The Firewalls and Virus Protection Security Alert Blog
                                    Keep up to date on Internet Security with the  
                                                Firewalls and Virus Protection Security Alert Blog


                     Richard Rossbauer's
           SECURITY ALERT BLOG 

   Vital Internet Security Alerts and Information for the everyday Non-technical Computer user, Internet User and Web Surfer who just wants to be safe doing basic stuff without the hassle of viruses, spyware, or worse.

   I'm very pleased that you're here today, and that you're concerned about your computer security and family Internet Safety. I look forward to your early return to the Security Alert Blog. 

   Using the
 Web Feed or book-marking this page will make it a lot easier for you to visit again.

Thanks, Richard Rossbauer (Read About Us)  

            Save This Page  
Blogroll Me!
 

POSTS FOR APRIL THRU DECEMBER 2010

December 28 2010  Are You aware of How How Internet Marketing
                       Gurus Make You Buy Their Stuff?

  
 
It is said that the pen is mightier than the sword.

That is so true especially in internet marketing where there is very little face-to-face interaction between the marketer and the prospective customer.

Therefore, it is imperative for internet marketers to 'speak' to their prospects through what they write.

Successful internet marketers have learned the art of communicating through powerful, compelling copy that almost hypnotizes their prospects into buying their stuff.

How do they do it?

Read about Guru Marketing Tactics HERE

With all this information, you can see through all the gurus' methods of making you buy their stuff. Not that much of it isn't of value, but this article will give you the background you need to better practice your own due diligence.

                                                                        ...Richard


                                                                                   




If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

HAPPY HOLIDAYS

December 25th has been here and gone for another year. I feel that the most valuable gifts that could be given to anyone are love and friendship, respect, and tolerance.

Can you imagine how much better this world would be if everyone had it in them to bestow these gifts every day, not just on an annual holiday.

I wish all of the best to you now and into the future. Your support as followers of my web postings is cherished. Thank you.

                                                    Richard Rossbauer
 

Check the Security Alert Blog Archives - Lots of Cool Posts

December 19, 2010       We Used the Kitchen for a Computer Room
                           by Jim, Philadelphia, PA suburbs

This is another one of the top rated responses to our Invitation to Help Others by Sharing Your Experiences in Teaching Your Children To Be Safe When They Were learning to Surf the Internet.
                                       ______________________

My children range in age from toddlers to early teens. The older ones learned a lot about using the computer by instant messaging with their class mates. It was amazing to watch as they chatted with 5, 6, or more kids at the same time.

The younger ones learned from watching, too. By age 5, one of my little girls was able to put a cd in and start the computer all by herself.

With only one computer, they had to learn to take turns and it took some supervising to even it it out for them. But we kept the computer in between our kitchen and dining area so it was pretty easy to see what they were doing.

The teeners are aware of the bad stuff and we remind them to be very careful when they get email and go to the chat rooms.
They know not to tell private stuff to strangers.
                                                                  ... Jim

                                                                                   



CLICK HERE to Share your Experiences and learn how other parents helped their kids to safety
If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

Check the Security Alert Blog Archives - Lots of Cool Posts

December 12, 2010      Keep your name private
                              
 by BM, London UK
                                
This is one of the top rated responses to our Invitation to Help Others by Sharing Your Experiences in Teaching Your Children To Be Safe When They Were learning to Surf the Internet.

I believe it carries a very important message. Do You?
                              ____________________________
I asked my my teen daughter what one thing she thinks is the most important thing she has been taught to keep herself safe on the internet. Her response: not to tell anyone her name.

I can add that when she is using a chat room, she is not to stay chatting if someone she does not know (as in someone who is not in her class at school or circle of friends) comes into the chat room and starts to chat with her and her friends. Even if someone she knows invites the person, she knows not to chat while the unknown person is part of the chat.

It is sad but true that every case of child abuse that I know of personally has involved either a family member or someone who is a close friend of the family. The internet makes it so easy to make friends and become familiar with people. Trying to teach children to see everyone as a threat does seem unfair but the only real way to make them aware of how close and innocent danger can appear to be.

