Social Medias and its Influence: Adventure with IT-Security Tweeps on Twitter

Hi,

chat iconFirst of all let me tell you that on the beginning when I joined Twitter I really wasn’t a friend of it as I didn’t see its advantages. I am an ICT Course Instructor and also an author who has written a lot of articles, blogs, tutorials and courses who were read +/- 4 million times in total:

I am also an TOP10 author on Google Knol with more than 1,3 million page views…
.
Top ranking Google Knol English
Link: http://knol.google.com/k/gust-mees-s-knols# (Screenshot is from October 2011) and link doesn’t work anymore as Google Knol discontinued its services on May 1, 2012!
.
So for making best SEO (Search Engine Optimization) I used the Social Medias and also curation to do this, so using also Twitter. It’s only when I started to make curation about Education related articles on Scoop.it, here my curations Gust MEES on Scoop.it, that I got a lot of Retweets (RTs) from teachers and educators and that I build me up a strong social network and a PLN (Personal Learning Network) which were accepting later on also my curations and FREE courses about IT-Security (EN + FR).
.
It started then to make fun using Twitter as I learned from others and others learned from me. As a Life Long Learner Twitter became my main resource to find best articles about Education related stuff and other interesting topics to me, such as mainly IT-Security. One needs only to know the right Hashtag to find relevant stuff for what one is looking…
.
Related links:
.
I tweeted then also a lot about IT-Security and Cyber-Security on Twitter and I encountered something very interesting, here is the story about it…
.
As I am writing in English, German and French so I decided one day to create a new tutorial about IT-Security in French, a FAQ-List http://gustmeesfr.wordpress.com/2012/02/05/securite-pc-et-internetfaqs/ about Frequently Asked Questions for IT-Security and when it was published, so I tweeted it on Twitter and I addressed it also to one of the responsible persons from one of our National Security Chapters (in Luxembourg) on Twitter!
.

A True Story

sharing iconHere ALL begins now:
.

My tweet: Feb 09, 2012: FAQ’s (FR) http://vsb.li/8BFqNe

I got a Reply on Twitter  @knolinfos well done, although some classics are missing like: what is the best antivirus software? ;-)
As there is no one who can give that answer as its dependent also from customers choice, so I sent back an other tweet:
.
#joke What’s best car in the world? LOL ;) This was a friendly message to open a new discussion… (BTW: I know that person…)
But then suddenly something happens what none of us expected (Looks like that both of us forgot that on Internet everybody can see and follow our conversations…); BTW: on Internet we are all “Sender” and “Receiver“, Internet is bi-directional!
.
We got a Tweet (an answer) back from an Antivirus Manufacturer, from Webroot.
.
 .
February 09, 2012: @knolinfos What IS the best antivirus software? Do we hear “Webroot?” :)
 .
February 09, 2012: I replied than that Webroot is already in my #curation list on #scoopit of  best IT-Security Tools here http://www.scoop.it/t/ict-security-tools?tag=Webroot and that would be worth a FREE licence of their product (provoking a bit…).
 .
February 10, 2012: Webroot Rescue ‏ @WebrootRescue @knolinfos We are so honored to be included in your list! Please let us see what we can do and we’ll be in touch. :)
.
February 18, 2012: Webroot Rescue ‏ @WebrootRescue @knolinfos Greetings! Would like to put a care package together for you & your students :) Need some info do so –mind DM’ing us on here? :)
.
I contacted Webroot on Twitter over DM (Direct Message/Private Message) and provided them my email address.
.
Feb 24, 2012: Webroot Rescue ‏ @WebrootRescue @knolinfos We apologize for the delay! Expect a buzz in your inbox ASAP :)
.
Oh Wonder! I got an email proposing me FREE licences of an antivirus for my class! So I got a proposition for 40 licences (Key Codes) for a one year FREE use of  Webroot! ===> The key codes are for one year of Webroot SecureAnywhere Antivirus. <=== You will imagine how happy I was on that moment, 40 licences worth 1,600 EUROS = 2,112 $US (currency value at March 22, 2012)! WOW!
.
What followed later I will not publish it here as it was arranged over DM (Direct Messages), #privacy needs to get protected!
..

On March 22, 2012 I got contacted by email that they found already an institution who needs help and waiting now for an appointment…
.
===> I will try to make a completely report of any visited institution… with photos (if allowed…) and publish it also on our local press!<===
.
This could become a story, when well managed from the 3 actors could benefit to all of us and also for the readers of this blog, a win-win situation in the name of  a better Internet, a secure and safe Internet!
.
While visiting these chosen institutions I will give them practical advice on How-To stay secure and on How-To become a responsible eCitizen (Digital Citizen) while being assisted also from our National Security Chapter…
.
.
March 26, 2012: Webroot Rescue ‏ @WebrootRescueSocial Media & it’s Influence“-An in-depth look at our Twitter relationship w/ @knolinfos -A GREAT read! http://bit.ly/GRkX6l
.

