2010/07/31

Dispelling a few Myths of Computer Forensics


1. Spending all day behind a computer – This one is mostly true, but it does not work for everyone. Think about this, you will not be carrying a gun, chasing “bad guys” AND spending all day behind the computer.
2. Chasing criminals – You will be chasing a cursor on the command line interface, more than anything else.
3. Everyone is traceable – Bull! I can whack your PC, and when I am done, all you will have is list of 5,000 users who were on the same proxy I was when I whacked your PC. There are several proxy servers who will not reveal log files, besides that, there is a good chance more than one proxy was used. The courts, and companies will usually not go through all that trouble to get information to find out who downloaded your “my documents” folder.
4. Everything has a signature – This is true. The problem is, how many devices did a document go through before you received it? Even tracing an email can be nearly impossible after it has been around the world a few times.
5. Command Line Interface – Yes you will have to know the command line very well, you will also have to know how to interpret results from a command line inquiry. Those Graphical front ends are nice, but they do not always give you all the information you need to do the job.
6. The FBI Needs You – (ROFL) The FBI has a “cyber-crime” unit, but most of their information comes from 3rd party sources.
If you want action, forensics is not really the place. Network security has more action, and many times you prevent crimes, instead of looking at the traces of a crime.
Still interested?
Start by investigating your own PC. Find all your internet cookies, analyze them, and write down your browsing history from the cookie analysis. There are programs that do this for you, but cookie analysis is a good way to learn how internet servers communicate.
Delete some files, overwrite them, and then try to recover them.
Set up a “limited user” account on your PC. Try to get to the administrator documents and programs, without the password. This can be done on most Windows systems.
Forensics can be a lot of fun, if you are the curious type. It requires a deep understanding of how computers communicate, and their underlying processes.
Starting out, don’t worry about catching the crooks, worry about expanding your own knowledge.
In 2005 I started using Windows XP. I had never used Windows, I was an Apple user. Within a month, I knew what every file in the System 32 and the Windows folder did. I knew where to change passwords, where to remove microsoft branding, where to change serial numbers, where to stop the pop-ups on the task bar, etc., etc., etc.
Why would I need that knowledge? When a virus or spyware comes into my PC I can tell “where” it is by “what” it is doing. Instead of just deleting the files, I save them, and analyze them to see where the virus came from.
If things like this do not seem interesting to you, then you may not be cut out forcomputer forensics. If it does interest you, I promise you will never be bored with sitting behind a computer all day, there is a whole virtual world of possibilities out there waiting to be discovered. There is a lot more to computer forensics than just picking apart someones old hard drive.

2010/07/30

11 Common Myths that Keeping People from Switching to Macs

Although Apple’s Mac computers are selling in record numbers, there is still a ton of misinformation being spread about them. You have to believe Mac sales would skyrocket even more if the average person figured out those myths aren’t so true after all.
As Mac users, it’s frustrating to listen to mistruths and unfair prejudices about our computers of choice. Unfortunately, attempting to set the record straight only gives people more reason to call us crazy. At some point we’ve all fought the myths and been accused of being blind cultish followers of Steve Jobs, right? No matter how much we try to debunk outdated anti-Mac talking points, some just never go away.
I can’t tell you how many times I’ve heard people say, “Oh, Macs are nice but I could never get one.” Naturally, when I’ve asked why that is, the same set of excuses come up. The realization I’ve come to over time is that the general public is simply uneducated about the benefits and limitations of Apple’s computers. They develop assumptions based on what they’ve heard in casual conversation from friends & family, mainstream publications, and the super-geek down the street who builds his own gaming rigs. Gathering information from a variety of sources is good, but figuring out who is uninformed or biased is just as important.
Before we get into debunking the common myths surrounding Macs, let me just clarify this article is targeted to the Average Joe who buys a Windows computer for home, school, and casual business use from Dell, HP, or Acer every 3-7 years. Technology enthusiasts and folks who like to tinker with their machines – especially Linux users – are never going to find the plug-and-play nature of Macs appealing. For just about everyone else, though, Macs are a viable and attractive option for their next computer.