In addition, every user of the computer has their own login details and none of the accounts used for surfing the internet have any admin. privileges.

Browsers are also set up to not display or download any third party content, neither images nor scripts.

As a final security measure, the hosts file is kept up to date with all requests for 'banned' sites sent to 127.0.0.1.

                                                ... BM, London, UK
CLICK HERE to Share your Experiences and learn how other parents helped their kids to safety
If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 
 
November 21, 2010     Use NoodleNet  to help keep your kids safe online
                                   by Guest Author Pam Brown (Texas)

I have found the best product out there for protecting my children. My oldest son "accidently" hit upon several adult entertainment sites when searching for toys. So that left me searching for how to protect him when he is searching for games and toys and perhaps give him some safe sites to visit.

Give NoodleNet a try. It creates a safe desktop enviornment. That means that it temporarily takes over you computer's desktop. This way kids can play games on such sites as Disney, Discovery Kids, NickJr, and tons of other safe sites.

This software is amazing, it even stops the kids from clicking on an ad that might take them to something they shouldn't see. It blocks chat so no one can talk to my kids and offer them who knows what. You can even set session timers. That allows you to set say an hour a day for your child to play on the computer.

I don't work for NoodleNet, so don't get the wrong idea. This isn't an ad, just a Mom that found a good solution. I wanted more people to know about it.

CLICK HERE to COMMENT on Pam's Post and to add your own experiences.
            
                                                          ... Richard
If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 
Sorry about not keeping these posts up-to-date. I had  some medical problems over the past few months that I'm now getting under control. I hope to keep you better informed in the coming months. Thanks for being here, today.
                                                                    ...Richard Rossbauer
November 12, 2010   Going on Computers when left alone

This is one of the top rated responses to our Invitation to Help Others by Sharing Your Experiences in Teaching Your Children To Be Safe When They Were learning to Surf the Internet.

I believe it carries a very important message. Do You?
                              ____________________________

Going on Computers when left alone by Samantha Cole (Oxfordshire)

I am in my view; a very protective and sensible Mum, I have spoken not just once but many times of internet dangers.

I have followed the recommended precautions, not allowing my children to be on the internet without either Parent present, I have the passwords to all their sites and monitor their online 'friends' and chats, and until yesterday I believed my daughter had totally understood why we do what we do with regards keeping her safe.

In my arrogance of thinking I was doing all I could to keep her safe, I failed to appreciate the 15mins she is alone at home after School while I am picking my other child up and in those 15mins she made a video of herself and had a conversation with a stranger who got her to give out the information she had been told never to do.

She told her name, her school, where she lived, it was all the stuff the books tell us children will do-I am 'numb' to say the least.

The Police have had to be informed and it's blown mine and my families world apart. This isn't easy for me to put into words BUT if it keeps another family from going through what we're experiencing and keeping just one child safe then praise be to God.

Don't feel confident like we did, children will expose any weakness as I've found out, it seems the more we try to keep them from these 'dangers' the more intriguing they become to them.

I don't have any clever answer I just wanted to share my experience and to make you aware of the times when you may be out to disable your system as I've found out 15mins is a damaging amount of time.


CLICK HERE to COMMENT on Samantha's Post and to add your own experiences.

                                                                   ... Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

Check the Security Alert Blog Archives - Lots of Cool Posts

October 20, 2010   Cyber War - Looks like Stuxnet is one of the Tools

Target identified, missile launched, countermeasures applied, so reports Iran -
"The industrial computers infected by the Stuxnet virus have been cleaned," Mohsen Hatam, deputy industry minister, was quoted as saying on the state television's website.

"Who done it?"
A leading European analyst said Israel introduced the Stuxnet computer virus into Iran's nuclear energy plant at Bushehr. Ralph Langner, a German cybersecurity expert, said Israel, in what he said was an operation called "myrtus," appeared to have designed Stuxnet and embedded the virus in control systems at the 1,000 megawatt Bushehr reactor.

