 |
Here's your
"Security
Alert News Reporter"
for September, 2005
The "NewsReporter"
is published to keep you up-to-date on the latest information we
gather for avoiding and surviving the hectic hacker attacks on your computer
security and personal identity that take place constantly on the
internet. Many of our comments are based on personal experiences. Protecting
your safety, security, sanity, and privacy is not a simple task. We're trying to make it a bit easier for you to accomplish.
This Newsletter
is sent out periodically to everyone who has registered for the
Security Alert
and Report
Alert Services from one or more of the websites
published and maintained by www.RichardPresents.com.
If you are no longer interested in up-to-date Security Alerts or
Safe Surfing Suggestions -
please use the
link at
the end of this letter to un-register.
|
Thanks for being a
Loyal
Subscriber |
Some
Highlights from
TODAY'S TOPICS |
●.
Latest Virus and Worm Threats /
SSA Keylogger worm removal
●.
The Panda Report - Spying Activity
●.
Revised ALERT -Stinger Updated
●.
Privacy Theft - Important Updates
●. Family Security -
Updated Caring Report
●.
Family and Kid Friendly Sites
●. Recommended - Predator Guard to Protect
your Children
●.
Protect Yourself - from the No. 1 Scam |
●. Publications for your Family and Friends/
"23 Critical
Security Alerts" / FREE
Internet
Glossary /5 New Article Announcements/
Online Security while Traveling / Others
●.
Resources - Many FREE! / (What
is i-cop?)
●.
Bill Hely's ebook -My Security Bible
●.
Reviews of the News-
really fresh
information and encouraging news to keep
you abreast of latest Security activities
●.
National Cyber Security Month -
October 05
●
Free Download
/ Errornuker Registry
Cleaner
|
CLICK ON ANY TOPIC YOU'RE INTERESTED IN - OR READ THIS NEWSLETTER FROM
TOP TO BOTTOM |
America has just experienced a tragedy, and the survivors
of the Katrina disaster need help - our help - and they'll need it for
a long, long time. Please open your hearts and help them in the best
way you know how. We're doing it through i-Cop.
~~~~~~~~~~~~~~
►
Latest Virus Threats
reported
thru Sep 4,
2005 by McAfee ,
US-CERT, Panda and other advisory services. (US-CERT is the
operational arm
of the National Cyber Security Division (NCSD) at the
Department of Homeland Security)
Full descriptions including virus characteristics, symptoms, aliases
and removal instructions are available by clicking on the
links. This virus alert is in addition to those posted in previous
month's News Reporter
issues. You can review previous Virus Alerts in the Archive files.
CLICK on
Red
Virus Name for
descriptions and Removal Advice
► |
McAfee Advisory
W32/Bagle.dldr is a Low-Profiled trojan.
|
► |
symantec Advisory
●
W32.Zotob.E
is a medium
threat worm with high distribution
|
|
► |
US-Cert
advisory
Apple Mac Products Affected by Multiple Vulnerabilities
Original release date: August 17, 2005
Systems
Affected
● Apple
Mac OS X version 10.3.9 (Panther) and version 10.4.2
(Tiger)
● Apple Mac OS X Server version 10.3.9 and version 10.4.2
● Apple
Safari web browser
(See Apple Security Update 2005-007 for further information)
.
|
► |
TrendMicro
No Malware Alert: no new medium or high risk
alerts at this time.
|
► |
Panda
Here are the highlights from the
Panda Report for Sep 1, 2005
with
most frequently detected
malware
during August, 2005
Despite the
appearance of the Zotob and IRCBot.KC/KD
worms, which exploited the Windows Plug and Play
vulnerability to affect numerous media companies and other
businesses and institutions especially in the United
States, the list of the viruses most frequently detected
by Panda ActiveScan in August has not changed radically
with respect to the previous month. Sdbot.ftp once
again occupies first place in the ranking. This is the
detection of a script that downloads the Sdbot
worms onto computers via FTP. The old-timer Netsky.P
crops up in second place. This notorious worm exploits a
vulnerability to run itself automatically.
Third in the list is Mhtredir.gen, a generic
detection for a group of Trojans that remotely execute
code on the compromised computer, without the user's
consent but with the same privileges. This is followed by
Gaobot, a worm with bot functions. Bots are a
type of malware designed to allow attackers to take
malicious action on infected computers. The malware in
fifth place is closely related to the previous example.
Qhost.gen is a generic detection for the modifications
that some malicious code, such as the Gaobot family, make
to the Windows HOSTS file.
