How To Protect Personal Information On Your Computer

With more people using the internet everyday, there has been a significant increase in the threats of online criminals attempting to steal personal information. When you use email, surf the net, and provide financial information to retailers, you have to make sure no one can steal your information. Fortunately, technological improvements in computer security and implementing safety precautions can drastically reduce the chances of having your information stolen.

The following tips are designed to help you protect personal information on your computer:- Acquire Security Software: It is important that you have the appropriate security software to protect your computer from viruses, hackers, worms, spyware, spam, identity theft, and Adware. A quality and renowned security software program will protect your computer from a variety of security risks. Some software provides a combination of protection methods while others provide just one security function.

– Implement Wireless Security Protection: If you access the internet through a Wi-Fi network, make sure you have the appropriate protection from hackers. With wireless networks, the radio waves travel in the surrounding area, so a hacker sitting nearby can access your connection and hack into your computer.

– Use a Firewall: A firewall adds a security obstruction between a personal computer and the internet. It helps prevents hackers from accessing your computer. It will block any suspicious and unauthorized entry into a computer system.

– Email Encryption: When you use email encryption, it reduces the chances of someone intercepting and accessing your information.

– Beware of Phishing Scams: Many online criminals will send fraudulent emails and use fraudulent websites to gather a person’s personal information. Never provide personal information to unknown businesses. Confirm the site is legitimate by either checking with the Better Business Bureau or online sites that expose fraudulent sites and emails. Purchase products from sites that encrypt transaction payments. Encrypting payment information will code your personal and financial data after you submit the payment.

– Beware of Certain Free Download Programs: Some free download software can contain harmful programs. They can allow the person who sent it access to your computer. Security software can prevent these programs from installing. Adware and Spyware are software that can contain these malicious programs.

– Backup Information: Back up and store your information in case your security barrier is breached so you will not lose important information. Store it on a CD or an external hard drive.

– System Security Configuration: Configure your browser or operating system to manage pop-ups, delete cookies, and block specific web sites.

– Change Passwords Regularly: Change your passwords at least every 30 days to reduce the chance of a hacker accessing your online personal and financial information.

– Monitor your Credit Report: You should regularly check your credit report history. This will let you know if anyone has been using your financial information.

When you use the internet for shopping, banking, emailing, and sending instant messages, there are shady people who may try to access your computer to steal your information. Using the latest security software and practicing safe security practices, will reduce the chance of having your personal information stolen and used for illegal purposes.

Firefox now blocks cross-site tracking by default for all users

Posted June 14, 2022

Mozilla says that all Firefox users will now be protected by default against cross-site tracking while browsing the Internet.

This is because, starting today, Mozilla is rolling out and enabling its Total Cookie Protection set of privacy improvements for all Firefox users worldwide.

Total Cookie Protection forces all websites to keep their cookies in separate “jars,” thus blocking attempts to track you across the web and building browsing profiles.

Read the article here: https://www.bleepingcomputer.com/news/security/firefox-now-blocks-cross-site-tracking-by-default-for-all-users/

How to get a complete network inventory of all the machines and software

If you are a network administrator, you have no doubt been in many scenarios before where you need to have these crucial software and hardware statistics, but you have to manually probe each machine rather than having an automatically updated network inventory. Of course this takes a great deal of time, so imagine if you could have a complete network inventory accessible automatically and remotely. Using highly useful application you can do precisely that. This application will thoroughly scan your complete network, querying all the workstations and servers on it. It will then give you data about all these different pieces of hardware and software installed on each PC and appliance installed on the network.

You don’t have to install anything else on the other machines, and in a matter of moments, this application can do everything for you. What’s more, it doesn’t even matter how large or diverse your network is. This application will be able to do the task just perfectly, even if you have a vast commercial type environment with dozens if not hundreds of machines on the network. Collecting all the data you need in real-time, you’ll be able to get to it without even leaving the office.

To give you an example of some of the sorts of details that this application will offer you, it will give you data regarding hardware that each workstation and server has. Some of the hardware data included, but not limited to, is the workstation manufacturer, model, motherboard make and any other peripherals installed. It will also give details about the type of operating system installed including the version and also data about all the updates and service packs that have been applied, if any. However, it doesn’t end here. It will also give you data about all the additional applications installed on the machines, and what’s presently running.

It also gives you a better way to securely monitor multiple machines over a network, since it will also tell you which processes are presently running on the machine. It will also list the user accounts being used, including information about the staff that are using the PC.