First intervention on Wednesday June 6, 2012

I had an appointment where I gave free (volunteer base) course about IT-Security and where I showed two responsible ladies from 10:00 am to 00:30 pm about how the practical course (workshop) on June 14, 2012 will get hold. There was also one of the free licences from Webroot installed. The ladies thought in beginning that the foreseen course of June 14, 2012 would perhaps become too theoretical; that’s why I made an appointment a week before to convince them about the practice, what they understood also and accepted later. Even that I got an email thanking me for my professionalism and my engagement. The main responsible lady even tried my advice out at home the same evening and didn’t have any problems to install the suggested programs alone… A success…
Here the link of the proposed FREE software to install (in French):  http://gustmeesfr.wordpress.com/2012/05/31/securite-internet-guide-pratique/. Next intervention with 7 more learners on the same place on Thursday June 14, 2012.
.
foyer-sichem-14.06.2012
Thursday June 14, 2012
I was getting introduced by BEESECURE where I am member of the “Advisory Board“. The practical course was given in a house for women and children in distress http://www.fmpo.lu/ and I got the authorization to take also some photos as shown on left side… All the ladies were about 20 years old…
The ladies had netbooks, laptops and also some one an iPhone and one an Android smartphone.
Concerning the iPhone: I helped to install a secure QR-Reader App from Symantec, the “Norton Snap QR-Code Reader“. The young lady didn’t know anything about the QR-Codes, so I explained a bit about it and I showed her how it is working with the QR-Code of the course page. She was impressed by seeing that without typing one letter one could access an Internet web site in less than 2 seconds… Now she can at least scan QR-Codes on a safe way.
 We installed together 6 free licences from Webroot and scanned also the computers where there were 3 computers infected! I didn’t wonder about the infections as all of them use filesharing P2P to download music, as most young people do. They don’t know the dangers of P2P (Peer to Peer) file-sharing, so I will prepare soon a course about How-To download music free and legal from Internet radios…
 .
Related links:
.
Stay tuned, will get updated and continued…
.
.

The actors on Twitter from this “adventure”

.community-jpeg
  • Webroot: Twitter Name @WebrootRescue  ===> Follow them on Twitter, very good Tweets (love that…) <===
    • As I had to make some research on old Tweets to find back the original Tweets by date, so I had time also to read their Tweets and I must say that I was impressed of the #quality!
  • Me: Twitter Name Knolinfos
  • Doesn’t want to get mentioned ;)

More info about Luxembourg (Europe):
.
BTW: I am actually unemployed due to health problems http://scalpelart.wordpress.com/ + http://lcgb.lu/fr/articles/show/id/1281 and looking for a new job in Luxembourg (Europe), my country, or as teleworker from an international company by working on Internet at home… With 57 years old not that easy to find a new job :( My mentioned courses here are made on a volunteer base as I want to spend my time on a constructive way in the “unemployed time”…
.
.

My Google+ Profile: https://plus.google.com/u/0/102227403703855230445/about

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES (Cyberworld Awareness and Security Enhancement Structure)....


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.

Beginners IT-Security Guide

chat iconIn 21st Century we need not ONLY talking about Internet-Safety, Online-Safety and IT-Security, but we need to secure our computers and ANY other related device connecting to Internet, such as also our smartphones! I will present you now a tutorial on How-To create best protection (as on March 2012) for your computer and this with mostly FREE tools and FREE Online Services… Also will I provide you a worksheet which helps you planning your weekly tasks!

.

Weekly Tasks? YES, you need to work a bit, but don’t worry, most tasks are automated and don’t need a lot of intervention! But they are necessary! It’s ONLY the first time when you have to install some programs and to read this tutorial that you will need to invest time!

===> But investing once time for saving time later and avoiding trouble is definitely worth to do ;-) <===

.


What you should know: Computer Viruses and Threats

.

Check the video for better understanding, click image… This video explains the how computer viruses, worms and trojans work and what you can do to protect yourself.

.

Computer Viruses and Threats from CommonCraft

Click image above to access video

.

===> For readers who don’t want to read (trusting me and only want to install the programs which they didn’t know yet…), but ONLY want to install the proposed programs: go to the bottom of this tutorial and follow the download links! <===

So here we go…

First a reminder and the most important to know to have best protection on your computer:

 programmer manWhat you MUST KNOW!

                      • Automatic Windows Update must be enabled
                      • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them alsoUse SECUNIA PSI to update automatically third party programs https://secunia.com/
                      • Browsers (ALL) need to get updated!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

.