Myth #1: Macs aren’t compatible with Microsoft Office

People who work from home or have kids in school need Word, Excel, and PowerPoint. It’s a sad truth, but still a truth nonetheless. Another truth is that Macs can indeed run these programs. Microsoft makes a Mac version of Office that is fully compatible with its Windows counterpart. It doesn’t matter what kind of computer they’re created on, Office files will open on both Macs and Windows-based PCs.

Myth #2: There isn’t a lot of software for Macs

When I first switched to a Mac I was amazed at how much software was available for it. First, all Macs come pre-loaded with way more quality applications than any Windows computer. Programs like Mail, Address Book, iCal, Safari, iChat, iTunes, QuickTime, Preview, TextEdit, Time Machine, the entire iLife suite, and many more are usable right out of the box. The amount of software available from third party developers isn’t lacking either. A good portion of it is actually free, and most of the paid ones are reasonably priced. Bottom line: If a consumer application exists for Windows, there is either a Mac version or a comparable Mac alternative.

Myth #3: Macs won’t play nice with my network & other Windows PCs

Not only are Macs compatible with nearly any type of network out there, it’s extremely easy to connect them too. The internet will work just fine, as will file sharing between the Mac and Windows computers. That’s right, the Mac can see shared files on a Windows machine and a Windows machine can see shared files on a Mac. What else is there to say?

Myth #4: Macs are more expensive because you’re just paying for the brand name

The high starting price of Apple’s computers scares the pants off the average consumer who sees an eMachine at Walmart for $399. Heck, even the $699 Compaq at Best Buy seems like nothing compared to the $999 entry level MacBook or $1199 MacBook Pro. The problem with merely comparing sticker prices, though, is that the true value of each machine is not considered. In other words, you get what you pay for. Macs are built out of more durable materials, they’re more energy efficient, they tend to have higher quality components, and the software is far and away better than what Windows offers. Mac OS X is the reason to buy a Mac. The hardware is great too, but it’s the software that offers the real value. Lower long-term maintenance costs don’t hurt either. For more information about Mac pricing and why the “Apple tax” doesn’t exist, check out “Are Macs really worth it? Selling points for choosing Mac vs. PC

Myth #5: Macs are only more secure because they don’t have any market share

Zero viruses (that is, self-replicating and spreading viruses) have affected Mac OS X in the wild since its introduction a decade ago. This is hard for naysayers to grasp, but it is a fact – not a single virus. Windows, on the other hand, has been hit with hundreds of thousands of viruses. Many believe this is because Mac OS X doesn’t run on 90% of the world’s computers like Windows. If that is the case, how do viruses exist for versions of Linux which have even smaller market share than Macs? How were viruses introduced specifically for Windows 7 when it was still in limited beta testing? Nobody can claim Macs are 100% immune to all security threats, but “security via obscurity” is – for lack of a better term – hogwash. The Mac operating system was built on a more stable and reliable core, which gave it more security from the start. In the end, less popular platforms have been compromised in the past while Mac OS X is still virus-free.

Myth #6: Macs are just for graphics and animation professionals

It’s true that graphic designers and other creative people prefer to use Macs, but it’s not because Macs have some magical ability that makes it possible to do that kind of work. After all, Adobe’s Creative Suite is available for Windows too. The reason designers like Macs so much is because they “make sense.” They’re quality machines and Mac OS X is organized in a way that makes it easy and even pleasurable to use. In that kind of environment, users can fully immerse themselves in the work to be done rather than worry about the computer itself. When you think about it, that’s something everybody should want.

Myth #7: Macs don’t right-click because they only have one mouse button

Back in the day, the one-button mouse was indeed a limitation of Macs. Today, however, this is no longer true. Both the Mighty Mouse and the brand new Magic Mouse have touch-sensitive shells that can be configured to click on the left and right sides, among other things. The same thing can be done for Apple’s MacBook trackpads. This approach actually gives users a level of customization that traditional two-button mice cannot offer.