Bloomberg Businessweek reports that The spread of the Stuxnet computer worm has heightened fears about the security of industrial control computer systems that run factories and power plants. The rogue program, which affects machines sold by Siemens (SI), has been found in computers around the world, Symantec says. Most are in Iran, leading analysts to believe that its nuclear program is the target.

What does it mean?

From guardian.co.uk - Dave Clemente, a researcher into conflict and technology at the International Security Programme at Chatham House in London, argues that where once the threat from cyber war was "hyped … reality has quickly caught up".

"The US and the UK are now putting large amounts of resources into cyber warfare, in particular defence against it," said Clemente, pointing out that there is now a cyber security operations centre in GCHQ and a new office of cyber security in the Cabinet Office. He added: "What I think you can say about Stuxnet is that cyber war is now very real. This appears to be the first instance of a destructive use of a cyber war weapon.

Think about it - are you anti-infection programs up-to-date and in order?
                                                                     ... Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 
 
September 28, 2010  Stuxnet - Is this malware the Cyber Terrorist's Ultimate Threat?

Republished from The Daily Beast on Sep 28, on the Business Insider, Trevor Butterworth's article is a must read for anyone who wants to know what
CyberCriminals are really Planning, and Doing.

Titled "Cybercriminals Launch New Era of "Geek Terror", Trevor reveals some of the high-stakes crimes being planned and perpetrated in secrecy - like A worm in
Iran’s nuclear facility. A plane crash in Spain. Chile’s Web heist.

Makes one wonder if it's just cybercriminals or if Rogue Nation States aren't part of these terrorist threats, and actual incidents.

If we thought Conficker was dead because there hasn't been much news about it, well, Conficker is still considered by many to be the big mystery of the cyberworld because no one knows why it’s there or what it’s going to do.

And now, along comes Stuxnet, like a pre-programmed guided missle that can do unimaginable harm to people, businesses, the military and even governments.

Read more, it might raise the hair on the back of your neck:
http://www.businessinsider.com/cyber-war-2010-9


                                                                     ... Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

Check the Security Alert Blog Archives - Lots of Cool Posts

August 8, 2010                Internet marketers and webmasters -
                                                 Who's stealing your stuff?


"How Would YOU Feel ...if you were surfing the Web and suddenly saw an exact copy of something you created, and to which you own the legal rights of use, on someone else's web site? Including, but not limited to ...
 
   * YOUR Articles,
   * YOUR Web Site Designs
   * YOUR Web Site Copy
   * YOUR Sales Letter Copy
   * YOUR Ebooks or Reports
   * YOUR Ad Copy
   * YOUR Software
   * YOUR Other Products
   * YOUR Graphics & Images
   * YOUR Newsletters & Ezines

How would you reclaim your copyrighted property?

Wouldn't you like to know how to get your stolen Intellectual Property removed from the web without hiring a Lawyer?

You'll be pleased to learn that there is a brand new ebook where you'll discover how you can "Beat Web Thieves at Their Own Game!"

Actually, you really need this ebook BEFORE your own intellectual property (or copyrighted material) is stolen so you can take the necessary steps to protect yourself, now.

Who wrote the book? - jlScott. The author is Director of the International Council of Online Professionals (i-Cop).

Included in her ebook is a recent case history documenting how she used her expertise to have a blatant case of plagiarism (complete sections of the i-Cop website stolen and republished word for word) removed within a matter of hours!

There's stuff in this ebook that has already helped me prepare to take action against the thieves who have copied my property and even shut down a couple of my sites -

-some of which is the included word-for-word, fill-in-the-blanks samples to use in corresponding with the plagiarists, their ISP's, web hosts, and even their lawyers, if necessary.

Here's the link to get your ebook - http://tinyurl.com/beat-web-thieves

You'll want to take advantage of the low "Public Launch price" before it goes up in the near future. Click on over to learn how and where you can get immediate access to your ebook - "Beat Web Thieves at Their Own Game!"

