Internet Security

Joel Skousen's Discussion Forums: The Secure Home (FAQ): Internet Security
Top of pagePrevious messageNext messageBottom of pageLink to this message  

WJR

Friday, December 20, 2002 - 05:36 pm Click here to edit this post
Back in the March 31 issue of WAB, Joel discusses internet security. He advises not to use Microsoft products. I'm currently using Internet Explorer which I know is not at all secure.

Joel uses Opera which he recommends in the brief. I was just wondering how many have switched and if you like it. It must be good if Joel likes it.

Bill

Top of pagePrevious messageNext messageBottom of pageLink to this message  

WJR

Friday, December 20, 2002 - 05:59 pm Click here to edit this post
OOPS! I should have posted the above in the WAB Forum.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

wjr

Monday, December 30, 2002 - 06:07 pm Click here to edit this post
Never mind. I'm using it and like it.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

unkeled

Wednesday, February 19, 2003 - 06:20 pm Click here to edit this post
Do a google search on the internet for the software called Spybot. It's freeware out of Germany. Install the product, check all options for it to do a full job, and it will remove almost all traces of what you've been doing on the net. The author has had so much success with the product that he is now gratefully accepting contributions. However, he puts no limitations on the product's use for personal purposes, and I can testify to the fact that it does remove most current tracks. If you need to go further, you will have to work into the Microsoft registry and start changing stuff there. Don't really recommend it. Once done with all this, then switch to Opera, but remember that it won't work with all sites though it's a darn good product.
I might add that Opera leaves tracks too.

And while I'm at it, you need to stop using any Microsoft email product. They leave lots of internal tracks. Better to use a less known product. Eudora, Pegasus, etc come to mind. Be prepared however for the "trauma" of change.

Ed.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

wjr

Wednesday, February 26, 2003 - 09:47 pm Click here to edit this post
Thanks Ed,

Not being a computer nerd, I worry about what might be hiding deep inside the computer that I can't find and delete. I also notice that I get a lot of nasty little pop up ads that come out of nowhere.
I'm glad you mentioned that opera does not work with all sites. I noticed this also. The version I downloaded was what they called "beta", which I assume means a preliminary. Now I notice there is a final version and was wondering if the bugs were worked out. If so, I may purchase it so I do't have to look at ads.

Also, thanks for recomending e-mail products. I know about Microsoft products. just didn't know what others were good.

I think we all need to get a little more paranoid about all aspects of privacy.

Bill

Top of pagePrevious messageNext messageBottom of pageLink to this message  

THX1138

Tuesday, April 01, 2003 - 03:25 pm Click here to edit this post
Hi All,

I want to put out a reminder that not all the tracks of your internet activity are stored on your computer.

Any time you visit a web site, its server may or may not be storing your computer's address and a list of the pages you viewed on that site. This has nothing to do with "cookies". I've seen some of these server logs and they can be most interesting. The admins used to only keep them for the purpose of mapping which pages are getting the most "hits" but who knows what those logs could be used for now?

Also, when you do anything on the internet, (browse the web, send email, etc.), your "packets" of info may be passing through many different server computers. Those computers may be scanning ("sniffing") or storing these packets. Not only have there been hackers (cyberpunks) stealing info this way there have been government projects (Echelon, Carnivore, etc.) which scan email traffic going through certain servers. If certain keywords are found (typically relating to terrorism and drug trafficking), the email messages are kept for future reference. You can't really change what "route" your email may be taking, that's the beauty of the internet - a server may go down and all the traffic that was going through it will be rerouted through different servers.

Traceroute is a utility on some computer systems which will actually show you what servers your data packets are traveling through on their way to a specific address (some servers will identify their physical location too). A while back I found an address that took a route starting in central Ohio, bounced through 12 different servers including ones on the west coast AND the east coast before actually getting to the correct address in eastern Ohio. Granted, the system I was trying to connect to was having network problems, (causing the networks not to know where to send the data). But it serves as an example of what can happen to your private email messages.

An extension of this is that many corporate email servers keep a copy of each message that is sent (my employer's system does this). This definitely can be used against you.