Myth #8: Macs aren’t expandable or upgradable

When you buy a laptop from Dell or HP, just about the only things you can upgrade are the RAM and hard drive. The same components can be upgraded on Apple’s line of MacBooks and iMacs as well. And, no, you do not have to buy special Apple memory or drives – standard brands will work. In most cases, this is as far as the average user would go anyway. People talk a lot about upgradability, but when 3-5 years pass it’s usually a better idea to go for a whole new computer rather than pump a lot of money into an older one. The great thing about Macs is they have excellent resell value to help pay for the new one.

Myth #9: Macs can’t run Windows applications

As long as you have a legal copy of Windows (which can be taken from the PC that your Mac replaced), you can run any Windows program on your Mac. You can use Mac OS X’s free Boot Camp to natively run Windows or use a virtualization program like Parallels ($79), Fusion ($79), orVirtualbox (free) to run Windows within OS X. Consider this: Apple’s computers can run both Mac and Windows software flawlessly, while other PCs are limited to only run Windows software.

Myth #10: A lot of websites don’t work on a Mac

A few years ago, it was common to come across websites that only worked in Internet Explorer. Of course, this was before Firefox, Safari, and other browsers took away significant market share from Microsoft’s offering. As a result, this isn’t much of an issue anymore – either Safari or Firefox will get the job done. If not, Internet Explorer is still available when you run Windows on your Mac.

Myth #11: Macs are different and will be hard to learn

The beauty of Mac OS X is that it’s so much easier to learn and understand than Windows. The main reason is because it’s more intuitive. For people who have never used a computer before, it works just the way they would expect it to. For Windows switchers, it’s going to seem weird at first. It will require unlearning old Windows habits. Constantly saying “That’s not how I’m used to doing this…” is going to sour the exciting Mac experience. The best advice to give anybody who is thinking about switching to a Mac is simply “have an open mind.” In the end, it will all work out.
What are some of the other Mac myths you’ve heard over the years? How do you tell people the truth about Macs to clear up the confusion?

2010/07/29

System Adware Scanner 2010: Myths and Facts

Keeping your computer safe is one of the most important things nowadays, since most of our essential information is stored on it. Information related to our workplace, appointments, meetings, things we love that we have immortalized on our PCs are so important for us, that losing these things might cause a lot of damage. For this reason, we must try our best to keep our computers protected and to prevent viruses from perpetrating the system and destroying it. You might be confused about what to do when such a rogue program will pretend to be a legit antivirus app. : looking like the real thing but still compromising your PC ? The next website System Adware Scanner 2010 has very good infos regarding System Adware Scanner 2010.
The spyware System Adware Scanner 2010 is not a real antivirus product: it is a fake one ready to destroy your PC the most it can. It enters the system as you visit certain websites or when you are performing an online scan and it runs itself. Once on your system, this rogue program will but notify you of lots of threats related problems. You will get notifications your system is in great danger. Then the program will tell you that the only solution to fix your computer is to buy some online full version. Reason being you are using the free trial version and you need the full version to clean your computer. Check the following online service online virus removal to help you clean this threat while this webpage virus removal has even more infos about virus removal.
System Adware Scanner 2010 runs in the background, starting once you turn your computer on, and in the alerts generated to you, all sorts of files useful for the well- functioning of your computer will be reported as corrupted, whether being deleted them or advising you to delete them. System Adware Scanner 2010 will slow down your computer a lot besides changing its performance. You might also see that you are automatically connected to the Internet and the settings of your browser are modified.
Going on the Internet to get an adequate software to remove this malware from your PC is the right thing to do. Even if this malware is really dangerous, they are programs to clean it.

Source: coolthingdaily.com

2010/07/28

Four Myths About Online Education Experience

People are sometimes unpleasantly surprised that it’s not easier,” says Kathleen Moore, executive director of the University of South Florida’s (USF) ECampus. ECampus supports more than 84,000 enrollments in 2,000-plus distance learning sections each year, and since “regular faculty are teaching both online and face-to-face courses, there’s probably 100% comparability in terms of students’ workloads and the demands,” she adds.

“A graduate course is a graduate course, whether you take it online or in the classroom,” says Ellen Waterman, associate dean for distance education at Regis University in Denver.