 

So, after knowing now what’s most important for protecting your computer and helping also your Government for a better National Cyber-Security we will start with our workshop on How-To protect our computer at its best (for private users…)

Related links:

First of all, I suggest to you to check online your computer’s security to get convinced yourselves about the need to secure your computer, here we go…

Most of this advice is for Windows PC’s, but some are also necessary for Mac and Linux computers!


1. Is your Browser up-to-date?

This is very easy to check online, without installation of any program! Use Qualys BrowserCheck who will perform a security analysis of your browser and its plugins to identify any security issues.

QUALYS Browser Check Results

.

===> Here is the link: Qualys Browser Check <===

`


2. Is your Operating System switched to automatic updates?

Programmer man

This is the most important for any OS (Operating system), the updates!!! They MUST get installed!!!

===> Visually: it’s like of the manufacturer of a car has detected technical problems who are necessary to get fixed for your security! The car will then go the the garage and problems will get fixed for FREE! <===

Read instructions on How-To:

 

 3. Is your antivirus program up-to-date?

Surprised? I am convinced that most of you are wondering and surprise about the results! So now you know that it is about time to get better protected, follow these steps now please:

Run F-Secure HealthCheck http://www.f-secure.com/en/web/home_global/protection/free-online-tools/free-online-tools

.

F-Secure HealthCheck


4. Install an “Internet Security Suite”!

Instead of working with a FREE antivirus, use aInternet Security Suite“! Why?

Why IT-Security? Gust MEES's cartoon courses about IT-Security

.

Links to learn more:


5. Update your Third Party Applications!

Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them alsoUse SECUNIA PSI to update automatically third party programs, install it ===> https://secunia.com/ <===

.

.


6. Organize a Family Weekly-Security-Day

My suggestion: to make sure that anybody’s computer is secure at home I suggest that you introduce a “Family Weekly-Security-Day“, where any week one member of your family will get chosen as the  “responsible” for the week and that “responsible” will remind you to respect the weekly task and controls also that the task was achieved! I will provide you with a sheet from Google Docs which you can use for it…

===> Play as a team in the family to make sure that everybody respects the weekly Security-Day! Any week someone else is responsible to remember the whole team (family) for the Weekly-Security-Day-Task! <===

Worksheets on Google Docs: 

You can even imagine some penalties such as e.g. making the dish-wash for 2 days, or similar, LOL ;)

.

===> Motivation: don’t let us forget the positive side and motivate members of family to do that unusual task by giving them some special bonus points when well done that task! Those bonus points could result in: <===

.

  • Penalties could get reset for a certain time (up to you to make the rules…)
  • Bonus points will get collected and by reaching a certain score will result by paying out some money (up to you to say how much…)
  • Your own ideas for motivating the team to do the tasks…
.
 

7. Secure Surfing Behavior

McAfee SiteAdvisor™ software

McAfee SiteAdvisor™ software

McAfee SiteAdvisor™, software is an award-winning, free browser plug-in that gives safety advice about Websites before you click on a risky site. These site ratings are based on tests conducted by McAfee using an army of computers that look for all kinds of threats (detailed below). The result is a guide to Web safety. The SiteAdvisor software is free, easy to install and even easier to use. And it doesn’t collect any personally identifiable information.

Other similar products:


8. Forewarned is Forearmed

In a world where ICT is getting more and more important it is very important to follow the Information (“I” in ICT) and also to share this Information over the Social Medias (“C” in ICT), communicating with your friends in real life and in virtual life (Internet)!


Internet Monitor (Luxembourg/Europe)

↑ Grab this Headline Animator

Recommended programs:


9. Change your Router’s Pass Word!

help-books-aj.svgajash01-1

Cybercriminals may also use your Router (without that you know it…) when you haven’t changed the original settings! Text from Internet / Network Security

.

===> The first step in securing your wireless network is the same as the first step for just about everything else in computers and computer networking — always change the defaults. Any attacker can find out what the default username and password is for a given program or device in just a few minutes. <===


10. Chose strong PassWords

.
No need to explain more, just watch the video below, it says ALL ;-)
.
 
.
.

.
 
Check out also this sketch below who explains in a humorous way about PassWords :-)
.
.
.
.
.

.

11. Be Aware of Public Wi-Fi!!!

programmer man
 
 
Protect yourself on public Wi-Fi: ALL your data could get seen when not taken the right precautions on a public Wi-Fi Access…
 
.
 
 
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public Wi-Fi!!! Follow this BBC investigation and be surprised Why personal data is at risk on unsecured public Wi-Fi!!!
.
.
 
 
.
.
 
 
 
 
.
.
 
 
 
Lessons to learn: coming soon, stay tuned…
 
As learned already now from the shown videos above, you will certainly know how to protect you against it? OK, what should we know???
 
