Minggu, 13 September 2009

How To Secure Emails Smartly

Email is inherently not secure since SMTP does not encrypt messages. Messages sent through SMTP contain information about the computer that it sent from, and the email program that was used. The POP and IMAP protocols do not encrypt the username and password you used to login. The email messages you send may be saved unexpectedly and indefinitely and may be read by unknown persons as a result.

Tips to secure emails smartly
To secure your emails, take the basic precautions as explained below.
• To make an email secure use a secure email client like Bat, Thunderbird, or even Outlook Express.
• Read email in plain text and do not open an attachment especially if it is a .exe file.
• Use free webmail accounts for subscriptions and postings and when spam does start getting through dump that address and get a new one.
• Use additional multi-layered defenses like anti spyware/ adware to scan your system for Trojans that have crept through and a firewall that will prevent unauthorized applications from connecting to the Internet.

Tools to increase email security
There are many services, which are currently in use in the market to prevent email spam, spoofing, and other email security threats. The below listed services are popularly known for its effective security measures and its features.

• Google Postini Services: Filters out all messaging threats like spam and viruses before they reach the network. It also helps to stop phishing, denial of service (DoS), spam, directory harvest attacks (DHA), viruses, and other attacks.
• Sophos Security and Data Protection: Relies on remotely monitored, managed appliances, offers easy-to-use protection for groupware (including Microsoft Exchange and Lotus Notes) and UNIX gateway protection.
• Webroot E-Mail Security SaaS: Blocks spam efficiently. Protects against backscatter and prevents from disturbing images. Helps in neutralizing Distributed Denial of Service (DoS) attacks, and terminates Directory Harvest Attacks (DHA).
• VIPRE AntiVirus + AntiSpyware: Delivers comprehensive security against today's blended malware threats for email protection, highly complex viruses, and spyware.
• Sonic WALL Email Security: Offers protection against both inbound and outbound viruses and spyware. It also includes several templates and databases. Ability to prevent DHA (Directory Harvest Attack), DoS (Denial of Service) attacks, and provides zombie detection to check whether your computer is a part of a botnet.
• McAfee Email Security Service: Comprehensive e-mail filtering is provided and it is compatible with all e-mail platforms. Web-based interface helps you configure your policy, manage the users from an administrator’s point of view, review quarantines, and display reports.
• eCipher Pro-Easy Email Encryption: Encrypt email and attachments. Works with standalone email programs like Microsoft Outlook™, Thunderbird™, Eudora™, Gmail™, Yahoo! Plus™, AOL, Comcast, Mac and other webmail accounts.
• Outlook Email Security Update: Meant for Outlook 98 and Outlook 2000. Allow disabling many features that let viruses to spread easily. In Microsoft Exchange Server environments, administrators can customize the security settings whereas in Outlook 2002, end users can allow access to particular file attachment types that the security features normally block.

Shortlist the email security services based on your requirements. Parameterize your required features and cross verify based on your specifications.

Source: http://www.articlesbase.com/security-articles/how-to-secure-emails-smartly-1208886.html

PowerPoint Security

Let's talk about Powerpoint and securing your presentation files. Powerpoint has made it very easy for anyone to put together easy presentations and one of the problems that some run into is finding a way to secure their powerpoint presentation so no one can tamper with it. So, how do you secure your powerpoint (ppt) files? One option for you might be to convert it into a video. There is software available that can essentially record your presentation as a video. Once that is done then it would be more challenging for someone to edit the video to alter your presentation. You may be able to conver the slides to JPG files and then piece them together using Windows Movie Maker.

PPT2DVD let's you convert your powerpoint ppt file into something suitable for playing from a DVD. That's right you can turn your PPT into a DVD movie essentially. The disc will then be read only and your data shouldn't be tampered with that way. The nice thing about converting your presentation to video is that you will make it easier for the recipients to view it. *No need for powerpoint.

Within powerpoint you can mark your presentation as final and then only the creator of the file can make further changes. You can also go to the File Menu, Choose Prepare and select Restrict Permission. Here you can restrict usage of the file to users, and also digitally sign the document. You may also be able to password protect your presentation in the same menu with the choice to Encrypt the Document. More info on digital signatures can be found here

In the tools menu, options and then choose security. Here you can set password permissions for viewing and altering your document. I have heard that this can be easy to bypass though.

Macro Security is something that can be related to ppt security. If a users powerpoint macro security settings are too high, macros within powerpoint may not run and you may not receive a warning that they were blocked. Go to Tools, Macro, Security. Then on the tab that says security level, check medium. On trusted publishers check the box next to Trust all installed add-ons and templates. Close the dialogs and now powerpoint should be able to prompt when new macros are encountered.

Just like other office products you may be concerned that your powerpoint file (ppt) contains personal information that you would not want leaked to the public. If you want to make certain that your ppt is secure in this regard go to the office menu (older versions would be file) then prepare document and choose inspect. This launches the document inspector. Check the boxes in front of the information you want to inspect. In this case: Document Properties and Personal Information. It will generate a list of items then that you can remove. You may want to rerun this and make a second pass through the document.

It is also possible for a virus or other malware to use vulnerabilities in powerpoint to compromise a system. For that reason proper ppt security practices would be to be cautious with ppt files that you are unsure of their origin. For instance if you receive an email with a ppt presentation it would be best to verify (via another communications channel) with the sender that they really send the attachment to you, after determining if it's legitimate and they would not attempt to deceive you then you can open it.

Source: http://www.articlesbase.com/security-articles/powerpoint-security-1210956.html

How to Remove Downloader.Trojan?

Downloader.Trojan is a malicious downloading program, which can execute downloading task and install malicious software secretly in the background. When you are infected by Downloader.Trojan, there are always many strange file names in the list of Process Manager. Sometimes, Downloader.Trojan exists by sneaking into the dll file of Explorer.exe. It is one of the most stubborn viruses that many anti-virus programs can do nothing to it because this virus will appear again and again after being removed. This is a delicate task. However, we can still find out how to fix this problem.

Remove Downloader.Trojan by deleting IE temporary files.

If careful enough, you will see that there is a file named XXX.dll detected by your anti-virus program. Once you find this file and delete it as well as the IE temporary file, Downloader.Trojan will have been removed by then. In most cases, you can find the IE temporary files in C:Documents and Settings. You can search the folder “Temporary Internet Files”, and delete all the files inside. When there are some files that can’t be removed, they probably are the running files of Downloader.Trojan. You can follow the instructions below to remove them.

  1. Download a forcible anti-spyware program.
  2. Run the Process Viewer and list the suspicious processes.
  3. Use a File Shredder tool to completely remove the suspicious files.

Note:

Files removed by File Shredder tool can not be reverted. So you have to confirm whether you have chosen the right files to remove before executing.

Remove Downloader.Trojan by using the File Deletion of Spyware Cease.

Go to C:WINDOWSsystem32 and find the infected files, which should be named after DLL and be composed of letters and numbers. Run Spyware Cease and use the File Deletion function. Add the files that you want to remove into the list and then click Delete button. Till now, go to C: WINDOWSsystem32drivers and find the ×.sys file (×.sys file refers to the same file mentioned previously.) Remove ×.sys file on the same method.

Go to Start > Run > Type regedit to open the Registry Editor. Search for the following three paths separately and delete the files which are named with Downloader.Trojan.

HKEY_LOCAL_MACHINESYSTEMControlset001Services

HKEY_LOCAL_MACHINESYSTEMControlset002Services

HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices

The above are the methods for manually removing Downloader.Trojan from your system. If you still can’t remove Downloader.Trojan, you can use the Online Scan function of Spyware Cease to scan your system and completely remove the virus.

Source: http://www.articlesbase.com/security-articles/how-to-remove-downloadertrojan-1213097.html

Remote Virus Removal - Practical Tips and Tricks On Virus Removal

So your computer is infected with viruses and spyware and you do not know where to find concise instructions on removing them? Clearly, it is not by chance that you have stumbled upon this site! As you will discover soon, the tips-and-tricks stated here can help you isolate and remove the infections only if applied correctly. However, if you find yourself struggling with the virus-spyware removal process, I’d suggest you seek the services of remote virus removal experts.

First of all, a virus, at the most basic level, is a small piece of software that causes unexpected activities or actions on computer/network systems. Generally, it causes damage by eliminating programs and files on the computer systems it infect. Spyware on the other hand, is computer software that installs itself secretly and obtains pertinent user’s information and transmits the stolen information to the originating server.

It’s extremely important that you know when your computer is infected with viruses and spyware because the earlier they are detected, the better your chance of eliminating them without having to reformat the hard disk drive and reinstalling both the operating system and application software. However, if you allow viruses and spyware to linger around for a while, they will involve more system elements and cause serious damage to your system. In most cases, viruses disable and lock up key administrative tools of your computer system such as; “Add/Remove Programs” utility; “System Restore Points;” “System Registry;” “Windows Updates;” “Security Patches;” and much more! At this stage of infection, they may become very difficult to detect and remove.

Listed below are some general symptoms of virus and spyware-infected computer:

  • Frequent pop-ups
  • Unusual computer slowness
  • Computer shows error messages
  • Unable to visit favorite websites
  • “Page cannot be displayed” error messages
  • Internet connection is lost every now and then
  • Web browser is hijacked and redirected to unknown websites
  • Windows updates & security patches become unavailable

Generally, if you experience any of the above listed symptoms, your computer might be infected and you can search the internet for free virus removal tools. On my next blog titled “Now That Your Computer Is Infected with Viruses,” I’ll unveil more tips-and-tricks on virus removal.

Source: http://www.adachicomputech.com/pc_security.php

.

How Do I Start A Blog

is a part of culture now. Anyone with a keyboard, a dream, an opinion (for better or worse) and the ambition of starting an online blog can be a blogger, but there is a right way and a wrong way to go about it (I was going to say there is a "write" way, but I don't have the guts to use terrible puns, at least not without pointing them out shamefully). But if you've no previous experience yourself, you're no doubt asking yourself, "How do I start a blog?".

Over the years I have used social networking sites to blog about TV, movies, random things that go through my head, and other banal minutia of my daily life. I even attracted a small following, or groupies as my wife would call them. Problem is, these sites aren't built to cater to the blogger the way a site dedicated to solely blogging does. Which leads me to Wordpress.com. Starting an online blog there is free, easy to setup and dive in, and it allows the user to customize their blogs to their liking. Whether you are a computer whiz or a beginning, you can start blogging in minutes.

As far a bells and whistles go, there are tons that I have never even gotten to yet (or cared to), but the one thing I like about "real" blogs is that you can actually get people to read your blogs with a few simple words. For example: If I write a blog about a television program, when I am done I will add tags, keywords that refer to the content of my blog, separated by commas. So I would tag the show title, actor and character names, the subject of my blog, perhaps the episode title, anything you feel is relevant, and click the handy Add button for tags. Now, when people search for blogs about that show, or actor, or characters, etc, your blog will be among the list. The more Blogging specific you are, the more likely you will find people with similar interests that will (possibly) appreciate your blogs. I mean, you still have to actually write well.

The basic purpose of a blog is to say something, and you are free to say whatever you want, but I would strongly suggest attempting to say something original. There are thousands...millions of blogs about what political party you are affiliated with and how the other party is totally wrong, while you remain (as always), totally right. Try blogging about weird little things that strike you as amusing, or odd pet peeves, or anything you think someone besides you and your mom would find interesting. At least try.

The worst thing you can do is blog about an average day, basically logging your daily tasks. If you're bored with your own life, odds are it's not going to rivet Joe Blogreader either. So if you want to be a blogger, more power to you, but if you want people to actually read it, follow a few simple rules, post a few blogs, and see what people think.

Source: http://www.articlesbase.com/computers-articles/how-do-i-start-a-blog-1215890.html

Fix your PC registry errors

Has your computer been getting the Hal.dll error message? It is actually a pretty popular Windows error. The Hal.dll error normally occurs shortly after your computer starts but before Windows loads. You may see any of the following Windows error messages:

Speed Up Your PC
Easily Scan, Repair and Fix Errors
Speed & Optimize PC, Free Download

Cannot find WindowsSystem32hal.dll

Winnt_root>System32Hal.dll missing or corrupt:

Please re-install a copy of the above file.

Cannot find hal.dll

Windows could not start because the following file is missing or corrupt:
system32hal.dll.

Please re-install a copy of the above file.

HAL stands for the Hardware Abstraction Layer. It is a DLL file that exists in the Windows registry. This file is required to communicate information between the physical hardware and the software in your system.

Speed Up Your PC
Easily Scan, Repair and Fix Errors
Speed & Optimize PC, Free Download

Fix Hal.dll Error

In order to fix the Hal.dll Error you need to fix the Windows registry. The registry is the directory that contains information to run all software and hardware on your computer. Think of it as the engine that makes your computer go.

When files like Hal.dll become corrupted you need to use a registry cleaner to fix them. I do not recommend attempting to fix these types of problems without a cleaner. If you remove or alter the wrong files in the registry you can cause serious damage.

I have personally used registry repair software that not only can fix all types of registry errors (including Hall.dll) it can also speed up your computer. Computer sluggishness can be directly attributed to errors and congestion in the registry. Scan your computer for free below and fix the Hal.dll Error in minutes!

Want to repair computer errors the easy way? Scan your computer for free and fix corrupt registry problems with the #1 registry cleaner on the internet. After scanning your computer, I promise you will be quite surprised by all the errors on your system.

Jim Marshall is a computer technician expert with over 15 years in the industry. He has an intimate knowledge of the windows registry and various register repair software. After testing some of the top registry cleaners on the market, he has created a comprehensive review site that details his findings.


Hacker Uses Virus

In Adelaide, which is located at the south of Australia, a 20-year-old man was arrested for allegedly spreading a virus in the computer world which ranges worldwide. The man, whose identity was undisclosed, will go on trial to the courts next month.

According to South Australian police, the man created chaos not just to the populous city of Adelaide but to the whole Australia and the rest of the world as well. The man is said to be working from home, created the virus and infected more than 74,000 computers around the globe. Detective Senior Sergeant Barry Blundell also said that this recent computer hacking was believed to be the largest that had happened so far in Australia. He also said that this hacking is the biggest yet that they had located and it is also good that they had arrested the person behind it.

Police officers said that the destructive virus was created and also spread by the same man. The virus is known to crash websites, disturb your research online, and even disrupt your time for some entertainment on the net. Officers also believed that this virus can infiltrate your personal information and can even steal financial information using a code he also devised. It is estimated that it can affect 3000 susceptible computers. The said code is also something that can be sold to other hackers.

This new computer virus is one of the many viruses that caused troubles and difficulty to the citizenry. Some of the notable viruses include the one that makes your monitor go into a trance-like sleep in blue hue, make websites crash and the innocent-looking attachment that is programmed to destroy your PCs. And perhaps the most famous virus, the “iloveyou virus” that even infiltrated top government agencies and caused quite a stir to the security of the nation.

In line with this, Officer Blundell reminded everybody to check and verify their bank accounts and make sure that all transactions that have transpired is legal and accurate. Another good tip is to protect your computers with anti virus software that are available in the market and on the internet as well. Computer virus can be treated as an intruder to your beautiful and organized home. Because these viruses cause troubles and creates havoc to the computer world, what you can do is safeguard your computer from it.

You can have antivirus software by simply having a cyber defender download. Cyberdefender and many other antivirus are readily available.

Source: http://www.articlesbase.com/computers-articles/hacker-uses-virus-gets-arrested-1227400.html