To be even more paranoid about your computer:

Format your hard disk and reinstall everything once in a while (maybe once a year or maybe 2 years, depending on how sensitive your data is). Do this especially before you pass an old computer on to someone else. Yes, that means erasing EVERYTHING and starting from scratch. This is where backing up important data becomes really important. I don't recommend just backing up the entire disk and copying back the entire backup after the format. That leaves the tracks in tact. I like to only backup certain folders of data that I know I need (I like to burn (write) them to CD's). You can always crack, shred or destroy the CD in a fire if you need to erase the data later. Though even formatting a hard disk will not prevent real professionals from recovering data, it will certainly cut down on the obvious tracks (and the sorts of things that give the professionals the hint that they need to look deeper).

Also, PGP encryption (http://www.pgp.com/) is a good idea, as Joel mentioned, BUT, having encrypted files on your computer (or in your email) will again alert the professionals to dig deeper. Whether "They" can crack the latest version of PGP or not is still under dispute.

I agree with Joel about Microsoft. In fact, I will NOT buy a home machine with Windows on it (I have no choice at work). I've been a Mac user for years (yes there is still plenty of software for the Mac (over 8,000 commercial programs, many more shareware and freeware programs) - if you need help finding something send me an email).
If Apple ever stops selling Macs, I'll switch to Linux (perhaps it will actually be a little more user friendly by then). Another benefit to consider, 97 percent of computer viruses and "cyber attacks" are Windows only. This is because Apple has something like 3 percent of the consumer market share, while Microsoft has something like 97 percent. When 97 percent of the computers out there are Windows, where do you suppose most of the viruses and attacks will be directed?

Anyway, to make a short story long... The best way to ensure your computer is secure is to KNOW that it is NOT secure and act accordingly (i.e. don't send email you don't want published on the front page of a national newspaper).

I hope this helps...

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Kay

Tuesday, May 06, 2003 - 12:40 pm Click here to edit this post
EPIC Online Guide to Practical Privacy Tools

Snoop proof email, anonymous remailers, surf anonymity, HTML filters, cookie busters, voice privacy, email and file privacy, web encryption, disc encription.
http://www.epic.org/privacy/tools.html

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Shawnee

Sunday, July 13, 2003 - 08:26 pm Click here to edit this post
Personal information that might be used in identity theft schemes against you can be obtained from the web site http://www.anybirthday.com. You can opt out and insist that your personal information be removed from the web site.
http://www.snopes.com/inboxer/scams/birthday.htm

On Internet Scams
http://www.snopes.com/inboxer/scams/scams.asp

Top of pagePrevious messageNext messageBottom of pageLink to this message  

shoots (Gedwards)

Monday, July 14, 2003 - 06:21 pm Click here to edit this post
It's good to know about the servers being tractable. I'm no computer expert, but I always felt that they could find out where you've been surfing (using the servers). I'd like to mention that when Joel talked about erasing data with Window Washer and Cyberscrub, I then tried both systems' free trails. I fianlly opted for Cyberscrub and I have been happy with the results, in fact I updated with their latest version and I'm happy that it doesn't interfere with Windows programs(yea, I'm one of those dummies that uses Windows). I tried the latest version of Window Washer's free trial and I couldn't sign in on MSN until I removed the Window Washer trial from my programs. I'm not saying Window washer is a bad program( it's actually quite good) but I did experience some problems. I think though, that also I've reached the limit on my computer's memory and that could have something to do with it. Anyway, Cybersrcub does a number on everthing I can fiquire is on my computer after I've done my surfing and I'm confident it's one of the best on the market; unless anyone knows of a better one?! By the way, Cyberscrub makes a program called Cybercide that really does a complete erase job and is good if you're getting rid of your computer and don't want any history left on it. Also, I was getting so tired of pop ups that I fianlly got Mcaffee AdSubpro and it does a reasonable good job of eliminating pop up adds. I always thought that those pop up adds could give an outside source an easy window of view on your computer. Oh I almost forgot, I downloaded the Opera software and I use it every so often, probably not as much as I should, but I feel that it's a fairly secure way to surf about. As far as being totally secure, I doubt it, but it's probably is more secure than other ways mentioned, such as Windows.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Steve Stock

Sunday, August 24, 2003 - 03:24 pm Click here to edit this post
Is Your Computer Being Hijacked?
By Dr. Joseph Mercola
http://www.mercola.com/2003/may/14/spyware.htm

Spyware can send Internet users to porn and gambling Web pages, track where users go on the Internet, trigger pop-up ads and slow down overall PC performance.

