The Firewalls and Virus Protection Security Alert Blog
                                    Keep up to date on Internet Security with the  
                                                                Firewalls and Virus Protection Security Alert Blog   


                     Richard Rossbauer's
           SECURITY ALERT BLOG 

   Vital Internet Security Alerts and Information for the everyday Non-technical Computer user, Internet User and Web Surfer who just wants to be safe doing basic stuff without the hassle of viruses, spyware, or worse.

   I'm very pleased that you're here today, and that you're concerned about your computer security and family Internet Safety. I look forward to your early return to the Security Alert Blog. 

   Using the
 Web Feed or book-marking this page will make it a lot easier for you to visit again.

Thanks, Richard Rossbauer (Read About Us)  

 Save This Page  
Blogroll Me!
   

ARCHIVES January to March 2011

March 30, 2011         McAfee Labs Stinger* Updated on March 23, 2011

Free mcAfee STINGER backup virus scanner and removerIf you don't have a Virus Protection program yet, here's an Emergency Step you should take, Right Now!
 
 McAfee offers a FREE Virus Scanning program named
                  
STINGER™. (Current Build Date: 23-Mar-2011)

It's a great backup tool when, for example, your computer is infected with a virus and you can't go online for an update, or even use your existing anti-virus program. If you saved the latest version of McAfee Labs Stinger to a CD or flash drive, you could disconnect from the Internet and run a scan or two with Stinger, which currently searches for 2038 viruses, Trojans and variants!

*Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next-generation scan engine technology, including process scanning, digitally signed .DAT files, and scan performance optimizations. It detects and removes threats identified under the "List Viruses" icon in the Stinger application.                          
                                                                                           
... Richard

                                                                                   




If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

Check the Security Alert Blog Archives - Lots of Cool Posts

March 26, 2011      Are you still using outdated Microsoft
                                      Internet Explorer browsers?


Our recent experience in creating websites that render properly in various browsers was that the 10 year old IE6 doesn't always display our sites properly - showing broken pages, misplaced images, etc.

Didn't seem to matter if the sites were created using Dreamweaver or FrontPage.

Then we read in SunbeltSecurityNews
™, that Microsoft is Urging Users to upgrade from IE6 (and in my opinion, users should update if they are still using IE7, too)

If you are still using IE6 (or IE7) visit the Microsoft announcement here
www.sunbeltsecuritynews.com/MPTSX6/110316-IE6-Countdown

And while on the subject of updates - Apple patched a record 62 vulnerabilities in Safari 5; nearly all can be exploited by drive-by attacks, updating the Mac and Windows browser to version 5.0.4.
www.sunbeltsecuritynews.com/MPTSX6/110316-Safari-Update

- - - - - - - - - - - - - - - - - - - - - - -  -  -  -  -  -  -  -  -
Also, thanks to SunbeltSecurityNews
™, here are this weeks
Top 10 Spyware Threats

  1. Trojan.Win32.Generic!BT: Trojan
  2. FraudTool.Win32.SecurityShield.ek!c (v): Trojan
  3. Trojan.Win32.Generic.pak!cobra: Trojan
  4. Trojan-Spy.Win32.Zbot.gen: Trojan
  5. Zugo Ltd (v): Adware (General)
  6. Worm.Win32.Downad.Gen (v): Worm.W32
  7. INF.Autorun (v): Trojan
  8. Trojan.Win32.Generic!SB.0:Trojan
  9. Yontoo (v): Adware (General)
10. Worm.Win32.Downad.Gen (v): Worm.W32

Stay on top of all the real-time threats:
www.sunbeltsecuritynews.com/MPTSX6/110316-Real-Time-Threats
© Copyright Sunbelt Software, Inc. 1996-2011
- - - - - - - - - - - - - - - - - - - - - - -  -  -  -  -  -  -  -  -
Use CounterSpy Free 30 day trial to check your computer for spyware,
adware, rootkits, worms, viruses and trojans CLICK HERE for FREE TRIAL

                                                                          ... Richard

                                                                                   




If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
                         

Check the Security Alert Blog Archives - Lots of Cool Posts

March 02, 2011      Do you remember hearing about Stuxnet?

