Results 1 to 11 of 11
  1. #1

    Lightbulb Keeping Yourself Safe On The Web

    .
    Keep normal computer functionality while combating malware





    Keep Windows updated!
    - Internet Explorer.
    • Go to Start > Windows Update or go to Microsoft Update, and install ALL critical security updates listed.


    • Always keep current with the latest Microsoft security updates by applying Service Packs and all critical updates issued on the second Tuesday of each month. Also known as Patch Tuesday.
      • These can patch many of the security holes through which attackers can infect your computer.



    • Do not turn off Automatic Updates!
    • Go to Start > Control Panel > Automatic Updates to ensure they are on.




    Tighten Internet Explorer's security setting
    • Since Internet Explorer is the leading browser it will always be the lead in attacks from the bad guys.
      • Make your Internet Explorer more secure
        1. From within Internet Explorer click the Tools menu and then on Internet Options.
        2. Click once on the Security tab
        3. Click once on the Internet icon so it becomes highlighted.
        4. Click once on the Custom Level button.
          • Change the Download signed ActiveX controls to Prompt
          • Change the Download unsigned ActiveX controls to Disable
          • Change the Initialize and script ActiveX controls not marked as safe to Disable
          • Change the Installation of desktop items to Prompt
          • Change the Launching programs and files in an IFRAME to Prompt
          • Change the Navigate sub-frames across different domains to Prompt
          • When all these settings have been made, click on the OK button.
          • If it prompts you as to whether or not you want to save the settings, press the Yes button.

        5. Next press the Apply button and then the OK to exit the Internet Properties page.








    Tighten Internet Explorer's security setting continued
    - Default Internet Explorer settings should be set to high.

    1. Start up IE then go to Tools > Internet Options > Security
    2. Set the Security level for the Internet Zone to High. (If no slider is visible, click Default Level.)
    3. Click the Trusted Sites icon.
    4. Set the Security level for the this Zone to Medium. (If no slider is visible, click Default Level.)
    5. Click OK.




    Use a personal firewall
    - Using more than one at a time can cause system crashes and/or program conflicts.
    • It is critical that you use a firewall to protect your computer and your personal information from hackers.
    • Use a third party firewall







    Use anti virus software
    - Only use one antivirus to avoid system conflicts.

    • Always make sure your antivirus is up to date!


    • Set the updates to automatic or get in the habit of manually checking for updates weekly.
    • Below are some reliable free and paid antivirus.










    Online virus scans - Occasionally run an online scan.

    These all remove what they find for free.



    Anti-malware programs
    - Use more than one.

    Some listed below also have paid versions that offer real time protection.
    Only one antispyware with
    real time protection is required but the use of multiple on-demand scanners is suggested.
    Be sure to check for updates before each scan


    • Antispyware test:
      • Spycar - A suite of tools designed to simulate spyware-like behavior.



    Realtime malware blockers
    - Programs that are designed to preventing malware from being installed.

    Both of these can be used along with one real time spyware protection.



    Dialup users -
    Avoid Dialer rip offs.



    WinPatrol
    - Real time Infiltration Detection.


    System Restore and Backups
    - Do a complete virus scan before performing any backups.



    • Backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.


    Backup software
    - Backups can be a invaluable resource.
    • ERUNT & NTREGOPT A useful freeware utility for users of Windows 2000/XP.
    • It's made up of two parts, ERUNT & NTREGOPT.
      • ERUNT will create daily complete backups of your computer's Registry. Whilst System Restore does the same thing, a corrupt registry file may prevent Windows from booting & this effectively disables System Restore. With ERUNT, you're able to restore the damaged Registry.
      • NTREGOPT works by recreating each registry hive "from scratch", thus removing any slack space that may be left from previously modified or deleted keys. In other words, it compacts the Registry to a small size which allows Windows to load & perform faster.



    • Karen's Port Replicator is a fantastic freeware backup program that's easy to use, and it allows scheduled backups.


    • Acronis True Image is a very attractive and reasonably priced hard drive imaging program, that can save you in the event your hard drive fails unexpectedly. Acronis supports Microsoft Windows Vista and offers a 15 day trial version.


    Alternate web browsers
    - More secure, and customizable.

    • Alternative browsers like Mozilla Firefox are somewhat more secure because they are have fewer security holes. This is because fewer malware writers target the non Microsoft browsers.


    • Opera is a full-featured Internet power tool with many useful tools and features.


    • Avant Browser is a fast, stable, user-friendly, versatile web browser with many features.





    You must remember that no browser will offer complete protection. If you access questionable sites, download illegal, pirated or keygens/cracked software or visit porn type websites then no browser will be secure enough!


    Software updates
    - An extremely useful tool which is strongly recommend to use at least once a month.

    • Secuna Software Inspector
      • Detects insecure versions of applications installed
      • Verifies that all Microsoft patches are applied
      • Assists you in updating your system and applications
      • Runs through your browser. No installation or download is required.




      • The Secunia Software Inspector covers
        • Internet browsers
        • Internet browser plugins
        • Instant messaging clients
        • Email clients
        • Media players
        • Operating systems




    • FileHippo.com Update Checker
      • The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases. These are then neatly displayed in your browser for you to download.



    Sun Java JRE (Java Runtime Environment)
    - It is very important not only to keep Sun Java up to date but also to remove older versions which have security holes and can be exploited by malware.



    • Install the latest version of the Java Runtime Environment
    • Uninstall any old versions of Sun Java in Add or Remove Programs. (Vista Programs And Features)
    • Download JavaRaand unzip the file to your Desktop.
    • Open JavaRA.exe and choose Remove Older Versions
    • Once complete exit JavaRA and delete the program.


    • The Microsoft Java Virtual Machine, or MS Java VM, should be removed due to it no longer being supported by Microsoft. It has become obsolete which leaves it open to exploit by malware.




    CCleaner - Erase your tracks.
    Download CCleaner

    It is suggested to download the CCleaner - Slim - No Toolbar which is the version without the Yahoo! Toolbar.
    • Double click on the ccsetup.exe file to start the installation of the program.
    • Select your language and click OK, then next.
    • Read the license agreement and click I Agree.
    • Click next to use the default install location.
    • Under Install Options, choose all the default settings
    • Click Install then finish to complete installation.
    • Double click the CCleaner shortcut on the desktop to start the program.
    • On the Windows tab, under Internet Explorer, uncheck Cookies if you do not want them deleted. (If deleted, you will likely need to reenter your passwords at all sites where a cookie is used to recognize you when you visit).
    • If you use either the Firefox or Mozilla browsers, the box to uncheck for Cookies is on the Applications tab, under Firefox/Mozilla.
    • Click on the Options icon at the left side of the window, then click on Advanced.
      Uncheck Only delete files in Windows Temp folders older than 48 hours.
    • Click on the Cleaner icon on the left side of the window, then click Run Cleaner to run the program.
    • Caution: It is recommended that you use the Registry feature with care.
    • Always back up the Registry before removing anything with the Registry cleaner.
    • Exit CCleaner.


    Watch what you download!
    - Screen savers, codecs, audio/video files, chat and e-mail attachments are just a few threats.

    Malware can be hidden in illicit software or other files and programs you might download from the Internet.

    Many "freeware" programs come with an enormous amount of bundled spyware that will slow down your system, include pop-up advertisements, steal your personal information or just plain crash your browser and even the Operating System itself.

    • P2P programs come with an enormous amount of bundled malware. There are also multiple sites that offer rouge antimalware products.






    • Javacools EULAlyzer can analyze End User License Agreements in seconds. Discover if the software you're about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, and much much more.




    Malware free all-in-1 Codec packs
    - The K-Lite Codec Pack should be all you ever need.

    If there is a video or audio file that says it needs anything besides what the below codec packs include, it likely contains malware.



    Website analysis
    - Always know the sites you download from or visiting are safe.
    • Dr. Web Link Scan - Scan a link or file before you download it by copy and then paste the download or url link into the white box then click Scan


    • LinkScanner Lite - Integrates with major search engines to check search results for a variety of online threats before you click.


    • WOT - Web of Trust - WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free. WOT works with Internet Explorer and Firefox.


    • vURL Online - This service is completely free and allows you to view the source code within a webpage without your having to visit the site itself.