“I have heard online courses are even more challenging than in person,” notes Waterman, a frequent presenter at education technology conferences whose division in the College for Professional Studies helps faculty design and develop courses for online delivery. When online courses are developed, everything is thought through beforehand and all the learning activities are built to fit the course objectives, she explains. While classroom environments can be more free flowing, that’s a little less possible online, where professors use the same course template.

Myth 2: I won’t be interacting much with the instructor and other students. 

This misconception “pretty much goes away as soon as a person engages with an online course,” Moore says. From chat rooms and discussion boards to class discussions held in real time (sometimes even in-person, for “hybrid” courses or in instances where the instructor likes to have everyone possible meet at least once in the beginning), there are lots of chances to interact. At USF, where many online learning students are local, it’s common for instructors to have students come in for the first day of class, she notes.

At USF and other institutions, instructors get special training in strategies for building a feeling of community in online courses. “Active learning strategies are specifically set up to create an atmosphere where students can participate in dialogue with each other and with faculty, Waterman says.

“Some of the best learning you do is through the groups you study with,” points out Waterman. She hopes students seeking online programs look for ones where interaction is key.

Participation is generally key to getting a good grade. “It is much harder to ‘hide’ in an online course than in a classroom. I am reviewing every post by each student. I can tell who is contributing and who is not,” says Patricia Carroll, an alumna of the nursing school at Excelsior College (N.Y.), where she is now an adjunct faculty member in the School of Health Sciences who teaches online courses only. A registered nurse and founder of the consumer health resource website Nurse’s Notebook, Carroll explains that contributions to online discussions count as class “attendance.”

Luckily for those who tend to be shy, online course interaction is often easier than speaking up in front of a class. “If you’re participating in a message board, you can compose your message before you send it, think about it without having to be so spontaneous,” says Moore.

Myth 3: I’m not tech-savvy enough to enroll. 

Carroll puts it this way: “I’m pretty geeky, but many of my students are not.” Students need a reliable internet service provider, ideally with a broadband connection, knowledge of Microsoft Office, basic e-mail skills, and virus protection software, she says.

Her students can turn to Excelsior’s tech support team or troubleshooting resources that are part of the learning management system Blackboard. “‘I couldn’t upload my paper’ is the new ‘dog ate my homework’ and it doesn’t work any better as an excuse,” Carroll says.

Students at Regis, which also uses Blackboard, tend to turn to faculty as the “first line of tech support,” Waterman says, adding that Regis has 24-hour tech support available.

At USF, “We try to make sure that instructors are conversant with all the functionality of the technology so they can help the students and model the online behavior,” Moore says. Pre-course training on using Blackboard is also available.

Myth 4: My degree won’t be respected by employers. 

Moore sees this as a real concern both for students and faculty not yet involved in online learning. “The bottom line is that online is a delivery mode. We’re basically delivering the same programs and courses that we deliver in the face-to-face mode on campus, or face-to-face at off-campus locations,” she says. “There are clearly online programs that are not accredited and not of quality, but there are also face-to face programs that are not accredited and not of good quality. Online delivery doesn’t say anything about the quality of the program.”

But do employers know that? An article in the spring 2009 issue of the Online Journal of Distance Learning Administration that reviewed seven years of studies and articles about how potential employers perceive online degrees concluded that there may still be a “marked stigma attached to online degrees throughout the hiring process” within the industries studied. Studies have shown that they may perceive these degrees as lacking rigor and face-to-face interaction, associated with diploma mills, having increased potential for academic dishonesty, and indicating concern about students’ true commitment.

Yet some themes emerged in the review, namely that certain conditions can influence online degrees acceptance, including reputation of the institution and accreditation. In addition, there seems to be a perception that online graduates must be more self-directed and disciplined.

“There are diploma mills out there, which hurt us all,” says Carroll. “But the characteristics of a successful online student – takes personal responsibility, reliable, computer literate, able to express self in writing, goal-oriented – those are the characteristics I want in a professional employee.”

When Waterman checked in with two people from well-known technology companies to get a sense for what they thought about online degrees, they both pointed out that their companies had supported and even paid for master’s degrees earned online. They also noted that most of the training done at their companies is delivered online.