If you recall - the world’s top software-security experts were panicky over the discovery of a drone-like computer virus last summer. It was notably different from and a lot more sophisticated than any they’d seen.

We haven't heard a lot of public discussion about Stuxnet recently, other than an occasional reference to Cyber Warfare - but a tremendous amount of research seems to have gone on behind the public view.

Vanity Fair published an article by Michael Joseph Gross on their website that is
as thrilling as any spy story you might pick up at your local library.

It's a "Not To Miss" article that raises many question about clandestine activities of major governments in the far East, Europe and the United States - and can scare the heck out of you concerning the potential for panic-creating Cyber warfare.

Be sure to read it at the Vanity Fair website here -

www.vanityfair.com/culture/features/2011/04/stuxnet-201104

Where do we go next?
                                                          ...Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
                             

To TOP

Feb 24, 2011      Here's an update on Internet threats.

Sunbelt Software reports an Elevated World Wide Threat Level and recommends caution in your computer practices.

As of Feb 23, 2011, here are Sunbelt Software's Top 10 Realtime threats -
 
              Threat Name   TYPE of Threat
Trojan.Win32.Generic!BT Trojan
Trojan-Spy.Win32.Zbot.gen Trojan
MyWebSearch Toolbar  Potentially Unwanted Program
Zugo Ltd (v) Adware (General)
Trojan.Win32.Generic.pak!cobra Trojan
Trojan.Win32.Generic!SB.0 Trojan
Worm.Win32.Downad.Gen (v)  Worm.W32
INF.Autorun (v) Trojan
Trojan-Downloader.HTML.Renos.r (v) Trojan Downloader
FraudTool.Win32.SecurityShield.ek!c (v) Trojan

SunbetSoftware provides Virus Protection and Anti-Spyware programs for homes and businesses.

They publish this information and offer FREE trials to help all of us avoid Virus grief and personal intrusion by spyware.

Be aware!
                                                          ...Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
  

Check the Security Alert Blog Archives - Lots of Cool Posts

Feb 17, 2011      This Week's Top 10 Malware Threats

The following updates were published in Sunbelt Security Software's "SecurityNews" for Feb 16, 2011 (and is protected by Copyright Sunbelt Software, Inc. 1996-2011)
http://mail.aol.com/33222-111/cs_com-1/en-us/Suite.aspx

Threat Level Elevated

WordPress has released version 3.0.5 of its popular blogging software to fix a variety of vulnerabilities.
http://www.sunbeltsecuritynews.com/110216-WordPress

Google has released Chrome version 9.0.597.84 for all platforms to fix a number of security vulnerabilities.
http://www.sunbeltsecuritynews.com/110216-Google

Microsoft has released a security advisory and fix to patch vulnerability in MHTML that could allow disclosure of information.
http://www.sunbeltsecuritynews.com/110216-Microsoft


This Week's Top 10 Spyware Threats

You will note that Yontoo has made our Top 10. Yontoo is adware. If you don't like adware on your computer then you should not download it.

Adware, also known as advertising software displays third-party advertising on the computer. The ads can take several forms, including pop-ups, pop-unders, banners, or links embedded within web pages or parts of the Windows interface.

Some adware advertising might consists of text ads shown within the application itself or within side bars, search bars, and search results. Adware is often contextually or behaviorally based and tracks browsing habits in order to display ads that are meant to be relevant to the user.

