Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register. |
Show Posts
|
Pages: [1] 2 3
|
1
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / An Open Letter From a So-called Stupid
|
on: September 02, 2007, 11:41:34 AM
|
An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. I present on Identity Theft all over the Western United States, and thought I would respond to this particular individual in writing. There are multitudes of ways to lose your personal information. You have undoubtedly heard of many of them. Fake web sites, data theft, stealing people's trash, stealing people's outgoing mail, check fraud, etc., are just a few of the possibilities for loss of information. Job ads are also being used for Identity Theft. Monster.com ranks fake companies posing as real companies on their web site among their biggest problems. So, to you who think that it could never happen to you, you might want to read this next sentence twice. No matter how good you are, no matter how vigilant, no matter how much you shred or tear, no matter how many times you go to the post office so that you don't put outgoing mail in your home mailbox, regardless of how well you can hide in your home, there is no 100% effective defense against Identity Theft. Let me say that again, in case you don't read it twice. There is NO 100% effective method to defend yourself against identity theft. Here's an example of why. Let's say you want to get health insurance, or auto insurance, or finance a car, etc. etc. etc. Let's say for purposes of this example that you are trying to get health insurance through your company. This is a relatively simple process, right? Fill out the form, and wait to get the insurance cards in the mail. What you may not realize is that the insurance agent has taken the form you filled out and submitted it for group health. It is submitted to three different companies for underwriting. So now, the insurance agent and the insurance company has the information from you, the three companies supplying the insurance coverage have the information on you, AND all of the employees at all four points have access to the information. Think about how many employees that might be. That information is often then passed on to a data warehouse like ChoicePoint, and anyone who has access to ChoicePoint now has access to that information. Who has access to ChoicePoint? I think with the recent news articles, the more appropriate question is, who doesn't have access to ChoicePoint? The information is also submitted to your MIB (Medical Information Bureau) file. Anyone who has access to the MIB files, now has access to all of that information. Who has access to the Medical Information Bureau records? Anyone, at any hospital around the United States, who has even a small amount of clearance, has access to the Medical Information Bureau records. According to John Gardner, co-author or Chicken Soup for the Entrepreneurial Soul, "This makes the Identity Theft Shield, along with a Pre-Paid Legal Services Membership, an absolute must for anyone that's breathing." So to you, sir, who more or less said to me, "You'd have to be stupid to become a victim of Identity Theft!" I wish you my best. If you want to continue thinking that shredding your information is going to protect you, then for you I respectfully choose a phrase used by my friend Larry Smith. "Sometimes, you just can't fix stupid." Jonathan Kraft is Colorado's foremost expert on computer-related Identity Theft. He has been helping employers and employees to protect themselves from the issues surrounding Identity Theft since long before identity theft reached today's epidemic proportions. To learn how Mr. Kraft can protect you or your company against the effects of Identity Theft, please call 877 825-7119, or email mailto: [email protected]. You can also find out more online at http://www.strive4impact.com/idt
|
|
|
2
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and W
|
on: September 02, 2007, 11:40:13 AM
|
Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line. John Sakoda of IMlogic CTO and Vice President of Products stated that, "IM viruses and worms are growing exponentially....Virus writers are now shifting the focus of their attack to instant messaging, which is seen as a largely unprotected channel into the enterprise." Because Instant Messaging operates on peer-to-peer (P2P) networks, it spawns an irresistible temptation for malicious computer hackers. P2P networks share files and operate on industry standard codec (encyrption codes) and industry standard protocols, which are publicly open and interpretable. Anti virus software does not incorporate protection for Instant Messaging services. Like sharks in a feeding frenzy, these hacker mercenaries view Instant Messaging clients as their personal "Cash Cow" because of the ease by which they can access your computer via the publicly open and interpretable standards, unleash a Trojan horse, virus, or worm, as well as gather your personal and confidential information, and sell it to other depraved reprobates. Please, don't be naïve enough to think it won't or couldn't happen to you! Want to see how easy it is for hackers to access your Instant Messaging chat and what can happen to you as a result? Did you know that some hacker-friendly providers offer processor chips that can be bought on the Internet? (I guess it would be pretty hard to walk into a store and ask the clerk to help them find a processor chip that could be used to illegally hack into a victim's computer for the sole purpose of spreading malicious code or stealing someone's identity!) Did you know that hacker-friendly providers actually offer hacker software that enables these criminals to deliberately disable security on computers, access your personal and confidential information, as well as inject their Trojan horses, viruses, and worms? Hacker manuals are also conveniently accessible via the Internet. One of these manuals shows how to DoS other sites. DoSing (Disruption of Service) involves gaining unauthorized access to the "command prompt" on your computer and using it to tie up your vital Internet services. When a hacker invades your system, they can then delete or create files and emails, modify security features, and plant viruses or time bombs onto your computer. "Sniff" is a tool (originally intended to help telecommunication professionals detect and solve problems) that reprobate hackers use to tamper with the protocol and "sniff out" data. When hackers sniff out your Instant Messaging data packet from Internet traffic, they reconstruct it to intercept conversations. This enables them to eavesdrop on your conversations, gather information, and sell it to other depraved criminal entities. Don't set yourself up to be the next Identity Theft Victim because you like to chat using Instant Messaging. Identity theft is one of the most sinister of vulnerabilities you are inadvertently be subjected to. Identity theft is defined by the Department of Justice as "?the wrongful obtaining and using of someone else's personal data in some way that involves fraud or deception, typically for economic gain." Identity theft is the by-product of hacker mercenaries obtaining your social security number (including those of your spouse and children), your bank account, your credit card information, etc., from the Internet. You become a virtual "Cash Cow" for hackers as your information is then sold to other felons for financial gain. Using your information, these criminals then: · access your bank account funds · create new bank accounts with your information · create driver's licenses · create passports Attorney General Ashcroft stated that, "Identity theft carries a heavy price, both in the damage to individuals whose identities are stolen and the enormous cost to America's businesses." A group hosting a website known as shadowcrew.com was indicted on conspiracy charges for stealing credit card numbers and identity documents, then selling them online. While this group allegedly trafficked $1.7 million in stolen credit card numbers, they also caused losses in excess of $4 million. According to a Press Release issued by the Department of Justice on February 28, 2005, a hacker was convicted of several counts of fraud, one in which "?he fraudulently possessed more than 15 computer usernames and passwords belonging to other persons for the purpose of accessing their bank and financial services accounts, opening online bank accounts in the names of those persons, and transferring funds to unauthorized accounts." Trojan Horses, Viruses, and Worms ? The Toxic Trio According to Dictionary.com, a Trojan horse is "...a subversive group that supports the enemy and engages in espionage or sabotage---an enemy in your midst." The toxic cargo of Trojan horses can include viruses or worms. A Trojan horse is a program that Internet criminals use to interrupt and interfere with your security software and produce the following results · Terminates processes · Removes registry entries · Stops services · Deletes files Hackers, who have gained access to your computer, because of the easily accessible programs and software as mentioned above, are enthusiastically incorporating this venomous little program into their arsenal of weapons. As recently as March 4, 2005, a new Trojan horse was discovered that modified settings in Internet Explorer. Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP were the reported systems that could be affected. On January 28, 2005, a press Release issued by the Department of Justice reported that a 19 year old was convicted for his criminal activity by "?creating and unleashing a variant of the MS Blaster computer worm." Christopher Wray, Attorney General ? Criminal Division stated that, "This ? malicious attack on the information superhighway caused an economic and technological disruption that was felt around the world." By the way, "malicious" is defined by Webster as "...intentionally mischievous or harmful". On February 11, 2005, in a Press Release issued by the Department of Justice, reported that another criminal was sentenced for circulating a worm. This worm, "?directed the infected computers to launch a distributed denial of service (DOS) attack against Microsoft's main web site causing the site to shutdown and thus became inaccessible to the public for approximately four hours." March 7, 2005, Symantec.com posted discovery of a worm named "W32.Serflog.B" that spread through file-sharing networks and MSN Messenger ? networks that operate on publicly open and interpretable industry standards administered by P2P systems that host Instant Messaging clients-none of which are protected, regardless of the anti virus software on your computer. The W32.Serflog.B worm also lowers security settings and appears as a blank message window on the MSN Messenger. SOLUTION Avoid at all costs, P2P file sharing networks as they operate on publicly open and interpretable industry standards. (Instant Messaging services run on P2P file sharing networks.) If you like the convenience of text chatting via Instant Messaging, then why not consider an optimally secure VoIP (voice over internet protocol), also known as a Computer Phone, that incorporates the Instant Messaging feature. Make sure the VoIP internet service provider does not operate on P2P file sharing networks that use industry standard codec or industry standard protocols that are publicly open and accessible. (Don't forget, these standards create the vulnerability which reprobate hackers are capitalizing on because of their easy accessibility.) Optimally secure VoIP service providers that incorporate a secure Instant Messaging feature, operate from their own proprietary high end encryption codec on patented technology which is hosted in a professional facility. Simply put, when a VoIP internet service provider is optimally secure, the Instant Messaging feature on the VoIP softphone is also incorporated in their optimally secure technology. Here's the bottom line. If you are currently using Instant Messaging of any sort, you need to make a decision: a. Continue enticing hacker mercenaries and remain as a user of an Instant Messaging service, or b. Take immediate corrective action. If you decide to take immediate corrective action: 1. Find an optimally secure VoIP internet solution provider that includes the Instant Messaging feature in their proprietary patented technology. 2. Find an optimally secure VoIP internet solution provider that has their own proprietary high end encryption codec. 3. Find an optimally secure VoIP internet solution provider that has their own proprietary patented technology. 4. Find an optimally secure VoIP internet solution provider that hosts their proprietary patented technology in a professional facility. Need Help? Here's a place you can look over to see what an optimally secure VoIP internet solution provider looks like--one that operates on their own proprietary high end encryption codec with their own proprietary patented technology hosted in a professional facility, AND one that incorporates the Instant Messaging feature. http://www.free-pc-phone.com**Attn Ezine editors / Site owners **Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify the content and include the resource box as listed above. Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com
|
|
|
3
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / An Open Door To Your Home Wireless Internet Network Security?
|
on: September 02, 2007, 11:38:54 AM
|
An Open Door To Your Home Wireless Internet Network Security?
This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. Any business that uses the Internet to share or exchange information, news, or ideas with clients, vendors, partners, or other locations look in the reflection of your monitor and realize that your business is an unintentional (or intentional) target.
You should already be aware of all the thousands of bugs, viruses, denial of service attacks and other unfriendly items that lurk on the internet and virtually try attacking every second. It's like having a screen door on your most valuable assets. Let's not repeat what you know about, let's look at a larger picture that should concern everyone - the unknown. There are attacks that go unreported for various reasons, these are the ones that the major software and hardware vendors have no clue about and can only warn you after an attack is reported.
If your files, email, identity, client or product information are important to your african american business and you cannot afford a network being down for 24 hours. Then a firewall is what should be between the internet and everything else. You need to expect an intrusion if you have a small amount or no network protection. Hackers have tools that search the Internet 24/7 looking for a vunerable point to destroy. Overzealous marketers use similar tools to harvest information to use for spamming and unfortunately no one currently calls that a crime that we know as identity theft.
You have a deadbolt and a door lock on your front door and some even have a home security system in place. Why have a screen door latch on your home computer network, when you know there are people trying that door 24/7?
If you want to put a digital rottweiler between your home wireless network and hackers, marketers and other cyber-vandals then evaluate a strong firewall for your african american business.
Don't have the time or resources to get your home wireless network protected and need a african american Wireless Solution Provider partner to be there for you? We can help give you your freedom back...and a whole lot more. M.D.T.G.
Daviyd Peterson ©2005 All Rights Reserved
***********************************************
Daviyd Peterson: 10-year consultant, instructor, trainerHelps african american SMBs bridge the digitaldivide by going wireless. Free articleon Home Wireless Internet Security and other related articleshttp://www.mogendaviydtechgroup.com/firewallsmb.htmSee a video where big time firewalls duke it out!
****************************************************
MDTG
|
|
|
4
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / Spyware Programs Are Out To Get You!