- A public, non secured Wi-Fi Access can intercept all of our internet traffic…
 
- With special programs (even Freeware programs like FireSheep) it is possible that a third person could break in our PC and MAC and steal our PWs (passwords) and log-ins and also so sending messages with our identity!!! Not really funny isn’t???
.
firesheep sample
 
 
.
Read here the full article who explains very well:
.
So how can we protect us again those threats (MAC and Windows and Linux)???
 
By using a public Wi-Fi Access, called also HotSpot it is recommended to use a private network (VPN) between your laptop or iPhone and our Internet gateway. 
 
Such a good and FREE and also for MAC users FREE program is “Hotspot Shield”:
 

Get behind the SHIELD! 100% FREE!

  • Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
  • Protect yourself from identity theft online.
  • Hide your IP address for your privacy online.
  • Access all content privately without censorship; bypass firewalls.
  • Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices.

Works on wireless and wired connections alike. Provides Unlimited Bandwidth.
Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.

Here is the address to download it http://hotspotshield.com/.

.
.
.
.
.
Check out ALSO the FREEWARE “BlakSheep” who shows you when someone is using “FireSheep“! Knowing your enemy is every time good ;)
.
.
 
And here is the download link:
.
 
 

12. Be aware of what YOU publish online

.

This video reveals the magic behind the magic, making people aware of the fact that their entire life can be found online.

.

.


Don’t want to read all the above text and start the practice?

.

gears icon Download Links:

      • SECUNIA PSI ===> Automatic check and download of Third Party Applications
      • WOT ===> Web Of Trust helps you identify suspect web sites
      • McAfee Site Advisor ===> helps you identify suspect web sites

Free Online Checks:

===> Reminder: NOBODY is perfect! A security by 100% doesn’t exist! <===

 

..

This below is the situation actually, now you know where it is necessary to apply above mentioned advice

.

IKARUS Comic_MalwareEvolution

Click image to access IKARUS Security Software

.


.

.
 

blueman20401Recommendations from the BIG Players on IT-Security, Cybersecurity, Internet-Safety, privacy, Online-Safety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
 
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA http://www.microsoft.com/security

 

.

Gust MEES

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Why IT Security? Why the need to secure a computer?

Wordle Logo regrouping keywords for IT-Security

Why IT Security?

Why the need to secure a computer? Isn’t this a question which you were asking since long? I will try to give you an answer for that with pedagogical background. Don’t fear, it’s not like on school, you will learn on an easy way, on a way as you would ask me a question and I would answer on a way that you will understand it… 

Here we go, I made a new project with cartoons… Follow them and if you have also one more question so leave me a comment please and I will answer wit a cartoon… Enjoy it and learn the easy way with practical examples, examples from life ;)

Why IT-Security?Click image to enlarge, please.

Links to learn more:


Why IT-Security?Click image to enlarge, please.

Links to learn more:

.

Why IT-Security?
Click image to enlarge, please.
.

Links to learn more:


.
Why IT-Security?
Click image to enlarge, please.
.

What did we learn so far?

We learned already:

  • We need an antivirus and a firewall. This is the absolute minimum for any computer!
  • Internet (the virtual world) is exactly the same as the real world. There are bad and good guys. We need to protect us and the community against the bad guys!
  • Any computer with Windows, Mac and Linux Operating Systems and…, are vulnerable!
.
.

Why IT-Security?

Why IT-Security?
Click image to enlarge, please.
.

Why IT-Security?
Click image to enlarge, please.
.

Why IT-Security?
Click image to enlarge, please.

Links to learn more:


Why IT-Security?
Click image to enlarge, please.
Why IT-Security?
Click image to enlarge, please.

Why IT-Security?
Click image to enlarge, please.
.

What did we learn so far?

What we learned already:

Why IT-Security?

              • We need an antivirus and a firewall. This is the absolute minimum for any computer!
              • Internet (the virtual world) is exactly the same as the real world. There are bad and good guys. We need to protect us and the community against the bad guys!
              • Any computer with Windows, Mac and Linux Operating Systems and others, are vulnerable!
              • Windows updates and updates for Mac and Linux must be made as soon as they are available! Any other installed program on the computer must also be updates asap!
              • There are FREE antivirus programs and commercial antivirus programs. We learned also the difference between those two variants.
              • We learned that there are better protections, such as “Internet Security Suites”!
              • We learned that ALL “Browsers” need to be secure also!

Links to learn more:


.
Why IT-Security?
Click image to enlarge, please.
.

.
Why IT-Security?
Click image to enlarge, please.
.
.
.
. To be continued… Stay tuned for next episodes ;)

What you should know also!

Big Business with Cyber-Crime

Read full story here: http://www.scoop.it/t/securite-pc-et-internet?tag=Business-with-Cybercrime

and also this one…

Antivirus signatures is simply not enough anymore

Read more: http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Antivirus-signatures-is-not-enough

.


Check Your Browser

Qualys BrowserCheck will perform a security analysis of your browser and its plugins to identify any security issues.

QUALYS BrowserCheck Results

What items are detected by Qualys BrowserCheck?

The Qualys BrowserCheck tool checks your browser as well as browser plugins and add-ons (32-bit) to identify insecure and out-of-date versions that put you at risk. It also checks if your Windows operating system is supported by Microsoft. Microsoft security updates cannot be installed on unsupported operating system versions. These items are detected:

 QUALYS BrowserCheck

.

Here is the link to this FREE service: QUALYS BROWSERCHECK

Stay tuned for next cartoons, coming soon ;)

.

Useful links:

.


..

.

.

blueman20401Recommendations from the BIG Players on IT-Security, Cyber-Security, Internet-Safety, privacy, Online-Safety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA http://www.microsoft.com/security

.

Gust MEESL’auteur Gust MEES est membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  “MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet “CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is “Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.

PC Security-HowTo Fight Spam efficiently

A short tutorial showing you how to get protected against Spam and How-To fight it very efficiently…

Wordle logo grouping keywords about IT-Security
.
This blog explains you how to fight spam on an efficient way, my own experience over more than 10 years

This blog was actually a knol created on January 16, 2011 and migrated to WordPress on January 05, 2012.

Introduction


books-pc icon

This blog is made in urgence because some friends have some problems with security and spam and I want to share this knowledge also with you my readers…

The author is “Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
.

What is Spam???


 animationspam by Gust MEES
.
.
Spam is unsolicited email…
Spam is unsolicited bulk email. Not all bulk email is spam. Not all commercial email is spam. Email must be unsolicited and bulk in order to be spam. Unsolicited email is email the recipient did not (explicitly or implicitly) agree to receive. If the recipient agreed to receive it, then it is not spam.

The top twelve spam relaying countries for July – August – September 2013

.

Spam-countries-2013

.

Despite only 5.3% of the world’s internet users reportedly living in India, the country topped the list by a significant margin and was accountable for 11.4% of the world’s spam seen throughout April, May and June.

The spam itself, of course, doesn’t have to promote Indian goods. Chances are that most of the spammers who are relaying their messages through compromised Indian computers are not based in the country at all – and just taking advantage of zombie computers that have been unwittingly recruited into a botnet. Credit to http://nakedsecurity.sophos.com/2012/07/23/dirty-dozen-spam-india/

...
Daily Spam Outbreaks-100 Days View
.
.
.
.
Related links:
.

Web Informer Button

.

 How Can We Fight Against Spam???

information-question-mark icon
There are several ways to get protected against spam such as installing antispam programs which are available as FREEWARE and also as commercial versions. But there is also an other option which most of users don’t know, reporting Spam to a FREE service such as SPAMCOP.NET. This service reports the spam to the Internet providers…
.
SpamCop is the premier service for reporting spam. SpamCop determines the origin of unwanted email and reports it to the relevant Internet service providers. By reporting spam, you have a positive impact on the problem. Reporting unsolicited email also helps feed spam filtering systems, including, but not limited to, SpamCop’s own service.
.
Related links:
help-books-aj.svgajash01-1
.
.

How To Work With Spamcop…

gears icon
.
.
First of all we need to visit the start page of SpamCop here: www.spamcop.net. The start page looks like this as shown below…
..
.
.
.
.
spamcop screenshot
.
.

.
Click on “Register Now“, as shown on the screenshot below.
.
spamcop-start-page
.
.

.
A new page will show up as shown below where you need to provide your name and your email address, don’t forget also to read carefully the disclaimer…
.
.
spamcop-register
.
.
You will get an confirmation email send which you need to acknowledge and your new FREE service is ready than…
.
.

.

How To Use This Service Now???


First of all we need to know also that there are different email clients and two different ways of receiving and sending emails:

In our example below we will use the webmail to explain on how to do… Below is a typical Spam message…
.
.
example of spam
.
.

.
You must now copy the header and the body of the received spam email and paste it into the text area…
How-To get the header and the body of emails?
.
spamcop-forward-spam-message

.
.

.
.
spamcop-report-spam
.
.

.
.
spamcop-send-spam-report
.
.
Once done, you click the button “Process Spam” and you need to wait a bit till it is proceeded… The screen below shows up…
.
.
spamcop
.
.
That’s it! You have reported now the spam source to Spamcop.net. SpamCop parses reported email, sending warning information to the internet service provider responsible for hosting the services used by the spammer (web sites and email sending sites). SpamCop also uses the information to generate SpamCop’s free blocking list.
.
.

Web Informer Button


What Else Do I need To Do?.




WOT-badge150x150
.
.
.
WOT, protect yourself from online scams, sites with adult content, spam and other Internet threats. The Wot community has rated millions of websites so you can search, shop online and surf for fun without worrying. Get WOT now!


Web Informer Button

WOT: Web Of Trust demonstration

.

.
WOT is also available as an extension for your browsers:

.

.

.

blueman20401Recommendations from the BIG Players on IT-Security, Cyber-Security, Internet-Safety, privacy, Online-Safety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA http://www.microsoft.com/security

.

Gust MEESL’auteur Gust MEES est membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  “MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet “CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is “Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

PC Security-HowTo Secure my PC

Safer Internet day-logo SID 2012

A short tutorial showing you how to secure your PC on a maximum…

Secure your PC by easy to follow steps. A blog about a series of  Tutorials who will show you how to secure your PC and to understand it…This blog explains you what needs to be installed on your PC to make it secure on a maximum…

This blog was actually a knol created on July 14, 2010 and migrated to WordPress on January 05, 2012.

Introduction


Wordle logo about keywords for IT-SecurityThis blog was made in urgence because some friends have some problems with security and I want to share this knowledge also with you my readers…
.
The author is “Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.

.
KlickSafe: Did You Ever Dieded?
did-you-ever-diedKlickSafe: Did You Ever Dieded?
Image Source (Screenshot)
KlickSafe: Where Is Klaus?
where-is-klausKlickSafe: Where Is Klaus?
Image Source (Screenshot)
KlickSafe: Cybermobbing
cybermobbingKlickSafe: Cybermobbing
Image Source (Screenshot)
.
.

.

 What Is The Minimum Required To Secure Your PC?

gears iconAs probably most of PC users know, a PC needs an antivirus and a firewall, that is the strict minimum. But that is not all, Windows updates must be done also and some updates which most of users don’t know, ALL installed programs on the PC must be updated!!!
.
Why IT-Security? Why the need to secure a computer?
Why fore the updates are they relevant to security may you ask?
.


In ALL programs are discovered vulnerabilities, so when discovered by their manufacturer there will be a new update released. Those updates are necessary to install as they close the security holes in the programs. Because of those security holes a PC could get remotely controlled over Internet.
.
The most known vulnerable programs are: Adobe Acrobat Reader, Adobe Flash Player, Java, Internet Explorer, Mozilla Firefox, Opera, ITunes…
.


Do you have installed the latest Java on your PC? Check here: Verify Java.
.
Advice: Chose an other firewall than the Windows firewall, best is to buy an Internet Security Suite, which contains an antivirus, a firewall, an anti spyware, an anti rootkit… I recommend “Norton Internet Security” which I use since years on my working place and as well at home. This Security Suite is easy to handle, the most important for a user, you don’t remark even that it is existing on your PC… 
..
To make sure that ALL your installed programs on your PC are every time updated, use Secunia Personal Software Inspector (PSI). Once installed on your PC it checks automatically for all updates of your installed software and installs them, very easy procedure.
.
secunia-start-window
The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus and are therefore increasingly “popular” among criminals.
.

The only solution to block these kind of attacks is to apply security updates, commonly referred to as patches. Patches are offered free-of-charge by most software vendors, however, finding all these patches is a tedious and time consuming task. Secunia PSI automates this and alerts you when your programs and plug-ins require updating to stay secure.

.

secunia-scan 95%
.
The figure shows the scan of a new laptop (mine), as you may discover yourself the laptop even as a brand new one doesn’t have installed all he updates and would be vulnerable if not updated… It is only secure by 95%.
.

.
secunia-scan-97%
.
After a couple of minutes PSI has already downloaded one program and started the download of a second program, the progress is now already 97%.
.
.

.
secunia-scan-98%
Progress…98%…
.

.
scan-secunia-100%
Once all the downloads made the dashboard shows 100%…
.

.
Secunia dashboard after 6 weeks running
Scan Result after 6 weeks running PSI.
..
.
.
.
.

.
Related links:
help-books-aj.svgajash01 icon

Web Informer Button


Protecting Your Facebook Account, How Secure Are Your Settings???

Bitdefender Safego BetaRecently (Feb, 2011) BITDEFENDER launched a new Beta program, here is the text and screenshots from it:

Posts on your wall, comments from friends, Inbox messages: sharing’s the name, having fun is the game. Well, at least until an infected link or a ton of spam steps in to spoil it.

Using in-the-cloud scanning, BitDefender safego keeps your social networking account safe so that you and your PC don’t get into e-trouble. An efficient BitDefender spam repellent also helps keep your message flow free from this kind of blah-blah.

And that’s not all. With BitDefender safego you get a privacy rating that tells you whether you’re an easy prey on the personal data theft front as well.

.

Bitdefender Safego Beta

and here below how it looks in practice…
.
Bitdefender Safego Beta result on Facebook
.
As shown in image below SAFEGO shows you the infected links on the right-hand side and provides you also a red icon. By clicking this “red icon” a new window opens with an alert message and a button. When clicking this button you could send a message to your friend who’s link is infected to alert him…
.
Bitdefender Safego Beta result on Facebook/Example of infected link

WOT goes social – Preview the beta version now!

Wed 16 Mar 2011 09:00:35 AM UTC —

Social networking - on Facebook, Twitter and elsewhere – is a big part of what people are doing daily on the internet. Social media allows messages to spread far and fast and become popular, even viral. When the messages come from someone that you know and trust, it’s often perceived as safe. Put these factors together, and you’ve got a very tempting target for scammers and hackers. Typically, a scammer takes over an account and uses it to spread links which are contaminated, lead to phishing or malicious sites, or intend to capture more accounts.

Wouldn’t it be great to know, from the very first glimpse, if the links your Facebook friends are sending you can be trusted?

WOT goes social
.
As you see here, soon there will be a new version of WOT released, stay tuned and download it when available…
.
Update (23.03.2011): it works now, here below a screenshot…
.
WOT in practice on Facebook
.

 How Does It Happen An Infection Of The PC?

information-question-mark iconAs already mentioned above, the “Drive by Download” is on the mood and it is the most dangerous way to get the PC infected. “Drive by Download” means, your PC will get infected while visiting a web site. And that could be any web site, even web sites from government and/or Newspapers… Even if you have installed an antivirus and a firewall your PC could get infected, because of the security holes in installed programs on your hard disk when they are not updated…
.
How is this possible?
.
Not every webmaster (people who take care of that web site and/or are creating that web site) has the necessary security knowledge, nor does the owner of that web site wanting to spend more money for security awareness…
.
.




Against of what most people think, a PC can also getting infected when not connected to the Internet. Any storage medium (CD, DVD, Memory Cards, Flash cards, USB Stick, USB drives…) who is infected can infect a PC while using it on the PC.


 What Else To Install On The PC For A Better Protection?

I recommend to install also the following programs:

gears icon

Have also a look here on my French Knol and use translation tools:

First of all install ThreatFire:

ThreatFire™ AntiVirus protects when others can’t

PCs are under constant attack from viruses, spyware and identity theft. Every day you hear about a new threat to your PC. They’re coming faster than ever before, they’re getting harder to stop and traditional antivirus products are not able to keep up.
Will your antivirus software catch the latest malware that just came out today? In most cases, no, because it simply does not know how to detect it yet. But ThreatFire’s ActiveDefense technology does, and has proven to provide up to 243% more protection when combined with traditional AntiVirus products. See the table below.
.
threatfire
.

Web Informer Button


What Else Do I need To Do?

While surfing on Internet you could find an infected web site which would also infect your computer when visiting it, these web sites could also bee web sites from Governments and other serious companies, nobody is perfect! How can I know if a website is infected and/or a trustful site? Use WOT (Web OTrust), it is shown below with download link…
.


WOT badge150x150
WOT, protect yourself from online scams, sites with adult content, spam and other Internet threats. The Wot community has rated millions of websites so you can search, shop online and surf for fun without worrying. Get WOT now!


Web Informer Button
.
.
WOT is also available as an extension for your browsers:

Other similar products are:

McAfee SiteAdvisor™ software

McAfee-SiteAdvisorMcAfee SiteAdvisor™, software is an award-winning, free browser plug-in that gives safety advice about Websites before you click on a risky site. These site ratings are based on tests conducted by McAfee using an army of computers that look for all kinds of threats (detailed below). The result is a guide to Web safety. The SiteAdvisor software is free, easy to install and even easier to use. And it doesn’t collect any personally identifiable information.

TrendProtect LogoTrendProtect is a FREE browser plug-in that helps you avoid Web pages with unwanted content and hidden threats. TrendProtect rates the current page and pages listed in Google, MSN, and Yahoo search results. You can use the rating to decide if you want to visit or avoid a given Web page. To rate Web pages, TrendProtect refers to an extensive database that covers the following information for billions of Web pages:
            • Content category
            • Phishing scam detection
  • Site reputation
  • Page reputation

Protect your children: Norton Online Family


Choose Strong Passwords

No need to explain more, just watch the video below, it says ALL ;-)
.
.

What Else Do I need To Know?

