Here's a great post on Internet security in the Security Alert Blog                          The Firewalls and Virus Protection Security Alert Blog
                      Keep up to date on Internet Security with the  
                Firewalls and Virus Protection Security Alert Blog

                            Richard Rossbauer's
    (Archives Apr-May-June 2009)

   Vital Internet Security Alerts and Information for the everyday Non-technical Computer user, Internet User and Web Surfer who just wants to be safe doing basic stuff without the hassle of viruses, spyware, or worse.

   I'm very pleased that you're here today, and that you're concerned about your computer security and family Internet Safety. I look forward to your early return to the Security Alert Blog. 

   Using the
 Web Feed or book-marking this page will make it a lot easier to visit again.

Thanks, Richard Rossbauer (Read About Us)

Save This Page AddThis Social Bookmark Button 
Blogroll Me!
June 29, 2009            Avoiding Internet Sharks and Scam Artists

   In this period of economic turmoil, more and more people are looking at adding to their income using the Internet. Although most of these people are honest, some are simply predators preying on the the urgent need of many.

internet scam artist   They present themselves as providers with offers of money making schemes - often with outrageous claims of easily attained riches with little or no effort.
   They are the ultimate "Scam Artists".
   If you are one of the many considering the Internet as a source for earning some extra income, keep in mind the old caveats, "Buyer Beware", and "If it sounds too good to be true, it probably is."
   How do you check if an offer is legitimate or not?

   There are Websites that outline scams online. A simple Google search will turn up several top Websites and it is always a good idea to check and see what is not recommended.
   Most online work at home jobs are scams. There are more people who want to work at home than there are jobs, so it doesn't make (more HERE)
Tags: Spam and Scams

If you found our Security Alert Blog interesting, please subscribe to the RSS feed!


June 26, 2009       ID Theft on the Increase - Are You Prepared?

   Have you heard the radio and TV commercial reporting that an identity theft takes place every 3 seconds?
   Exaggerated or not, it's still an alarming thought. However, there is something we can all do to prepare ourselves to minimize our chances of being one of the victims.
   We can learn about and understand how the perpetrators operate, and what steps to take if we do become victimized. Here are links to resources on my websites that should be in your library - they are all free.

5 Part course on Avoiding Identity Theft .... CLICK HERE
Protect Your personal Privacy .... CLICK HERE
Protect Your Children's Privacy ...CLICK HERE

   Why not share these free resources with your family and friends? They'll appreciate your thoughtfulness.
 identity theft, phishing,

If you found our Security Alert Blog interesting, please subscribe to the RSS feed!


June 22, 2009     Here's how I plan to protect my computer this summer,
                                                what are your plans?

   In the recent issue of my "Security Alert NewsReporter", there's an update on the current virus and Trojan Horse threat activity and some advice on Rogue software which is designed to fool us into believing our computers have more viruses and worms than they may actually have.

   There is also a lot of Free advice on protecting your computers, advice in the form of a series of lessons and eCourses that I hope you use.

   This issue is different, however. There's an optional version to the usual text email. You can read it
here (and I hope you will use the email link to give me your opinion - the version you can read in your browser, or the email text version)

    Summer vacation time is soon here for us to enjoy - the criminal element doesn't take vacations - they're using all of their time to try to trap us - stealing whatever, and however they can.

    Be Alert - take a look at the current
"Security Alert NewsReporter"

 virus removal, anti spyware,  -
If you found our Security Alert Blog interesting, please subscribe to the RSS feed!


June 3, 2009   How to Protect your Computer when You Are
                           Online - and Offline

   Technological advances, increasingly sophisticated software, faster
networks and online communication have brought many benefits for
everyday computer users. However, with these advances have come
increased security risks. When cyber criminals harness this very same technology to further their evil ends, many previously unknown risks lie in wait to trap the unprepared, often hidden among the social networks.

   The following should be a review for the more experienced computer user, but some of these threats could be new to the lesser
experienced web surfers.

Here are some common threats and ways to handle them:

   Viruses - These malicious software codes cause undesirable effects on our computers. A virus is designed to spread itself without the knowledge of the computer user. A computer may become infected through downloads from the internet using CD's, floppy disks, or other storage devices with infected programs, or from other computers on the network. Another extremely common way viruses spread is through infected email attachments.

  Given the many modes of transmission, computer viruses are clearly a threat online as well as offline. The old adage "Prevention is better than the cure" is particularly true in the case of computer viruses. You can save yourself a lot of virus grief and many hours of misery by avoiding infection in the first place.

   These simple and practical rules can help you avoid virus grief (read more)
botnet, phishing, social networking -
If you found our Security Alert Blog interesting, please subscribe to the RSS feed! 