While there were 56 types of Spyware on 125 Web sites in 2002, there are now 493 types on 1,317 Web sites.

Comparatively, there are only a few dozen types of computer viruses active at anytime worldwide.

Spyware can get installed via:

· Browser hijackers. By clicking on certain pop-up ads or Web pages, you trigger malicious code that resets your browser home page, inserts unwanted bookmarks and makes the changes difficult to purge. Some browser hijackers get paid for each browser click diverted to sites they send traffic to, mostly porn and gambling sites.

· Adware. As a condition for using services such as Kazaa or Grokster to download music, you must agree to accept programs that alert advertisers where you go on the Web. Before long, pop-up ads follow, and PC performance might degrade.

· Auto dialers. Lurking in browser hijackers or on certain Web pages, these programs tap into your PC modem to dial 900 numbers in other countries and rack up exorbitant fees.

Spyware victims can find help at Web sites such as http://www.spywareinfo.com and http://www.doxdesk.com .
Simple steps can tighten browser security settings, and free spyware eradication programs are available from Lavasoft and SpyBot.

USA Today May 5, 2003

Dr. Mercola’s Comment:

So far, 2003 is off to a slower start than 2002 in terms of the appearance of new computer viruses. While antivirus protection has improved, there are still many unprotected PCs in the world.

Some people feel the real reason for the decline in viruses this year is that the serious virus writers have graduated to more sophisticated attacks, such as Trojan horses and spyware. The occurrence of both of these threats has increased in 2003.

Trojans open ports on infected machines and allow malicious users to access data on that system remotely. A more mainstream use of this technology is called spyware, ad-serving software that (in the best case) allows advertisers to update and target advertising on your computer or (in the worst case) allows advertisers to track your Web habits for sale to other advertisers.

Trojan horses and spyware are quite similar: both have the potential to obtain information about you without your knowledge.
Some think spyware is acceptable, because it's what allows the software you're using to be free. And there are legitimate uses for this technology. But whatever the purpose, this activity should be disclosed somewhere in the end-user license agreement so that you know what your software is doing and can decide whether it's OK with you--but often it's not.

Unfortunately, antivirus software does little to stop spyware. It will identify and remove some Trojan horses associated with viruses, but it will not recognize those associated with free software. Firewalls can be effective in blocking spyware from communicating with other computers on the Internet. However, antivirus apps and firewalls won't protect against all Trojans or against spyware attacks on your system registry. For these more subtle threats, you're going to need a dedicated anti-spyware program.

The current issue of PC Magazine recommends the following program as one of the best out there, and to top it off it is free:

SpyBot Search & Destroy

Your computer is likely infected with a form of program called spyware. According to a recent GartnerG2, more than 20 million people have installed applications that report back to a company about your online activity.

In all likelihood you willingly installed much of your spyware yourself when you downloaded an application from the Internet. That is how some companies make money while not charging for their products. In a sense you are paying, but the coin is privacy, not money.

I recently had to reformat my Dell notebook, and the install was only a few weeks old yet spyware found over 20 items that needed to be removed. You might have hundreds.

SpyBot Download

The program is a bit tricky to install, as you must first download the program. Once downloaded you will need to find the program and execute it. Hint: Just remember the folder location that you download it to.

After you click the file it installs itself onto your computer, but you will need to go to your program folder and find it to execute it. Once it is executed it will need to go online and download an updated version with the latest information.

Finally after this lengthy process you can scan your entire computer for infections and then immunize your computer against future ones. It is a slight pain, but I believe it is worth it for the added protection you will receive.

ZoneAlarm

When was the last time you parked your car in a busy lot but left the keys in the ignition and the motor running? How often do you leave your house with the doors and windows wide open?
Never of course, we all lock up our property to prevent theft and malicious damage. But if you leave your computer connected to the Internet without any special security of its own, you're leaving it as open to intruders as a house with no locks. Although your computer may not contain information that can change the balance of world power, you'd be amazed at just how much sensitive, personal data hackers can find in a Microsoft Money file or in your browser's cookie file.

The best way to protect your PC from Internet intruders is to install and set up a firewall. Corporations usually run expensive hardware-based firewalls to protect their networks, but for the individual's PC, we recommend personal firewall software. Firewall software monitors your Internet connection, alerts you when an outside connection tries to access your system, and blocks that attempt if you want it to. Some firewalls will also alert you when programs on your own PC attempt to access the Internet unexpectedly (possibly indicating the presence of spyware on your system).

Most experts widely agree that the best software firewall out there is ZoneAlarm. One can purchase their program and obtain a bulk of nifty features, but the vast majority of the protection can be obtained by using their free program.

If you go to the ZoneAlarm site you will have a major challenge finding the free download. Of course they don’t want you to get the free software and would much prefer you pay for the extras. But most people will not need them and nearly all of the reviewed protection is available in the free version listed above.

Phoenix--Alternative Web Browser

If you have any technical expertise at all, or know someone who does, I would highly recommend that you stop using Internet Explorer as your browser. Well over 99 percent of my Web surfing is done with the new browser called Phoenix. It is much faster and gives you far better control over your Web experience.

I wrote a comprehensive article on Phoenix a few months ago and my enthusiasm for Phoenix has only increased since I started using it. I would never go back to Internet Explorer.

http://www.mercola.com/2003/may/14/spyware.htm

©Copyright 2003 Dr. Joseph Mercola. All Rights Reserved. This content may be copied in full, with copyright, contact, creation and information intact, without specific permission, when used only in a not-for-profit format. If any other use is desired, permission in writing from Dr. Mercola is required.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Shawnee

Friday, September 05, 2003 - 06:20 pm Click here to edit this post
The Secret Life Of An Infected PC
Excerpt:

Richard Smith, a computer security expert in Brookline, Massachusetts, estimated that one of every two computers using versions of Microsoft's Windows operating system has unsolicited software lurking within. "I'm the official computer maintainer in my extended family, and I have seven computers to keep up and running," Smith said. "With the exception of my computer, they've all been whacked." His machine was spared, he said, only because of his extreme vigilance . . .

"Spyware is stuff that you don't know how it got on your computer, and it doesn't add value," Eagle said. "It could be a program that's specifically designed to seek out information like credit card information or e-mail information, but you have no idea how you got it, there's no permission, and there's no way of removing it."

On the other hand, Eagle said, adware is something that consumers agree to download. Once Gator is installed, it tracks a user's Web travels and delivers what he called "highly relevant, highly branded" ads. (Read full story at http://www.iht.com/cgi-bin/generic.cgi?template=articleprint.tmplh&ArticleId=108954)

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Rex

Sunday, September 14, 2003 - 01:45 pm Click here to edit this post
Say Goodbye To Your Mouse, Keyboard And Phone Number - Voice Control Is Finally Taking Over

NEW BRUNSWICK/PISCATAWAY, N.J. - Using phone numbers, remote controls and computer keyboards will likely seem quaint within a decade as new capability to turn human speech into accurate, efficient computer code radically changes the ways we live and work.

That's the outlook of Lawrence R. Rabiner, associate director of the Center for Advanced Information Processing (CAIP) at Rutgers, The State University of New Jersey, in an overview of speech processing, "The Power of Speech," in the journal Science, available Friday (Sept. 12).

"We are rapidly approaching the point where entering data to devices by voice - regardless of language or accent - will be as accurate and efficient as entering it by keypad or mouse. When this happens, another wall between humans and machines will fall. The idea of 'going to work' to get things done will change to 'getting things done' no matter where you are," said Rabiner, a Rutgers electrical and computer engineering professor, former vice president of research at AT&T Labs and co-author of four books in the fields of digital signal processing and speech processing.

Life at home will change, too, as operating the family entertainment center becomes a matter of pointing at it and saying "find me a good classical music station," Rabiner said.

He explained that new abilities to compress and transport massive amounts of computer code without using excessive network capacity will help usher in this new age of voice control. At the same time, the shrinking size of equipment will drive the move away from hand-operated controls. "There's no room for a keypad when the device you're controlling is as small as a single key. Voice control has an advantage here because it requires virtually no physical space and we always carry our voices with us," he said. For security, new speech verification technologies will be able to analyze voices and restrict use of devices to intended users only.

Rabiner said he expects to see the following voice-control scenarios evolving over the next five to 10 years:

* Telephone calls will be made by name, not number.

* Intelligent voice-controlled communications agents, essentially nonintrusive network-based robots, will place our phone calls, track down the people we want to reach and let us now whether these people want to talk to us.

* Voice-controlled agents will help us find deals on merchandise, remind us about appointments and birthdays, and control our appliances from any location.

* Virtually all devices in the home and office will be network accessible and voice controllable.

* The distinction between work life and home life will blur as we can do whatever we want from wherever we are at any time. Work will become something we do, not someplace we go.

http://www.libertyforum.org/showflat.php?Cat=&Board=news_computers&Number=877995&page=&view=&sb=&o=&vc=1&t=-1

Top of pagePrevious messageNext messageBottom of pageLink to this message  

True North

Wednesday, February 11, 2004 - 05:58 pm Click here to edit this post
I have decided to learn more about secure and private electronic communication. I think it's wise to be proactive about preserving what's left of our privacy. I personally don't have as much need for secure communications yet, but who knows what the future holds. The more I learn about it now, the quicker I can adapt when the need arises.

Does anybody here have experience with anonymous web browsing? Examples I've found are www.the-cloak.com and www.anonymizer.com? I'm interested in setting up or using anonymous web proxies to increase my level of surfing privacy. (My IP address is fairly static and can be traced back to me.) For example, this discussion board records the IP address of each poster. An anonymous web proxy would enable you to hide your IP address. Unfortunately, it seems like many secure web proxies require subscriptions. I'd like something that I can configure in my web browser so it automatically uses the proxy.

I am also looking for a good disk/file encryption program to keep my private data private. I like the idea of an open-source solution, because it can be audited by the security community for "back doors" and other vulnerabilities. So far, I like what I see at
http://axcrypt.sourceforge.net/, and need to decide between it an PGP Disk.

Regarding PGP, one of the disadvantages of using a public key encryption system is that you need to maintain a "keyring" of the public keys of people you correspond securely with. If your keyring got into the wrong hands, it would reveal who you're associated with.

Phil Zimmerman endorses PGP again now that NAI sold it to PGP Corp. PGP Corp permits reviews of their source code so others can verify that it doesn't contain backdoors. You can buy it from Phil at http://www.philzimmermann.com/findpgp.shtml

Does anyone know if Intel CPUs still carry unique identifiers? (A fuss was made about this a few years ago.)

Finally, does anyone have experience with anonymous email? I've heard about www.hushmail.com and anonymous remailers (FAQ at http://www.andrebacard.com/remail.html).

(Click here and search for "pgp" to see what Joel's said about PGP in the past.)

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Mike

Thursday, February 12, 2004 - 06:27 am Click here to edit this post
I use Anonymizer's paid subscription for web surfing. Yes it costs money, but I believe it is well worth it to try to maintain a level of anonyminity.

I have PGP and have looked into Hushmail. From what I see, they both have pros and cons. The biggest problem I have had with secure communication is that my friends don't see the need. They are blind to what is happening and live in the illusion created by the powers that be.

Back to the Internet, we need to realize that over time the govt via will gain more and more control and therefore less and less freedom will be allowed. Alternative web sites will be shut down and it will only be the "company" line being spouted.

Work while it is yet day for the night comes when no man will be able to work.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Darrell Ostler (Dostler)

Thursday, February 12, 2004 - 10:42 am Click here to edit this post
I second the last post. If friends don't see the need, you won't be sending secure E-mails. I work at a major software company and have had technical problems with an old version of PGP on a Windows desktop (there's the problem). Open source code can be good, but doesn't always mean the security holes will be fixed. I must recommend a very good book here. "Secrets and Lies, Digital Security in a Networked World" by Bruce Schneier. It is a good book. Better, I would say, than his more updated and generalized book titled "Beyond Fear." Half way through "Secrets and Lies" you will get discouraged and think, "Nothing I can do will protect me." But Mr. Schneier will tie it all together and give you some good recommendations.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Kay Camden (Kay)

Friday, June 04, 2004 - 07:11 pm Click here to edit this post
Dust from PCs may be toxic
When you hit a key on your computer or wipe your monitor, you may be picking up toxic dust. A study to be released today reports that dust on computers contains a flame retardant with a toxic chemical known to pose reproductive and neurological hazard in animals. The report was published by advocacy groups that included the Silicon Valley Toxics Coalition. The report, along with other recent studies, suggests that people are exposed daily to such chemicals in the office and at home. Right now, though, scientists can't predict what, if any, harm these chemicals -- known as PBDEs -- have on humans . . . Her organization, an advocacy group, recently published a study that found PBDEs in dust in American homes. A study in 2003 revealed traces of the chemicals in women's breast milk.
http://www.ledger-enquirer.com/mld/ledgerenquirer/business/technology/8826113.htm

See also:

‘Toxic Dust’ On Computers Linked To Diseases
"Toxic dust" found on computer processors and monitors contains chemicals linked to reproductive and neurological disorders, according to a new study by several environmental groups. The survey, released Thursday by Silicon Valley Toxics Coalition, Computer TakeBack Campaign and Clean Production Action, is among the first to identify brominated flame retardants on the surfaces of common devices in homes and offices.
http://www.usatoday.com/tech/news/2004-06-03-toxic-computer-dust_x.htm

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Steve Stock (Steveandkaystoc)

Friday, June 18, 2004 - 05:09 pm Click here to edit this post
Figures published on June 18, 2004 showed 1/3 of all PCs connected to the Internet are infected.

More at
http://www.thisislondon.com/news/articles/11434434?source=Evening%20Standard

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Webmaster (Tom)

Friday, June 18, 2004 - 09:17 pm Click here to edit this post
This article is a bit misleading. Spyware is typically used by someone who has access to the PC to install it. It is generally more sophisticated than viruses. Usually employers put it on to see what you are up to. Suspecting spouses or parents monitoring their children's internet activities are also up there in how that stuff it used. So it is very very few computers that are going to have an anonymous interloper collecting bank information. This is one of those stories the media is hyping up and making it sound much much worse than it is.

Should you be carefull of email attachments and use anti-virus software? Absolutely! If you are suspicious of someone who has physical access to your PC there are ways you can detect spyware, but otherwise you are probably safe.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Steve Stock (Steveandkaystoc)

Saturday, June 19, 2004 - 11:08 am Click here to edit this post
Thanks for your quick response, Tom, and for setting the record straight. Glad to hear you say things aren't as bad as the article hinted.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Cecil T. Champenois, Jr. (Cecilc)

Saturday, June 19, 2004 - 11:49 am Click here to edit this post
In regard to Internet Security, you have some options if you stay in a Windows evnironment. One is to go to www.netscape.com and download their browser and email client. Most of the virus programs attack Microsoft's Internet Explorer (Browser) and also Outlook and Outlook Express email clients by sending out a virus using the user's own address book (*.PAB) to every person whose name is listed therein.

I am using Netscape's browser and email client at work, but admit that I am using Microsoft's products at home.

Another option is to have a Linux desktop in which you can easily have email and browser client's for which no one is writing viruses. It is a much safer option than continuing with Microsoft's products.

Another problem with Microsoft is that their Word product has many macro viruses written which can mess up your PC. Linux also has products that can do pretty much anything which Microsoft can do.

In fact, you can download from www.openoffice.org office products for either Linux or Microsoft's operating systems. The OpenOffice product has a WORD clone, as well as a spreadsheet and a presentation software that is similar to Microsoft's PowerPoint.

All of this from OpenOffice is free just by downloading from OpenOffice. Of course, it's a lot of megabytes, so you will need either a cable connection or a DSL line to download it, otherwise, you will be at it all day long with a dial up line.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Webmaster (Tom)

Saturday, June 19, 2004 - 01:23 pm Click here to edit this post
Linux is a much safer environment to run your computer. However unless you have the patience and time to learn a new operating environment I wouldn't recommend it. I'm no genius with computers but I do have an aptitude for it. I tried Linux but between family obligations and work I just didn't have the time I needed to learn it.

If you have to stick with Microsoft make sure you have a good anti-virus software program and a firewall and router if you have high speed internet. This will prevent the vast majority of break-ins to your system. Then you have to be wary of email attachments and keep your virus software updated. I've been very active with computers for nearly 15 years. I have only been infected twice --once while running DOS and Windows 3.11 in college and once a few years ago when we got a new virus that hadn't been loaded into anti-virus software yet. Both were easily cleaned with no long term data loss.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

golfer (Gedwards)

Sunday, June 20, 2004 - 06:44 am Click here to edit this post
As far as the anti-virus software and a firewall for microsoft, I totally agree. when I first started using my computer a few years ago, I thought of using Norton software but fianlly decided on Mcafee anti-virus and firewall products. I have no complaints. In fact just yesterday, the software isolated and cleaned a virus from my computer. I use the auto-update on the softwares' index and it keeps my machine current without further hassle. I'm totally no expert either but from my limited experience Mcafee seems OK.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Truenorth (Truenorth)

Saturday, November 26, 2005 - 11:12 pm Click here to edit this post
Things have changed a lot since this thread got started. The internet got a lot wilder, and you can get your PC infected (silently) just by visiting a hostile web site, which can load malware (bad programs) onto your PC without you even noticing.

There is a trend among those in the know to switching off Microsoft Windows and onto a more secure system like the Macintosh. The Macintosh combines the security of Unix with an unbeatable UI and usability.

For plenty of information about why Windows users shouldn't connect to the internet, see http://www.radsoft.net and http://www.rixstep.com

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Kay Camden (Kay)

Monday, December 05, 2005 - 05:14 am Click here to edit this post
This happened to me last month--a nasty virus attacked my Norton Security files. I switched to McAfee.

Norton Gets A Bit Less Secure

What's the newest security threat lurking on your PC? It's not the spam sitting in your inbox luring you to fake Web sites. Or the keystroke-logging malware recording your passwords. It's holes in the software designed to protect you from all that. It's true: Hackers, bored with attacking Microsoft, are going after Symantec Corp., whose Norton products are the first line of defense on 50 million PCs worldwide. Says Ralph R. Echemendia, an info-tech security instructor at Vigilar's Intense School, a Ft. Lauderdale security training institute: "They've become a new target."
http://news.yahoo.com/s/bw/20051202/bs_bw/b3963118

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Lester Leper (Theleper)

Thursday, February 02, 2006 - 08:22 pm Click here to edit this post
The End of the Internet?

The nation's largest telephone and cable companies are crafting an alarming set of strategies that would transform the free, open and nondiscriminatory Internet of today to a privately run and branded service that would charge a fee for virtually everything we do online.
http://www.thenation.com/doc/20060213/chester

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Clint Fisher (Dreamer)

Friday, February 03, 2006 - 01:27 pm Click here to edit this post
We lost the "open and nondiscriminatory Internet" some time ago all nations filter the content you can access based on your ip addresses. For instance, if you google nazi from Germany your results will be filtered. if you know the site you want to go to the German gov may block that site based on its ip address.

Or maybe you googled George Bush or John Kerry from a U.S. ip durring the last election, you would have recieved far more positive articles for Bush than Kerry, but if your ip address was from say Canada or Mexico you would have had equal good and bad for each. I guess it's good the CIA recently dumped their shares in google.

I talked to someone at www.anonymizer.com and they said they are trying to develop a work around for filtering or blocking by ip, but you'll have to pay to use if they develop it.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Clint Fisher (Dreamer)

Friday, February 03, 2006 - 01:34 pm Click here to edit this post
We lost the "open and nondiscriminatory Internet" some time ago, all nations filter the content you can access based on your ip addresses. For instance, if you google nazi from Germany your results will be filtered. if you know the site you want to go to the German gov may block that site based on its ip address.

Or maybe you did a google news search for George Bush or John Kerry from a U.S. ip durring the last election, you would have recieved far more positive articles for Bush than Kerry, but if your ip address was from say Canada or Mexico you would have had equal good and bad articles for each. I guess it's good the CIA recently dumped their shares in google.

I talked to someone at www.anonymizer.com and they said they are trying to develop a work around for filtering or blocking by ip, but you'll have to pay to use if they develop it.

Top of pagePrevious messageNext messageBottom of pageLink to this message  

Steve Stock (Steveandkaystoc)

Friday, February 03, 2006 - 03:21 pm Click here to edit this post
Maurice Strong and the other NWO players are planning a new Internet experience for us “sheeple.” Read about how the socialist and NWO gang plan to take over our Internet at
http://www.manyone.net/today/press200601163.html

Of course, they “only want to help us.”


Add a Message


This is a private posting area. A valid username and password combination is required to post messages to this discussion.
Username:  
Password: