software has security vulnerabilities because of careless
computer hardware engineering along with careless software
engineering. They fix vulnerabilities and then add new functions
creating new vulnerabilities! That means the computer you buy
has computer chips that were designed with buffer flaws and
operating system software with default settings that are not
set to the best security.
Choices of Internet Browsers:
preferences before using any new browser on the Internet! For
check No Images, check No Cookies, No Automatic Updates, No CSS,
No Skins, No Icons or Favicons, No ActiveX, etc. You
can always toggle the preferences to enable them on trusted
have security vulnerabilites but most have little except Internet
Explorer that has many. Security vulnerabilites are greatly
reduced with the use of strict security procedures such as
firewalls, virus scanners, spyware scanners and high security
settings and preferences on your computer.
The best tips
and tricks on the Internet for Windows and power users is at:
http://www.mdgx.com/toy.htm#NET FREE 9x/NT/2000/ME/XP/2003 INTERNET BROWSERS
Opera (latest version that is now free
or 8.54 and 5.12 for old computers with Windows 9x)
The fastest and best browser for older computers and the best for power users after direct editing of opera ini instead setting preferences using their user interface!
Note for those using Opera browsers. Edit opera6.ini and add under [User Prefs] EnableLastActiveChildOnDocWindowChange=1 and under [Cache] Check Expiry History=2. This will greatly speedup the loading of long pages using the same tab when going back.
Firefox (latest version - this is Open
Fast on newer computers, great for power users, and better with extensions.
http://ftp.mozilla.org/pub/mozilla.org/firefox/ for .zip
nightly/latest-mozillax.x.x/ or tinderbox-builds/mozxxx-win32-tbox-mozillax.x.x/
SeaMonkey is the updated version of Mozilla
(latest version - this is Open Source software)
Mozilla (old but updated for security
patches - this is Open Source software)
Netscape (latest version)
Older versions had too many software bugs!
http://plugins.netscape.com/ also you can use plugins in Mozilla products
Add on for Internet Explorer
6.0 SP1 was the last one for Windows 98 and IE 5.5 SP2 for
This browser is not recommended for security reasons because it is integrated software code into Windows operating system! Use only for testing purposes or offline.
Why is Internet
Security Bulletins and Advisories
http://www.microsoft.com/windows98/ no longer supported
http://www.microsoft.com/windows95/ no longer supported
Microsoft's biggest greedy mistake was no longer supporting their old software that is still useful today!
The heck with Microsoft,
use open source software!
Technology-based terrorist attacks remain a theoretical phenomenon, and businesses should focus instead on protecting themselves from demonstrable threats. Despite the incidence of high-profile digital attacks, cyber terrorism is a phenomenon that has never occurred.
The goal of terrorism is to change society through the use of force or violence, resulting in fear. Cyber terrorism is a theory, it is not a fact. An organisation should do the best it can to protect itself in the first place, whether attacks are coming from criminals or "cyber terrorists".
CERT (Computer Emergency Response Team) Coordination Center of Carnegie Mellon University
SANS (System Administration, Networking, and Security) Institute
Computer Incident Advisory Capability of Lawrence Livermore National Laboratory
National Security Institute's Security Resource Net
National Institute of Standards & Technology (NIST) Computer Security Resource Clearinghouse
Purdue University Computer Science Department's Computer Security Resource Page
NTBugtraq (mailing list for those interested in Microsoft server security)
Internet Security Systems' Xforce Security Site
InfoWar.Com's Information Security and Information Warfare "Portal"
Cisco Security Solutions
Authoratative Virus and Anti-Virus Information Sources
Australian Computer Emergency Response Team (CERT)
International List of Encryption and Computer Security Resources
ICSA Labs Anti-Virus
West Coast Labs Checkmark
Expanded threats exist outside of commonly known definitions of viruses, worms, and Trojan horses that may provide unauthorized access, threats to system or data security, and other types of threats or nuisances.
http://zdnet.com.com/2001-1105-0.html News Security
http://www.cigital.com/javasecurity/ Java Security Resources
http://csrc.nist.gov/ NIST Computer Security Division
http://www.issa-intl.org/ The Information Systems Security Association
http://www.psycom.net/iwar.1.html Information Warfare
http://www.securityfocus.org/ or http://www.securityfocus.com/
http://www.iwar.org.uk/ IWS - The Information Warfare Site
http://www.owasp.org/ Open Web Application Security Project
http://www.netsys.com/ The Intelligent Hacker's Choice!
http://leovilletownsquare.com/ubbthreads/kfihome/index.php KFI's The Tech Guy show
http://www.w3w3.com/05.CSecurity.htm Internet Talk Radio
http://www.mitnicksecurity.com/ - Kevin Mitnick's security website
also see No Privacy with New Technologies
Benefits and dangers of using proxy servers click here
Here is what you can do to enhance the security on your Personal Computer (PC).
What to do if you are a
victim of credit card fraud or other kinds of online scams
When you use a credit card, you can be vulnerable to fraud, whether you pay online, over the phone, or even in person at your neighborhood grocery store. That is because whenever you pay with a credit card, companies need to verify your account before they can provide you with goods and services. Unfortunately, because this credit information is stored on large computer servers, it can also be the target of hackers looking for ways to break into the system and get the information so they can use it to commit fraud.
If you think you have been the victim of fraud or a scam, immediately follow these steps. The faster you contact the proper authorities, the more likely you are to minimize the damage a scammer can do to your identity, your credit, and your bank account.
Close any affected accounts
Place a fraud alert on your credit reports
Contact the proper authorities
Record and save everything
Close any affected accounts
Contact the genuine company or organization if you believe you have given sensitive information to an unknown source masquerading as that real company or organization. If you contact the real company immediately, they might be able to lessen the damage to you and others. Then:
1. Speak with the security or fraud department about any fraudulently accessed or opened accounts at every bank or financial institution you deal with, including credit card companies, utilities, Internet service providers, and other places where you regularly use your credit card.
2. Follow up with a letter and save a copy for yourself. When you open new accounts use strong passwords, not passwords such as your mother's maiden name, along with a new account number.
Change the passwords on all of your online accounts, starting with any that are related to financial institutions or information.
Place a fraud alert on your credit reports
In the United States, you can contact these three credit bureaus:
Equifax (800) 525-6285
Experian (888) 397-3742
TransUnion (800) 680-7289
Get a copy of your report (victims of ID theft can receive copies of their credit reports for free) and ask that no new credit be granted without your approval.
Make sure your account is flagged with a "fraud alert" tag and a "victim's statement," and insist that the alert remain active for the maximum of seven years.
Send these requests in writing and keep copies for yourself. When you receive your reports, review them carefully. Look for things like inquiries you did not initiate, accounts you did not open, and unexplained debts.
Outside of the United States, you can contact your bank or financial institution, who can direct you to the relevant organization or agency.
Contact the proper authorities
In the United States, contact the Federal Trade Commission (FTC)
File a complaint. If you are a victim of any type of identity theft, you can report the theft by calling the FTC's toll-free Identity Theft Hotline at (877) ID-THEFT or (877) 438-4338. Counselors will advise you on how to deal with the credit-related problems that can result from identity theft.
Download and print the FTC's Identity Theft affidavit. Fill it out and send it to credit card agencies to help minimize your responsibility for any debts incurred by those who stole your identity. Your case will be entered in the FTC's nationwide "Consumer Sentinel" database of ID theft cases, which helps law enforcement agencies find criminal patterns and catch the thieves.
File a report with your local police department
Get a copy of the police report to notify your bank, credit card company, and other creditors that you are a victim of a crime, not a credit abuser.
Depending on where you live, you might be required to file a report in the jurisdiction where the crime actually took place.
Record and save everything
As you complete all these steps to clear up the wrongdoing, always make print copies of documents for yourself-including e-mail messages, written correspondence, and records of telephone calls-and file them somewhere safe. For telephone or in-person conversations, follow up with dated confirmation letters to the organization, and save a copy for yourself. State in the letter what was covered in the conversation, and list any follow-up items that you or the representative have committed to in the conversation.
http://www.fraud.org/ the National Fraud Information Center. Use the online complaint form or call (800) 876-7060.
http://www.usdoj.gov/criminal/fraud/idtheft.html U.S. Department of Justice ID Theft kit
http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm Federal Trade Commission's document, Take Charge: Fighting Back Against Identity Theft, which includes sample dispute letters and other recovery procedures.
http://www.privacyrights.org/identity.htm provides a detailed 17-step plan to follow if your ID is stolen.
http://www.idtheftcenter.org/index.shtml Identity Theft Resource Center
Personal Infrastructure Protection 101:
Before you post any
Be choosy. From the start, limit the amount of personal information you give to a site. Only share your primary e-mail address with people you know, and avoid listing any information in large Internet directories.
When shopping online know your sources. The kinds of vendors who sell deeply discounted electronics tend to be different than those selling knitting supplies. Limit your purchasing of expensive, popular items to prominent companies with clear privacy policies. And find out what others say about the sellers and selling sites by reviewing seller and buyer feedback and checking out comparison sites such as Epinions.com or Bizrate.com.
Post your resume only on prominent job sites. Be sure that any Internet job sites you use have privacy policies that only allow verified recruiters to scan your information. Do not post your resume on your own Web site.
Avoid participating in sweepstakes or other such marketing-driven events, both online and offline.
Get off the lists (and stay off)
Find out where you are currently listed by doing your own online research. Search for your name in the popular search engines and in online directories, such as the ones listed in the sidebar on the right of your screen.
Request that your name be removed from online directories. If it is not clear how to do this on a Web site, use the "Contact Us" link or address at the bottom of the directory site.
Get an unlisted phone number or at least have your address unlisted. Also, instruct your phone and Internet service providers to remove any existing personal information of yours from all of their directories.
Set up a special e-mail address solely for online activities such as shopping and newsgroups. This way you can close it if needed and start a new one without disrupting your business or personal e-mail correspondence.
Keep a record any time you give your personal information to a company so you can ask them to remove it later if necessary.
If you have a laptop
computer with wireless connectivity built-in or through an
inserted wireless network card, you can now surf the Web in some
coffee shops, airports, hotels, and even fast food restaurants
using public wireless networks, or WiFi. Here are quick tips for
enjoying the convenience of WiFi and helping to protect your
Use a firewall
A firewall is a protective boundary that monitors and restricts information that travels between your computer and a network or the Internet.
You can secure your home wireless network with different types of encryption with varying effectiveness. If you are using public WiFi, network encryption is often out of your control. Check the privacy statement on the network's Web site to learn more about the type of encryption they use. If they do not have a privacy statement, you would be better off not using the network.
Tip: If you must enter credit card numbers while using a public wireless network, make sure you see a locked padlock icon at the bottom right corner of the browser window, and make sure the Web address begins with https: ("s" for secure).
Do not type in credit card numbers or passwords
The measures listed above will provide some protection against casual hackers and identity thieves who prey on wireless networks. But if the bad guys are determined enough, they will eventually find a way to get around any security system. If you want to be safe, avoid typing any sensitive information, such as your credit card number or any other financial information, into your computer while using a public wireless network.
Public computers at libraries, Internet cafes, airports, and copy shops are convenient, cheaper than buying your own laptop, and sometimes even free to use. But are they safe? Depends on how you use them.
Do not save your login
Always logout of Web sites by pressing logout on the site, instead of by closing the browser window or by typing in another address. This will help keep other users from accessing your information.
Many programs (especially instant messenger programs) include automatic login features that will save your username and password. Disable this option so no one accidentally (or on purpose) logs in as you.
Do not leave the computer unattended with sensitive information on the screen
If you have to leave the public computer for any amount of time, logout of all programs and close all windows that may include sensitive information.
Erase your tracks
When you are done using a public computer you should delete all the temporary files and your Internet history.
To delete your temporary Internet files and your history
1. In Internet Explorer click Tools and then click Internet Options.
2. On the General tab, under Temporary Internet files click Delete Files and then click Delete Cookies.
3. Under History, click Clear History.
Watch for over-the-shoulder snoops
Because there is so much in the news about how hackers can digitally sneak into your personal files, we sometimes forget about the old fashioned version of snooping. When you are using a public computer, be on the look out for thieves who collect your information by looking over your shoulder or watching as you enter sensitive passwords.
Do not enter sensitive information into a public computer
The measures listed above will provide some protection against casual hackers who use a public computer after you have. However, an industrious thief may have installed sophisticated software on the public computer that will record every keystroke and then e-mail that information back to the thief. Then it does not matter if you have not saved your information or if you have erased your tracks. They still have access to this information.
If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into a public computer.
Tips on how to help reduce
risks when selling or discarding computer hardware
If you are ready to replace, sell, or retire your old computer, it is very important to eradicate personal data stored on its hard drive before unplugging it for the last time. You should always remember that even though you manually delete computer files, an identity thief might still be able to recover them, possibly putting you or your family at risk.
Remove the files yourself at home using disk-cleaning software. It is not difficult to do, and many cleaning utilities are free. Files you should remove before you donate or sell your computer by using disk-cleaning software to erase them:
All files in the operating system recycle bin or trash folder
External links are provided for research and information only. The external links on this Web site does not constitute endorsement or approval by me. I am not responsible for the contents on any external link referenced from this Web site.