(Panda is an
International anti-spyware provider)
************** |
|
To Top
In following the
threat activities reported by
the major Security companies, I've observed the change in
virus activity and severity from fast-acting, broad based
global threats to more targeted worm attacks where the focus
is on avoiding detection and stealing money and identities.
Phishing activities are rampant, as are Trojans dropping
spyware Keyloggers.
Here's an interesting scenario on a recent keylogger exploit
Patrick Jordan, Sunbelt
Software Company's most senior CoolWebSearch (CWS) expert, was doing research on a CWS
exploit. During the course of infecting a machine, he
discovered that (a) the machine he was testing became a spam
zombie and (b) he noticed a call back to a remote server. He
traced back the remote server and found an incredibly
sophisticated criminal identity theft ring.
The spyware keylogger, named Srv.SSA-KeyLogger, is a backdoor
program that, among other things, secretly steals data from users
internet sessions, including logins and passwords from online
banking sessions, eBay, PayPal, and other programs that use
html forms to collect personal information.
In my August 13, 2005
post to the Security Alert Blog, I reported that
Sunbelt Software
posted their removal software download link and
expert
James Healan of SpywareInfo published an
extraordinarily good step-by-step guide for those of us Win98
users who can't use Sunbelt's fix.
You can get
Expert Help
and the Direct Links for Removing this sophisticated
Srv.SSA-KeyLogger. If you use Windows 2000, I encourage you
to visit the
August postings of the Security Alert Blog
and test
your system for this threat.
... Richard |
|
To Top
IMPORTANT ALERT►
I'm changing my recent reminder about the Free virus checking
and removal STINGER tool at the
Firewalls and Virus Protection site.
STINGER, (compliments of McAfee's Anti-virus and
Vulnerability Emergency Response Team -
AVERT) was
updated on August 18, 2005 to detect and remove more than 50
current viruses including Zotob.
It's a great
little program that still fits neatly on a floppy disc - a perfect way to
clean up your computer if a worm or other 'rogueware' has disabled
your ability to get back on the Internet to update your
security ware.
Whenever updated versions become available,
I'll post
a notice here, on the Firewalls and Virus
Protection website and
in the Security Alert Blog. |

|
|
To Top
|
Privacy Theft
-
Be on the alert for the latest spyware and Scams
How to detect and get rid of
malware and Zombie (hijacking)
programs
Usually, it's very difficult to repair the damage
they cause, however, there
are some really
fine
and very effective
Programs available to Home and Small
Business computer
users to improve online security and minimize adware, Trojan horse/Zombie and
general malware threats. You'll need
three.
Recent recommendations: Microsoft AntiSpyware*,
Webroot Spy Sweeper
(CLICK
for Free trial),
-
SpywareBlaster
(Download)
-
Adaware - and
XoftSpy
*
Microsoft AntiSpyware
is currently available as a
FREE Download,
but you can't use it with
Windows 95 or 98. I use it on my windows 2000 and Windows XP PC's,
have it set for automatic updates and daily scans. Like Spyware
Blaster, it's designed to monitor in Real Time.
Check
out the Free Resources topic for more information and links
to HijackThis and
CWSshredder
Protect Yourself From the No. 1 Scam
Memorize this. Repeat this. You really need to know this.
CompuServe, PayPal, AOL, and most all of the online money
handling company employees NEVER ask you for your password,
credit card number, or other personal billing information
online-- via an e-mail message or instant message -- nor do
they ever call you directly to ask you for this type of
information.
Scammers and phishers will try. So now you know. Don't
fall for these scams. Refuse to give out your personal billing
information. Be firm; don't be fooled. |
|
To Top
►
Family Security and Caring
Family Caring- At some time
in our lives, family members and friends may need caring support
and special understanding. The FREE Care Giving/Care Receiving manual is still available
from the Senior2Senior.org website. Don't miss getting this
valuable document, even if you aren't a Senior or aren't now
involved in providing care for a loved one. All of my friends
that I've shared it with agree that it's a great Resource and
Guide.
You'll want to share it, too. The
download
is Free (and could be worth some of its weight in gold to you
someday).
If you already have a copy, the Author Tom Koziol, has
updated some of the important information.
Get
the updates HERE ...... Richard |
►We post Kid Safe Sites, because like you, we care about
the safety and security of our children and grandchildren...
...and to help parents,
grandparents and guardians guide today's young internet surfers to
safe sites. There are many other website creators who feel the same
concerns and responsibility. These are just a few of their sites that
we have personally reviewed and tested as safe for our Grandchildren.