Still, the fear of people looking down on a degree earned online may be a reason some people seek online programs offered by traditional institutions. As Waterman says, “The degree looks the same. It doesn’t say how you did the work.”



Source: 
Matthew Speer, Director, Sales and Marketing
U.S. News University Connection
866-442-6587
http://www.usnewsuniversitydirectory.com/four-myths-online-experience.aspx

2010/07/27

Myths and Realities About Windows Backup Recovery

Owing to the huge population in the world, there exist copious notions of copious people. If a person thinks in a way, he influences his friends with the akin opinions that he possess. Thisleads to a commonscenario of “many people thinking alike”. And when this happens that many people reckon and judge in a particular notion, whether assess or incorrect; it leads to the age group of several myths that make home in their minds. Unless and until they come face-to-face with the realities, they go on believing those myths. In today’s age group, computer has deeply penetrated in every corner of the world. These deep roots have been formed because today anyone and everyone can use (and is using) the computer. Thanks to the very brilliant Operating System (OS) which is Microsoft Windows. Due to its extremely interactive Graphical User Interface (GUI), it is the most widely used OS in the world. But still, innumerable technological myths keep following the people because no one can stop the human minds from thinking. Many Windows users, who save their crucial files in the in-built backup systems(NTBackup and others provided by Microsoft Windows), live with several myths about Microsoft Windows backup recovery in case of Windows backup (.bkf files) corruption. These myths confine them to get any backup recoverysoftware to get data back they reckon they have lost everlastingly. Some of these myths are:
Myth 1: After hard drive crash and backup loss, Windows backup recovery is not doable.
Actuality: Even after hard drive crash leading to backup deletion, it is still doable to mend Windows BKF. This certainly is the worst data loss situation when the computer’s hard drive gets crashed. It surely would bring all the critical files at stake. But, it would still be doable to repair BKF using an further than Windows backup mend software tool. Windows backup recovery is realistic in the majority of backup data loss situations.
Myth 2: When BKF files fail to mend and some error occurs, it indicates permanent BKF data loss.
Actuality: This is again an completely negative notion which is incorrect. Many times, people encounter several errors while working on the system. With BKF files also, users can come across errors like “The backup file contains unrecognized data and cannot be used”; “The backup file is unusable. You must erase it, or choose another file”; “The fixed media is full. You cannot back up all of the individual data to this disk device. The backup operation will stop”; “An inconsistency was encountered on the requested media” etc. But, this surely would not mean that it is the end to the data saved in the BKF file. Corruption can be fought using a Windows backup recovery tool.
Myth 3: After upgrading from an earlier Windows version to Vista, whole backup data will perish because NTBackup is not supported by Vista.
Actuality: This is right that previously Vista version did not support NTBackup. But, today it is a myth as Window Vista now supports NTBackup. So, if a user using any earlier Windows version stored his crucial data in Windows NTBackup tool and then upgraded the system to Windows Vista need not worry about his backup data. Still if there is any corruption issue in the BKF file (because of the BIT variation which is 32-bit in earlier versions and 64-bit in Windows Vista), user can still get data back from BKF by using a Windows backup file mend tool.
Myth 4: While restoring backup, interruption occurs – it would mean that BKF would dishonest and all the data stored in BKF would be vanished.
Actuality: Again, this is a incorrect notion (myth) that after BKF corruption (due an interruption at the time of backup restoration by the Windows backup utility), data stored in BKF files cannot be retrieved. The actuality is that Windows backup recovery is doable. Only thing the user has to do is to get a Windows backup mend software tool.
These myths are useless for the users as they only enlarge on their distress of data loss because such myths confine the users from trying for Windows backup recovery using an further than software tool. These myths have to be broken and users have to reckon positive towards – How to recover backup files after BKF corruption?
How to recover backup files?
As discussed above, a software tool to recover data from corrupted BKF is required for proper Windows backup recovery. Users should get the right software, otherwise their myths would become stronger and also can lead to several other myths that such software tools are of no excellent. To terminate such notions right in the commencement, SysTools has generated highly dependable and result-oriented software products which are simple and intuitive. For Microsoft Windows backup recovery also, there is a tool – SysTools BKF Repair software. It is effectual, it is well-organized, it is dependable, it is safe, it is simple-to-use, it is quick and last but not the least, it is not expensive also. The last version of this SysTools BKF Repair software is version 4.2. SysTools has added a new feature in this version which is of “Partial Scan”. In the recovery of large sized files, user can quickly do partial scan if he needs only a few files from BKF. He can grant a value (say 30%) and the software will scan till 30% and then abort the operation. In this way, user can quickly recover a few files instead of coming up till the total completion of recovery process which takes a longer time. This is a fantastic feature added to the latest version 4.2 of SysTools BKF repair software.
Author: Jessica Lal Alba
Article Source: EzineArticles.com