1. Trojan.Win32.Generic!BT: Trojan
2. FraudTool.Win32.SecurityShield.ek!c (v): Trojan
3. Trojan-Spy.Win32.Zbot.gen: Trojan
4. Trojan.Win32.Generic.pak!cobra: Trojan
5. Zugo Ltd (v): Adware (General)
6. Yontoo (v):Adware (General)
7. INF.Autorun (v) : Trojan
8. Worm.Win32.Downad.Gen (v): Worm.W32
9. Trojan.Win32.Generic!SB.0:Trojan
10. Exploit.AdobeReader.gen (v): Exploit

Stay on top of all the real-time threats:
http://www.sunbeltsecuritynews.com/110216-Real-Time-Threats

Copyright Sunbelt Software, Inc. 1996-2011

This information, provided courtesy of Sunbelt Software, Inc is covered by
Copyright Sunbelt Software, Inc. 1996-2011 and is published here in accordance with their terms. None of the above has been edited or changed from the information provided in their "Security News".
                                                                
...Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

To TOP

Feb 13, 2011           Here's How to remove Rogue Antispyware

GFI Labs, which is part of the GFI security family (http://www.gfi.com/), is hosting a Blogger site to help Internet users identify and remove rogue security software and other malware from infected computers.

Their website is not intended to promote or advertise malicious software. What it does provide is solutions to removing Rogue Antispyware for the following phony programs.

But first, "What is Rogue antispyware?". Wikipedia has a simple definition -

"Rogue security software is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware. .."

The blog includes instructions for removal of the following rogues -

* Windows Optimal Settings (Yes, that's the right name)
* Antivirus System 2011
* Windows Optimal Solution
* Microsoft Security Essentials Alert
* AntiVira AV
* Windows Care Tool
* Windows Wise Potection
* PC Security 2011

Here's the link to all of these instructions, with pictures of the Rogue software screen images to help you identify your problem software -

http://rogueantispyware.blogspot.com/

I suggest you bookmark this Blogger post - just in case one of these Rogues should infiltrate your system - and cause you a lot of grief. You can even subscribe to their posts thru an RSS link and have their updates appear on your RSS aggregator (like my.yahoo, Newsgator, Atom, etc)

Thank you GFI.*

* (GFI Software provides a single source of web and mail security, archiving, backup and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises).

                                                                     ...Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

To TOP

Jan 29, 2011          This Week's Top 10 Spyware Threats
                             
(Alert furnished by Sunbelt Software Company)

Please note Number 5  - Exploit.AdobeReader.gen (v).
 
An Exploit is software or code that targets security vulnerabilities, usually in the operating system or browser, but may also target vulnerabilities in other programs.

Exploits are typically used to install malicious software on the victim's computer without the victim's knowledge or consent. An Exploit may be used to install malware that gives the attacker complete access to and control of the affected computer from a remote location.

Before you download that PDF make sure you know its source. In fact before you download anything be certain of who sent it and what they sent. And of course always keep your definitions up-to-date.

  1. Trojan.Win32.Generic!BT: Trojan
  2. Trojan.Win32.Generic.pak!cobra: Trojan
  3. Trojan-Spy.Win32.Zbot.gen: Trojan
  4. Zugo Ltd (v): Adware (General)
  5. Exploit.AdobeReader.gen (v): Exploit
  6. Worm.Win32.Downad.Gen (v): Worm.W32
  7. INF.Autorun (v): Trojan
  8. Trojan.Win32.Generic!SB.0: Trojan
  9. Pinball Corporation. (v): Adware (General)
  10. Yontoo: Adware (General)
Stay on top of all the real-time threats at the Sunbelt Security News site -
http://www.sunbeltsecuritynews.com/110126-Real-Time-Threats


                                                            ...Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

To TOP

Jan 27, 2011   Staying Safe on Social Network Sites

Social networking sites rely on connections and communication, so they encourage you to provide a certain amount of personal information.

When deciding how much information to reveal, people may not exercise the same amount of caution as they would when meeting someone in person because:

   * the internet provides a sense of anonymity
   * the lack of physical interaction provides a false sense of security
   * they tailor the information for their friends to read, forgetting that others
      may see it
   * they want to offer insights to impress potential friends or associates

While the majority of people using these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information that's available.