Check them out and share them with the young people you care about.
Please note the 'AMBER ALERT" scrolling at the bottom of this
table
If you would like to help support the Code Amber project,
please
click here.
Reviews of
Family Safe Sites |
CRAYOLA
|
The Crayola
website goes
beyond being just for Kids with its sections for Parents
and Educators, too. |
 |
PBS Kids is a respected and trusted site.
We would not hesitate to send our children and grandchildren
there for entertainment and education, either. |
 |
Our Firewalls-and-virus-protection.com
website is Certified 'Family Safe' by the
Institute of Family Safe Businesses. |

Ask Jeeves for Kids |
Ask Jeeves is a
trademark of Ask Jeeves, Inc., Copyright 1996-2000 Ask Jeeves,
Inc.
Ask Jeeves for Kids has great Study Tools, Fun and Games and
News Resources, |
Kid Safe Site from
 |
|
A really cool Index to the
Web for net Surfers ages 8 - 14. |
|
Check out the
Kid Friendly pages HERE |
and the
Parent Friendly Links
HERE |
 |
Your Site Support
Supporting your Play Time with Kids
for Kid approved
activities that grownups love
Click to visit Site |
|
We receive no compensation for
displaying these links and you will be under No Obligation when
you visit them. They are here because we care about the safety
of everyone who uses the internet, especially our Kids. |
|

|
Help for Parents and Grandparents. Add to your computer
Predator Guard provides real-time protection for
children in chat rooms, instant messaging, and e-mail
exchanges.
The Home Edition Features:
-
Real-time protection
in Instant Messaging, Chat Rooms, E-mail and Attachments
-
E-mail notification to parents
-
Reviews both outgoing and incoming data
-
User defined library to prevent distribution of personal
information
-
Detects, captures, logs and reports violations
-
Works as a stand-alone application or with existing site
blocking programs (AOL Parental Controls, Cyber Patrol, Net Nanny,
and more.)
|
Predator
Guard provides real-time protection for children in chat
rooms, instant messaging, e-mail and attachments from online
predators and pedophiles. In addition,
Predator Guard can prevent all outgoing personal
information, such as a child's home address, phone number and
school information, or other information that is essential for a
predator to make contact with a child.
Purchase this
Inexpensive Protection Now
~~~~~~~~~~~~~~~~~
To
Top
|
► As
you may have noticed, the
News Reporter
keeps growing with more and more information in each issue.
If you Bookmark it, you can return to re-read it at your
convenience. I hope you do.
► Would
splitting the newsletter into two separate sections, and issuing
them two weeks apart make it easier for you to keep up with all
of the news,
tips, and useful content?
► Your
opinions will be very helpful. Please let me know how often
you'd
like to have your newsletter sent to you.
►
CLICK HERE to open a
contact form where you can tell me what you think.
thanks, Richard |
To
Top
|
►
Publications - Use these Reports to help your
family and friends:
. For
those of you who have visited our Firewalls website and Security Alert Blog, you know that the information there is directed toward keeping
you safe from hacker and cracker attacks. Additions to our bookshelf
are selected with the same purpose - and we encourage you to share our
reports
freely. Don't
miss the NEWest
Free report
►
Bookshelf and
Special Report Alerts |
 |
"23
CRITICAL ALERTS
You Should Consider
when Maintaining
Your Computer Security and Protecting
Your Personal Safety"
FREE Downloadable eReport for ALL Subscribers
to the Security Alert News Reporter
Already a
Subscriber?
CLICK HERE to
request your
Free copy
~~~~~~~~~~~~~~~~~
|

Protect Yourself
and Family from Dangerous Chat Rooms and Instant Messages.
If you use them, you and
yours are the Hacker's newest targets.
Hackers are already taking advantage of problems with today's IM
systems. People not familiar with these new threats could easily
open a new, harmless looking IM message that pops up on their
screen. With one well intentioned click of their mouse on a Hackers
phony message, could get infected.
It's no longer just the teen age Chat Room users that
are in danger.
Whole families are threatened
In case you missed this FREE report on the
Firewalls-and-Virus-Protection website,
you can read
it here. Please print the report and share it with your
family, friends and associates. Help them avoid the hidden
dangers and threats often buried in IM messages and of predators
lurking in Chat Rooms.
~~~~~~~~~~~~~~~~~~~~~~~~
To
Top
|

If you take your laptop computer with you on your travels, this
interview with the Author of "Travel Cheap-Travel Well" contains
tips and advice to help maintain your
Online Security while Traveling in the United
States and Abroad.
The author, Victor K Pryles, discusses computer security and
offers first hand advice on maintaining personal safety while on
the road, high seas and in the air.
Click to read it
here or Down Load it from this link and share this FREE 10 page
report with the travelers you care about. (It's in eBook format;
download in less than a minute and zip to open)
DOWNLOAD HERE
This is the book that
prompted my interview with Victor Pryles. He included so
many money saving Tips and Useful Resources that I sought
his first hand advice on keeping my laptop free of bugs
and stuff when traveling. There's so much more in his
book, though, it would be impossible to describe it all
here... but it's summarized on his web page where he
describes everything he included, like --
all the travel
hot spots, the unknown secrets, the special deals and
comprehensive travel savvy, and a great deal more; knowledge that would take
years to learn on your own. He put it all in one place --- in the
"Travel Cheap - Travel
Well!"- Confessions of A Traveling Pauper eBook.
I feel confident
you'll find Victor's web page to be a fascinating
review in itself.
Click here - it won't cost you anything to look.
... Richard
~~~~~~~~~~~~~~~~~~~~~~~~ |
|
Don't
get trapped by Rogue Anti-Spyware
software
Trying a new anti-spyware program? Avoid being duped
or robbed by false
positives.
"Rogue/Suspect" means that these products are of unknown,
questionable, or dubious value if used for anti-spyware
protection.
In case you missed this FREE report on the
Firewalls-and- Virus-Protection website, you can read
it here. Please print the report and share it with your
family, friends and associates. Help them avoid the hidden
dangers and threats often buried in software programs that are
supposed to clean up, not infect your computer.
~~~~~~~~~~~~~~~
|

Is Your
Firewalls and Virus Protection Safe
Enough?
This FREE report will help you identify viruses, prepare for attacks
and infections and guide you in their removal. It's a
9 page,
easy reading guide that covers the threats we all face in our
daily use of the internet. It's a basic education in
understanding and Avoiding Virus Grief
Down load it from this link (it's in PDF format):
http://www.RichardPresents.com/safefirewall.zip
The download includes a ReadMe page with instructions for
unzipping and using your Acrobat Reader, and even a link to the
Adobe website where you can get your own free Acrobat Reader if
you don't already have one
~~~~~~~~~~~~~~~
|

Is a Keystroke Logger Being Used To Spy
On You?
Many of the tools and tricks in use today to spy on
your internet activities are exposed in this 7 page report. This
look into spyware will alert you to the ease in which your
identity could be compromised, or stolen.
Open the FREE report in a new webpage by clicking
Are
Keystroke Loggers
Spying On You?
(No downloading necessary, and you can print it right from
your
browser window.)
~~~~~~~~~~~~~~~~~
|

How Much Money would it cost you to
regain the use of your computer after a serious virus infection?
It cost one of our friends a whole lot of money, much aggravation
and lost time, lost records, and a major inconvenience to recover
from the havoc caused by the worms and viruses that had infiltrated
their computer over a period of many months.
In case you missed this FREE report on the
Firewalls-and-Virus-Protection website,
you can read
it here. Our friends have recovered full use of their
computer and now encourage everyone to learn from their
experiences. Please print the report and share it with your
family, friends and associates.
~~~~~~~~~~~~~~~~~ |
What's an Internet Glossary?
NEW!
Ours
is FREE. It's an alphabetical list of dozens of
the terms you'll find used in many of the articles
and news reports that relate to the Internet.
With our Glossary, you'll be able to decipher
acronyms, like CGI, CSS, DSL, GIF, ISP, and more
Do you know the difference between
Cookies and Crackers?
Firewalls and flame?
Internet and Intranet?
Surfing and Scrolling?
Get the answers from our FREE Internet Glossary.
Click HERE to Download yours
~~~~~~~~~~~~~~~~~
To
Top
|
There are a lot more
Articles and Reports at the Firewalls and Virus
Protection website. Look them over for the helpful 'keeping
safe' info they contain.
Our most recent library additions include
PC
Cleanup for Windows XP
Viruses
and Worms - The Problems and their Solutions
Good
Password Tips and Password Management
Avoid
Losing Data Files from your Recycle Bin
Planning
for Disaster Recovery -Protecting Your Data Files
and
visit the
Federal Trade Commission (FTC)
website with its many publications relating to protecting the security
of your family, both on the internet and off. They are FREE. You can go to their pages covering
Consumer (family)
Protection
HERE.
|
To Top
|
► Resources
- many Free. It's
easy to install the latest Firewall, anti-virus(*), spam blocking, and spyware removal software on
your computers. Download all of these programs, and more, mostly for FREE, from our
Firewalls-and-Virus-Protection website pages.
Check them out. If you need to
block Spam, find the links on the 'Spam and Spyware' page. Same thing for Cookie
Crumbling tools, Spyware protection, etc. Most of them have a purchasable Upgrade option, and by trying the
free versions, you can upgrade the ones that work best for you.
(*) Here's the best link to
Grisoft's AVG
Free anti virus software, in case you missed it in recent issues of
the
News
Reporter |
Browser Hijacking is still
a major problem. One of the outstanding
sources for information about browser hijackers and tools
to remove these predators is still available on the
SpywareInfo.com website.
It's loaded with
powerful information and helpful advice that zeros in on the hijacking
problem. If you are experiencing any similar problems, be sure to
follow the link to their forum. There are literally thousands
of postings from which you will learn and possibly find the advice
that will help you resolve your own issues.
You can download HijackThis from the Software link on the
SpywareInfo website. Be sure to read and follow their instructions to
the letter if you want good results.
We learned about this program from the extraordinary website and
forums built and maintained by James Healan, webmaster of SpywareInfo.com.
|
DOWNLOAD latest cws shredder
which is now a part of Trend Micro
http://www.intermute.com/products/cwshredder.html
It'll find and remove
those nasty Cool Web Search trojan horses. |
To Top
Here's a powerful, inexpensive, and helpful resource
Did you know
that popular, everyday gadget items like MP3 music players
(Apple iPod for example) and digital cameras can "walk"
your precious data and records off your premises, right
under your unsuspecting nose?
In The
Hacker's Nightmare the danger is fully explained and
an inexpensive, easily-implemented solution offered.
You'll learn the dangers and the means of prevention.
Hackers, virus and
spyware writers and other unethical persons are
becoming more and more sophisticated every day. Their
attacks and the undesirable and often dangerous stuff they
sneak into our computers slow them down, and threaten our
personal lives with increasing severity.
Ever since I found the
eBook, "The Hacker's Nightmare"
that tells how to
really Keep Hackers, Worms and Germs out of my PCs, it has
received my highest recommendation to family and friends.
It's my Computer Security Bible.
Bill
Hely, 20 plus year veteran of internet security consulting. has loaded
it with valuable information and plain common
sense. We could fill this and future issues of our News
Reporter for the next few months just talking about them.
Bill has designed a webpage that describes many of the security
tricks and tools that will help keep that nasty stuff out
of your computer.
Review The Hacker's Nightmare Story HERE. Some
sample (Free) chapters are available to early visitors.
Some testimonials
Bill received recently--
"My heartfelt thanks to you
for finally writing a book about Internet security
in
a language that us 'non-techies' can
understand...
"Reading The Hacker's Nightmare actually made me
physically cringe as
I realized just how easily [intruders] could access my system despite the
fact I have installed expensive software to prevent just that."
- Eric Hart - Proprietor
- Hints-Tips-Newstuff.com
- Christchurch, New Zealand
--------------------------------------------
"If anybody
is interested at all in protecting their system [The
Hacker's Nightmare] is certainly a purchase they
should consider making."
- Bob Parsons
- Founder & President
- Go Daddy Domains
- Scottsdale Arizona USA |
and here's My Favorite Resource
i-Cop is a resource I'm
proud to be a part of.
You have probably noticed the
various references to it throughout this newsletter,
the Firewalls and Virus Protection website
and my Blog.
It's the
International Council of Online Professionals,
i-Cop for short. I
believe anyone actively using the internet to
provide information, services or sell products will
benefit by subscribing to i-Cop's publication -
The Internet Marketing Trade Journal.
It truly sets the
standard for Honesty and Integrity Online. I'm proud
to be a member.
This FREE ezine is
vitally important to online business owners and
anyone even considering making money online! We keep
folks
informed about all online issues and programs to
participate
in, or avoid. Subscribe to The Internet
Marketing Trade Journal
here::
http://www.i-Cop.org/trade-journal.htm
...Richard |
thank you, Richard |
|
|
To Top |
►
Reviews
of the News (more encouraging news
about controlling
SPAM, SCAMS, pornography, and protecting Personal Consumer
Information)
 |
Federal Grand Jury indicts three people accused of sending
pornographic bulk
e-mail in a major international spam case |
In a recent
release of the news at ZDnet.com I read, the U.S.
Department of Justice announced that a Federal Grand Jury indicted three
people accused of sending pornographic bulk e-mail in a major
international spam case.
The DOJ accused the three of distributing bulk e-mail advertising
pornographic Web sites containing explicit images of adults having
sex. The unsolicited e-mails may have numbered in the tens of
millions.
The grand jury issued indictments against former Arizona resident
Jennifer R. Clason, 32; Jeffrey A. Kilbride, 39, of California; and
James R. Schaffer, 39, of Arizona.
A fourth person involved in the case, Andrew Ellifson, 31, had pleaded
guilty last February to one count under the Can-Spam Act and one count
of criminal conspiracy. His conviction marked the first related to the
distribution of obscene spam e-mails, the department said.
The defendants were accused of sending the spam to earn commissions.
They designed the e-mails to make it difficult to determine the
identity of the sender by falsifying the "from" line and sending the
spam from Internet addresses registered in the Netherlands while the
domain names were registered in Mauritius.
Federal investigators noted that from January through June of 2004,
America Online received more than 600,000 complaints regarding obscene
e-mail that allegedly had been sent by the defendants. Investigators
also pointed to data collected by Spamhaus, a nonprofit agency, that
they say shows the defendants' operation to be among the 200 largest
in the world and one that may have generated tens of millions of
unsolicited bulk e-mails.
A nine-count indictment was issued to the three defendants. Each was
indicted on two counts of fraud under the Can-Spam Act and one count
of criminal conspiracy. Under the Can-Spam Act, it is illegal to
distribute unsolicited commercial bulk e-mail.
(from news at ZDnet.com)
~~~~~~~~~~~~~~~
Teen hacker goes to the house of detention
highlights from an article by René Millman of the SC Magazine dated
Aug. 18, 05
A teen hacker who rented out botnets to launch Denial of Service
attacks has been sentenced to five years in juvenile detention and
ordered to pay $35,000 in restitution.
Jasmine Singh, 17, of Edison, New Jersey, admitted he caused attacks
against the websites of jersey-joe.com, based in Delran, New Jersey
and Distant Replays of Atlanta, Ga. Three other retailers were also
thought to have suffered attacks. Singh was accused of launching more
than 30 attacks of which he admitted to five.
Deputy State Attorney General Kenneth Sharpe said the attacks cost the
victims more than $1.5 million through lost sales and getting websites
back online.
Singh uses the botnets at the alleged bidding of 18-year-old Jason
Arabo of Southfield, Michigan, to help give Arabo's rival website an
advantage in selling his sporting goods, the court was told.
~~~~~~~~~~~~~~~
The US Department of Justice receives
August's 'Good Guys' check mark.√
and another goes to NJ
Deputy State Attorney General Kenneth Sharpe √
'Good Guy Check Marks' to date )
√ √ √ √ √ √ √
√
√
√
√(See Archives)
~~~~~~~~~~~~~~~~~
To Top
►
"User Education" is the
focus of our Firewalls and Virus Protection website and the "Security
Alert News Reporter".
Are your IM and Chat Room Buddies alert to the growing Instant
Messaging and Phishing threats?
In case you missed this FREE report on the
Firewalls-and-Virus-Protection website,
you can read
it here. Please print the report and share it with your
family, friends and associates.
As a P.S. to the above comment,
encourage your friends to check out our "Security Alert Blog".
The
most recent Blog entries
include these helpful and timely posts:
●
Helping the Victims and Survivors of Hurricane Katrina
●
Warning for Children - The hidden dangers of Dust Off !
●
Law enforcement officials
arrest two young men suspected of
being responsible for the Zotob computer worm.
(August posts)
●
Up to the minute running report on the Zotob worm
with instant
publication of detection and removal software (August Posts)
●
How
Should everyday home users plan for a computer
disaster?
(August Post)
● Add our information blog to your list of
Must Read spyware
avoidance resources.
The more useful
information you have about
the scourge of malicious spyware, the
better chance you'll have of
avoiding
the grief
and frustration it
can bring.
There are dozens more posts available in the Blog
Archives.
Read our
Blog Posts HERE. I urge you to Comment, Challenge and
add your own opinions to ours.
~~~~~~~~~~~~~~~
To
Top
►
Are you campaigning with
us?
Have you participated in
the Computer Virus Awareness Campaign?