                                                            ... Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

Check the Security Alert Blog Archives - Lots of Cool Posts

July 29, 2010      Who is looking at your Facebook profile?

How many of you have a Facebook page?

Ever wonder who might be checking out your facebook profile?

Well, hundreds of other folk have the same question and that is exactly why scammers have created phony sites offering to show you who is looking at your profile.

But beware - many of these are simply phishing sites attempting to gain your personal information which can be used for a variety of nefarious reasons.

If you make the mistake of clicking on the link to one of these phony pages offering to tell you who is viewing your Facebook profile, you will find that the people behind the "services" want you to do a few things first.

The Sophos(*) Company's Senior Technology Consultant - Graham Cluley - has posted images of some of these phishing sites and some professional advice on how to avoid scams like these.

Here's the link to that post, and if you have a Facebook account, it's more than worth the few minutes it will take you to check it out. (this not an affiliate link)

www.sophos.com/blogs/gc/g/2010/07/23/viewed-facebook-profile-care/

(*) Sophos is a world leader in IT security and data protection offering organizations complete protection and control – defending against known and unknown malware, spyware, intrusions, unwanted applications, spam, policy abuse and data leakage, and providing comprehensive network access control.

                                                                             Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

Check the Security Alert Blog Archives - Lots of Cool Posts

July 25,2010              Do you have a paper shredder? - No?

It would be a good idea to buy one immediately to protect your privacy and personal information, and to prevent identity theft.

Do this by shredding every piece of paper you handle that contains your name, address, and any account numbers into tiny pieces that a potential identity thief has no chance of reassembling.

The papers you need to destroy include your utility bills, bank statements, junk mail, canceled checks, and
most important - anything that contains your Social Security Number and even your email address.

Print-outs you make while online often include your email address, date, possibly your credit card and your bank account numbers.

Anything that can identify you, or any financial account papers that you have, must be shredded beyond recognition.


Merely depositing such papers into a garbage can is not good enough. Garbage cans and dumpsters are treasure troves for "Dumpster Divers" and identity thieves. Recycle bins are not safe either. ID thieves will dig through personal recycle bins and those at community recycling centers, to get potentially damaging information on you. You can and should recycle these documents once they have been shredded, but how should they be shredded?

The features to look for in a paper shredder are described in the rest of the article "3 Most Important Paper Shredder Features"  

Be safe - protect your family from Identity Thieves.
                                                                         ... Richard
If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

Check the Security Alert Blog Archives - Lots of Cool Posts

July 22, 2010  New beta of Microsoft's Security Essentials 2.0.

Read about it in cnet news - download instruction included in the post.
http://news.cnet.com/8301-10805_3-20011194-75.html

Microsoft released a beta of the new version 2.0 of its Security Essentials anti-malware software on July 20th, with a few changes and enhancements.

It's smarter at detecting and removing security threats and offers better performance than version 1.0, according to a Microsoft blog. The software also now integrates directly with Windows Firewall and gives users the option to turn the firewall on or off.

The initial release of Security Essentials was well received with positive reviews from CNET and other tech sources.

More at the Microsoft Windows Blog
http://windowsteamblog.com/                    .. Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

Check the Security Alert Blog Archives - Lots of Cool Posts

June 15, 2010  Free Stinger virus removal software updated on June 14th.

Get the McAfee Labs Stinger Virus Remover Software update link here

Stinger is a stand-alone utility used to detect and remove specific viruses. It's not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations.

Save it to a CD or memory stick. It could save the day if a virus blocks your  connection to the Internet.
                                                         ... Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!

Check the Security Alert Blog Archives - Lots of Cool Posts

June 14, 2020    Here's a Free ecourse that could add to your safety

While reviewing the lesson pages for the new "Body Language Basics" ecourse, the thought struck me that understanding a person's non-verbal signals could easily help avoid aggressive or threatening confrontations.