|
on: September 02, 2007, 11:38:08 AM
|
Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits. The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. There are currently over 38,000 spyware and adware programs that are infecting innocent Internet users such as yourself through downloadable games, music, screensavers, pictures, pop-ups, emails, and the list goes on and on. Spyware and Adware can cause your PC to run extremely slow and even crash, and allow hackers and advertising companies to invade your privacy whenever they wish. What Is Spyware? Spyware is a broad term for programs that collects information from your computer without your knowledge or consent. Spyware is a software program that transmits a unique code to identify you (for tracking purposes) without your knowledge or consent. The programs collects or transmits information about your computer use, or other habits without your knowledge or consent. This internet pest which is better known as spyware installs itself on your computer without your knowledge or consent. It performs other unwholesome duties, and continue to reinstalling itself no matter how many times you remove it. Spyware! It has become so pervasive that lawmakers in the US are looking into ways to prevent or regulate it. The Spy Audit by EarthLink reflects the results of scans involving over one million computers between January and March. It uncovered more than 29.5 million examples of spyware. Why should I be concerned about spyware or adware? Passwords, credit card details and other personal information could end up in the wrong hands. Your computer could get unwanted viruses, worms or even Trojan. You would receive unwanted emails. Your computer could be used by malicious operators to do damage not only your own computer, but to other computer users too. How did I get spyware on my computer and how do I eliminate it? It usually happens when you visit a web site, and are prompted to download something that is said to be "necessary" to view or use features of that web site. Also, you might want or download a program that has some nice features, but also installs program code that can send information out without your knowledge. "By tracking and publicizing the growth of spyware, we can better educate consumers of its risks and encourage them to take steps to protect themselves and their families while online," said Christine Stevenson of Webroot, which conducted the scans. People concerned about what might be lurking on their machine can download software such as the popular ZoneAlarm Pro to disinfect their computer. The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more information at http://www.traffic-o-matic.com
|
|
|
5
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / If You Sell Anything Online Your ePockets Are Being Picked
|
on: September 02, 2007, 11:37:14 AM
|
If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. You and I, my friend, are victims of software piracy that accounted for over $24 BILLION dollars in lost revenue over the last two years*. There are so many ways people can get your product for free these days. If we continue doing nothing we will lose even more money this year as potential customers become more and more aware of just how easy it is to obtain digital products without paying for them. The question is, why do we put up with this? When we sell our downloadable products they are being easily and freely distributed (read: STOLEN) by the very same people that we are trying to get to purchase. And don't be fooled, this still occurs very regularly today even though a lot of us take precautions against it. This confirms that people want our products, they just don't want to pay for them ?because they don't have to. In fact, 70% of potential customers won't if they can get it for free*. We know the ideal scenario; what's supposed to happen. Consider Bob Jones and his knot tying eBook, "Scoutmaster Bob's Guide To Knots". Bob uploads his eBook to his web server and creates a sales link to sell it, and this sales link goes through to his payment processor. After the order is placed the customer is redirected to the download page, or "Thank-You" page, in order to automate the delivery process. Now Bob figures he's all set up and starts his massive promotion efforts. He spends lots of time and money getting people to visit his site and convinces them to place an order because it really is a great product. So, the customers place orders via the sales link then are redirected back to the download page automatically to get what they've paid for. Perfect automated system, right? Sorry Bobby, in a perfect world maybe. But here's what really happens. "Back Door" #1: Our boy Bob sets up a sales link, a download redirection link (where people go after successfully ordering) and spends time and money promoting his site. People come and visit his web site and feel that they could really use such an extensive knot tying resource and want a copy of it. A couple people place orders and Bob is happy. Because Bob has created such a great product they tell their friends about Bob's eBook. But instead of telling their friends to check out Bob's web site they simply email them a copy of the actual eBook. Why not, it doesn't cost Bob any money right? Those people then tell their friends, who tell their friends, who tell their friends. A couple of weeks later Bob's knot tying eBook is in the hands of hundreds, even thousands of people?for free. And this is just the first "back door". There are three (3) "Back Doors" that people use regularly to easily obtain free access to your product: * Back Door #1: Get a copy via email, newsgroups, forums, eBay, MSN, ICQ, ... whatever * Back Door #2: Get refunded and keep the product * Back Door #3: Locate the download page without paying And here's another scary fact: For every 10 copies downloaded, 4 of those are stolen*. How lightly would you take it if you sold a tangible product, like a t-shirt, and only 6 out of ten t-shirts that left the store were paid for? These are lost sales and income forgone, there's no more blunt way to put it. If you can guarantee that the only way they can get your product is through your payment process you've just stopped that leak and increased your profits. But right now online merchants have no idea who is really downloading their products, or what happens after the downloaded. They lose total control of its distribution. Some thieves/weasels/snakes ?whatever you want to call them? even go so far as to sell stolen software and eBooks as their own for a greatly reduced price. This is probably the greatest risk to selling a digital product, and if you ask anyone that's been doing it for a while they will have experienced this nightmare first hand. The people out there that do this are much worse than one guy that just gets your product for free. These people distribute hundreds or thousands of your product and you don't see a cent of it. They saturate the market and decrease the value of your product, until it's virtually worthless. They have to be stopped. "Back Door" #2: Back to Bob. There is another big problem for Bob when it comes to protecting his eBook. He doesn't know that many payment processors promptly, and without hesitation, honor each and every refund request, no questions asked. Seriously?no questions at all, one simple email is all it takes. There's usually no need for the customer to explain anything, just that they would like a refund. They will get their refund right away and the you, the merchant, don't have a say in the matter at all. And you guessed it, they get to keep the product, for free. There is no requirement to return the product like with a traditional refund, since there's no way to be sure the product was really deleted. Imagine the absolute uproar brick-and-mortar merchants would be in if customers were allowed 100% unconditional refunds on request, and the customer gets to keep the shirt, vacuum cleaner, DVD player, or whatever? Ridiculous right? But it happens to online merchants like Bob every day. "Back Door" #3: Lastly, Bob's uploaded product is also easily and regularly downloaded for free by potential customers right from his own web site. People can get to his download page in any number of ways. For example, open up Google. Type this into the search box: "thankyou.htm ebook download". Now go to the second and third pages. Here are some free products for you if you were the type to download copyrighted material without paying for it. Of course I'm not suggesting you do that, in fact I ask you NOT to download these products, just look at the thank you page to see that the "back door" is certainly easy to find. These people are just like Bob, and they work hard to create their web sites and their products. They are simply unaware of the kick-in-the-teeth they're taking by not protecting it. Some conscientious merchants claim, "I'm safe, I protect my download location with a third-party tool that creates my download location on the fly." This is a false sense of security and it only blocks one back door. Basically this protection method simply hides the download location, but the product is still just as susceptible to being freely distributed after the download. And it can still be kept if a refund is issued. This is equivalent to the banks simply hiding all the money instead of putting it in the bank vault. So how are online merchants like Bob, and you, and me supposed to stay afloat? As it is now, the only way to turn a profit is to rely on people's goodwill in hopes that they will do the right thing. And be content in the fact that some people don't know how easy it is to get online products for free, so these people actually pay for the product. So, if you think about it, within this system it's pure luck that anyone actually pays for a digital product. But there is hope. There is a real way to stop all types of thieves and freebie-seekers. We must protect the product itself with unique identifiers and access codes for each customer. And until more of us become wise to this one simple truth rampant software and eBook piracy will continue to plague online merchants. * - average 40% worldwide software piracy rate for 2001 & 2002, and dollar losses totaling $24.05 billion, based on intensive studies by the Business Software Alliance http://www.bsa.org, and the report - "Quantifying Online Downloading of Unlicensed Software : Survey of Internet Users for BSA - May 29, 2002" About The Author Shawn Pringle is the owner and founder of the Virtual Vault digital product security system. Read his story and how he fought back at http://www.CBProtect.com Email him at [email protected]
|
|
|
6
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / Social Engineering: You Have Been A Victim