It appears as if some positive progress is being
made in alerting your friends and family of spyware dangers.
Many of the Spyware monitoring organizations and individuals
have noted the changes in Hacker and Spammer tactics. Because so
many internet users have built up their defenses against
malicious spyware, these cyber criminals have had to develop
increasingly more devious and sophisticated attack schemes,
challenging the anti-spyware software developers. We're caught
in the middle of this battle. We cannot drop our guard now.
Now you can do even more. The National Cyber
Security Alliance (NCSA) has set October 2005 as the
National Cyber Security Awareness Month
|
How to
help? Heed their CALL TO ACTION: BE A CYBER SECURE
CITIZEN
Securing your personal computer plays a crucial role in
protecting our nation's Internet infrastructure. The National
Cyber Security Alliance (NCSA) is a public-private partnership
focused on promoting cyber security and safe behavior online. It
drives awareness and response to pressing cyber security issues;
providing tools and resources to empower home users to
stay safe online.
More and more consumers are using computers at home to create wireless
networks and access the Internet using high-speed broadband
connections. In addition, they are using their home computers to
conduct their personal banking, shop for groceries and make
purchases online. With the expanding possibilities that are
being created from powerful new computers and wireless home
networks comes increased risks of harmful attacks if consumers
are not careful.
Their website gives you the information needed to secure your
computer. You'll find tips on how to safeguard your system, a
self-guided cyber security test, educational materials and other
Internet resources, as well as valuable information from our
supporting organizations.
National Cyber
Security Awareness Month October 2005
Working in collaboration with our government and industry
partners, NCSA is sponsoring National Cyber Security Awareness
Month in October 2005. The mission for this initiative is to
raise awareness of cyber security so that users improve their
cyber security preparedness. The National Cyber Security
Awareness Month will feature fun, educational programs, events
and initiatives throughout the month targeting Home Users, Small
Businesses, Education audiences (K-12 and higher education), and
Child Safety online.
NCSA invites you to participate in the National Cyber Security
Awareness Month programs so be on the lookout for more
information as we approach October. In the meantime check out
their Top Ten Security Tips for more information on keeping your
computer safe from hackers. For more information contact
NCSARon@aol.com. or visit
the
National
Cyber Security Alliance
~~~~~~~~~~~~~~~
Please help us help your
family, friends, and associates enjoy a safer and less
frustrating internet experience. We encourage you to share this
information with them or suggest they
subscribe to this newsletter.
I like to say that
Sharing is Caring ......Richard
|
All of us, too, need to |
act, by educating ourselves and by making
sure we obtain the necessary programs to protect our computers.
Those programs include a firewall; installing and updating
anti-virus software; using anti-spyware software that can identify and
delete programs that have migrated to our computers; using spam
filters to protect
e-mail; and downloading patches that update
software and
web browsers. |
_____________
It is one of the most beautiful compensations of this life that
no man can sincerely try to help another without helping
himself.
~ Ralph Waldo Emerson
_____________ |
Keep in mind that
these programs are only as good as their
latest updates!
I hope your machines aren't infected with any viruses that send out spam.
How can you be sure? Do
some 'house-cleaning' on your system. Scan for spyware and
viruses and while you're at it, install a diagnostic program so
that you can discover any viral ills on your PC.
Have you checked the health of your computer's Registry? I have,
with
errornuker. It's a
powerful diagnostic utility
that scans the Windows Registry to identify errors and
provide ways
to optimize it's performance.
Your Registry could need a clean up, too, if
you have these Registry Problem Symptoms
- PC keeps crashing at
critical times
- PC needs frequent
rebooting
- unable to remove a program
using add/remove dialog
- 'unable to load ***.DLL'
errors
- 'cannot find ***.exe'
errors
- PC runs noticeably slower
than when you first bought it
 |
Download errornuker now,
absolutely FREE
After running
errornuker
the first time, and seeing how many registry listings
needed to be fixed on my computer, and how effectively
they were fixed, it is now a part of my booting
routine every time I restart. ...
Richard |
|
To
Top
|
► NewsReporter
Reader's Questions
??????????
Send in your questions.
There is no such thing as a stupid question. Some people are bashful
about asking, but there are always many others who share the same
question, and will benefit from the answers to yours.
With your permission, we'll publish your questions and answers in
future issues of the
"NewsReporter".
~~~~~~~~~~~~~~~~~
Sharing ?
If you have the opportunity to help
family members, associates, or friends by sharing any of the
information in this
"News Reporter",
please suggest that they subscribe for their own personal copy.
They can subscribe here and we'll never share their information with third
parties.
If your friends are hesitant or uncertain
about the benefits of visiting with us,
suggest that they review the help that's readily available at
our one page summary of the Online Security Consideration and
Protective Tactics that are designed to keep them safe on the
Internet.
They Can Check out these Considerations HERE.
And finally for this issue,
we hope you can take our one minute
mini- survey (We'll give you a nifty and entertaining Free
eBook on Coping With Your Stresses for your time)
and visit our
Blog Pages, read our postings and contact us with your comments
and opinions.
Everything you have to offer will help us do a better
job of helping you.
Thank you. ...Richard
Read our Privacy Policy
|
To
Top
As promised in our first
issue, we aren't going to stuff your mail box with un-ending mailings every
day, week, or whenever. When there's important news about the
topics we've noted, we'll let you know, usually monthly.
To avoid unwanted and unnecessary filtering of our messages, we will
send a very brief text email to you. It will have a link to this
News Reporter and an un-subscribe link. The email subject line will identify the contents as
"Latest Security Alert News Reporter - Issue ##" and the
email "FROM" address will be "richard@richardpresents.com"

|
Thank you again, for your interest and trust.
We'll do our best to
honor and preserve it
Richard Rossbauer
|
|
Please Take part
in our Computer Virus Awareness Campaign by Sharing this with a friend |
|
CLICK HERE to be removed from this mailing
list, or
Click to send Un-subscribe email request
|
Welcome New
Subscribers
 |
TODAY'S TOPICS
CLICK on a TITLE to
JUMP to that TOPIC
or Read this
Newsletter
from Top to Bottom ---
Your Choice! |
Latest Virus threats
► |
Privacy theft
► |
Family security
►
|
Publications
► |
Free resources
►
|
Reviews
► |
User
Education
Campaign
► |
Reader's Questions
► |
Archives
Volume
1, Issue 01
Volume 1, Issue 02
Volume 1, Issue 03
Volume 1, Issue 04
Volume 1, Issue 05
Volume 1, Issue 06
Volume 1, Issue 07
Volume 1,Issue_08
Volume 1,Issue_09
Volume 1,Issue_10
Volume 1,Issue 11
Volume 1.Issue_12
Volume 2, Issue_01
Volume 2, Issue_02
Volume 2, Issue_03 |
►= RED
ALERT
►= HELPFUL TIP |

CLICK ICON to Verify our Member standing
|
 |
We are proud participants in the
"Rid the Planet of Viruses" campaign.

CERTIFIED SAFE
for All Family Members
|
Get the latest News
Take a look at our Security Alert Blog
HERE.
A Blog (web log) is a quick and easy
way to share timely information (nearly daily updated news, trends,
developments), answer questions, express opinions and exchange views. |
|
What's
your
No. 1 Use of the Internet?
Please take this one
minute Mini-Survey. Tell us how we can best serve your primary interests
while avoiding
Hacker attacks and spyware intrusions.
We'll give you a nifty and entertaining Free
eBook on Coping With Your Stresses
as a Thank for your time
|
|
|
|
Right Click and SAVE link. Paste it into
your RSS Reader to
Subscribe to our Security Alert RSS feed. It keeps you totally
informed of the latest web page updates, Newsletter Editions and Blog
posts as soon as they're made!
 |
What's an RSS Feed? |
|

Have you heard about the i-Cop Coupon Book?
Check into it HERE |
|
|
|
Some
Subscriber
Comments |
"It's a TERRIFIC
newsletter"
jl scott, ph.d., Director iCop -
International Council of Online Professionals
www.i-cop.org/
|
"Happy One Year Birthday!
I read your newest information--
very nicely written.
You've informed many people over the last year-- a generous
under- taking since
I doubt there is much financial profit involved. Thanks!" Patrick
patrickcarrimaging
|
"Wow, You've really outdone yourself with this
newsletter! It looks and reads like brilliant gold! So much
valuable info! I use it once a day over a full week's time to
carefully digest and implement each of your 'helps', downloads
and updates. Thank you for your incredible dedication to online
security."
Victor K Pryles
www.AuthorsDen.com
|
|
|
|

GetNetWise
is a public service brought to you by a wide range of Internet industry
corporations and public interest organizations .
The
GetNetWise coalition
wants Internet users to be only "1 click away" from the resources they
need to make informed decisions about their and their family's use of the
Internet.
__________ |
|
|