Another great use for this network inventory application is if you are thinking about upgrading certain machines on your network. You can easily go through the data offered by the application to find which devices are letting down the network. Machines with older hardware or machines which need software updates to the operating system can easily be filtered. It will also be able to scan the network remotely, and you don’t need to ever install anything on to the machines being probed. It is safe and secure, and will not allow any data to leave your network. The application also includes various step-by-step wizards, making things even easier.

Recommended Software:

Komodo Labs – NEWT Professional – Free: https://www.komodolabs.com/network-inventory/

Gordon Lyon’s NMAP – Free: https://nmap.org/

Graphical User Interface for nmap – ZenMap – Free: https://nmap.org/zenmap/

NEWT Professional is free for up to 25 devices.

The above link is NOT an affiliate link. I do not receive any compensation from the above link or this posting.

Network monitoring without even having to get up from the chair

While you probably won’t have any issues with a small network of 10 or so machines, once the network starts increasing in size, the networking tools built into the Windows operating system are no longer so useful and things can hastily get out of control. You need a program which is more ideally suited to larger networks.

However, as networks get larger, the problem tends to need far more complex monitoring software to keep track of everything that is fucntioning on the network. However, things can start getting so complicated that only specialist IT experts can use them. This can add quite a large extra cost to your organisation to hire somebody who can do the task.

However, there is software out there now which will assist the monitoring of medium to large networks without even having to leave the chair. Total Network Monitor does precisely this. It doesn’t matter how large your local area network is, but this software can do the job for you by automating a lot of the tasks and collecting data in real time.

You can keep watch over network performance with this and also automatically be informed about any issues through its complex system of alerting. Even more impressively, the application can be configured to send you alerts to your mobile phone or e-mail, so you can keep an eye on what is going on back on the network from wherever you are.

This way you can monitor your entire network without having to leave the room, giving you much more freedom and time to work and other jobs. There are various automatic scans featured in the application including easy-to-use wizards and a number of various tests and probes.

It is also compatible with a great number of different protocols, including ICMP, HTTP, FTP, TCP, POP/SMTP, and IMAP, making it highly versatile as well. It will also allow you to access the various Windows performance tools on a number of different machines on your network, allowing you to more easily keep an eye on the finer details of all the devices on your network.

Network monitoring becomes ever more difficult as your network and company continues to grow, but there is really no need for it to get extremely confusing and out of control. A program like this can make things a lot simpler. Also, as a new machine is added to the network, Total Network Monitor will automatically add them to the network layout.

Working with all versions of Windows, this application really does have it all. However, if you are not completely convinced, then you should try a free evaluation edition which will give you a much better idea of how the application works and what it can do for you.

Better yet, why not go with a network device that has all of the needed monitoring tools embedded in it. I LOVE the Firewalla Gold Router/Firewall/Network Security and Monitoring device.

The above links are affiliate links and I will receive a small reimbursement for each device purchased through my affiliate link. Using these links helps support this website with no additional expense to you the consumer.

Free Backup Software vs. Free Online Backup

Why do you need backup software? The answer is because computer failures and crashes are a matter of ‘when’ and not ‘if’. So when the next crash happens you should be ready. Even you use the computer for home; you should know that it is important for you to protect your personal data by making backups of all your hard drives. With it, you can be sure that you are completely protected from data loss.

First off all, you need to remember that backing up your private data is a very important thing that you should always do. It is something that you should make a routine in order to protect your data from data loss.

Today anyone is able to do secure backups with absolutely no specific skills or knowledge of the high-tech industry thanks to the new generation of backup tools. Backup software makes creating data backups much easier than even copying a file or watching video DVD. When you are choosing solutions for backing up your critical computer files, there are two main ways you have. One is storing the backup files on CDs, DVDs or USB drives and the other is an online or remote backup service.

The fact that DVD and CD discs are much more stable than hard drives, you have to consider that backing up your files in DVDs or CDs is safer and will provide you with much more convenience. There is free backup software that you can download over the internet and install it in your computer. For example: Free Backup Mill. Basically, there are many free online backup services. Although it doesn’t really say that it is an online backup service, you can consider it to be so. You can try using your email account as your backup service as you can attach some important files and send it in your own email. This means that you will be able to have a copy of your files in the email.

Another good and recommended method to backup your important data is remote backups. As the name suggests, remote backup is backup store that you create in a remote computer. The concept of remote backup is just the same as online backup. However, it is important that you should not refer to it as the same. Remote backup is not online backup but is a part of it. It is where you save your file to another computer in real time.

When you are looking for backup software or service pay attention to five main features:

  • The first feature is that it will be able to backup and restore your entire machine.
  • The second is that it will be able to backup and restore your Outlook emails.
  • The third is that it will be able to backup your application settings.
  • The fourth is that it will let you backup and restore your music, pictures, documents, videos and other files.
  • The fifth backup feature is that it will enable you to backup and restore your data online.

So, if you want to better protect your important and critical data, you might want to back it up using any of the free backup software or free backup services.

How to Block Pop up Ads

Pop up ads are of three different categories namely pop-ups created by spyware and adware, messengers service advertisement and general browser pop-ups. Pop-ups ads occasionally appear on the screen and interfere with the user s ability to view the contents displayed on the screen. The user can easily avoid these advertisements by installing a pop-up blocker.

Messenger service advertisement:These types of pop-ups are applicable only for Windows XP and Windows 2000. They usually occur because someone is accessible to your computer network and is can transmit this message to your computer through TCP and UDP ports. It is the responsibility of the messenger service to transmit these messages. For controlling these pop-ups, the security has to be hardened by installing firewall software like zone alarm or by installing Windows XP which puts off messenger service by default and activates the windows firewall. The port which facilitates the transmission of these messages gets blocked.

For activating firewall in Windows XP, click the Start icon on the desktop, press Run and type the word Firewall.cpl, select the on button lick OK. It is recommended not to connect to the internet before activating the Firewall because there is a risk of computer getting infected.

Pop-ups created by adware and spyware:The function is same as the general browser but spyware is usually run by the browser assistant object which is the activeX controls that connects to the internet explorer and gets in touch with their server without the user knowing it. This can also be a cause of leaking the user s confidential information to the spies as well as wasting the internet bandwidth. In relation with this, any outgoing connection without the user s authorization should be taken as threat to the security of the user. For preventing pop-ups that are generated by adware and spyware, anti-spyware application such as spyware blaster, Ad-Aware, Spybot Search and destroyer should be installed in the computer. They are just the same like the anti-virus software. These applications work by employing the services of the folders of the hosts for preventing unnecessary ads servers and sites that are responsible for conveying these ads, they also increase the security settings of the browser.

Applications like Sygate and Zone Alarm will always signal the user every time when an outgoing traffic is detected. This will enable the user to block Trojans and dialers from reaching the internet. It will also give the user same attentions to the settings of the firewall, it can be assumed as the passage security and operates only with programs that are needed to be assessable to the internet. This point will make the user be able to investigate the performance of the firewall being employed to the websites. They will do a thorough checking of the system for accessible ports and weaknesses, therefore they will accordingly advise the user.

General Guidelines that should be followed:- The system should not be connected to the internet before activating Anti-virus and firewall.

– The security configurations should be amplified in the browser so that the Activex control is blocked from installing automatically.

– The system should be always updated by seeking latest information online or by subscribing to Microsoft Security Bulletin in order to be aware of the possible threat.

– The services of the HOSTS folder should be employed for preventing unwanted websites.

How to Prevent Spyware

Because there are so many different ways for spyware to enter a computer, it is almost impossible to avoid infection. Avoiding certain activities, such as downloading, can reduce the risk but there are still many ways for spyware to enter. That is why preventative and real-time counteractive measures need to be taken.

The first step to preventing spyware infections (and re-infections after spyware is removed) is to educate yourself. By understanding why spyware exists, you can start to identify possible threats while you are online. So, if you skipped the first five chapters of this eBook, now would be a good time to go back and read them before continuing on.

Research Before You Download

Even though downloading any sort of free file or software is one of the biggest risks when it comes to getting spyware or other computer infections, most people are not going to stop downloading. There are simply too many desirable free programs and files out there. However, you can greatly reduce the risk of an infection by researching the freebie first.

Whenever downloading free software, type its name into a reputable search engine along with the word spyware. Chances are, if that program comes bundled with spyware, you won’t be the first to get it. If you type in “Kazaa spyware” into Google, for example, the first several pages of results all mention the infamous spyware as well as how to remove it.

Change Your Settings

Some of the preventative steps against spyware are very simple to take. For example, you can use Mozilla Firefox instead of Microsoft’s browsers which have several security holes which are easy for spyware programs to enter through. Also, switching to a Mac or Linux operating system will greatly reduce your risk of various computer infections because most are targeted at Windows. However, this is not such an easy change to make.If working on Windows Explorer, you will want to install Windows XP Service Pack 2.