2010/07/26

Top 6 Myths And Facts On Online Classes

Top 6 Myths And Facts On Online Classes

Online learning (or e-learning) has revolutionized the educational field in just a few years. The number of colleges and universities offering online classes has continued to climb. Confidence in the ability of colleges to provide a quality education through online learning has grown but, as with most things that are new and unfamiliar, myths abound. Here are some of the myths and facts about online learning and classes.

1. Myth – You must be a computer whiz to take online classes

Fact – With basic knowledge of how to use a computer, students can find continued success while taking online classes. Students need to be at ease with certain internet tasks such as searching for information on the net, uploading and downloading files for assignments, using message boards for discussions.

2. Myth – Students lose interest in online classes quickly and cannot complete them.

Fact – Online courses are designed with the e-learner in mind. The skill level is designed for completion of the degree and to meet the needs of the student progressing through the course. Students can move at their own pace and completion dates and times vary according to the student’s desired schedule.

3. Myth – Online education is too expensive

Fact – Online classes save money for the student in a number of ways. First, the tuition for many online classes is less expensive than the same course offered on campus by college. This is a benefit for many colleges as they may enroll more students for courses and not need to increase the classroom size. Students save on travel time, travel expenses, and child or family care needed in their absence. A major expense for students is the cost of books and materials. Online classesmany times save on book costs when the course material that is designed for the course is included with the cost of the course or is available for a nominal fee compared to many college textbooks.

4. Myth – Time management: students do not have adequate time to prepare assignments due to home and work responsibilities.

Fact – Online classes give students the flexibility to adjust their learning pace. If one class is suitable for a student they may take just that. If a student wishes to work at an accelerated pace and complete the studies sooner, taking more classes is an option for those who wish to finish earlier.

5. Myth – Online education is not accessible to everyone

Fact – Online education is accessible to everyone and erases barrier of distance and time that on campus courses can create. Students have the flexibility of having access to classes on a 24/7 schedule. Online classes are also suitable for students with disabilities, health concerns and even more mature students. Many students who have family responsibilities find that studying and completing assignments during different hours than their family, provide them with a quiet environment and affords them the opportunity to reach their goals quicker.

6. Myth – Online degrees are not the same as from on campus colleges

Fact – Many major colleges and universities in the US and around the world have offered their students the option of completing many of their courses via the online portals on the college’s homepage. Online classes are the same as those taught on campus and many times by the same instructors. When a student completes a degree program (such as the BA, MS, or PhD), the diploma is issued by the college or university in the same way for online and on campus students. Also, the diploma and the students’ transcripts do not stipulate whether the credits and degree were earned through online or on campus classes as they are recognized equally by colleges and employers. Many students choose to take a mix of someonline degree classes and some on campus classes depending on their needs

2010/07/25

Top Internet Security Myths


efore thinking a computer is impenetrable by hackers, consider the common myths about Internet security safety and malware threats.
Every month of October marks National Cybersecurity Awareness Month (NCAM). The NCAM campaign is used to bring awareness for users who are unaware of the latest virus and malware threats. Many users think that installing antivirus software is enough to protect their machine. The Windows operating system also comes with an internal firewall and antivirus application, which is also a part of users’ false sense of security. However, security measures require user education and identification of threats when browsing the Internet.

Installing Antivirus Software is Sufficient

Antivirus software is a commonly known requirement for Internet security. However, the myth that antivirus installed is all that is needed for protection is dangerous for Internet surfers. Installing antivirus software is the start of Internet security. Constant installation of the latest virus definition files is required. Most reputable antivirus software has monthly updates for definition files. Download them to ensure the computer can recognize newest threats.
Nothing Valuable is on the Computer
Even a laptop used for minor editing and writing can lead to stolen information. Although the user can often forget about it, casual use of a computer can also lead to identity theft. If the computer has a network card, and it’s used for Internet connectivity, it can lead to a breach on the machine’s security. Some users only use a computer for email retrieval. Email is a point for hackers to send phishing emails that can lead to the theft of passwords for banking and finance websites.

Browsers Don’t Make a Difference

Unfortunately, Internet Explorer users are more susceptible for malware installed on their computer. Google Chrome and Firefox use Google’s malware detection alerts. If a user tries to access a website that has been listed as an attack site, the browser pops up a bright red interface that leaves a warning. Internet Explorer has no interface, so users are left susceptible to accessing websites that have been compromised. If the user chooses IE as a browser, be careful when accessing unknown domains.


The Department of Homeland Security disputes this train of thought. This is a common thought for home users. Several scripts are available that allow others to find security holes on a computer. These people are called “script kiddies.” Script kiddies run common programs that find the security issues on machines that don’t have the latest security patches. For the best protection, purchase an antivirus program that protects against all types of hack attacks.
Hackers Only Target Specific People

The best protection against Internet malware is avoiding websites that are suspicious. Choose a web browser like Google Chrome or Mozilla Firefox to ensure the latest websites listed as attack sites are blocked when finding them in the search results. Don’t have a false sense of security and ensure the latest definition files are applied.


Read more at Suite101

2010/07/24

Internet Security Myths

The Internet is a powerful and wonderful tool, yet many people feel that making use of it exposes their persona to the constant threat of scrutiny and theft by hackers. Most of these fears are compounded by widely held myths, while on the other hand, some users tend to feel the complete opposite – that virus and anti-spyware software has their ‘personal assets’ fully protected.  In reality, both views are slightly exaggerated.

MYTH 1: HACKING

Some people believe that hackers tend to be teenagers, who are simply snooping around aimlessly, and have no specific interest in specific personal information. In fact, hackers tend to be very inquisitive, and often destructive people. An example of this is the recentdefacement of China’s Baidu site by Twitter hackers.
Learning the weakness of computer systems’ design and protocol, and exploiting it is seen as challenge and a test of their skills. Furthermore, accumulation of persona to further enable their access to computer networks and systems is a necessary follow-on of such tactics. This your information may not at some stage be more useful to them in a monetary sense – the purchases they make from your credit card may primarily be used to finance their hacking activities.
Additionally, hackers have simplified this process through the development of hacking tools anyone can use. You no longer need specific technical knowledge to hack into computer networks. The best preventive measures you can take is to secure your files, and email accounts with unique passwords (not one for all of them!). Try make these passwords difficult to guess/decipher by staying away from personnel monikers such as your, date of birth, nickname, etc. Chances are if they are genuinely interested in gaining access to your account they will have done some research on you.

MYTH 2: VIRUS SOFTWARE PROTECTS ME COMPLETELY

Contrary to popular belief, anti-virus software does not automatically mean your computer is secure from viruses, unwanted access and undesirable programs. Even the best virus protection software is still only a precautionary measure which offers support to your PC’s security. Daily, many new viruses are developed to try exploit weaknesses in your operating system, or software environment. Mac users note that the latest version of Mac OS is Unix-based, an environment long understood by experienced hackers. Updating regularly and maintaining some control to the access of your computer is paramount. This can be simple if you are mindful of file sharing, whether through a flash drive, network, or email account.
No computer system, whether it be a home computer or office network, is completely safe from the hazards of the information age. Privacy has become less personal and more public with the advent of the internet. The best advice is to be pro-active in your usage of the information superhighway. Keep what is personal safe and secure your assets by using a combination of preventative measures.