HackAttack

P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.

What can we do about it? How can we be sure that we are properly protected against them?

A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control of your computer so that he can use it to send out hundreds of thousands of e-mails in your name with the intention of crashing your mail server.

This can get you into very serious trouble with the server. This is something that you do not want. How are you going to prove that you were not to blame?

How do the hackers do it? What tools do they use?

A port scanner. What is a port scanner? A port scanner can locate PCs that are on line and check for an open port. A hacker using a program such as 'Super Scan' can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of the trouble.

The main port that the hacker is interested in is port 80. This is the one that you use to log on to the internet.

I am not going to confuse you with all the various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.

There are a number of programs designed to show you what is going on inside your PC. I will give you a short list of some that are recommended by some of the program makers.

The one that I would not be without is: www.testmyfirewall.com As its name implies it will test your firewall for flaws and scan for open ports and any other security problems you may have. You do have a firewall, don't you?

Another one is: www.pestscan.com This will scan for any nasties that are already on the computer.

Lastly, I use: http://www.security.symantec.com This will run a security check of all my systems.

Don't put of what you should be doing today. Make sure that your protection is doing its job. Check that you have the latest version of whatever protection you are using. An out of date system is worse than useless. It gives a false sense of security and suddenly you find yourself in serious trouble with your ISP.

It is your responsibility to ensure that your computer will not cause problems for someone else. There are so many free systems out there that you have no excuse for not using one or more of them.

Be safe. Be happy. Be responsible. All the best. ?Bob?

---

Robert has been on line for over four years and earns a very good living from some of the very best affiliate programs on the web. This is one of his favorites. If you are interested in growing your very own opt-in mailing list in the shortest possible time, take a look now.

http://www.bz9.com/robjfar 'It's free.'

In The News:


pen paper and inkwell


cat break through


How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More