Watch those videos below by clicking on the appropriate link who opens than in YouTube to know more about the present vulnerabilities. The videos are made by SYMANTEC, the manufacturer of “Norton” products and they explain very well, I recommend them…
.
Symantec Guide: Phishing
phishing
Image Source (Screenshot)
Symantec Guide: Botnets
Image Source (Screenshot)
Underground Economy
Image Source (Screenshot)
Drive By Downloaddrive-by-downloadsDrive By DownloadImage Source (Screenshot)
Misleading Applications
Image Source (Screenshot)
DOS Attacksdos-attackDOS AttacksImage Source (Screenshot)
Viruses, Trojans&Worms
viruses-trojans-worms
Image Source (Screenshot)
Losing Your Data
loosing-your-data
Image Source (Screenshot)

.
.
Trend Micro: Malware

trend-micro malwareTrend Micro: Malware

Image Source (Screenshot)
Attention Virus

attention-virusAttention Virus

Image Source (Screenshot)
BSI: Botnet

botnet-animatedBSI: Botnet

Image Source (Screenshot)

.
.
.
.

.
.
..
.

.
.
.
.
.
.

.
Related links, non exhaustive list:
help-books-aj.svgajash01

Be Aware of Public Wi-Fi!!!

programmer man
Protect yourself on public Wi-Fi: ALL your data could get seen when not taken the right precautions on an public Wi-Fi Access…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public Wi-Fi!!! Follow this BBC investigation and be surprised Why personal data is at risk on unsecured public Wi-Fi!!!
.
.
.
.
.
.
Lessons to learn: coming soon, stay tuned…
As learned already now by the shown videos above, you will certainly know how to protect you against it? OK, what should we know???
- A public, non secured Wi-Fi Access can intercept all of our internet traffic…
- With special programs (even Freeware programs like FireSheep) it is possible that a third person could break in our PC and MAC and steal our PWs (pass words) and log-ins and also so sending messages with our identity!!! Not really funny isn’t???
.
firesheep sample
.
Read here the full article who explains very well:
.
So how can we protect us again those threats (MAC and Windows and Linux)???

By using a public Wi-Fi Access, called also HotSpot it is recommended to use a private network (VPN) between your laptop or iPhone and our Internet gateway. 
Such a good and FREE and also for MAC users FREE program is “Hotspot Shield”:

Get behind the SHIELD! 100% FREE!

  • Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
  • Protect yourself from identity theft online.
  • Hide your IP address for your privacy online.
  • Access all content privately without censorship; bypass firewalls.
  • Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices.

Works on wireless and wired connections alike. Provides Unlimited Bandwidth.
Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.

Here is the address to download it http://hotspotshield.com/.

.
.
.
.



And what about Apple and Apple related products???


The best way to find this out is to follow my scoop who collects (curation) all the news about Apple (in)security and this in English, French and German. Here is the address:

Apple, Mac, iOS4, iPad, iPhone and (in)security…


Curation: Apple, Mac, IOS4, iPad, iPhone (in)security






Must Know News…

book-laptop icon
Danger connu est danger vaincu (FR) / Gefahr erkannt ist Gefahr gebannt (DE) / Forewarned is forearmed (EN).

 newspaperaubanelmonnie01 iconInteresting News



Web Informer Button

Web Informer Button

Is there Any Possibility To Check My PC Online?

internetmonitor
.
.
.
.
.
.
.
.
.
.
Yes you may use www.internetmonitor.lu where you will find on the right hand navigation different free services for checking your PC online.
.
.
.
.
Internet Monitor is a multilingual (DE, FR, EN) web site dedicated to PC security…
.
.
.
.
.
.
.
.
.
.
.
.

Reminder…

What is the most important???
book-laptop imageDanger connu est danger vaincu (FR) / Gefahr erkannt ist Gefahr gebannt (DE) / Forewarned is forearmed (EN).


  • Windows automatic update must be activated on your computer…
  • An antivirus, better an “Internet Security Suite” must be installed on your PC…
  • ALL your installed programs on your PC need to get updated. Use one (or all…) of the proposed updating programs…
  • Stay informed about newest threats…
Web Informer Button


International Security News

Find here below the news about security in real time, updated 24/24…
.
.

Real-Time Outbreak Monitor

.
Watch web threats in real time online: http://www.commtouch.com/security-center.
.
comtouchrealtimeoutbreakmonitor
.

 Mobile Security

.

McAfee Mobile Security
.
Smartphones are getting more and more targeted from the Internet Mafia, there fore it is necessary to protect them!
.
Whether your phone is lost or stolen, or is targeted while you’re surfing the internet, you know your personal data is always safe when having installed a Mobile Security Suite!
.
Non exhaustive list of Mobile Security programs:
.
Related links:
.
.
.

Related Links…

help-books-aj.svgajash01

.
.

Trouble Shooting…


In case of trouble, virus infection or similar use following programs whiche are LIVE-CD’s (non exhaustive list):

.

.

.

blueman20401Recommendations from the BIG Players on IT-Security, Cyber-Security, Internet-Safety, privacy. Online-Safety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA http://www.microsoft.com/security

.

Gust MEES

L’auteur Gust MEES est membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.

Follow

Get every new post delivered to your Inbox.

%d bloggers like this: