Why the need to secure a computer? Isn’t this a question which you were asking since long? I will try to give you an answer for that with pedagogical background. Don’t fear, it’s not like on school, you will learn on an easy way, on a way as you would ask me a question and I would answer on a way that you will understand it…
Here we go, I made a new project with cartoons… Follow them and if you have also one more question so leave me a comment please and I will answer wit a cartoon… Enjoy it and learn the easy way with practical examples, examples from life 😉
We need an antivirus and a firewall. This is the absolute minimum for any computer!
Internet (the virtual world) is exactly the same as the real world. There are bad and good guys. We need to protect us and the community against the bad guys!
Any computer with Windows, Mac and Linux Operating Systems and…, are vulnerable!
On this site you will find independent comparatives of Anti-Virus software. All products listed in our comparatives are already a selection of some very good anti-virus products. In order to get included in our main tests, vendors must fulfill various conditions and minimum requirements.
We need an antivirus and a firewall. This is the absolute minimum for any computer!
Internet (the virtual world) is exactly the same as the real world. There are bad and good guys. We need to protect us and the community against the bad guys!
Any computer with Windows, Mac and Linux Operating Systems and others, are vulnerable!
Windows updates and updates for Mac and Linux must be made as soon as they are available! Any other installed program on the computer must also be updates asap!
There are FREE antivirus programs and commercial antivirus programs. We learned also the difference between those two variants.
We learned that there are better protections, such as “Internet Security Suites”!
We learned that ALL “Browsers” need to be secure also!
Qualys BrowserCheck will perform a security analysis of your browser and its plugins to identify any security issues.
What items are detected by Qualys BrowserCheck?
The Qualys BrowserCheck tool checks your browser as well as browser plugins and add-ons (32-bit) to identify insecure and out-of-date versions that put you at risk. It also checks if your Windows operating system is supported by Microsoft. Microsoft security updates cannot be installed on unsupported operating system versions. These items are detected:
L’auteur Gust MEES est membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet “MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet “CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is “Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
A short tutorial showing you how to get protected against Spam and How-To fight it very efficiently…
.
This blog explains you how to fight spam on an efficient way, my own experience over more than 10 years…
This blog was actually a knol created on January 16, 2011 and migrated to WordPress on January 05, 2012.
Introduction
This blog is made in urgence because some friends have some problems with security and spam and I want to share this knowledge also with you my readers…
The author is “Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
.
What is Spam???
.
.
Spam is unsolicited email…
Spam is unsolicited bulk email. Not all bulk email is spam. Not all commercial email is spam. Email must be unsolicited and bulk in order to be spam. Unsolicited email is email the recipient did not (explicitly or implicitly) agree to receive. If the recipient agreed to receive it, then it is not spam.
The top twelve spam relaying countries for July – August – September 2013
.
.
Despite only 5.3% of the world’s internet users reportedly living in India, the country topped the list by a significant margin and was accountable for 11.4% of the world’s spam seen throughout April, May and June.
The spam itself, of course, doesn’t have to promote Indian goods. Chances are that most of the spammers who are relaying their messages through compromised Indian computers are not based in the country at all – and just taking advantage of zombie computers that have been unwittingly recruited into a botnet. Credit to http://nakedsecurity.sophos.com/2012/07/23/dirty-dozen-spam-india/
There are several ways to get protected against spam such as installing antispam programs which are available as FREEWARE and also as commercial versions. But there is also an other option which most of users don’t know, reporting Spam to a FREE service such as SPAMCOP.NET. This service reports the spam to the Internet providers…
.
SpamCop is the premier service for reporting spam. SpamCop determines the origin of unwanted email and reports it to the relevant Internet service providers. By reporting spam, you have a positive impact on the problem. Reporting unsolicited email also helps feed spam filtering systems, including, but not limited to, SpamCop’s own service.
Once done, you click the button “Process Spam” and you need to wait a bit till it is proceeded… The screen below shows up…
.
.
.
.
That’s it! You have reported now the spam source to Spamcop.net. SpamCop parses reported email, sending warning information to the internet service provider responsible for hosting the services used by the spammer (web sites and email sending sites). SpamCop also uses the information to generate SpamCop’s free blocking list.
.
.
What Else Do I need To Do?.
.
.
.
WOT, protect yourself from online scams, sites with adult content, spam and other Internet threats. The Wot community has rated millions of websites so you can search, shop online and surf for fun without worrying. Get WOT now!
WOT: Web Of Trust demonstration
.
.
WOT is also available as an extension for your browsers:
L’auteur Gust MEES est membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet “MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet “CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is “Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
A short tutorial showing you how to secure your PC on a maximum…
Secure your PC by easy to follow steps. A blog about a series of Tutorials who will show you how to secure your PC and to understand it…This blog explains you what needs to be installed on your PC to make it secure on a maximum…
This blog was actually a knol created on July 14, 2010 and migrated to WordPress on January 05, 2012.
This blog was made in urgence because some friends have some problems with security and I want to share this knowledge also with you my readers…
.
The author is “Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
As probably most of PC users know, a PC needs an antivirus and a firewall, that is the strict minimum. But that is not all, Windows updates must be done also and some updates which most of users don’t know, ALL installed programs on the PC must be updated!!!
.
Why fore the updates are they relevant to security may you ask?
.
In ALL programs are discovered vulnerabilities, so when discovered by their manufacturer there will be a new update released. Those updates are necessary to install as they close the security holes in the programs. Because of those security holes a PC could get remotely controlled over Internet.
.
The most known vulnerable programs are: Adobe Acrobat Reader, Adobe Flash Player, Java, Internet Explorer, Mozilla Firefox, Opera, ITunes…
.
Do you have installed the latest Java on your PC? Check here:Verify Java.
.
Advice: Chose an other firewall than the Windows firewall, best is to buy an Internet Security Suite, which contains an antivirus, a firewall, an anti spyware, an anti rootkit… I recommend “Norton Internet Security” which I use since years on my working place and as well at home. This Security Suite is easy to handle, the most important for a user, you don’t remark even that it is existing on your PC…
..
To make sure that ALL your installed programs on your PC are every time updated, useSecunia Personal Software Inspector (PSI). Once installed on your PC it checks automatically for all updates of your installed software and installs them, very easy procedure.
.
The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Attacks exploiting vulnerable programs and plug-ins are rarely blocked by traditional anti-virus and are therefore increasingly “popular” among criminals.
.
The only solution to block these kind of attacks is to apply security updates, commonly referred to as patches. Patches are offered free-of-charge by most software vendors, however, finding all these patches is a tedious and time consuming task. Secunia PSI automates this and alerts you when your programs and plug-ins require updating to stay secure.
.
.
The figure shows the scan of a new laptop (mine), as you may discover yourself the laptop even as a brand new one doesn’t have installed all he updates and would be vulnerable if not updated… It is only secure by 95%.
.
.
.
After a couple of minutes PSI has already downloaded one program and started the download of a second program, the progress is now already 97%.
.
.
.
Progress…98%…
.
.
Once all the downloads made the dashboard shows 100%…
Protecting Your Facebook Account, How Secure Are Your Settings???
Recently (Feb, 2011) BITDEFENDER launched a new Beta program, here is the text and screenshots from it:
Posts on your wall, comments from friends, Inbox messages: sharing’s the name, having fun is the game. Well, at least until an infected link or a ton of spam steps in to spoil it.
Using in-the-cloud scanning, BitDefender safego keeps your social networking account safe so that you and your PC don’t get into e-trouble. An efficient BitDefender spam repellent also helps keep your message flow free from this kind of blah-blah.
And that’s not all. With BitDefender safego you get a privacy rating that tells you whether you’re an easy prey on the personal data theft front as well.
.
and here below how it looks in practice…
.
.
As shown in image below SAFEGO shows you the infected links on the right-hand side and provides you also a red icon. By clicking this “red icon” a new window opens with an alert message and a button. When clicking this button you could send a message to your friend who’s link is infected to alert him…
.
WOT goes social – Preview the beta version now!
Wed 16 Mar 2011 09:00:35 AM UTC —
Social networking – on Facebook, Twitter and elsewhere – is a big part of what people are doing daily on the internet. Social media allows messages to spread far and fast and become popular, even viral. When the messages come from someone that you know and trust, it’s often perceived as safe. Put these factors together, and you’ve got a very tempting target for scammers and hackers. Typically, a scammer takes over an account and uses it to spread links which are contaminated, lead to phishing or malicious sites, or intend to capture more accounts.
Wouldn’t it be great to know, from the very first glimpse, if the links your Facebook friends are sending you can be trusted?
.
As you see here, soon there will be a new version of WOT released, stay tuned and download it when available…
.
Update (23.03.2011): it works now, here below a screenshot…
.
.
How Does It Happen An Infection Of The PC?
As already mentioned above, the “Drive by Download” is on the mood and it is the most dangerous way to get the PC infected. “Drive by Download” means, your PC will get infected while visiting a web site. And that could be any web site, even web sites from government and/or Newspapers… Even if you have installed an antivirus and a firewall your PC could get infected, because of the security holes in installed programs on your hard disk when they are not updated…
.
How is this possible?
.
Not every webmaster (people who take care of that web site and/or are creating that web site) has the necessary security knowledge, nor does the owner of that web site wanting to spend more money for security awareness…
.
.
Against of what most people think, a PC can also getting infected when not connected to the Internet. Any storage medium (CD, DVD, Memory Cards, Flash cards, USB Stick, USB drives…) who is infected can infect a PC while using it on the PC.
What Else To Install On The PC For A Better Protection?
I recommend to install also the following programs:
PCs are under constant attack from viruses, spyware and identity theft. Every day you hear about a new threat to your PC. They’re coming faster than ever before, they’re getting harder to stop and traditional antivirus products are not able to keep up.
Will your antivirus software catch the latest malware that just came out today? In most cases, no, because it simply does not know how to detect it yet. But ThreatFire’s ActiveDefense technology does, and has proven to provide up to 243% more protection when combined with traditional AntiVirus products. See the table below.
.
.
What Else Do I need To Do?
While surfing on Internet you could find an infected web site which would also infect your computer when visiting it, these web sites could also bee web sites from Governments and other serious companies, nobody is perfect! How can I know if a website is infected and/or a trustful site? Use WOT (Web Of Trust), it is shown below with download link…
.
WOT, protect yourself from online scams, sites with adult content, spam and other Internet threats. The Wot community has rated millions of websites so you can search, shop online and surf for fun without worrying. Get WOT now!
.
.
WOT is also available as an extension for your browsers:
McAfee SiteAdvisor™, software is an award-winning, free browser plug-in that gives safety advice about Websites before you click on a risky site. These site ratings are based on tests conducted by McAfee using an army of computers that look for all kinds of threats (detailed below). The result is a guide to Web safety. The SiteAdvisor software is free, easy to install and even easier to use. And it doesn’t collect any personally identifiable information.
TrendProtect is a FREE browser plug-inthat helps you avoid Web pages with unwanted content and hidden threats. TrendProtect rates the current page and pages listed in Google, MSN, and Yahoo search results. You can use the rating to decide if you want to visit or avoid a given Web page. To rate Web pages, TrendProtect refers to an extensive database that covers the following information for billions of Web pages:
No need to explain more, just watch the video below, it says ALL 😉
.
.
What Else Do I need To Know?
Watch those videos below by clicking on the appropriate link who opens than in YouTube to know more about the present vulnerabilities. The videos are made by SYMANTEC, the manufacturer of “Norton” products and they explain very well, I recommend them…
Protect yourself on public Wi-Fi: ALL your data could get seen when not taken the right precautions on an public Wi-Fi Access…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public Wi-Fi!!! Follow this BBC investigation and be surprised Why personal data is at risk on unsecured public Wi-Fi!!!
.
.
.
.
.
.
Lessons to learn: coming soon, stay tuned…
As learned already now by the shown videos above, you will certainly know how to protect you against it? OK, what should we know???
– A public, non secured Wi-Fi Access can intercept all of our internet traffic…
– With special programs (even Freeware programs like FireSheep) it is possible that a third person could break in our PC and MAC and steal our PWs (pass words) and log-ins and also so sending messages with our identity!!! Not really funny isn’t???
.
.
Read here the full article who explains very well:
So how can we protect us again those threats (MAC and Windows and Linux)???
By using a public Wi-Fi Access, called also HotSpot it is recommended to use a private network (VPN) between your laptop or iPhone and our Internet gateway.
Such a good and FREE and also for MAC users FREE program is “Hotspot Shield”:
Get behind the SHIELD! 100% FREE!
Secure your web session, data, online shopping, and personal information online with HTTPS encryption.
Protect yourself from identity theft online.
Hide your IP address for your privacy online.
Access all content privately without censorship; bypass firewalls.
Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices.
Works on wireless and wired connections alike. Provides Unlimited Bandwidth.
Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)
Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.
And what about Apple and Apple related products???
The best way to find this out is to follow my scoop who collects (curation) all the news about Apple (in)security and this in English, French and German. Here is the address:
Smartphones are getting more and more targeted from the Internet Mafia, there fore it is necessary to protect them!
.
Whether your phone is lost or stolen, or is targeted while you’re surfing the internet, you know your personal data is always safe when having installed a Mobile Security Suite!
L’auteur Gust MEES est membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Is your computer protected?
F-Secure Health Check is a free online tool that lets you know if your computer is protected and helps you fix possible security issues.
In just a few minutes, and without installing anything on your computer, you can find out: click image
Uninstallers (removal tools) for common antivirus software
Running two antivirus products on the same computer can degrade performance and cause system instability. It is important that any previously installed antivirus software is uninstalled from your system before installing your new security product. Typical uninstallation* using the Windows removal tool (Add/Remove Programs) is often insufficient.
Click image below to find a list fitting your needs...