The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting individuals to meet them in person. That could lead to a dangerous situation. The personal information can also be used to conduct a social engineering attack.

By using information that you provide about your location, hobbies, interests, and friends, a malicious person could impersonate a trusted friend or convince you that they have the authority to access other personal or financial data.

Additionally, because of the popularity of these sites, attackers may use them to distribute malicious code. Sites that offer applications developed by third parties are particularly susceptible. Attackers may be able to create customized applications that appear to be innocent while infecting your computer or sharing your information without your knowledge.

How can you protect yourself? US-CERT (a Government Organization)
provides 10 very important tips on maintaining your safety when you participate in sites like facebook, twitter, MySpace, etc.

- - - - - - - - - - - - - - - - - - - - -
Children are especially susceptible to the threats that social networking sites present. Although many of these sites have age restrictions, children may misrepresent their ages so that they can join. By teaching children about internet safety, being aware of their online habits, and guiding them to appropriate sites, parents can make sure that the children become safe and responsible users.
- - - - - - - - - - - - - - - - - - -

(This information was Produced 2006, 2009, 2011 by US-CERT, a government organization.)

I urge you to visit the US-CERT site from which I obtained this information and copy and print these 10 Tips to share with your children, older family members and friends.

Here's the link
http://www.us-cert.gov/cas/tips/ST06-003.html

Social Network sites are fun to visit and valuable for many businesses and you can participate and enjoy them safely

It's more than worth the few minutes it will take to click over to the US-CERT site:
http://www.us-cert.gov/cas/tips/ST06-003.html
                   
                                                                     ...Richard
If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

To TOP

Jan 21, 2011   Reminder - When Do You Need to Defragment?

   Computer maintenance is one way to keep your laptop or PC working like new five years from now. Most people don’t think about maintenance until something catastrophic happens, but you have the good fortune to be thinking about it now. One part of the maintenance process is keeping your computer running at tiptop speed.

   There are many reasons that computers begin to run slow: viruses, not enough memory, too many applications (goes along with insufficient memory) or a lot of files. Whatever the reason, something needs to be done so you don’t have to work at a snail’s pace.

   Behind the scenes on your computer, many things are going on. If you get on the Internet, your computer may be allowing “cookie” files to be stored to remember where you’ve been. We download any and everything from music to videos to eBooks from the Internet. There are temporary files created for some of your downloaded items that can accumulate over time.

   Sometimes, the hard drive just needs to be cleaned up a bit. With the defrag process, the computer finds ways to free up space on your hard drive. This cleaning process ensures optimal performance from your computer when something else is not the problem. Defragmenting your computer is a good first step when performance is not at its best.

   If you are having a hard time navigating the various files on your computer, the proper name of the process used to correct this is “Disk Defragmenter.” You can use your program search bar on the Start Menu to find it easily. The defragmenter takes fragmented files and consolidates them or gets rid of them completely depending on what they are and if they’re needed.

   This is not something that you need to do every day. Remember, you are maintaining here. Performing the operation once a week is good for those who use their computer every day and create a lot of documents and files. The best thing about Windows is that these maintenance operations can be set up on a schedule so that they work behind the scenes. Schedule maintenance operations at odd times like early in the morning or in the middle of the night, when you are not at work on your computer in order to keep them from slowing down your PC while you’re trying to work.

   In a nutshell, disk defragmentation is important for everyone. Scheduling the operation leaves your brain free to think about other things. If the defragmentation process does its job, your computer will continue working well for you without any hitches or glitches.

Read more about defragmenting your hard drive

                                                                ...Richard
If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

To TOP

Jan 17, 2011          You can get Free Malware Removal help

We all know that Malicious software is tricky and sometimes, it gets through all your layers of protection.

However, did you know that SunbeltSoftware will remove malware that has gotten into your computer for free?

All you need is a valid subscription to VIPRE and their team of malware removal specialists will get the bad stuff out of your system.

They will assist any customer that becomes infected while under VIPRE's anti-virus protection.

Just go online and fill out the support form and a member of SunbeltSoftware's Malware Removal Team will get back to you right away.

You don't have to pay for this incredible service when you have a valid subscription to VIPRE.

Want a FREE 30 day trial to VIPRE first? Go here -
http://www.richardpresents.com/Vipre-Free-Trial.html

By the way - SunbeltSoftware's blogger, Larry Jaffe (he's really the Editor of SunbeltSecurityNews) reports these as the current malware threats of the week -
DiskOK is a rogue security product that pretends to find hard disk and file errors on a victim's machine in order to frighten him or her into purchasing this useless application. VIPRE detects it as FraudTool.Win32.FakeAV.hdd (v)
(Number 8 below).

1. Trojan.Win32.Generic!BT: Trojan
2. Trojan-Spy.Win32.Zbot.gen: Trojan
3. Yontoo: Adware (General)
4. Trojan.Win32.Generic.pak!cobra: Trojan
5. Zugo Ltd (v): Adware (General)
6. Worm.Win32.Downad.Gen (v): Worm.W32
7. Trojan.Win32.Generic!SB.0: Trojan
8. FraudTool.Win32.FakeAV.hdd (v): Trojan
9. INF.Autorun (v): Trojan
10. Pinball Corporation. (v): Adware (General)

I'll post the Sunbelt updates periodically - I find them very useful in keeping my computer systems clean.
                                                                         ...Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

To TOP

January 11, 2011  Current Microsoft Updates for Multiple Vulnerabilities

On Patch Tuesday (January 11, 2011) Microsoft released two bulletins with patches for three security holes affecting all versions of the Windows operating system.

The Microsoft Security Bulletin Summary for January 2011 describes multiple vulnerabilities in Microsoft Data Access Components and Windows Backup Manager. Microsoft has released updates to address the vulnerabilities.

* Microsoft Security Bulletin Summary for January 2011 -
<http://www.microsoft.com/technet/security/bulletin/ms11-jan.mspx>
Check the Executive Summaries paragraph under Bulletin Information

The updates to address these vulnerabilities are available on the
Microsoft Update site (requires Internet Explorer).

* Microsoft Update - <https://www.update.microsoft.com/>

Automatic Update is enabled on my computers. It provides both some insurance to "Drive By" attacks and improves my Peace of Mind. Do you have Your Updates automated, too?

                                                                 ...Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

To TOP

EVERGREEN               Internet marketers and webmasters -
                                                 Who's stealing your stuff?


"How Would YOU Feel ...if you were surfing the Web and suddenly saw an exact copy of something you created, and to which you own the legal rights of use, on someone else's web site? Including, but not limited to ...
 
   * YOUR Articles,
   * YOUR Web Site Designs
   * YOUR Web Site Copy
   * YOUR Sales Letter Copy
   * YOUR Ebooks or Reports
   * YOUR Ad Copy
   * YOUR Software
   * YOUR Other Products
   * YOUR Graphics & Images
   * YOUR Newsletters & Ezines

How would you reclaim your copyrighted property?

Wouldn't you like to know how to get your stolen Intellectual Property removed from the web without hiring a Lawyer?

You'll be pleased to learn that there is a brand new ebook where you'll discover how you can "Beat Web Thieves at Their Own Game!"

Actually, you really need this ebook BEFORE your own intellectual property (or copyrighted material) is stolen so you can take the necessary steps to protect yourself, now.

Who wrote the book? - jlScott. The author is Director of the International Council of Online Professionals (i-Cop).

Included in her ebook is a recent case history documenting how she used her expertise to have a blatant case of plagiarism (complete sections of the i-Cop website stolen and republished word for word) removed within a matter of hours!

There's stuff in this ebook that has already helped me prepare to take action against the thieves who have copied my property and even shut down a couple of my sites -

-some of which is the included word-for-word, fill-in-the-blanks samples to use in corresponding with the plagiarists, their ISP's, web hosts, and even their lawyers, if necessary.

Here's the link to get your ebook - http://tinyurl.com/beat-web-thieves

You'll want to take advantage of the low "Public Launch price" before it goes up in the near future. Click on over to learn how and where you can get immediate access to your ebook - "Beat Web Thieves at Their Own Game!"

                                                            ... Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

Check the Security Alert Blog Archives - Lots of Cool Posts

Don't hesitate to express your views and opinions on my Security Alert Blog and Cyber Security Alert postings (easily done by clicking on the highlighted 'COMMENT' |  at each post. Watch for postings on fraud alerts, virus alerts, worm alerts, Internet Security alerts, security scams, parental controls, online predators, net security, and more. Be sure to visit our Firewalls-and-Virus Protection website for even more help

To TOP

Evergreen      Free report - "Avoiding Current Security Threats"

   There are still some unresolved issues with the Conficker worm and Cyber criminals are flooding the Internet with bogus "Anti Virus and Anti Spyware" programs designed to steal your personal information, add your computers to world wide "botnets", and generally prey on unsuspecting web surfers with unprotected computers.

   But you can take steps to avoid these security threats, and I have outlined them in a special report you can have for Free.

   This report is an update and a bit of an overview of the information published in my newsletters, blog and websites.

   It covers the basics of what to look for and how to prepare your computer to avoid the next high risk threat. It's a quick download (PDF file) which you can obtain by going to the registration page and leaving your email address so that the download instructions can be sent to your email inbox.

   Get Free Report here and share this web address with your friends so the emails you get from them are clean and free of malware.

http://www.richardpresents.com/avoid-threat-registration.html
                                                          ...Richard  
 
If you found our Security Alert Blog interesting, please subscribe to the RSS feed! 

To TOP


Quick and Easy Way to Subscribe to the
Security Alert Blog

 
Add to My Yahoo!
add to my.msn
Add to Google
Add to My AOL

Just Click a button to add to your favorite RSS feed

 


If you're not comfortable with RSS feeds, I'll send
you a brief email each
time I update this blog
with an important
Security Tip or Alert.
 
Enter your Email Address

 

Preview |
Powered by FeedBlitz

Your email address is safe.
It will never  be shared with
third parties or used for Spam
Here's What's Happening at our Other RichardPresents.com websites

To TOP

Evergreen    
    
Please accept our INVITATION to Help Parents
Teach Their Kids to be Safe Surfers – an Invitation to Help other Parents, Grandparents and Guardian by Sharing Your Experiences of Teaching Your Children To Be Safe When They Were learning to Surf
the Internet. Please Tell Us About It HERE

 

To TOP

Evergreen      Update your Emergency Virus Protection program

Free mcAfee STINGER backup virus scanner and removerIf you don't have your Virus Protection program yet, here's an Emergency Step you should take, Right Now!
 
 McAfee offers a FREE Virus Scanning program named
                  
STINGER.

  It has grown in size a little over the past few years and no longer fits on a single floppy Disk. But so many of the newer PCs, including lap tops don't have a "A" floppy drive anyway, you should burn it to a CD or memory stick for an offline back up tool.

  You can use it as we do, to check any of your PC computers for viruses, without being on line.

  It is an 'After the Fact' application, which means that it does not scan incoming email files, attachments or downloads, but it does scan whatever you have already received online.