So, as a follower of my Safety Alerts postings, it seemed quite appropriate to share this Free eCourse with you.

Register for your copy of the eCourse here and immediately start to receive a new lesson in your email every two or three days until you have all five.

Here's the direct link to the sign-up page. Just enter your first name and a valid email address, and you'll have Lesson One within a few minutes.

http://tinyurl.com/2716ord

or use this sign-up address -

www.richardpresents.com/body-language-course.html

The "Body Language Basics "  Course covers information that will help you learn how to effectively interpret the signs and signals people are sending you with their body -

 -in any situation!
                                                                   ... Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
                      Check the Security Alert Blog Archives - Lots of Cool Posts
June 9, 2010    Microsoft, Apple, and Adobe post a bunch of updates -

Get Microsoft Security Updates here
http://www.update.microsoft.com/windowsupdate/v6/thanks.aspx?ln=en&&thankspage=5

Apple Security updates for Safari 5.0 and 4.1 here
http://support.apple.com/kb/HT4196

Adobe Security Bulletin here
http://www.adobe.com/support/security/advisories/apsa10-01.html

And when you have finished installing these, be sure to check out the June 9, 2010 post about the ZeuS Trojan in his blog at "Krebs on Security",
http://krebsonsecurity.com/

Krebs reports that the ZeuS Trojan is loaded into a major spam email campaign announcing fake alerts from the IRS, Twitter and certain Youtube videos.

You should know, and remember that the Internal Revenue Service does not communicate with taxpayers about their accounts using email.

Do your family and friends a favor by reminding them that they will not receive valid account information from The IRS in their email, ever.

                                                                 ...Richard

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 
           
May 30, 2010       Am I stupid? I could have become a millionaire

I could have become a millionaire many times over this month.
 
I can't remember when I've been so lucky!
 
Every day during this past month there have been dozens of notices in my email
that there are millions of dollars just waiting for me to act.
 
There have been so many that I didn't know where to start - the alerts came
from addresses like these, with Subject lines to grab my attention
 
johnsigen@ btinternet.com ATTENTION: BENEFICIARY
officefile.office@ att.net Your Bank Draft worth of $3.8million usd
barbara.david@ btinternet.com CONTACT FEDEX DELIVERY OFFICE COTONOU.
sblucci@ sbcglobal.net Coca-Cola 2010 promo (contact claims office for your prize)
a.kampman@ btinternet.com Fro.Mr.Johnson Salim To You
e3424@ btconnect.com CONGRATULATIONS (3 million dollars on this one)
centbnk16@ excite.it IMPORTANT AND URGENT (Another Nigerian Lure)
contractrevew@ gmail.com CONFIDENTIAL
jjasssson49@ onet.pl INVESTMENT
yisimon77@ yahoo.com.uk ATTN:SIR/ADAM

What's the matter with me? Why didn't I jump at these bonanzas?
 
Well, you and I recognize them all as fakes, but what about the less experienced
web surfers, young and old, who may be in dire need of money to buy food, pay
for their utilities, rent, buy clothes -
 
They are being suckered into a trap.
 
Do you know anyone who might fall for these robber tactics?
 
If so, save your friends and relatives from sure financial disaster and warn
them that the chances of becoming a millionaire from unsolicited offers like these
are a lot less than one in a million.
                                                                        ... Richard
Tags:
, phishing
If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

 
April 16, 2010    Does it matter what you tweet? You bet it does because Big Brother is watching - and saving your tweets!

Thanks to a heads-up by Tom Kelchner who posts to the SunbeltSoftware Company blog, we visited the Library of Congress website to learn that they are archiving yours, and my Twitter posts!

With more than 50 thousand followers, and the donation of its digital archives from Twitter, there's an incredible amount of super sleuthing personal and other information available for public and big brother scrutiny.

So, does it matter what you tweet?  It's nearly mind boggling to understand what these resources could lead to in the hands of the wrong people, political, or radical groups.