This service pack solves many of the security holes in Internet Explorer and it also has a built-in pop-up blocker. There are also features like the add-on manager which will allow you monitor which programs are running with Internet Explorer.You will also want to change your Security Zone settings on Internet Explorer to block harmful sites. The settings have the options of listing sites as Trusted, Restricted, Local Internet, or Internet.

If you list a site as restricted, you are still able to visit that site but the security settings will prevent the site from harming your computer. Some antispyware tools like Spyware Blaster and Spybot Search and Destroy will add automatically add harmful sites to the restricted setting. If your computer internet is connected to a dial-up modem, you will want to unplug the modem when you aren’t using it. This will prevent spyware from committing dial fraud by calling premium numbers.

Choosing Antispyware Software

Yesterday we looked at Free Antispyware Applications, but which one is right for you?

There are a lot of antispyware software programs out there and all of them offer different levels of security. Before you antispyware software, you should at least take a few minutes to do some research and find out more about the software. You can easily get lists of the “best” antispyware software from blogs and websites. Then, use these lists for further investigation.
Here is what you should be finding out about the antispyware before downloading:

• Who makes the antispyware: There are a lot of well-known companies which make antispyware, such as Microsoft. However, this doesn’t mean that the big brand names are offering the best products. What is important is that the company has a good reputation for antispyware software. Some of the best companies have been around for a long time. Since they have been dealing with spyware issues for so long, they may be adept at fighting against the threat.

• Are there any complaints about the company: Generally, you can easily uncover any complaints about an antispyware company simply by typing its name into a search engine. You may also want to try searching for the company’s name followed by “complaints.” If there are more negative comments than positive ones, you can be sure that there are major issues with that software program. To really be sure about the company’s reputation, you can visit the website for the Better Business Bureau. There, you will find out if there are any unresolved complaints against the company.

How are its reviews: There are countless blogs and other websites which have reviews of antispyware software. Some of these are left by users while others are by professionals in the field. To make sure that the reviews are accurate, you might want to check out reviews at sites like CNET.com which specialize in tech news. :
Keep in mind that there is no one best antispyware software program. Rather, it matters which antispyware is best suited for your needs. Here are some other factors you should take into consideration:

  •  How easy is the antispyware to use?
  •  Does the antispyware come with customer support?
  •  Will the antispyware slow down your computer?
  •  Is the antispyware effective in prevention?
  • Is there real time prevention?
  •  How effective is the software in spyware removal?
  •  Do you need to update and, if so, are updates free?
  •  What scanning options are there?
  •  Does the antispyware include antivirus as well?
  •  How much does the antispyware cost?

Almost all antispyware software today comes with a free trial period. It is highly recommended that you take advantage of this option in order to see how you like the antispyware before you decide to buy it.

Free Antispyware Software

One of the reasons that spyware is spread so quickly is because of all the free downloads which have spyware software bundled in with them. Obviously, many people are not willing to pay for software- especially antispyware software. Luckily, there is now a lot of free antispyware software available.
One of the ways to get free antispyware software is simply to download it from the internet. However, it is very common that the free antispyware software actually comes with spyware bundled in with it. You can read the next chapter to find out about this risk. Here is a list of some of the best antispyware software programs available for free online.

Free Spyware Protection

  •  Windows Defender: Before any software can be installed, it has to pass a Windows Genuine Advantage test. This antispyware software works in real time. It takes up little running space and can be put on a schedule for scanning a computer system. However, it is not the best choice of software for stopping all spyware.
  •  Spybot Search & Destroy: This is one of the most well-known antispyware software programs. It has been around since 2000 and is regularly updated. It has an immunization feature which will add malicious sites to your Restricted Sites list to protect you in case your computer is hijacked and taken to a harmful site.
  •  Ad-Aware: Ad-Aware is another one of the most popular free antispyware software. It can be downloaded for free. However, there is also a commercial version of Ad-Aware which offers even higher levels of protection. It also includes antivirus.
  •  AVG Anti-Spyware Free Edition: AVG is popular became popular as antivirus software and now has created antispyware software as well. There is a commercial and a free version available. AVG is one of strongest in terms of overall computer protection. However, like all free antispyware software, it does not contain a built-in firewall.
  •  Avast! antivirus Home Edition: This software is a combination of antivirus, antispyware and anti-rootkit. It is made for Windows and is free for home use.
  •  Panda Cloud Antivirus: This program also includes antispyware
  •  Microsoft Malicious Software Removal Tool: Called MSRT for shot, this software is available for free so long as your Windows is genuine. There are free monthly updates of MSRT available for users on the first Tuesday of each month.
  •  Comodo Internet Security: The Comodo company makes several software programs including antispyware, antivirus, and a firewall. You can download each of these separately for maximum protection. There is also a paid version called Comodo Internet Security Pro. Comodo is one of the strongest when it comes to battling computer infections. However, the software may be a bit difficult for beginners to operate and the free version doesn’t have any customer support.
  •  Spyware Blaster: This software does not remove spyware infections. Its goal is to prevent spyware infection and has a list of thousands of malicious sites which can be added to your Restricted Sites list. It also has a feature which will allow you to lock your Internet Explorer homepage so it can’t be altered. 

Free Spyware Removal Tools

  •  SuperAntiSpyware: If you already have a spyware infection, this software has been reported as effective in removing the spyware.
  •  HijackThis: This freeware utility works a bit differently than most spyware removal tools because it doesn’t just perform a simple scan based on a list of spyware. Instead, it scans the computer and looks for all suspicious items. Then, HijackThis will ask the user what to do with those items. Users should be very careful while using HijackThis to not delete any useful or essential items.
  •  Removal Restrictions Tool: Also known as RRT, this tool is used to restore permissions in situations where spyware has locked users from the Control Panel, Task Manager or Regedit.

There are a lot more free antispyware programs available with new ones constantly becoming available. However, it is important to note that many of these are not completely effective in preventing or removing spyware. Usually, they each have a few loopholes which spyware makers are aware of and exploit.

One way to get around the loopholes is to use multiple free antispyware software programs at once. What one program misses will generally be picked up by another program. The only real downside to this method is that using multiple antispyware programs can make your computer run slower.

Also, it needs to be pointed out that many of the free antispyware which is advertised online is actually rogue antispyware. This software actually contains spyware which will infect your computer.

How does Spyware Get onto Your Computer?

In most cases, spyware gets onto your computer because you have installed it unknowingly. This is how it works: when you find some sort of free program or file online, you download it and it comes bundled together with spyware. This is also the case with shareware. For spyware creators like Claria, which is the largest spyware company, this method of spyware transmission is very profitable. Claria had revenues of $35 million just last year.

Spyware as a profitable business really began to surge when free internet applications became available online. Since applications such as Web browser, email, and instant messaging were free, it didn’t take long before users expected free software as well. Software makers were having a hard time selling software for even low prices and they had trouble battling against illegal file sharing as well. Instead of trying to increase sales, the software makers decided to offer free software but include spyware bundled with it.

A spyware company will pay a software company for every time the software is installed. Then, the spyware uses targeted ads on the user. When a user clicks on the ad or makes a purchase through the ad, the spyware company profits. An example of this is the free file sharing application Kazaa which comes bundled with spyware from the company Claria. Kazaa gets paid by Claria every time its program is installed.

Then, the Claria spyware creates targeted pop-up ads for users and profits each time one of those ads is clicked on. If you visit the Dish Network homepage, a pop-up ad for DirecTV will appear. This method of spyware distribution occurs with all sorts of free downloads including software and file sharing. Often, the terms and conditions for downloading a free application will mention that spyware is included with the download.

However, not many people take the time to read through the terms and conditions. It is also common for the information about spyware to be deceptively hidden in a very long and confusing terms and conditions statement. The downloader simply clicks “Accept” and gets the spyware.

Fake Windows Security Boxes

To start downloading spyware, sometimes all it takes is a click of a link. One of the most common ways that spyware makers get users to click on their links is by disguising them as Windows security boxes. The boxes look just like a normal Windows security box. However, when you click on them, the link causes your security settings to change and spyware to be installed on your computer without your knowledge. For example, a box might read, “Optimize your internet access.” Even if you hit the “No” button, you will still trigger the spyware.

Security Holes

If you do not have high security on your computer, you run the risk of spyware finding its way inside. Some of the newer spyware programs have even learned to find their way through holes in firewall and antispyware software. Spyware is often distributed with a virus. First, a virus is sent to a computer. Instead of replicating and possibly destroying a computer’s system like a normal virus, its job is instead to create a hole for the spyware to enter.

There are several other illicit ways in which spyware can enter a computer. For example, there are spyware programs which are spread through emails. Even if the email gets tagged as potentially dangerous and the user doesn’t read it, the spyware can still be spread just by having it displayed in a preview pane.