May 8, 2009     Have you been a victim of Internet Crime?
   If you have, The Internet Crime Complaint Center (IC3) accepts online Internet crime complaints from either the person who believes they were defrauded or from a third party to the complainant. If you have been victimized, your can file a complaint at their website.
   In their recent Press Release (03/31/09) The Internet Crime Complaint Center (IC3) announced their "IC3 2008 Annual Report on Internet Crime".
   The Report states that complaints of online crime hit a record high in 2008.
IC3 received a total of 275,284 complaints, a 33.1% increase over the previous year.
   The total dollar loss linked to online fraud was $265 million, about $25 million more than in 2007.
  The average individual loss amounted to $931.
  While the complaints consisted of a variety of fraud types, non-delivery of merchandise and/or payment ranked number one (32.9%). Internet auction fraud was the second most reported offense (25.5%) followed by (read more)

 identity theft, phishing,  
If you found our Security Alert Blog interesting, please subscribe to the RSS feed! 


April 25, 2009    Free report on "Avoiding Current Security Threats"

   There are still some unresolved issues with the Conficker worm.

   As of this writing, the worm, which started spreading to millions of
computers last year, appears to be turning its infected hosts into servers for e-mail spam, security experts recently reported.

   Apparently, the payload has been made more of a threat by adding a second virus, called Waledac which adds infected computers to botnets which send out e-mail spam.

   And yet a third virus carried by Conficker prompts infected PC owners to purchase a fake (rogue software) anti-virus program called
Spyware Protect 2009
for $49.95. (Don't fall for it!)

   But you can take steps to avoid these security threats, and I have outlined them in a new report you can have for Free.

   This report is an update and a bit of an overview of the information published in my newsletters, blog and websites.

   It covers the basics of what to look for and how to prepare your computer to avoid the next high risk threat. It's a quick download (PDF file) which you can obtain by going to the registration page and leaving your email address so that the download instructions can be sent to your email inbox.

Get Free Report here and share this web address with your friends so the emails you get from them are clean and free of malware.

Tags: Conficker,
virus removal, anti spyware, Rogue software  
If you found our Security Alert Blog interesting, please subscribe to the RSS feed! 


April 18, 2009      More and More Rogue Software -
                                                 Seems like they're Everywhere

If you aren't careful, you can be duped unto buying antivirus software that is actually a fake - designed to steal your money and often load your system with malicious code that continues to pop-up false alerts of virus infections.

      How can you tell which ones are fake? It isn't easy because the purveyors of these criminal ploys are extremely talented and clever. The stuff they are promoting - like Antivirus'09 - is so well presented that even some more experienced web surfers have been trapped.

      So that you don't get trapped with this one, take a look at the pictures of it at the Sunbelt Software Company's Blog. These images will help you recognize it - and avoid it.

If you found our Security Alert Blog interesting, please subscribe to the RSS feed! 


April 11, 2009           Simple Test to Detect Conficker Worm

     The first place I saw this was on Paul Myers TalkBizNews newsletter. It's an easy and simple method that could identify the presence of the Conficker worm on your PC

     Here's how it works - Go to this page for the "Conficker Eye Chart"


     There are 6 images at the top of the page. If you can see all 6 images, you are probably not infected with the worm.

      If it looks like your machine is infected, disconnect it from  the Internet immediately. Go to another system that's not infected, and get Microsoft's Malicious Software Removal Tool.


      Run that on the infected system, and be sure the infection is removed before you reconnect to the Net.


If you found our Security Alert Blog interesting, please subscribe to the RSS feed! 


April 2, 2009     So the Conficker worms didn't execute on April 1st -
                        so What

   Doesn't mean it doesn't exist - it does - and still presents a potential problem. But your computer is safe if ...

   ...if it is up to date with all the Microsoft patches

   If your computer is not infected, you really do not have a problem - it has to be infected for a "disaster" to happen.

   However, to protect against it becoming infected, make sure you have an
up-to-date anti-virus program installed, anti-spyware software, and your Microsoft Security patches are current.

   If you aren't sure that your Microsoft Security patches are up to date, you can download the latest at the  Microsoft Update Web site

   And of course you have a firewall program - right? If not, get a FREE top of the line one here - "Sunbelt Personal Firewall"

 Be prepared for "when ever" the Conficker owners do instruct it to perform  some nefarious deed.
... Richard

If you found our Security Alert Blog interesting, please subscribe to the RSS feed! 