The Library has been collecting materials from the web since it began harvesting congressional and presidential campaign websites in 2000. Today the Library holds more than 167 terabytes of web-based information, including legal blogs, websites of candidates for national office and websites of Members of Congress.

In addition, the Library leads the congressionally mandated National Digital Information Infrastructure and Preservation Program www.digitalpreservation.gov, which is pursuing a national strategy to collect, preserve and make available significant digital content, especially information that is created in digital form only, for current and future generations.

There's a lot more fascinating evidence at the Library of Congress website
 
... and here's a brief and interesting history of the beginnings of the Library-

Founded in 1800, the Library of Congress is the nation's oldest federal cultural institution. The Library seeks to spark imagination and creativity and to further human understanding and wisdom by providing access to knowledge through its magnificent collections, programs and exhibitions. Many of the Library's rich resources can be accessed through its website at www.loc.gov and via interactive exhibitions on a personalized website at myLOC.gov.

When President John Adams signed a bill in 1800 transferring the seat of the Federal government from Philadelphia to Washington D.C., he provided a mandate for "such books as may be necessary for the use of Congress -- and for putting up a suitable apartment for containing them therein…"

The original library was destroyed in 1814 when British troops set fire to the Capitol building. But former president Thomas Jefferson offered to replenish the library with his own extensive collection.

Today's library contains more than 29 million books and other print materials in 460 languages. They, along with million more films, maps, manuscripts and other materials, are housed in three buildings with the original named for President Jefferson.

The library assists congress with research, completing 822,000 research assignments in 2007. It is also open to the public, receiving 1.4 million visitors in the same year.-- (Information from The Library of Congress Web site).

Even without this consideration, it just makes sense to use good judgment and discretion with your tweets.
                                                                          ...Richard

Tags: twitter, Library of Congress, Sunbelt blog
If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

To TOP

April 11, 2010  Get Ready for a Busy Security "Patch Tuesday" from Adobe and Microsoft on April 13th

Expect a very active and important release schedule from both Adobe and Microsoft for this coming April 13th "Patch Tuesday"

Comment from the Sunbelt Software blog by Tom Kelcher. "Given the attention that malcode (malware) creators have lavished on Adobe products recently, an updater to go along with regular “patch Tuesday” updates will certainly help us all have a good end-user experience."

More details here at Adobe's reported April Security Updates


SANS Security  The SANS Institute(*) reports that there will be 11 security bulletins from Microsoft with 5 of them rated critical, and all 11 affect Windows or Microsoft Office and Microsoft Exchange.

Microsoft Security Bulletin Advance Notification has comprehensive tables that list the bulletins in order of major software category and severity.

Microsoft is also reminding users that as of July 13, 2010, it will no longer support Windows XP SP 2; users are urged to upgrade to XP SP 3 or Windows 7. On the same day, Microsoft will stop extended support for Windows 2000; no updates of any kind for Windows 2000 will be released after this date.

(*)SANS is the most trusted and by far the largest source for information on security training and certification in the world.

I hope you have automatic update notification set up in anticipation of these important security updates. There's really little reason not to -

                                                                  ... Richard
Tags: malware

    If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

To TOP

April 3, 2010       Malware Rivalry - childish? Maybe not

If you think "'School Yard Bullying and Rivalry" sound juvenile, consider what's taking place in the "Malware School yard".

Unfortunately, as juvenile and childish it may sound, the ramifications are somewhat frightening.

KrebsonSecurity* recently posted about the rivalry between authors of two malware crime kits - the Zeus Trojan that we mentioned recently, and "SpyEye", a more recent keystroke logger package for sale.

Looks as if they're out to get each other - or at least each other's crime clients. You know, the Internet criminals who buy these malicious software packages (for a much a $10,000) so they can steal yours, and my private information from our computers and the financial services we use online.

As I see it, this kind of rivalry leads to more and more sophisticated malware, more difficult to block with our current Anti-virus programs, and certainly extremely more difficult to remove from our computers.