  It currently checks, and repairs over 200 recent viruses. It's FREE to download from McAfee
STINGER

                                 
 Stinger - Click for Latest Version  
                                                                                               
                                                                                                       ... Richard

 

To TOP

More Tags:  ,
          cyberbullying,
Firewalls, Keyloggers,  Disaster Recovery,
        
phishing, , Trojans,
         ,,
         Conficker, , , Rogue software
 

To TOP


Return to Firewalls Home Page     CLICK to Visit  our Internet Security Website
 

FREE Internet Security and
Computer Safety Articles and Reports

CLICK HERE
for your copies

 (New Window)

SQUASH the Bug

Google   
 

SUBSCRIBE ME
 to the
 
Security Alert Blog
 ~~~~~~~~~~~~~
 POSTS
for 
CURRENT Week

EVERGREEN
                 


Contact Me
Unlike the people who use
Twitter to  tell you they've
walked  their dog, I Tweet
Only the  things that I believe
all my followers will find useful.
So, grab a Twitter account and

Follow me on Twitter

Visit our Family Friendly Internet Security Website

Automatic notification
of Blog updates
 
    it's
private

powered by
ChangeDetection
 

Check out this Demo and signup for FREE




CLICK HERE

 


 
90 Percent of PCs are infected with Spyware - IS YOURS?
Get your FREE
anti-spyware

Download Trial HERE


CounterSpy - Get a Free Trial here

CounterSpy -
IT WORKS!
 
Archives
Jan-March 2011
April-Dec 2010
Jan-Feb-Mar 2010

Oct-Nov-Dec09
Jul-Aug-Sep 2009
April-May-June 2009
Jan-Feb-Mar 2009
December 2008
Sep-Nov 2008
June-Aug 2008
April-May 2008
Feb-Mar 2008
Dec - Jan 2008
Oct-Nov 2007
Aug-Sep 2007
Jun-July 2007
Apr-May 2007
Jan 2007,Feb-Mar 07
Oct 2006,Dec  2006
July 2006,Sep 2006
April 2006,-June 2006
Dec 2005,-Mar 2006
Sep -Nov 2005
June,-Aug, 2005
March, -May, 2005
February 2005
January,  2005
December 2004
 
CURRENT CYBER NEWS


Some of my favorite Blogs
--------------
Blogged By RichardPresents
Sunbelt Blog
Cnet Download Blog
Bill Hely's Computer & Online
    Security Blog

FaceTime Security
"Kenneth A. McArthur
 Marketing Thoughts
"
Basic Computer Skills Blog
PC Maintenance
WhyWait? Start it Now

Security Fix Blog
 

Checkout the eBook "How to Protect Your   Privacy and Security Online"












CLICK HERE for the Security Tips ebook, bonus
PC Security ebook
and  Free Resale Rights
Instant Access - Instant Download - Anytime of the day or night
(These are electronic books that you will download upon purchase...there will be no book mailed to your address)
 
Listed with

Feed Shark

Blogroll Me!

CLICK HERE for your FREE  Guide to Stopping Spam - Once and For All
Free Report on Stopping SPAM
Instant Access - Instant Download - Anytime of the day or night
(This is an electronic book that you will download upon purchase...there will be no book mailed to your address)
 
  • Disclosures
    Material Connection
    You should assume that the owner of this website has an affiliate relationship and/or another material connection to the providers of goods and services mentioned in this message and may be compensated when you purchase from a provider. You should always perform due diligence before buying goods or services from anyone via the Internet or offline. -- (Terminology used with permission of Ken McArthur)

     
  •                        Get your Subscription to th
    Security Alert News Reporter
          A Newsletter with periodic updates on the latest
           events and issues affecting your  personal security

        We Value Your Privacy

     Click Button to Read a recent issue and subscribe

                 SUBSCRIBE ME
     
             Recognized as a Family Friendly website

     
                                              Email this page to a friend

        

                                           Close Window                    T
    o TOP 

                                                             changing LINKS 
                   ©  *RichardPresents.com is the parent company of Firewalls-and-virus-protection.com ,

            Privacy Policy|Contact     Security Alert Blog    Proud Charter Member of i-Cop, Protecting the Consumer