|
on: September 02, 2007, 11:36:15 AM
|
Social Engineering: You Have Been A Victim Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. On the way to work you're thinking of all you need to accomplished this week. Then, on top of that there's the recent merger between your company and a competitor. One of your associates told you, you better be on your toes because rumors of layoffs are floating around. You arrive at the office and stop by the restroom to make sure you look your best. You straighten your tie, and turn to head to your cube when you notice, sitting on the back of the sink, is a CD-ROM. Someone must have left this behind by accident. You pick it up and notice there is a label on it. The label reads "2005 Financials & Layoff's". You get a sinking feeling in your stomach and hurry to your desk. It looks like your associate has good reasons for concern, and you're about to find out for your self. And The "Social Engineering" Game Is In Play: People Are The Easiest Target -------------------------------------------- You make it to your desk and insert the CD-ROM. You find several files on the CD, including a spreadsheet which you quickly open. The spreadsheet contains a list of employee names, start dates, salaries, and a note field that says "Release" or "Retain". You quickly search for your name but cannot find it. In fact, many of the names don't seem familiar. Why would they, this is pretty large company, you don't know everyone. Since your name is not on the list you feel a bit of relief. It's time to turn this over to your boss. Your boss thanks you and you head back to your desk. You have just become a victim of social engineering. When Did I Become a Victim of Social Engineering? -------------------------------------------- Ok, let's take a step back in time. The CD you found in the restroom, it was not left there by accident. It was strategically placed there by me, or one of my employees. You see, my firm has been hired to perform a Network Security Assessment on your company. In reality, we've been contracted to hack into your company from the Internet and have been authorized to utilize social engineering techniques. The spreadsheet you opened was not the only thing executing on your computer. The moment you open that file you caused a script to execute which installed a few files on your computer. Those files were designed to call home and make a connection to one of our servers on the Internet. Once the connection was made the software on our servers responded by pushing (or downloading) several software tools to your computer. Tools designed to give us complete control of your computer. Now we have a platform, inside your company's network, where we can continue to hack the network. And, we can do it from inside without even being there. This is what we call a 180 degree attack. Meaning, we did not have to defeat the security measures of your company's firewall from the Internet. You took care of that for us. Many organizations give their employees unfettered access (or impose limited control) to the Internet. Given this fact, we devised a method for attacking the network from within with the explicit purpose of gaining control of a computer on the private network. All we had to do is get someone inside to do it for us - Social Engineering! What would you have done if you found a CD with this type of information on it? What Does It Mean to Be "Human" -------------------------------------------- As human beings we are pretty bad at evaluating risk. Self preservation, whether it be from physical danger or any other event that could cause harm, like the loss of a job or income, is a pretty strong human trait. The odd thing is, we tend to worry about things that are not likely to happen. Many people think nothing of climbing a 12 foot ladder to replace an old ceiling fan (sometimes doing so with the electricity still on), but fear getting on a plane. You have a better chance severely inuring yourself climbing a ladder than you do taking a plane ride. This knowledge gives the social engineer the tools needed to entice another person to take a certain course of action. Because of human weaknesses, inability to properly assess certain risk, and need to believe most people are good, we are an easy target. In fact, chances are you have been a victim of social engineering many times during the course of your life. For instance, it is my opinion that peer pressure is a form of social engineering. Some of the best sales people I've known are very effective social engineers. Direct marketing can be considered a form of social engineering. How many times have you purchased something only to find out you really did not need it? Why did you purchase it? Because you were lead to believe you must. Conclusion -------------------------------------------- Defining The Term "Social Engineering": In the world of computers and technology, social engineering is a technique used to obtain or attempt to obtain secure information by tricking an individual into revealing the information. Social engineering is normally quite successful because most targets (or victims) want to trust people and provide as much help as possible. Victims of social engineering typically have no idea they have been conned out of useful information or have been tricked into performing a particular task. The main thing to remember is to rely on common sense. If some one calls you asking for your login and password information and states they are from the technical department, do not give them the information. Even if the number on your phone display seems to be from within your company. I can't tell you how many times we have successfully used that technique. A good way of reducing your risk of becoming a victim of social engineering is to ask questions. Most hackers don't have time for this and will not consider someone who asks questions an easy target. About The Author ---------------- Darren Miller is an Industry leading computer and internet security consultant. At the website - http://www.defendingthenet.com you will find information about computer security specifically design to assist home, home office, and small business computer users. Sign up for defending the nets newsletter and become empoweredto stay safe on the Internet. You can reach Darren [email protected] or at [email protected]
|
|
|
7
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Compute
|
on: September 02, 2007, 11:33:12 AM
|
How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Many people want to know what they did to get infected. Unfortunately, usually it was just one wrong click. Here are the top reasons people get infected and how to prevent these common internet security threats. 10. Exchanging files in chat rooms. You should never download files from sources you don't trust. Viruses and other internet security threats can look like valid files or photos. Always scan files with a virus scanner before opening them. 9. Clicking on popup ads. If you're like most people, you probably don't like popup ads. But whether you like them or not, you should never click on them. Popup ads can take you to a website that secretly downloads adware onto your computer. Enabling a popup blocker on your computer can help protect you. Some popups come from adware programs that have downloaded onto your computer, so if you still see popups after installing a popup blocker, scan your computer for spyware or adware. 8. Email attachments. Viruses can be sent out as email attachments to infect your computer if you open them. If you download your email into an email program, scan all email attachments with a virus scanner. Most major webmail programs scan attachments before you download them, but you should still not download files from unknown sources. "Phishing" email, claiming to be from your bank or other financial institution which asks you to provide personal information or download something to your computer is another common email threat. 7. Instant messaging. Because people are cautious with email attachments, new viruses are spreading through instant messaging programs. Infections look like valid files or photos, so always be careful accepting file transfers, even from sources you trust. 6. Downloading music. Many websites that advertise free music downloads are loaded with spyware. You can even get spyware from these websites without manually starting a download. Other sites make you accept a spyware download to get the music you want. 5. Browsing websites. Some websites use "drive-by downloads" ? misleading dialogue boxes to secretly install spyware programs. Sometimes spyware can install even if you do not choose "yes" or "accept". Keep your browser security settings on default to protect yourself against these infections. 4. Installing free programs or screen savers. Check the license agreement of any program you install to confirm it does not come bundled with other programs. License agreements are supposed to explain if the software you are downloading will cause advertisements or other downloads. These programs may have long or confusing license agreements where they have buried this information. Always carefully read what you agree to before you download free software. 3. Adult-related websites. Many of these sites make a profit by forcing viewers to download spyware and adware to access their site. You may not be able to view these sites if you are using a secure browser or have your security settings too high. 2. P2P programs like Kazaa or Limewire. If you share music using peer-to-peer networks, you may be forced to download advertising software onto your computer. This software can generate popups from within your computer. In these cases, you may see popups even if you are not online. 1. Gaming websites. It may seem that viewing spoilers for online games will let you win faster, but it can slow down your computer with spyware. Mick Lathrop, part of StopSign's Spyware Research team says, "I get most of my spyware samples from gaming-related websites." Avoid any site that requires a software download to access information. Even if you have an anti-virus product on your computer, confirm that it protects against the growing threat of spyware. Enable a popup blocker and firewall for further protection. Using safe browsing habits and good security software can keep you safe on the internet. Marla Porter is part of the Product Development Team at eAcceleration Corp., the makers of StopSign anti-virus and spyware remover. StopSign detects and removes viruses, trojans, spyware, worms, keyloggers and browser hijackers. Learn more about StopSign at http://www.stopsign.com. StopSign is a product of eAcceleration Corp: http://www.eacceleration.com.