I suggest that *Brian Krebs Post is a must read if you are concerned about, or even just interested in the current state of malware development

                                                        ....Richard
Tags: Zeus Trojan, SpyEye

If you found our Security Alert Blog interesting, please subscribe to our RSS feed!
 

To TOP

Don't hesitate to express your views and opinions on my Security Alert Blog and Cyber Security Alert postings (easily done by clicking on the highlighted 'COMMENT' |  at each post. Watch for postings on fraud alerts, virus alerts, worm alerts, Internet Security alerts, security scams, parental controls, online predators, net security, and more. Be sure to visit our Firewalls-and-Virus Protection website for even more help

To TOP

Evergreen      Free report - "Avoiding Current Security Threats"

   There are still some unresolved issues with the Conficker worm and Cyber criminals are flooding the Internet with bogus "Anti Virus and Anti Spyware" programs designed to steal your personal information, add your computers to world wide "botnets", and generally prey on unsuspecting web surfers with unprotected computers.

   But you can take steps to avoid these security threats, and I have outlined them in a special report you can have for Free.

   This report is an update and a bit of an overview of the information published in my newsletters, blog and websites.

   It covers the basics of what to look for and how to prepare your computer to avoid the next high risk threat. It's a quick download (PDF file) which you can obtain by going to the registration page and leaving your email address so that the download instructions can be sent to your email inbox.

   Get Free Report here and share this web address with your friends so the emails you get from them are clean and free of malware.

http://www.richardpresents.com/avoid-threat-registration.html
                                                          ...Richard  
 
If you found our Security Alert Blog interesting, please subscribe to the RSS feed! 

To TOP


Quick and Easy Way to Subscribe to the
Security Alert Blog

 
Add to My Yahoo!
add to my.msn
Add to Google
Add to My AOL

Just Click a button to add to your favorite RSS feed

 


If you're not comfortable with RSS feeds, I'll send
you a brief email each
time I update this blog
with an important
Security Tip or Alert.
 
Enter your Email Address

 

Preview |
Powered by FeedBlitz

Your email address is safe.
It will never  be shared with
third parties or used for Spam
Here's What's Happening at our Other RichardPresents.com websites

To TOP

Evergreen    
    
Please accept our INVITATION to Help Parents
Teach Their Kids to be Safe Surfers – an Invitation to Help other Parents, Grandparents and Guardian by Sharing Your Experiences of Teaching Your Children To Be Safe When They Were learning to Surf
the Internet. Please Tell Us About It HERE

 

To TOP

Evergreen      Update your Emergency Virus Protection program

Free mcAfee STINGER backup virus scanner and removerIf you don't have your Virus Protection program yet, here's an Emergency Step you should take, Right Now!
 
 McAfee offers a FREE Virus Scanning program named
                  
STINGER.

  It has grown in size a little over the past few years and no longer fits on a single floppy Disk. But so many of the newer PCs, including lap tops don't have a "A" floppy drive anyway, you should burn it to a CD or memory stick for an offline back up tool.

  You can use it as we do, to check any of your PC computers for viruses, without being on line.

  It is an 'After the Fact' application, which means that it does not scan incoming email files, attachments or downloads, but it does scan whatever you have already received online.

  It currently checks, and repairs over 200 recent viruses. It's FREE to download from McAfee
STINGER

                                 
 Stinger - Click for Latest Version  
                                                                                               
                                                                                                       ... Richard

 

To TOP

More Tags:  ,
          cyberbullying,
Firewalls, Keyloggers,  Disaster Recovery,
        
phishing, , Trojans,
         ,,
         Conficker, , , Rogue software
 

To TOP


Return to Firewalls Home Page     CLICK to Visit  our Internet Security Website
 

FREE Internet Security and
Computer Safety Articles and Reports

CLICK HERE
for your copies

 (New Window)

SQUASH the Bug

Google   
 

SUBSCRIBE ME
 to the
 
Security Alert Blog
 ~~~~~~~~~~~~~
ARCHIVED POSTS

April 3, 2010  thru
 December 28, 2010

Jan 11, 2011
Dec 28, 2010
Dec 19, 2010

Dec 12, 2010
Nov 21. 2010
Nov 12, 2010
Oct 20, 2010
Sep 28, 2010
Aug 8, 2010
July 29, 2010
July 25, 2010
July 22, 2010
June 15, 2010
June 14, 2010
June 9, 2010
May 30, 2010
April 16, 2010
April 11,2010
April 03, 2010

EVERGREEN
 


Contact Me
Unlike the people who use
Twitter to  tell you they've
walked  their dog, I Tweet
Only the  things that I believe
all my followers will find useful.
So, grab a Twitter account and

Follow me on Twitter

Visit our Family Friendly Internet Security Website

Automatic notification
of Blog updates
 
    it's
private

powered by
ChangeDetection
 

Check out this Demo and signup for FREE



CLICK HERE

  
 
90 Percent of PCs are infected with Spyware - IS YOURS?
Get your FREE
anti-spyware
Download Trial HERE


CounterSpy - Get a Free Trial here

CounterSpy -
IT WORKS!
 
Log Out
 
Archives
Jan-Feb-Mar 2010

Oct-Nov-Dec09
Jul-Aug-Sep 2009
April-May-June 2009
Jan-Feb-Mar 2009
December 2008
Sep-Nov 2008
June-Aug 2008
April-May 2008
Feb-Mar 2008
Dec - Jan 2008
Oct-Nov 2007
Aug-Sep 2007
Jun-July 2007
Apr-May 2007
Jan 2007,Feb-Mar 07
Oct 2006,Nov 2006,Dec  2006
July 2006,Aug 2006,Sep 2006
April 2006,May 2006,June 2006
Dec 2005,Feb 2006,Mar 2006
Sep 2005,Oct 2005,Nov 2005
June, 2005,July, 2005,Aug, 2005
March, 2005,April, 2005,May, 2005
February 2005
January,  2005
December 2004
 

Some of my favorite Blogs
--------------
Blogged By RichardPresents
Sunbelt Blog
Cnet Download Blog
Bill Hely's Computer & Online
    Security Blog

FaceTime Security
"Kenneth A. McArthur
 Marketing Thoughts
"
Basic Computer Skills Blog
PC Maintenance
WhyWait? Start it Now

Security Fix Blog
 

Checkout the eBook "How to Protect Your   Privacy and Security Online"












CLICK HERE for the Security Tips ebook, bonus
PC Security ebook
and  Free Resale Rights
Instant Access - Instant Download - Anytime of the day or night
(These are electronic books that you will download upon purchase...there will be no book mailed to your address)
 
Listed with
Weblog Commenting and Trackback by HaloScan.com

Feed Shark

Blogroll Me!

CLICK HERE for your FREE  Guide to Stopping Spam - Once and For All
Free Report on Stopping SPAM
Instant Access - Instant Download - Anytime of the day or night
(This is an electronic book that you will download upon purchase...there will be no book mailed to your address)
 
  • Disclosures
    Material Connection
    You should assume that the owner of this website has an affiliate relationship and/or another material connection to the providers of goods and services mentioned in this message and may be compensated when you purchase from a provider. You should always perform due diligence before buying goods or services from anyone via the Internet or offline. -- (Terminology used with permission of Ken McArthur)

     
  •                        Get your Subscription to th
    Security Alert News Reporter
          A Newsletter with periodic updates on the latest
           events and issues affecting your  personal security

        We Value Your Privacy

     Click Button to Read a recent issue and subscribe

                 SUBSCRIBE ME

                                     Recognized as a Family Friendly website
                                              Email this page to a friend

        

                                           Close Window                    T
    o TOP 

                                                             changing LINKS 
                   ©  *RichardPresents.com is the parent company of Firewalls-and-virus-protection.com ,

            Privacy Policy|Contact     Security Alert Blog    Proud Charter Member of i-Cop, Protecting the Consumer