, including other devices,
bank cards or online accounts. That way, if one passcode gets hacked the rest stay secure.
6. Be discreet. Look around and make sure no one is watching you enter your passcode, just as
you would protect your PIN at the ATM machine.
Q. What steps need to be taken to secure
mobile devices (smartphones) for
personal/work phones and
A. Follow these steps to secure your mobile
1. Secure your device
Always lock it
b. Apply a complex passcode
c. Shield your passcode
d. Apply the latest patches
Prevent Malware Infections
Don't click on unsolicited links
b. Think before downloading apps
c. Don't "jailbreak" or "root" your mobile
Be data aware
Be careful what you share
b. Encrypt sensitive data
4. Stay compliant
a. Know and follow your organizations
Q. Do you have an example of an Organizational 'Mobile Device Security Policy'
A. Here is EZMobilePC's policy.
Mobile devices, such as smartphones and tablet computers, are important tools for the
organization and their use
is supported to achieve business goals.
However, mobile devices
also represent a significant risk to information security and
data security as, if the
appropriate security applications and procedures are not applied,
they can be a conduit for
unauthorized access to the organization’s data and IT
This can subsequently lead to data leakage and system infection.
EZMoblePC has a requirement to protect its information assets in order to safeguard
its customers, intellectual property and reputation. This document outlines a set of
practices and requirements for the safe use of mobile devices.
1. All mobile devices, whether owned by EZMoblePC or owned by employees, that have
access to corporate networks, data and systems, not including corporate IT-managed
laptops. This includes smartphones and
2. Exemptions: Where there is a business need to be exempted from this
(too costly, too complex, adversely impacting other business requirements) a risk
must be conducted being authorized by security management.
3. Policy - Technical Requirements
Devices must use the following Operating Systems: Android 2.2 or later,
iOS 4.x or later.
2. Devices must store all user-saved passwords in an encrypted password store.
3. Devices must be configured with a secure password that complies with EZMoblePC's
password policy. This password must not be the same as any other credentials used
within the organization.
With the exception of those devices managed by IT, devices are not allowed to be
connected directly to the internal corporate network.
3.1 User Requirements
Users must only load data essential to their role onto
their mobile device(s).
Users must report all lost or stolen devices to EZMoblePC
If a user suspects that unauthorized access to company
data has taken place
via a mobile device, they must report the incident in alignment
incident handling process.
4. Devices must not be “jailbroken”* or have any software/firmware installed
is designed to gain access to functionality not intended to be
exposed to the user.
Users must not load pirated software or illegal content
onto their devices.
Applications must only be installed from official platform-owner
Installation of code from un-trusted sources is forbidden.
If you are unsure if an
application is from an approved source contact EZMoblePC IT.
7. Devices must be kept up to date with manufacturer or network provided patches.
As a minimum patches should be checked for weekly
and applied at least once a month.
Devices must not be connected to a PC which does not
have up to date and enabled
anti-malware protection and which does not comply with corporate
Devices must be encrypted in line with EZMoblePC’s
Users may must be cautious about the merging of personal
and work email accounts on
their devices. They must take particular care
to ensure that company data is only sent
through the corporate email
system. If a user suspects that company data has been sent
from a personal email account, either in body text or as an attachment, they must notify
EZMoblePC IT immediately.
(If applicable to your organization) Users must not
use corporate workstations to backup
or synchronize device content such as media files, unless such content is required
legitimate business purposes.
*To jailbreak a mobile device is to remove the limitations imposed by the manufacturer.
This gives access to the operating system, thereby unlocking all its features and enabling
the installation of unauthorized software.
Q. What is the first thing I should
do when I turn on my computer.
A. Back up important files
If you follow these tips, you're more likely to be free of interference from
and spammers. But no system is completely secure. If you have important
files stored on your computer, copy them onto a removable disc or
drive, and store it in a safe place.
Q. How do I protect my password?
A. Protect your passwords
Keep your passwords in a secure place, and out of plain sight. Don't share them
on the Internet, over email, or on the phone. Your Internet Service Provider (ISP)
should never ask for your password. In addition, hackers
may try to figure out your
passwords to gain access to your computer. To make it tougher for
Use passwords that have at least eight characters and include numbers or symbols.
The longer the password,
the tougher it is to crack. A 12-character password is
stronger than one with eight characters.
Avoid common word: some hackers
use programs that can try every word in the
Don't use your personal information, your login name, or adjacent keys on the
keyboard as passwords.
Change your passwords regularly (at a minimum, every 90 days).
Don't use the same password for each online account you access.
Q. What steps need to be taken when
setting up Wireless Home Network Security.
1) Change Default Administrator Passwords (and Usernames)
Changing the default password is important because everyone
that purchases the same
Wireless access device, knows your password.
2) Turn on (Compatible) WPA / WEP Encryption
By default, your Wireless device comes
without the encryption enables. WPA / WEP are
security programs that forced your computer to provide
an encrypted password before
you are allowed access
to the wireless access point.
3) Change the Default SSID
SSID is the network name of your wireless network;
most people leave the default name,
such as, Linksys or NetGear. By changing the name, intruders have a more difficult time
identifying your system and use known vulnerabilities. (And
of course, use the unchanged
default password.) One
mistake people make is naming their home network their family
name and or address. When cruising a neighborhood of wireless devices, its always
scary to see Bobsnet444.
4) Disable SSID Broadcast
In Wi-Fi networking, the access point or router typically broadcasts
the network name
(SSID) over the air at
regular intervals. This feature was designed for businesses and
mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is
it increases the likelihood an unwelcome neighbor or hacker will try
log in to your home network.
5) Assign Static IP Addresses to Devices
Most home networkers gravitate toward using dynamic IP addresses.
This means that
the IP Address, (the IP
Address is needed to participate on a network.) is typically
assigned automatically. A dynamic IP address on an unsecure system can also supply
a hacker with a IP Address.
6) Enable MAC Address Filtering
Each piece of Wi-Fi gear possesses a unique identifier called the "physical address"
or "MAC address." Access points and routers keep
track of the MAC addresses of all
devices that connect to them. Many such products offer the owner an option to key in the
MAC addresses of
their home equipment that restricts the network to only allow
connections from those devices. Do this, but also know that the feature is not so powerful
as it may seem. Hacker software programs
can fake MAC addresses easily.
7) Turn Off the Network During Extended Periods of Non-Use
The ultimate in security measures for any wireless network
is to shut down, or turn office
your wireless access point
when you are not using. You are the most vulnerable at work
or asleep, and mischief minded people know it.
8) Position the Router or Access Point Safely
Wi-Fi signals normally reach to the exterior of a home. A small amount
outdoors is not a problem,
but the further this signal reaches, the easier it is for others
to detect and exploit. Wi-Fi signals often reach across streets and through neighboring
homes. When installing a wireless home network, the position
of the access point or
router determines it's reach. Try to position these devices near the center of the home
rather than near windows to minimize
Q: What are the first security steps I should take before I connect my computer to the internet?
A: Practices Before You Connect a New Computer to the Internet
We advise home users to download and install software patches
as soon as possible after connecting a
new computer to the
Internet. However, since the background intruder scanning activity
is constant, it may not be possible for the user to complete the
download and installation of software
patches before the vulner-
abilities they are trying to fix are exploited. We recommend the
following actions 'before' connecting computers to the Internet
users can complete the patching process without incident.
Q. Are there any references you can recommend?
A. Computer Emergency Response Team (CERT)
B. Microsoft Windows
C. Apple Macintosh
Q. How do I keep my system up to date once I go online.
A. Keep your operating system
and Web browser Up-to-Date, and learn about
their security features.
Hackers also take advantage of Web browsers (like Firefox or Internet Explorer)
and operating system software
(like Windows or Mac's OS) that don't have the
latest security updates. Operating system companies issue security
flaws that they find in their systems, so it's important to set
your operating system
and Web browser software to download and install security patches
you can increase your online security by changing the built-in security
and privacy settings in your operating system or browser. Check
the "Tools" or
"Options" menus to learn how to upgrade from the default
settings. Use your "Help"
function for more information about your choices.
If you're not using your computer for an extended period, disconnect
it from the
Internet. When it's disconnected, the computer doesn't send or
from the Internet and isn't vulnerable to
Q. How do I keep my security software up to date.
A. Use security
software that updates automatically
your security software active and current: at a minimum, your computer
should have anti-virus and anti-spyware software, and a firewall.
You can buy
stand-alone programs for each element or a security suite that includes these
programs from a variety
of sources, including commercial vendors or from your
Internet Service Provider. Security software that comes pre-installed
computer generally works for a short time unless you pay a subscription fee to
keep it in effect. In any
case, security software protects against the newest threats
only if it is up-to-date. That's why it is critical to set your
security software to update
automatically.Some scam artists distribute
malware disguised as anti-spyware
software. Resist buying software in response to unexpected pop-up
emails, especially ads that claim to have scanned your computer and detected
malware. That's a tactic
scammers have used to spread malware. OnGuardOnline.gov
can connect you to a list of security tools from legitimate security
vendors selected by
GetNetWise, a project of the Internet Education Foundation.Once you confirm that
your security software is up-to-date, run it to scan your computer
for viruses and
spyware. If the program identifies a file as a problem, delete it.
Anti-Virus Software Anti-virus software protects your computer from viruses
that can destroy your data, slow your computer's performance, cause
a crash, or
even allow spammers to send email through your account. It works by scanning
your computer and your incoming
email for viruses, and then deleting them.
Software Installed on your computer without
your consent, spyware
software monitors or controls your computer use. It may be used to send you pop-up
ads, redirect your computer
to websites, monitor your Internet surfing, or record your
keystrokes, which, in turn, could lead to the theft of your personal
A computer may be infected with spyware if
Slows down, malfunctions, or displays repeated error messages
Won't shut down or restart
Serves up a lot of pop-up ads, or displays them when you're not surfing the web
Displays web pages or programs you didn't intend to use,
or sends emails you didn't write.
A firewall helps keep hackers from using your computer
to send out
your personal information without your permission. While anti-virus software scans
incoming email and files,
a firewall is like a guard, watching for outside attempts to
access your system and blocking communications to and from sources
you don't permit.
Don't Let Your Computer Become Part of a "BotNet"
search the Internet for unprotected computers they can control and
mously to send spam, turning them into a robot network, known as a "botnet." Also
known as a "zombie
army," a botnet is made up of many thousands of home
computers sending emails by the millions. Most spam is sent remotely
millions of home computers are part of botnets.Spammers
scan the Internet to find
computers that aren't protected by security software, and then install bad software –
known as "malware"
– through those "open doors." That's one reason why up-to-date
security software is critical.Malware may be hidden in free software applications. It
can be appealing to download free software like games, file-sharing
customized toolbars, and the like. But sometimes just visiting a website or down-
loading files may cause
a "drive-by download," which could turn your computer
into a "bot."
Another way spammers take over your computer
is by sending you an email with
links or images which, if you click on or open them, install hidden
software. Be cautious about opening any attachments or downloading files from
emails you receive. Don't open an email attachment —
even if it looks like it's from
friend or coworker — unless you are expecting it or know what it contains. If you
send an email with an attached file, include a text message explaining what
Q. What do I do in an emergency?
A. Here is what to do in an e-mergency
If you suspect malware is lurking on your computer, stop shopping, banking, and
activities that involve user names, passwords, or other sensitive information. Malware
be sending your personal information
to identity thieves.
- Confirm that your security software is up-to-date, then use it to
scan your computer.
- Delete everything the program identifies as a problem.
- You may have to restart your computer for the changes to take effect.
- If the problem persists after you exhaust your ability to diagnose and treat it, you
might want to call for professional help.
- If your computer is covered by a warranty that offers free tech support, contact
- Before you call, write down the model and serial number of your computer, the
name of any software you've installed, and a short description of the problem.
- Your notes will help you give an accurate description to the technician.
- If you need professional help, if your machine isn't covered by a warranty, or if
your security software isn't doing the job properly, you may need to pay for
- Many companies — including some affiliated with retail stores — offer tech
support via the phone, online, at their store, or in your home.
- Telephone or online help generally are the least expensive ways to access
support services — especially if there's a toll-free helpline — but you may
have to do some of the work yourself.
Taking your computer to a store usually is less expensive than hiring a technician
repair person to come into your home.
- Once your computer is back up and running, think about how
malware could have been downloaded
to your machine, and what
you could do to avoid it in the future.
- Also, talk about safe computing with anyone else who uses the computer.
Q. Where do I report
Hacking or Malware activity?
A. Here is where to report:
Hacking or a Computer Virus
Alert the appropriate authorities by contacting:
Your ISP and the hacker's ISP (if you can tell what it is). You can
usually find an ISP's email
address on its website. Include information on the
incident from your firewall's log file. By alerting the ISP to the
problem on its system,
you can help it prevent similar problems in the future. The FBI at www.ic3.gov. To
fight computer criminals, they need to hear from you.
Fraud If a scammer takes advantage of you through an
when you're shopping
online, or in any other way, report it to the Federal Trade
Commission, at ftc.gov. The FTC enters Internet, identity theft, and other fraud-related
complaints into Consumer Sentinel, a secure, online database available to hundreds
of civil and criminal law enforcement agencies in the U.S. and abroad.
Spam If you get deceptive spam, including email phishing
information, forward it
to email@example.com. Be sure to include the full header of the
email, including all routing information. You also may report phishing email to
of ISPs, security vendors, financial institutions and law enforcement agencies,
uses these reports to fight phishing.
Personal Information If you believe you have mistakenly
personal information to
a fraudster, file a complaint at ftc.gov, and then visit the Federal Trade
Commission's Identity Theft website at ftc.gov/idtheft to learn how
to minimize your risk
of damage from a potential theft of your identity.
Parents Parents sometimes can feel outpaced by their technologically savvy
kids. Technology aside, there are lessons that parents can teach to help kids
stay safer as they socialize online. Most ISPs provide parental
controls, or you
can buy separate
software. But no software can substitute for parental supervision.
Talk to your kids about safe computing practices, as well as the things they're
seeing and doing online.
Sites Many adults, teens, and tweens use social networking
sites to exchange information about themselves, share pictures and
use blogs and private
messaging to communicate with friends, others who share
interests, and sometimes even the world-at-large. Here are some tips for parents
who want their kids to use these sites safely:
Use privacy settings to restrict who can access and post on your
child's website. Some social networking sites have strong privacy
your child how to
use these settings to limit who can view their online profile, and
explain to them why this is important.
Encourage your child to think about the language used in a blog,
and to think before posting pictures and videos. Employers, college
officers, team coaches,
and teachers may view your child's postings. Even a kid's
screen name could make a difference. Encourage teens to think about the
impression that screen names could make.
Remind your kids that once they post information online, they can't
take it back. Even if they delete the information from a site, older
exist on other people's
computers and be circulated online.
Talk to your kids about bullying. Online bullying can take many forms,
from spreading rumors online and posting or forwarding private messages
the sender's OK, to sending
threatening messages. Tell your kids that the words
they type and the images they post can have real-world consequences. They can
make the target of the bullying feel bad, make the sender look bad
— and, some-
times, can bring
on punishment from the authorities. Encourage your kids to talk to
you if they feel targeted by a bully.
Talk to your kids about avoiding sex talk online. Recent research
shows that teens who don't talk about sex with strangers online
are less likely to
come in contact
with a predator.
Tell your kids to trust their instincts if they have suspicions. If they feel threatened by
someone or uncomfortable because of something online, encourage
them to tell you.
You can then help
them report concerns to the police and to the social networking
site. Most sites have links where users can immediately report abusive, suspicious,
or inappropriate activity.
Q. What is the best way to keep malware
Try to minimize the threat.
the Effects of Malware on Your Computer
Malware is short for “malicious software;” it includes viruses —
programs that copy
themselves without your permission — and spyware, programs installed without
your consent to monitor or control your
computer activity. Criminals are hard at work
thinking up creative ways to get malware on your computer. They create appealing
web sites, desirable downloads, and compelling
stories to lure you to links that will
download malware, especially on computers that don’t use adequate security
software. Then, they use the malware to
steal personal information, send spam,
and commit fraud.It doesn’t have to be that way.
So says a website with tips from
the federal government and the technology industry that is helping consumers be on
guard against Internet fraud, secure their
computers, and protect their personal
malware can wreak, and reclaim their computers and their electronic information.
Computers may be infected with malware if they:
slow down, malfunction, or display repeated error messages;
- wont shut down or restart;
serve up a lot of pop-up ads, or display them when youre not surfing
display web pages or programs you didnt intend to use, or send emails
If you suspect malware
is on your computer
If you suspect malware is lurking on your computer, stop shopping, banking, and
other online activities that involve user names, passwords, or other
Malware on your computer could be sending your personal information to
Then, confirm that your security software is active and current:
at a minimum, your
should have anti-virus and anti-spyware software, and a firewall. You can
buy stand-alone programs for each element or a security suite that
from a variety of sources, including commercial vendors or from your
Internet Service Provider. Security software that comes pre-installed on a computer
for a short time unless you pay a subscription fee to keep it in effect.
In any case, security software protects against the newest threats
only if it is up-to-
Thats why it is critical to set your security software and operating system (like
Windows or Apples OS) to update automatically.
Some scam artists distribute malware disguised as anti-spyware software. Resist
buying software in response to unexpected pop-up messages or emails,
that claim to have scanned your computer and detected malware. Thats a tactic
scammers have used to spread malware, and that has attracted the attention
Trade Commission, the nations consumer protection agency, as well as a
security tools from legitimate security vendors selected by GetNetWise, a project
Once you confirm that
your security software is up-to-date, run it to scan your compu-
ter for viruses and spyware. Delete everything the program identifies as a problem.
may have to restart your computer for the changes to take effect.If you suspect
that your computer still is infected, you may want to run a second anti-spyware
program. Some computer security experts recommend installing one
program for real-time protection, and another for periodic scans of your machine
way to stop malware that might have slipped past the first program.
Finally, if the problem persists after you exhaust your own ability to diagnose and
treat it, you might want to call for professional
help. If your computer is covered by a
warranty that offers free tech support, contact the manufacturer. Before you call,
write down the model and serial number of
your computer, the name of any software
you’ve installed, and a short description of the problem. Your notes will help you give
an accurate description to the technician.If you need professional help, if your
machine isn’t covered by a warranty, or if your security software isn’t
doing the job
properly, you may need to pay for technical support. Many companies — including
some affiliated with retail stores —
offer tech support via the phone, online, at their
store, or in your home. Telephone or online help generally are the least expensive
to access support services — especially if there’s a toll-free helpline — but you
may have to do some of the work yourself.
Taking your computer to a store usually is
less expensive than hiring a technician or repair person to come into your home.
Once your computer is back
up and running, think about how malware could have
been downloaded to your machine, and what you could do to avoid it in the future. If
your security software or operating system was
out-of-date, download the newest
version and set it to update automatically. Use the opportunity to back up important
files by copying them onto a removable disc. Other
ways to minimize the chances
of a malware download in the future:
Don’t click on a link in an email or open an attachment unless you
know who sent it and what it is. Links in email can send you to sites
that automatically download malware to your machine. Opening
attachments — even those that appear to come from a friend or
co-worker — also can install malware on your computer.
Download and install software only from websites you know and trust.
Downloading free games, file-sharing programs, and customized
toolbars may sound appealing, but free software can come with
Talk about safe computing. Tell your kids that some online activity
put a computer at risk: clicking on pop-ups, downloading free games or
programs, or posting personal information.
Finally, monitor your computer
for unusual behavior. If you suspect your machine
has been exposed to malware, take action immediately. Report problems with
malware to your ISP so it can try to prevent similar problems and
Q. What Should Parents know about Social
A. Social Networking
"It's 10 p.m. Do you know where your
"Remember that phrase from your own childhood? It's still a valid question, but now, it comes with a twist:
"Do you know where your kids are — and who they're chatting with online?
"Social networking sites have morphed into
a mainstream medium for teens and adults. These sites
encourage and enable people to exchange information
about themselves, share pictures and videos,
use blogs and private messaging to communicate with friends,
others who share interests, and
even the world-at-large. And that's why it's important
to be aware of the possible pitfalls that
with networking online.
Some social networking
sites attract pre-teens – even kids as young as 5 or 6. These younger-focused
sites don't allow the same kinds of communication
that teens and adults have, but there are still things
that parents can do to help young kids socialize
safely online. In fact, when it comes to young kids, the
law provides some protections – and gives parents some control over the type of information that
children can disclose online. For sites directed to children under age 13, and for general audience sites
they're dealing with kids younger than 13, there's the Children's Online Privacy Protection Act
(COPPA). It requires
these sites to get parental consent before they collect, maintain, or use kids'
Information. COPPA also allows parents to review their child's online profiles and blog pages.
Parents sometimes can feel outpaced by their technologically savvy kids.
Technology aside, there are
lessons that parents
can teach to help kids stay safer as they socialize online.
Help Kids Socialize Safely OnlineOnGuard Online shares these tips for safe social networking:
your kids understand what information should be private. Tell them why it's important to
keep some things – about themselves, family members and friends
– to themselves.
Information like their full name, Social Security number, street address, phone number,
family financial information — like bank or credit card Account numbers
— is private and
should stay that way. Tell them not to choose a screen name that gives away too
Use privacy settings to restrict who can access and post on your child's website. Some
social networking sites have strong privacy settings.
Show your child how to use these settings to limit who can view their online profile,
explain to them why this is important.
Explain that kids should post only information that you — and they — are comfortable
with others seeing. Even If privacy settings are turned on, some — or even all
— of your
child's profile may be seen by a broader audience Than you're comfortable with.
Encourage your child to think about the language used in a blog, and to think before
Posting pictures and videos. Employers, college admissions officers, team coaches,
and teachers may view your child's postings.
Even a kid's screen name could make a difference. Encourage teens to think about the
impression that screen names could make.
Remind your kids that once they post information online, they can't take it back.
Even if they delete the Information from a site, older versions may exist on other
people's computers and be circulated online.
Know how your kids are getting online. More and more, kids are accessing the Internet
through their cell phones.
Find out about what limits you can place on your child's cell phone. Some cellular
companies have plans that limit downloads, Internet access, and texting; other plans
allow kids to use those features only at certain times of day.
Talk to your kids about bullying. Online bullying can take many forms, from spreading
rumors online and posting or forwarding private messages without the sender's
sending threatening messages. Tell your kids that the words they type and the
they post can have real-world consequences. They can make the target of the
bullying feel bad, make the sender look bad – and, sometimes, can bring on
punishment from the authorities.
Encourage your kids to talk to you if they feel targeted by a bully.
Talk to your kids about avoiding sex talk online. Recent research shows that teens who
don't talk about sex with strangers online are less likely to come in contact with
predator.If you're concerned that your child is engaging in risky online behavior,
search the blog sites they visit to see whatinformation they're posting. Try searching
by their name, nickname, school, hobbies, grade, or area where you live.
Tell your kids to trust their gut if they have suspicions. If they feel threatened by someone
or uncomfortable because of something online, encourage them to tell you. You
help them report concerns to the police and to the social networking site. Most
links where users can immediately report abusive, suspicious, or inappropriate
parent sections to Understand its features and privacy controls. The site should
your rights as a parent to review and delete your child's profile if your child
A Few More Tips to Protect Pre-TeensMany of the tips above apply for pre-teens, but
parents of younger children also can:
extra steps to protect younger kids. Keep the computer in an open area like the
kitchen or family room, so you can keep an eye on what your kids are doing online.
Use the Internet with them to help develop safe surfing habits.
Consider taking advantage of parental control features on some operating systems
that let you manage your kids' computer use, including what sites they can visit,
whether they can download items, or what time of day they can be online.
Go where your kids go online. Sign up for – and use – the social networking spaces
that your kids visit. Let them know that you're there, and help teach them how to act
as they socialize online.
Review your child's friends list. You may want to limit your child's online “friends” to
people your child actually knows and is friendly with in real life.
Understand sites' privacy policies. Sites should spell out your rights as a parent to
review and delete your child's profile if your child is younger than 13.
For More InformationTo learn more about staying safe online, visit the websites of the following organizations:
Federal Trade Commission — www.OnGuardOnline.gov The FTC works for the consumer to prevent fraudulent, deceptive, and unfair business
practices in the marketplace and toprovide information to help consumers spot, stop, and avoid them.
To file a complaint or to get free information onconsumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP
(1-877-382-4357); TTY: 1-866-653-4261.The FTC manages OnGuardOnline.gov, which provides practical tips
from the federal government and the technologyindustry to help you be on guard against Internet fraud,
secure your computer, and protect your personal information. ConnectSafely — www.connectsafely.org ConnectSafely is a forum for parents, teens, educators, and advocates designed
to give teens and parents a voice in thepublic discussion about youth online safety, and has tips, as
well as other resources, for safe blogging and socialnetworking. Along with NetFamilyNews.org, it is
a project of the non- profit Tech Parenting Group. Cyberbully411 — www.cyberbully411.org Cyberbully411 provides resources and opportunities for discussion and sharing
for youth - and their parents - who havequestions about or may have been targeted by online harassment.
The website was created by the non-profit Internet Solutions for Kids, Inc., with funding from the Community
Technology Foundation of California. GetNetWise — www.getnetwise.org
GetNetWise is a public service sponsored by Internet industry corporations and
public interest organizations to helpensure that Internet users have safe, constructive, and educational
or entertaining online experiences. The GetNetWise coalition works to provide Internet users with the
resources they need to make informed decisions about their and theirfamily's use of the Internet.
iKeepSafe.org is a coalition of 49 governors/first spouses, law enforcement,
the American Medical Association, the American Academy of Pediatrics, and other associations dedicated
to helping parents, educators, and caregivers byproviding tools and guidelines to promote safe Internet
and technology use among children.
NCMEC is a private, non-profit organization that helps prevent child abduction
and sexual exploitation; helps find missingchildren; and assists victims of child abduction and sexual
exploitation, their families, and the professionals who serve them. staysafe —
staysafe.org is an educational site intended to help
consumers understand both the positive aspects of the Internet aswell as how to manage a variety of
safety and security issues that exist online.
WiredSafety.org is an Internet safety and help group. WiredSafety.org provides
education, assistance, and awareness on cybercrime and abuse, privacy, security, and responsible technology
use. It is also the parent group of Teenangels.org, FBI-trained teens and preteens who promote Internet
safety. See also: Social Networking Sites: Safety Tips for Tweens and Teens
What to Do if There's a ProblemTrust your gut if you have
suspicions. If you feel threatened by someone or uncomfortable because of something online,Tell an adult
you trust, and report it to the police and the social networking site.The Children's Online Privacy
Protection Act (COPPA) requires websites to obtain parental consent before collecting, using,or disclosing
personal information from children under age 13.
Q. What are
Nigerian con-men or internet scams?
Phony Lotteries, Nigerian 419s, Advanced Fee Fraud, and Scams
While you're online:
Know who you're
In any electronic transaction, independently confirm the other party's name, street
address, and telephone number.
Resist the urge to enter foreign lotteries. These solicitations are phony
Delete requests that claim to be from foreign nationals
asking you to help transfer their money through your bank account. They're fraudulent.
emails that request your money, credit card or account numbers, or other personal information.
If you are selling something over the Internet, don't accept a potential buyer's offer to send you a check
for more than the purchase price, no matter how tempting the plea or convincing the story. End the transaction immediately
if someone insists that you wire back funds.The Internet gives buyers access to a world of goods and services, and gives sellers access to a world of customers.
Unfortunately, the Internet also gives con artists the very same access. But being on guard online can help you maximize the
global benefits of electronic commerce and minimize your chance of being defrauded. OnGuard Online wants you to know how to
spot some cross-border scams — including foreign lotteries, money offers, and check overpayment schemes — and
report them to the appropriate authorities.
For years, scam operators have used the telephone and direct mail to entice U.S. consumers into buying chances in supposedly
high-stakes foreign lotteries. Now they're using email, too — either to sell tickets or suggest that a large cash prize
has your name on it. No matter what country's name is used to promote a lottery, the pitch follows a pattern: you should send
money to pay for taxes, insurance, or processing or customs fees. The amount may seem small at first, but as long as you keep
paying, the requests for funds will keep coming — for higher and higher amounts. Some victims have lost thousands of
dollars.Most scam operators never buy the lottery tickets on your behalf. Others buy some tickets, but keep the "winnings"
for themselves. In any case, lottery hustlers generally try to get you to share your bank account or credit card numbers,
so they can make unauthorized withdrawals.If you're thinking about responding to a foreign lottery, OnGuard Online wants you to remember:
a foreign lottery is against the law.
There are no secret systems for winning foreign lotteries. Your chances of getting any money back are
slim to none.
If you buy even one foreign lottery ticket, you can expect many more bogus offers
for lottery or investment "opportunities." Your name will be placed on "sucker lists" that fraudsters
buy and sell.
credit card and bank account numbers to yourself. Scam artists often ask for them during an unsolicited sales pitch. Once
they get your account numbers, they may use them to commit identity theft.Resist solicitations for foreign lottery promotions. Report them to the appropriate government officials, then hit delete.View a sample fraudulent foreign lottery solicitation.
"Nigerian" Foreign Money Offers
The "Nigerian" scam got its name from emails that supposedly came
from Nigerian "officials" who needed your help getting at their money — which was tied up due to strife in
their country. Today, people claiming to be officials, businesspeople, or the surviving relatives of former government honchos
in countries around the world send countless offers via email to transfer thousands of dollars into your bank account if you
will just pay a fee or "taxes" to help them access their money. If you respond to the initial offer, you may receive
documents that look "official." But then, you will get more email asking you to send more money to cover transaction
and transfer costs, attorney's fees, blank letterhead, and your bank account numbers, among other information. Subsequent
emails will encourage you to travel to another country to complete the transaction. Some fraudsters have even produced trunks
of dyed or stamped money to verify their claims.The emails are from crooks trying to steal your money or commit identity
theft. Victims of this scam report that emergencies arise that require more money and delay the "transfer" of funds;
in the end, you lose your money, and the scam artist vanishes. According to the U.S. State Department, people who have responded
to these solicitations have been beaten, subjected to threats and extortion, and in some cases, murdered.If you receive an
email from someone claiming to need your help getting money out of another country, don't respond. After all, why would a stranger from another country pick you out at random to share thousands of
dollars? Report the solicitation to the appropriate government officials, and then hit delete.View a sample fraudulent foreign money offer.
Check Overpayment Schemes
no to a check for more than your selling price, no matter how tempting the plea or convincing the story. Check overpayment
schemes generally target people who have posted an item for sale online. The con artist, posing as a potential buyer from
a foreign country (or a distant part of the U.S.), emails the seller and offers to buy the item with a cashier's check, money
order, personal check, or corporate check. Or the scammer may pretend to be a business owner from a foreign country, needing
"financial agents" to process payments for their U.S. orders; in exchange, they promise a commission.Regardless of the cover, here's what happens:
The scammer sends you a check that looks authentic — complete with watermarks — made payable for more money than
you expected. They ask you to deposit it in your bank account, and then wire-transfer some portion of the funds to a foreign
account. They provide convincing reasons why the check is for more than the necessary amount, and why the funds must be transferred
quickly. Sometimes, the counterfeit checks fool a bank teller, but be aware that the check still can bounce. The scammer vanishes
with the money you wired from your own account and you are on the hook for the entire amount of the worthless check. In addition,
a scammer who has your bank account number is likely to use it to withdraw more money from your account.
Reporting a Cross-Border Scam
If you think you may have responded to a cross-border scam, file a complaint at www.econsumer.gov, a project of 20 countries of the International Consumer Protection and Enforcement
Network. Then visit the FTC's identity theft website at www.ftc.gov/idtheft. While you can't completely control whether you will become a victim
of identity theft, you can take some steps to minimize your risk.If you've responded to a "Nigerian" scheme, contact your
local Secret Service field office using contact information from the Blue Pages of your telephone directory, or from www.secretservice.gov/field_offices.shtml.In addition, report telemarketing fraud and check overpayment scams to your state
Attorney General, using contact information at www.naag.org.Report unsolicited email offers to firstname.lastname@example.org — including offers inviting you to participate in a foreign
lottery, looking for help getting money out of a foreign country, or asking you to wire back extra funds from a check you
received.If you receive what looks like lottery material from a foreign country through the postal mail, give it to your local
For More InformationForeign Lottery Scams
U.S. Federal Trade Commission — The FTC works for the consumer to prevent fraudulent, deceptive,
and unfair business practices in the marketplace and to provide information to help consumers spot, stop, and avoid them.
To file a complaint or to get free information on consumer issues, visit www.ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261.
The FTC enters Internet, telemarketing, identity theft, and other fraud-related complaints into Consumer Sentinel, a secure,
online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.Competition Bureau in Canada — The Competition Bureau is an independent law enforcement agency
in Canada that investigates anti-competitive practices and promotes compliance with the
laws under its jurisdiction. To file a complaint or to get free information, visit www.competitionbureau.gc.ca or call toll-free, 1-800-348-5358. The Bureau has the ability to refer criminal matters to the Attorney General of Canada,
who then decides whether to prosecute before the courts.United Kingdom's Office of Fair Trading — The United Kingdom's
Office of Fair Trading is responsible for making markets work well for consumers. They protect and promote consumer interests
throughout the United Kingdom, while ensuring that businesses are fair and competitive. To file a complaint or to get free information,
visit www.oft.gov.uk or send an email to email@example.com.Australian Competition and Consumer Commission — The Australian Competition and Consumer Commission encourages vigorous
competition in the marketplace and enforces consumer protection and fair trading laws. To file a complaint or to get more
information, visit www.accc.gov.au. The ACCC advocates consultation and negotiation as the first and
best option to settle disputes, but once the ACCC pursues legal action any sort of mediation becomes less likely.
"Nigerian" Advance-Fee Scams
U.S. Secret Service — The Secret Service investigates violations of laws relating to financial
crimes, including access device fraud, financial institution fraud, identity theft, and computer fraud. To file a complaint
or to get free information, visit www.secretservice.gov or call 202-406-5708.U.S. Department of State — The Department of State's mission is to create a more secure, democratic,
and prosperous world for the benefit of the American people and the international community. As part of that mission, the
Department of State seeks to minimize the impact of international crime, including cross-border internet scams, on the United States and its citizens. To get free information, visit www.state.gov.
Q. What should I do prior to disposing of an old computer?
A. Computer Disposal
Once you have a “clean” computer,
consider recycling, donating, or reselling it – and keep the environment in mind when
disposing of your computer.If you want to get rid of your old computer, options include recycling,
reselling, and donating.
you log off for thelast time, there are important
things to do to prepare it for disposal. Computers
personal and financial
information, including passwords, account numbers, license keys or registration numbers for software
programs, addresses and phone numbers, medical and prescription information, tax returns, and other personal documents.
Before getting rid of your old computer, it’s a good idea to use software to “wipe”the hard drive clean. If you don’t, consider
your old hard drive a 21st century treasure chest for identity thieves
and information pirates. The Federal Trade Commission
(FTC), the nation’s consumer
protection agency, says you can deter identity theft and information piracy by taking a few
Understanding Hard Drives
A computer’s hard
drive stores data, and maintains an index of files. When you save a file, especially a large one, it is
scattered around the hard drive in bits and
pieces. Files also are automatically created by browsers
systems. When you open a file, the hard drive checks the index, then gathers
the bits and pieces and reconstructs them.
delete a file, the links between the index and the file disappear, signaling to your system that the file isn’t needed
any longer and that hard drive space
can be overwritten. But the bits and pieces of the deleted file stay on your computer
until they’re overwritten, and they can be retrieved with a data recovery program.
To remove data from your hard drive
it needs to be wiped clean.
Cleaning Hard Dives
Before you clean your hard
drive, save the files that are important to you on an external storage device – for example,
a USB drive, a CDRom, or an external
hard drive – or transfer them to a new computer. Check your owner’s manual, the
manufacturer’s website, or its customer support line for information on how to
save data and transfer it to a new
computer. Utility programs to wipe your hard drive are available both online and in stores where computers are
They’re generally inexpensive; some are available on the Internet for free. Wipe utility
programs vary in their capabilities:
erase the entire disk, while others allow you
to select files or folders to erase. They also vary in their effectiveness:
programs that overwrite
or wipe the hard drive many times are very effective; those that overwrite or wipe the drive only once
may not prevent information being wiped from being recovered later.
If your old computer contains sensitive information
that would be valuable to an identity
thief, consider using a program that overwrites or wipes the hard drive many times. Or,
remove the hard
drive, and physically destroy it. One more thing to keep in mind: If you use your home or personal
for business purposes, check with your employer about how to manage information on your computer that’s business-related.
The law requires businesses to follow
data security and disposal requirements for certain information that’s related to
Once you have a “clean”
computer, here’s how to dispose of it:
Recycle it. Many computer manufacturers have programs to recycle computers
and components. Check their
websites or call their toll-free numbers
for more information. The Environmental Protection Agency (EPA) has
information on electronic product recycling
program. Check with your county or local government,
including the local landfill office for regulations.
Donate it. Many organizations collect old computers and donate them to charities.
Resell it. Some people and organizations buy old computers.
Check online. Keep
the environment in mind when disposing of your computer.
Most computer equipment contains hazardous materialsthat don’t belong in a landfill.
For example, many computers have heavy metals that can contaminate the earth.
The EPA recommends that you check with your local health and sanitation agencies for ways to dispose
of electronics safely.