|
|
|
8
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / The One Critical Piece Of Free Software Thats Been Overlooked
|
on: September 02, 2007, 11:30:28 AM
|
The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,... To Work When You Switch Your Pc On ?I Can And I Do It On A Pro-active Basis. Surfing Means More And More To Stay Invisible, To BeClean From The Inside And To Prevent Installment OfMalicious Software (So Preventing Unwanted CommunicationFrom Inside To Outside And From Outside To Inside). How do you stay invisible while surfing? Of courseby installing a firewall. How do I get one free?That's the easy point. You like to stay invisible. But are you?And how do you know? You could do a test from someoneout there trying to get in. But who can you trust? Suppose you are doing a test. Do you obtain objectiveand reliable information about your PC-vulnerability(for free)? Now even if you stay invisible, you will visit websitesleaving cookies in your PC and you will download software.By doing so you will get spyware, viruses, ... How can you detect them and delete them? That's alsothe easy point: you have to install an anti-virus programand anti-spyware programs. Research on the internetmakes it clear that you need 2 anti-spyware programs.Why 2? Because a great fish may be caught by the netbut a small fish can swim through the holes.Using 2 makes the holes smaller. What are those 2 freeprograms you have to download? Can you prevent spyware to install on your PC? Maybe,maybe not. There is one free software that mightprevent it (but not with 100% guarantee). And even then you need an additional freeware programto prevent a piranha to install itself on your PC(just enabling itself to start up whenever you switch yourPC on). This freeware program is overlooked by many andgives you an additional feeling of relief and security.It gives you also a hint whether some new downloadedsoftware is good or bad (and thus giving you the chanceto delete it anyway before it becomes too malicious). Now you owe it to yourself to maximize the safetyof your PC for surfing. You need a firewall,ananti-virus software, 2 anti-spyware programs,one spyware preventing program, a trusty guard preventinginstallment in your startup files and even 3 musketeers.And last but not least do a safe test to get an objectiveidea about the vulnerability of your PC. Everything is free. It only needs your attention.So look after the fully simple and logical steps in: http://www.optinfire.com/p.php?user=42&c=BLOGSEC1http://www.optinfire.com/p.php?user=42&c=BLOGSEC2After all, preventing a disease is better than curing it! Finally. Discover A Lifetime Of Amazing Simple AndFree Web Marketing Strategies, Tips And Resources.Subscribe to my Monthly Newsletter.Reply To My Survey And Receive A Free Software And Ebook!Go to http://startwithoutadime.blogspot.com
|
|
|
9
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / Securities
|
on: September 02, 2007, 11:29:00 AM
|
Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIES Computers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. Unless the web site you are viewing has taken special precautions to secure the web pages, they are open for anyone with the right tools to intercept information over the Web. Data security has taken on new meaning in recent years, particularly with the introduction and widespread use of the Internet for people and businesses to take care of the things they need to do. Many people see the Internet as a big open door inviting almost anyone to enter their system and stay for a while. With the proper measures, this does not have to be the case and you can effectively close the door and only allow a select group of people inside. There are a number of different ways you can get the data security you need to protect your system through the use of software. Some of these programs work to defend your system by providing encryption which basically scrambles information so it can not be utilized until it has been properly unscrambled on the system or another one. You can find programs that will inspect your system, looking for holes others may take advantage of and offering solution. Software exists allowing the person in charge of the network to know the instant an intruder is noticed on the system so appropriate steps can be taken quickly. There are many other good programs on the market you help you protect your system and data. Be proactive and find the solutions you need before you absolutely need them. Getting Data Security Software By far, the best place to start your search for the data security software you need is through the Internet. You can learn in detail about different software packages currently available and choose the one or combination of them to provide the security you need. Making sure your data is secure should not be left to chance. EMAIL ENCRYPTION Email encryption can be a great step to make sure the messages you send via email are kept completely private and out of the view of anyone else. One of the great things about living in the USA is the ability to pass snail mail from one person to another without worrying about anyone reading through it and casting aspersions. Some people living in countries not so free do not have the freedom to send mail without fear. The same privacy we receive in snail mail is what we should expect when sending digital mail to people we care about. While you do not need to worry about the government reading through your email (for the most part), other people may eavesdrop. There are a number of people who get a thrill out of looking at other people's email without permission by using various programs to snoop into the email. One of things to consider is some people do not use any kind of email encryption whatsoever. These people are basically writing information on a wall for anyone who desires to read it and look it over. While you may not be passing any personally sensitive material, you may not want people to know the details of your life found in the emails you send. Email encryption basically allows your computer to encode your message so that it does not make sense to people who may intercept it. The person it is meant for can decode the message to read it properly SECURITY SOFTWARE Security software is all about protecting your computer systems and data from those who would like to gain access to it for a variety of reasons. Many companies have found it necessary to create websites to tell the world who they are and what they have to offer but it also carries with it a problem. The moment you put up a web server at your site, you are inviting the world to your site and possibly to other portions of your system. SPAM FILTERS Spam filters can be one of the best tools you can use to get rid of practically all of the junk mail you and/or your company receives. It is amazing the amount of spam delivered to people all across the United States of America each and every day. Various companies help to deliver hundreds of millions of advertisements and contacts to people each and every day through email in the USA alone. INTRUSION DETECTION SYSTEM Intrusion detection systems can be the safeguard you need to protect your computer system from unauthorized access by people who do not have your permission to be in a particular area of the system. It is a step to make sure your data and IT systems are as safe as possible all of the time. You should recognize the possibility of intruders entering your system from remote locations outside of your network and from inside it as well. VIRUS PROTECTION Virus protection should be a part of every single computer used to surf the Internet or to work as part of a network. If you can read this page, posted on the web, you need to have some sort of quality virus protection on your computer. It seems almost everyone has had some kind of bout with a virus of some type either catching it and destroying it or suffering from its damaging effects. EMAIL FILTERS Email filters can read your email so you do not have to read every single message delivered to your computer. It is amazing to consider the impact email has had on people's lives since it was first introduced to the general public back in the 1990's. I can remember the computer systems designed to specifically handle email and very little else so people could keep in contact with friends and relatives many miles away. COMPUTER ENCRYPTION Encryption is one of the most popular ways information is protected and has been a way to send hidden or secret messages from one place to another. The idea is based on an age old practice called cryptography which is a coded message sent an individual who has the key to unlock the message in code so that it makes sense. Coded messages have been found dating back as far as the Roman Empire. COMPUTER VIRUS PROTECTION Computer virus protection should be one of the most important aspects of your computer system no matter if your computer is part of a huge network or is a single personal computer. There are a couple of different kinds of viruses and many variations of them, some of which have literally traveled around the world. Usually, once a virus has settled into a computer, it looks for the opportunity to duplicate itself and email itself to others. SECURING WEB SERVER SOFTWARE Web server software is one of the most important aspects of your server allowing people to view your website at any time day or night. The Internet has had a profound effect on the entire world and continues to grow more and more each hour of every day as people produce unimaginable amounts of information worldwide. Unfortunately, with all of the web traffic, there are also some people who do not use the Web for good. WEBSITE FILTERS Web site filters are a wonderful way for companies to make sure their employees are visiting websites appropriate to their job description. One of the major difficulties with the Internet is the amount of inappropriate websites popping up when you search for almost anything on the Internet. Imagine what would happen if your receptionist is looking up information pertinent for his/her job and a pornographic site pops up as a customer enters the door who catches a glimpse of the pictures on the monitor. SERVER SOFTWARE Server software is at the very heart of any computer network as it provides the tools needed to make the network operate properly. After investing in quality hardware for the network, it is of equal importance to make sure the software used is of high quality and performs the tasks you desire efficiently without fail. You want to make sure you have a powerful combination of both hardware and software COMPLYING WITH CHILDREN INERNET ACT The Childrens Internet Protection Act was introduced to congress in 1999 with the idea of providing some level of protection for the content minors are allowed to view on certain computer systems. All schools with minors in attendance must follow the rules established by this law. Also, any public place providing Internet access to the public which includes minors must also follow this law. This article is submitted by Kashif Raza http://www.networkingtutorials.net
|
|
|
10
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / Anti-Spyware Protection: Behind How-To Tips
|
on: September 02, 2007, 11:27:47 AM
|
Anti-Spyware Protection: Behind How-To Tips There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". And, of course, the Web is swarming with the ones like "10 Steps to Protect Your PC from Spyware"(if not 10, any number will do; odd ones like 5,7,9 are most popular) or "How to Forget About Spyware For Good". Please don't accuse me of being sarcastic -- I am not; all these articles by all means are informative and so very useful. They all include really handy tips to protect you from this recently emerged plague called spyware. But? A typical how-to article is short and snappy, with all unnecessary particulars carefully avoided. An ideal one is a clear scheme of what to do and how (because it is a how-to article). Some essential facts will surely be omitted just for the sake of brevity. Let's look into the author's "trash bin" for info ruthlessly (and maybe baselessly) thrown away. Hint one: What on earth is spyware? When you decide to apply "anti-spyware protection", you'd better realize what you want to be protected against. Unfortunately, there is not such thing as complete security. And? "There is no such thing as spyware in itself"-- you are perplexed, aren't you? I bet you are; what's more, it was Kaspersky who recently expressed this opinion. "The term spyware is basically a marketing gimmick," wrote Kaspersky in the company weblog on March 03, 2005. "Just to separate new ersatz-security products from traditional ones, just to push almost zero-value products to the security market." This quote (extremely curtailed and out of the context) have already spread all over the Internet, but it is very useful to read the whole posting to see the whole picture, so visit http://www.viruslist.com/en/Weblog?Weblogid=156679222Few definitions caused so much controversy and confusion as did "spyware". Eugeny Kaspersky blames marketers for having coined this term--and partially he is right. But only partially. As a professional, he classified various malicious programs according to their structure and characteristics; in this classification there is indeed no place for "spyware", which is too vague term to exactly denote anything with a particular structure. On the other hand, marketers and journalists needed an expressive, easy-to-remember word to name existing (!) information-stealing programs to tell users (who may be not so versed in software as its developers) how to protect their computers. What is "spyware" then? Spyware is a commonly used general term for any type of software that gathers personal information about the user without his or her knowledge and transmits it to a destination specified by the author of the program. Spyware applications are frequently bundled in other programs--often freeware or shareware--that can be downloaded from the Internet. So, the term is very general and doesn't reflect either structure or characteristics of such software. After all, it is only a conventional word for programs that steal information. According to Kaspersky, programs which are now called spyware, have existed for years. It's true. Who disagrees? Password-stealing Trojans were actually known as far back as in 1996. But it's also true that most dangerous information-stealing programs are on the rise. Spy Audit survey made by ISP Earthlink and Webroot Software (the survey lasted for a whole year 2004) showed--16.48% of all scanned consumer PCs in 2004 had a system-monitor, 16.69% had a Trojan. Another bitter truth is that some unscrupulous producers now are jumping at the chance of making quick money. There are lots of suspicious, low-performing, or adware-installing products. See, for example, the list at http://www.spywarewarrior.com/rogue_anti-spyware.htm But saying that all the dedicated anti-spyware solutions are like that?To put it mildly, it's a bit too much. Hint Two: Too Many Promises Made -- Is it Possible to Keep them? There are loads of software programs nowadays created for fighting spyware. An ordinary consumer tends to get lost in plenty of information and lots of products, which are supposed to help him get rid of spyware. If all the advertising claims were true, it would have been easy. In reality it isn't. Anti- spyware and anti-viruses work almost the same way. The efficiency of most anti-spyware programs is determined (and restricted, too) by signature bases. The more code clips (i.e. signatures) there are in the base, the more effectively the program works ? it means the more spyware programs it can identify. Only programs from the signature base are recognized as spyware; all other spy programs will be running unnoticed and unstopped. So, absolutely all the signature- basis- containing programs are pretty much the same, whatever their ads say. They all rely on the same "match pattern"; the difference is only how many signatures each of them contains. What conclusion we can make here? The bigger the signature base, the more reliable the product is, no matter whether it is anti-spyware or an anti-virus. If the software applies signature base, it's better to choose a product from a big company, which can afford spending plenty of money on research and updates. Another conclusion we can make is that all such software without constant updating pretty quickly becomes useless and even dangerous, because users still expect it to protect their PCs. New spyware is constantly being developed, and anti-spyware developers have to catch up with it all the time. This race started when very first malicious programs appeared, and it is impossible to say whether it will ever end. Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent software developing company. Software, developed by this company, does not rely on signature bases. Its innovative technology is capable of disabling the very processes of stealing information,such as keylogging, screenshoting, etc.Learn more -- visit the company's website: http://www.anti-keyloggers.com
|
|
|
11
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / Protecting Your Children On The Internet
|
on: September 02, 2007, 11:26:34 AM
|
Protecting Your Children On The Internet If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. Many young people find instant messaging and e-mail a convenient and fun way to talk with their friends. If you have children, like me, when they're not on the phone, they're talking with their friends on the Internet. We have very strict rules and guidelines about who they can talk with and for how long. We have given them detailed instructions on what to do when they receive e-mail from someone they don't know or receive an anonymous instant message. Recently, someone close to me received a death threat via an anonymous instant message. The language this person used was so vulgar and explicit you would have thought it came from a prison inmate. Interestingly enough, the person at the other end was a child. After significant investigation we determined this person was a school mate. They had received detailed information about the child including the child's instant messenger alias, their home address and color, and what type of cars the family drove. Can you imagine how scared this child and child's family was? Quite frankly, it was not only sad but sickening that another child could be so verbally brutal. Additional investigation revealed that the school these children go to were aware that this had been going on for quite some time. Other children had been receiving similar threats. This particular event was all the result of several children speaking in a chat roam and one child in particular got upset about something that was said. That child contacted another child, who is known to be mean, and asked them to scare one of the other children. We got to the bottom of the whole mess and everyone felt a bit of relief. It's very important to pay attention and, in some cases, monitor what children are doing on the Internet. It's for their protection and the protection of others. I'm sure I am going to get an ear full from privacy rights advocates on this one. Regardless, the safety of our children is one of the most important tasks a parent has. If your children use e-mail and Instant Messaging on a regular basis you should; 1) Limit the number of people they can e-mail and message with; 2) Work with them to develop an approved list of friends; 3) Limit the amount of the time they spend e-mailing and messaging; 4) Make your presence known while they are e-mailing or messaging; and 5) If necessary install some sort of monitoring software to see what is going on in chat rooms. Update: Shortly after writing this article, a 13 year old boy at a middle school in my area was arrested for e-mailing death threats to two teachers. In one e-mail he indicated he was planning on bringing a gun to school to kill a teacher. The other e-mail, sent to a teacher at a different school, indicated that he planned on targeting students as well. For further details please see the full article at South Florida's Sun Sentinel " http://www.sun-sentinel.com/news/local/palmbeach/sfl-pcletter18feb18,1,216444.story?ctrack=1&cset=true." For information on computer monitoring software take a look at WatchRight http://www.watchright.com/. A good site to visit to learn more about protecting children on the Internet is www.protectkids.com. It's full of great information every parent should know. Other sites you may want to visit are http://www.isafe.org/, and Obscenity Crimes Reporting http://www.obscenitycrimes.org/. About The Author ---------------- Darren Miller is an Industry leading computer and internet security consultant. At the website - http://www.defendingthenet.com you will find information about computer security specifically design to assist home, home business and small business computer users. Sign up for defending the nets newsletter and stay informed and empoweredto stay safe on the Internet. You can reach Darren atmailto: [email protected] or at mailto: [email protected]---------- Aritcle URL http://www.defendingthenet.com/Articles/ProtectYourChildrenOnTheInternet.htm
|
|
|
12
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / New CipherSend Online Security Service Thwarts Email Address Theft And Soothes P
|
on: September 02, 2007, 11:23:28 AM
|
New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue
In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.
I founded CPAsites.com and made a life for myself and a few other employees by designing and managing websites for CPA firms across the country. We had no competition in the early, heady days of the late 90's and were able to quickly secure a name for ourselves by offering quality sites to quality firms.
Since 1997 however, the internet has grown from a pimply faced teenaged medium to a...well, goliath-sized pimply faced teenaged medium. I can recall getting my first spam messages in the early days of email and like everyone else, I thought they were "kinda' neat" in the way that my teenage daughters think college mail is "kinda' neat."
As a website developer in 2005 however, spam has become the bane of my existence. Invariably, once a week, we get a call or email from a CPA exasperated by the volume of spam email he or she is receiving and, also invariably, we - or the website we host for the accountant - gets the blame. "Please remove all of our email addresses off the site!" they proclaim with finality.
So much for the golden age of instant internet communication at your fingertips. Dutifully, we would comply with their requests and it wasn't until I endeavored to solve another common CPA complaint that I stumbled on the perfect solution for email theft.
For several years, the second most common complaint coming from my CPA clients was concerning an easy way to have clients email them securely from their website. After we explain to them the intricacies of password management and secure logins, they immediately dropped their security plans. They, like everyone else on the internet, suffer from "password fatigue" and weren't about to subject their clients to learning and remembering yet another password just to send their CPA some tax information.
About a year ago, we finally decided there SHOULD be an easy way to just click on a website or email link and download a person's encryption key so that you can email encrypted documents to the individual. We searched. There wasn't. Seeing a critical need not only for our CPA clients, but also for attorneys, physicians and other financial professionals, we called an encryption programmer, gave him our idea and said "do it."
The result is CipherSend.com which began selling in March of 2005 for $19.95. As the encryption programmers promised, it works perfectly for what we needed (click the button, encrypt anything and send it with no password), but imagine our surprise when we realized it also solved an even bigger problem - spambots stealing our clients' email addresses!
When our clients replace their email addresses with CipherSend buttons, spambot crawlers are stopped in their tracks. The button-owner's email address is stored on our secure server, not on his or her public website. Needless to say, both we and our clients were rather delighted that a "side effect" of the program was even better than the intended cure!
The service is ideally suited for professionals and physicians who can now quickly and easily receive secure documents from clients, associates and patients at their standard email address without the inconvenience of giving out passwords or secure logins, but it is also finding a huge market among millions of aggravated spam victims needing to replace an email address posted on a public website or included in the coding of a contact form.
CipherSend offers advantages over standard website email or contact forms with its spam-block security and double notification to site visitors when their email has been delivered and again when it is opened by the recipient. Despite the low price, CipherSend uses sophisticated 2048-bit RSA asymmetrical (two-key) encryption algorithms with maximum key length and meets government security regulations required in the healthcare industry for the transfer of patient medical information.
Since messages and documents are encrypted right on the sender's computer with a downloaded public key and decrypted by the recipient's private key, CipherSend represents true end-to-end security. A demo of the button can be found on the CipherSend.com website and the program has a 30 day free trial membership.
Generally, "the law of unintended consequences" is a nightmare scenario for people introducing a new product or service on the market, but for this fortunate CPA, "two birds with one stone" just took on new meaning and made my life a whole lot less stressful!
Jeffery N Drake, CPA, MBAPresidenthttp://www.CipherSend.comhttp://www.CPAsites.com
|
|
|
13
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / Backup and Save your business!
|
on: September 02, 2007, 11:22:34 AM
|
Backup and Save your business!
There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind.
A message appears saying: "The file hal.dll is missing orcorrupt. Windows can not start." Well you know that 95% ofcomputer glitches are solved by a simple reboot, soclick?oops, can't click, no Windows. Ok then, you reset,and you think you are sure to be OK when the rebootcompletes.
Wrong! The same error message appears "The file hal.dll ismissing or corrupt. Windows can not start." How is itpossible for one measly file to kill your system?
DISASTER?What to do now? Phone your tech friend and askhis advice. He tells you the bad news. You are obliged tore-install Windows from the original disc! Oh My God! WillI lose all my programs and data? Yes, you will have to re-install all your programs. No your data may be safe, butonly if you don't have to reformat your hard disc.
But, your friend asks, I hope you have all your backups.
DO YOU, because that is the key to saving your business.You know that in today's business world, 95% of yourbusiness information is stored on your computer. Thisapplies not only to online businesses, but also to offlineones. In this paperless society of ours, business peopleare printing less and less of all their transactions.
Think hard. Where the heck did I hide my original Windowsdisc? Really, are you organized enough that you can easilyfind your original installation discs, along with the codenumbers they need to re-install.
You own some programs you downloaded off the Net, but theyare stored on your hard drive. Are they backed up? When isthe last time you backed up your data, the lifeblood ofyour business.
What backup system do you use? Do you use the old-fashioned tape systems, or do you backup to CD or DVD?Whichever one you use, the key is that your backups must befrequent enough to keep you out of major trouble.
Program backups do not have to be constantly repeated likeData does. Programs do not change, unless you downloaded anupdate. Then your update must be saved on your hard drive,and also backed up.
Data includes so many different things that it's easy toforget to back up some items. 'My Documents' contains muchof the data, but not nearly all. Do you know where yourFavorite links are stored? Where is your email that yousaved? Along with your email address book, Microsoft hidesthese files quite well.
It took me weeks to find, and then remember where they arehidden in Documents and Settings. I never did find theemail settings, so have not saved those.
Bottom line: what should you back up, and how often?
Whatever media you use, you must have at least 2 currentbackups of everything, and preferably 3. If you use CD orDVD, have you ever noticed how some discs suddenly becomeunreadable, and for no apparent reason. It happens oh toofrequently.. I lose up to 15% this way. CDs have anexpected shelf life of maybe 2 years. Some will surely lastlonger, too many die prematurely.
Does that mean you should not use CDs or DVDs to back up?Of course you should. It is the cheapest backup system I know about. But you MUST have more than one copy. I prefer 3.The proof of this comes when you save your business bybeing able to start over because your backups are up todate.
Imagine if you lose all your programs and have to buy themover again.
Imagine if you lose all your emails that have yourregistration codes for the programs you bought online. Andwhat about all the sales and purchase data in your emails.What about your contact list, your email lists, etc.
Imagine losing all your accounting data that you must havefor year-end tax reporting!
Enough said. Programs already backed up on 2 or 3 copies only need to be updated by adding new programs you buy, and upgrades that come out.
Data should be backed up based on the frequency of yourtransactions. It could be daily, or every 2 or 3 days ifyour business is in the early growth stage..
Without backups?your business may be dead in the water!Don't get careless. You may say I will save a disc or twoby backing up less often. Why? One CD-rom disc costs abuck. Big deal when it means life or death for yourbusiness.
Why take chances. Can anyone predict when you will have aproblem, a computer crash, a new virus? Of course not.Don't live dangerously, this isn't a thrill ride, it'syour life, your business life!
Fred Farahcopyright 2004
Fred Farah
Best Affiliate Products and Niche Market Strategieshttp://www.bestaffiliateproducts.com
|
|
|
14
|
THE TECHNO CLUB [ TECHNOWORLDINC.COM ] / Security / Top 10 tips for Safe Internet Shopping
|
on: September 02, 2007, 11:21:29 AM
|
Top 10 tips for Safe Internet Shopping Over £5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. The growth rate for the online market was 27.4 per cent, six times better than for the traditional retail market. This looks set to rise as more and more people look for more convenient ways of shopping. It's easy to search for a product and then purchase it ? all at the click of a button and from the comfort of your home. You have a fun time shopping, browsing, reading and gathering information about products, and you don't have to take time out from your busy schedule to fight traffic, crowds and queues to buy the perfect gift for your recipient. But how can you ensure you are shopping safely? Brad Bagherian, Managing Director, at Elaborations Ltd, a web design company in Amersham, has put together the following tips for safe surfing: 1. Take your time Take your time when purchasing online since high pressure sales tactics, just like in the real world, often indicate possible frauds. Ensure the site is easy to use, designed well and looks professional. An amateur's site will often look cluttered. If you are in doubt, stop the transaction. You can stop the transaction anytime before pressing the Pay and / or Confirm button that sends your order off to the business. 2. Look for Contact Details You may think all online shops will have their contact details on their website. You might be surprised to find that some do not provide their details, no email address and no phone number. This is a sure red flag. Reputable online shops will always provide concise contact information, this includes a physical address and a phone number. If you are suspicious trust your gut feelings. Do not buy online if you are unsure that the shop is real. 3. Consider all costs before purchasing Shop around and compare prices before buying. When you calculate the cost of a product make sure that you take into account of the delivery charge and the VAT ? these are often not included in the overall price. Also make sure what you're buying is not subject to any import restrictions. 4. Check the Returns Policy Most reputable online shops offer strong guarantees and stand behind their products. Check the Returns Policy before you proceed to the checkout. Things you should take particular note of are; what happens if the goods are damaged or faulty, who should pay the postage costs for the return of an unwanted item and how many days you have to return an unwanted item. Online shopping surpasses the physical shops in convenience, but there is a disadvantage of being unable to physically touch the products, so the greater the refund policy period the better. If there is no refund policy, the best advice is to stay away. Plus don't forget that under the Distance Selling Regulations, you do have a seven-day-cooling-off period in case you change your mind. For further information on Distance Selling Regulations see http://www.dti.gov.uk/ccp/topics1/ecomm.htm5. Check Delivery Options Find out when they will be delivering and whether you can choose the delivery date and time. Make sure the address you provide for delivery will have someone available who can sign for the package when it arrives. Various delivery options may incur extra costs. For example, faster delivery, registered post and weekend delivery may cost extra. So if you don't want to be surprised when checking out, make sure you find out what their delivery terms are like. 6. Protect your Personal Information Avoid giving out personal information that is not strictly necessary for a successful purchase. Check the companies Privacy Policy (which is usually located at the bottom of the website) which tells you what they intend to do with your information. They should maintain your personal details in the strictest privacy and confidentiality according to the 1998 Data Protection Act. 7. Ensure the Transaction is Secure Check whether the website complies with the industry's security standards (SSL) which help prevent fraud and protect you by encrypting the personal information you send over the Internet during the transaction. This encryption means that a hacker will not be able to steal your credit card and personal information. You must ensure the following two measures are in place before you complete any transaction on the Internet Ensure a padlock image is present on the bottom right hand side of your browser Ensure the web address begins with "https" 8. Pay by Credit Card This will give you added protection because your credit card issuer becomes jointly responsible for the goods that you buy. So if there is a problem that the company won't resolve, the credit card company will assist you. While the problem is being investigated, you would not need to pay the credit card charge and if the company still doesn't deliver or they are a scam, you're in a much better position to claim your money back. 9. Keep a record of everything Once you have made an online purchase, you will receive an email confirmation and an order reference number. Print these out and keep a note of any reference numbers provided during the transaction. It would also be useful to print out the details of the product or service you ordered. If there was a special offer on at the time, print out the web page with the offer on it. This will include vital information such as the web address, date and time it was printed. If you can not print out the information, then save the page in a folder on your PC for reference. These may be relevant if a dispute arises. 10. Know Your Rights Online consumers have exactly the same rights as offline consumers. The goods should fit the product description and be as satisfactory as described online. If something goes wrong with your purchase, there are actions you can take with the shop, and your bank to fix the problem. For further information take a look at the Office of Fair Trading website. Brad Bagherian, Managing Director, at Elaborations Ltd comments: "As long as you have these tips in mind, you can shop on the Internet with your mind at ease. Most online shops and companies provide excellent value and discount prices because they do not have to cover the overheads of a physical business that will cost them insurance, employee pay, taxes and more. It's no surprise then that we are finding more and more businesses are taking their products and services to the web by setting up ecommerce sites." Brad Bagherian is the founder and MD of elaborations Ltd ( http://www.elaborations.co.uk). elaborations is a London based Design Company specialising in website design and development, graphic design and Internet marketing.
|
|
|
|
Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Loading...
|