Don't hesitate to express your views and opinions on my Security Alert Blog and Cyber Security Alert postings (easily done by clicking on the highlighted 'COMMENT' |  at each post. Watch for postings on fraud alerts, virus alerts, worm alerts, Internet Security alerts, security scams, parental controls, online predators, net security, and more. Be sure to visit our Firewalls-and-Virus Protection website for even more help


Quick and Easy Way to Subscribe to the
Security Alert Blog

Add to My Yahoo!
Add to Google
Add to My AOL

Just Click a button to add to your favorite RSS feed


If you're not comfortable with RSS feeds, I'll send
you a brief email each
time I update this blog
with an important
Security Tip or Alert.
Enter your Email Address


Preview |
Powered by FeedBlitz

Your email address is safe.
It will never  be shared with
third parties or used for Spam
Here's What's Happening at our Other websites


Evergreen     Update your Emergency Virus Protection program

Free mcAfee STINGER backup virus scanner and removerIf you don't have your Virus Protection program yet, here's an Emergency Step you should take, Right Now!
 McAfee offers a FREE Virus Scanning program named

  It has grown in size a little over the past few years and no longer fits on a single floppy Disk. But so many of the newer PCs, including lap tops don't have a "A" floppy drive anyway, you should burn it to a CD or memory stick for an offline back up tool.

  You can use it as we do, to check any of your PC computers for viruses, without being on line.

  It is an 'After the Fact' application, which means that it does not scan incoming email files, attachments or downloads, but it does scan whatever you have already received online.

  It currently checks, and repairs over 200 recent viruses. It's FREE to download from McAfee

 Stinger - Latest Version  Updated July 6, 2009
                                                                                                       ... Richard

   Tags:  virus removal, ,   Trojans,         
I  f you found this Security Alert Blog post useful, please subscribe to the RSS feed! 


More Tags:Internet Safety Rules,  kids Internet safety , parenting teenagers,
          cyberbullying,  spam
Firewalls, Keyloggers,  Disaster Recovery,
 botnet,  identity theft, phishing, , Trojans,
          virus removal, anti spyware,  spyware


Here's a COOL list of current online security terms - with definitions.

Curious about 'Zombie' for example? Just click on the word and a new page will open with a bunch of information on Zombies

Go ahead - Try It


  Blogging Help
Blog for Fun and Profit
Blogging's easier and more fun than building your own website
Cloak PayPal Source Code
Easy-To-Use Software Instantly Generates Secure PayPal Buttons


Return to Firewalls Home Page     CLICK to Visit  our Internet Security Website

FREE Internet Security and
Computer Safety Articles and Reports

for your copies

 (New Window)

SQUASH the Bug


 to the
 Security Alert Blog

Current Week


Contact Me
Unlike the people who use
Twitter to  tell you they've
walked  their dog, I Twitter
Only the  things that I believe
all my followers will find useful.
So, grab a Twitter account and

Follow me on Twitter

Visit our Family Friendly Internet Security Website

Be notified of
page updates
it's private
powered by

90 Percent of PCs are infected with Spyware - IS YOURS?
Get your FREE
Download Trial HERE

CounterSpy - Get a Free Trial here

CounterSpy -
Log Out
April-May-June 2009
Jan-Feb-Mar 2009
December 2008
Sep-Nov 2008
June-Aug 2008
April-May 2008
Feb-Mar 2008
Dec - Jan 2008
Oct-Nov 2007
Aug-Sep 2007
Jun-July 2007
Apr-May 2007
Feb-Mar 07
Jan 2007
Dec  2006
Nov 2006
Oct 2006
Sep 2006

Aug 2006
July 2006
June 2006
May 2006
April 2006
Mar 2006
Feb 2006
Dec 2005
Nov 2005
Oct 2005
Sep 2005
Aug, 2005

July, 2005
June, 2005
May, 2005
April, 2005
March, 2005
February 2005
January,  2005

December 2004

Some of my favorite Blogs
Blogged By RichardPresents
Sunbelt Blog

Arlene's Small Town Living Blog
Cnet Download Blog

FaceTime Security
The Dilbert Blog
"Kenneth A. McArthur
 Marketing Thoughts
Max Anderson
Basic Computer Skills Blog
PC Maintenance
WhyWait? Start it Now

Security Fix Blog

Checkout the eBook "How to Protect Your   Privacy and Security Online"

CLICK HERE for the Security Tips ebook, bonus
PC Security ebook
and  Free Resale Rights
Listed with
Weblog Commenting and Trackback by

Feed Shark

Blogroll Me!

CLICK HERE for your FREE  Guide to Stopping Spam - Once and For All
Free Report on Stopping SPAM
                       Get your Subscription to th
Security Alert News Reporter
      A Newsletter with periodic updates on the latest
       events and issues affecting your  personal security

    We Value Your Privacy

 Click Button to Read a recent issue and subscribe

               SUBSCRIBE ME


                                       Close Window                    T
o TOP 

                                                         changing LINKS 
               ©  * is the parent company of ,

   Privacy Policy|Contact     Security Alert Blog    Proud Charter Member of i-Cop, Protecting the Consumer