    • Phishing is prevalent and on the rise. Make sure the site you go to is real. Your ISP or Web Browser may offer a toolbar to warn you of fake sites or you can choose one of the following
    • Spoofstick Toolbar
    • Netcraft Toolbar


    Skype users


    If you are a Skype user, please read Staying safe on Skype
    Also see Tips on how to safely use Skype. On the bottom of the page and pay particular attention to Article 4 - Permission to Utilize section of the EULA (end user license agreement).

    Additional articles:
    To Skype or not to Skype
    Use internet telephony safely


    Cookie management
    - Generally harmless, cookies are pieces of information generated by a Web server and stored on the user's computer.

    • Cookie Viewer - This Power Tool automatically scans your computer, looking for "cookies". It can then display the data stored in each one and can delete them.
    • Cookie Cruncher - Protects your hard drive from unwanted cookies.
    • Cookie Culler - Extended Cookie Manager. Protect/unprotect selected cookies. (Firefox only)
    • Add N Edit Cookies - Gives you the ability to easily alter, edit or delete cookies. (Firefox only)




    Scan your security event log - Check for high security events happening on your machine.
    • Use EventLogScan to check that your system is truly secure!


    Test your work
    - Check if your PC is secure.


    Resources
    - Videos & quizzes
    It is better to keep your mouth shut and appear stupid than to open it and remove all doubt.

  2. #2

    Lightbulb Web, email, chat, password and kids safety

    Web, email, chat, password and kids safety
    .
    Reports show that 74% of all e-mail is spam, and that one in 137.5 e-mails contain a malware of some sort, and that one in 200 e-mails is a phishing attempt.

    Viruses are most easily spread by attachments in e-mail or instant messages

    Phishing e-mails impersonate Banks, PayPal, eBay and Retailers

    If your e-mail application allows it, disable images in your e-mail. The primary reasons behind image blocking features are to prevent spammers from knowing if users open their messages.

    Never open a Chat or e-mail attachment without virus scanning it first!
    • Don't open any attachment unless you know whom it's from and you were expecting it.
    • Never unsubscribe from spam e-mail as this just validates your e-mail address to the spammer. Instead just delete it.
    • If you receive a chat or e-mail message with an attachment from someone you don't know, delete it immediately.
    • Use antivirus software that scans attachments as you open them and keep it updated.
    • Use an e-mail program with spam filtering built-in.

    Never respond to request for personal information through an embedded link in e-mail or through chatting.
    • Keep your chat software up to date.
    • Never send personal information through an instant message.
    • When you're asked to enter or sign up for a chat nickname, choose a name that doesn't give away your personal information.
    • Don't open attachments or click on Web links sent by someone you don't know


    • Phishing scams typically masquerade as e-mails from legitimate companies such as a financial institutions and contain links back to sites that look real. The reality, though, is these sites and e-mails are all fake and are simply being used to try and steal your information so that they can attempt an identity theft with your information.
    • Spam mail is basically unwanted and unsolicited e-mail. There are companies whose entire business model is to send out unsolicited e-mail and flood your inbox with trash. People have and still do loose their entire life savings to spammers.
    • Keyloggers can be installed by opening attachments in e-mail or in chat sessions.
    • Chat rooms and social networking websites are virtual magnets for harvesting software.
    • One address posted in a chat room received spam mail nine minutes after it was posted.
    • Spambots constantly scour websites and chat rooms looking for email addresses to add to their lists. It's not that they might lift the address, it's that they will lift the address.
    • CHATDANGER is a site all about the potential dangers on interactive services online like chat, IM, online games, email and mobiles.


    Pop-ups and URL redirection


    Never click on pop-ups ads! Many of these actually lead to some form of malware including virus, trojans, adware, spyware and browser hijackers.
    • URL redirection is the first sign that your PC may be infected.
    • Be very suspicious if you click a link and end up somewhere you didn't intend to be or start seeing pop-ups for porn and security software.
    • You might be left with an adware toolbar installed into your browser as well as some pesky pop-up advertising for rogue security software.
    • Avoid clicking on pop-ups even to close them. Instead, close pop-ups from the system tray with a right mouse click and choose Close.
    • Increase your browser security settings by using the Pop-up blocker.

    How to configure the Pop-up Blocker in most browsers

    Is your pop-up blocker working?


    • SPAMfighter Whenever new mail arrives, it will automatically be tested by SPAMfighter, and if it's spam, it will be moved to your spam folder. If you receive a spam mail that is not detected, click a single button, and the spam mail is removed from the rest of the 4.013.339 SPAMfighters in 218 countries/areas in seconds.
    • SpamPal is a mail classification program that can help separate your spam from the mail you really want to read.
    • Any email messages that SpamPal considers to be spam will be "tagged" with a special header; you simply configure your email client to filter anything with this header into a separate folder and your spam won't be mixed up with the rest of your email anymore!
    • Trend Micro eMail ID is a browser plug-in that helps you identify legitimate email messages in your inbox.
    • Use a free disposable e-mail address instead of your real one for web forms, surveys, chat sessions, message boards or anywhere you would rather not take the chance of receiving spam in your main e-mail account.
    • Hoax-Slayer is dedicated to debunking email hoaxes, thwarting Internet scams, combating spam, and educating web users about email and Internet security issues.
    • eCops is an online reporting service to which the Internet user can report crimes committed on or through the Internet.
      • You needn�t worry about who is qualified for what, eCops makes sure that your report is being investigated by the appropriate service.


    Fraud resources



    More spam prevention tools




    Password safety

    To create a strong password use a mixture of uppercase and lowercase letters, numbers, and other characters such as * ? $ % ^ & # to make the task of cracking it more difficult.

    The best defense against typical password cracks is length. The one drawback to lengthy passwords is that there are websites that put length restrictions on passwords or only allow letters and numbers, although Windows allows up to 120 characters for passwords.

    The key is to make a password that is easy to remember yet creative enough to fend off anyone trying to crack it.

    • Never share the password with anybody through e-mail or telephone conversation.
    • If you use a password manager, never give out your master password.
    • Don�t write passwords on pieces of paper and stick them in your drawer or pockets.
    • Password managers are not safe on a shared computer. It's best to only use them on your personal computer.
    • Using personal information for your password is not secure, such as your address, birthdays, initials, names, etc. And NO, using �password� is not a safe password.
    • Using the same password for everything is a bad idea. If that password is discovered, all your accounts can be stolen.
    • The longer the better. Don't make a password that's less than 6 to 8 characters. Anything less can be easily cracked using brute force software.
    • The more random and meaningless the password the better. Catch phrases can easily be cracked.

    I have been noticing a bunch of bloggers lately stating that using a blank password is safe. Microsoft even mentions it in this article: Strong passwords: How to create and use them. If anyone thinks that this is a safe method I encourage you to read this article by MS MVP ShadowPuterDude: The Sheer Lunacy of Suggesting the Use of a Blank Password

    Password strength tests


    What to do if your password is stolen or if you think your identity has been stolen or you've been defrauded.


    Alternate Instant Messengers


    These are malware free Instant Messenger programs which allow you to connect to multiple IM services in one program! (AOL, Yahoo, ICQ, IRC, MSN and more)


    Knowledge building




    Kids safety

    If your children use the Internet at home, you already know how important it is to help protect them from inappropriate content and contact.

    Much like the way marijuana is a gateway that leads to other drugs, children viewing pornography at a young age can also lead to more dark and reckless activities. Setting limitations in our children's online world is one way to help combat the temptations of viewing material that they are not ready for.

    In a survey of approximately 6,000 Canadian children, 26 per cent of the 9- to 10-year-olds said they visited private and adult-only chat rooms. The number increased to 66 per cent for 15- to 17-year-olds.


    Kids web browsers, web sites & search engines



    Enabling porn filters for major search engines

    • AOL Search - Doesn't appear to offer a filter, but enabling Parental Controls might have an impact on web search matches.
    • Ask Jeeves -Use options for Content Filtering on the Your Settings page or try Ask Jeeves For Kids, listed above.
    • Google - See the SafeSearch help page for instructions on setting up filtering on a permanent or as-needed basis.
    • Lycos - Use the Adult Filter section of the Advanced Search Filters page.
    • MSN Search - Use the Safe Search Filter on the Settings page.
    • Yahoo! - Set the SafeSearch Filter option via the Search Preferences page.


    Kids safety & cyber crime reporting



    Free parental control software





    Commercially
    licensed parental control software


    If you have any questions don't hesitate to ask in our forums.
    It is better to keep your mouth shut and appear stupid than to open it and remove all doubt.

  3. #3

    Lightbulb Trusted security tools & resources

    Trusted security tools & resources

    - I have used and/or recommend these tools.
    - If you are unsure of what tools are safe to download, use this list.
    - Some of the tools can damage a perfectly good OS if not used with care.
    - Use caution and only download from known safe sites.
    - Always download from the software makers Website if possible.
    - The software listed here is malware free, that does not mean that the site you download from is.

    - Unless otherwise noted the tools below are FREE.
    - Some are available as trial/shareware versions and have full functions during the trial period.
    - If you have questions don't hesitate to ask in the forums.


    Safe download sites
    (Any site with a bunch of free ScreenSavers is not 100% safe!)

    If your going to download anything regarding a security product, ALWAYS get it from the vendors website.

    Backup & imaging



    Temp. file & history cleaners

    Registry cleaners

    Warning: Using registry cleaning tools unnecessarily or incorrectly could lead to disastrous effects on your operating system such as preventing it from ever starting again. If your not 100% positive then leave it alone!

    Always back up your registry before making any changes.

    All-in-one & tweak tools


    File shredders

    Securely wipe hard disks

    Caution: DBAN will automatically and completely delete the contents of any hard disk that it detects.

    Tutorial: How to completely wipe all the data from your hard drive


    Firewalls (use only one)

    Antivirus (use only one)

    Gaming antivirus

    Portable security

    Spyware/Malware scan & removal
    Some offer real time protection with the paid version


    Online virus & spyware scans
    Most of these require working ActiveX - Internet Explorer

    Online trojan scans
    Require Internet Explorer


    Virus & spyware blockers


    Tutorial: Using IE-Spyad
    Anti-Trojan scanners

    Anti-keyloggers

    Rootkit detection
    Rootkit scans can be easily misunderstood
    It is advised to ask for help if you are not sure of the findings

    Online website URL analysis & advisors

    SafeSurf � - The original Internet content rating system! - ICCS� Certified

    For added security always keep your browser,
    firewall and antivirus up to date!
    Software Vulnerability Scanning - Secunia.com


    Password managers

    File/Drive encryption

    Analysis

    Hijackthis log tutorials
    Please ask for help in our forums when
    using Hijackthis if you are not 100% positive


    Specialized free removal tools
    You may need to know the virus or spyware
    name to use some of these

    Program & file identification


    Suspicious file scanners
    These will not remove malware but will help
    identify if a file is infected


    Remove stubborn files/programs

    General purpose/all in one fixes
    These tools can fix some Browser and Internet problems
    caused by malware.

    Web browsers

    Vulnerability testing

    Software updates & definitions

    Malware databases


    Virus hoax warnings - Wikipedia Virus hoax

    It is better to keep your mouth shut and appear stupid than to open it and remove all doubt.

  4. #4

    Default

    About the registry Cleaners.. If you use CCleaner, you should not enable any other options. Use the standard ones. The only one that would be safe to use without removing half of your hardware would be "Wipe Free Space". But it takes forever to finish.

  5. #5

    Default

    For novice users i would propose "Eusing Free Registry Cleaner". It is easy&safe to use.
    It is better to keep your mouth shut and appear stupid than to open it and remove all doubt.

  6. #6
    Rank: Forum Addict
    • Join Date: Apr 2009
    • Posts: 521

    Default

    Good job and very usefull , but are they safe ?(all of them)
    ΠΑΛΙΕΣ ΚΑΛΕΣ ΕΠΟΧΕΣ !

  7. #7

    Default

    If they take all precautions, they most definitely are.
    It is better to keep your mouth shut and appear stupid than to open it and remove all doubt.

  8. #8

    Default

    does the Ccleaner also remove the registry of trial packs?

  9. #9
    Rank: Aristocrat
    • Join Date: Jun 2009
    • Posts: 1,060

    Default

    Yes it does.It's clean and safe.

  10. #10

    Default Keeping Yourself Safe On The Web

    Can you not use the GPS data to show the route in google maps then use the link to embed the map in your web page?

  11. #11

    Default

    This thread is old and the author is no longer active.


    Closing.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •