www.1001TopWords.com |
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement: "A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it." I'm not making this up. Is this funny to anyone else? They do this everymonth and they are still the most popular web browser in the world! Don't get mewrong, the browser is good, as long as you don't mind "attackers"gaining control over it once in awhile. Who are these attackers? Is it acyber-geek with coke bottle glasses and an evil glint in his magnified eye?Could I tell if I saw one on the street? Would he have a lot of pens in the toppocket of his gangsta leather jacket? Does he have pentagrams sewn intohis polyester leisure suit? I know only one hacker, but he swears he's a"Light-Side" hacker. He hacks only for good. And what if we received these kinds of letters from othermanufacturers? "A security issue has been identified that could allowa pirate to board all pleasure boats running an outboard Mercury 150 and joyride it to Mexico for Cinco de Mayo. Install this jack screw on your rudder immediately." So let's review with an analogy because this is "critical". If you had a steel combination safe (your computer) in which you stored precious belongings,(your data) and you towed this safe around in a wagon throughmany of the world's most dangerous cities (surfing the internet), Microsoftannounced that there are 8 easy ways, and 4 just "so so" ways for thieves tobreak in and take everything you've got. But let's stay positive, the good news is,you can patch it all right up with a click. What could be easier? Maybethat's why we forgive them so often. Wouldn't it be great to get an email fromGM saying your vehicle will soon be stolen but click here and it will bealright. It's nice that theyannounce the holes and the patches together, that way I'm not so worried thewhole time before, while I browsed Internet Explorer around care free down themean streets of the internet completely innocent. I could have been E-jacked byI-marauders, demanding that I hand over every E & I in my wallet. The truth is, the good guys are winning the security battle online,why? Because they are rich and can hire the best light-side hackers moneycan buy. Even hackers known for evil all wind up working for large corporations.A headline of one going to jail for 18 months is a resume item on the lap ofevery CEO in the world with computers to protect. Now they're a cyber securityexpert, with all the dark secrets for sale! The speaking engagements startpouring in, "Come meet the man (or woman) who sent a KaGillion emails froma billion computers to Microsoft during lunch break. He did his time at ClubFed, and now works for the Department of Defense. So cyber villains may come and critical updates may go, I just click and fixmy way along the information highway and say a little prayer that the world's"attackers" never know I exist until they're on the payroll of the good guys somewhere. Rick David writes a humor column called,"Don't Laugh It Could Happen To You" forhttp://sandiego.merchantamerica.com
|
RELATED ARTICLES
Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar? Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet." How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff.com? Or have you been turned on to www.freeipods.com? Or maybe some friend sent you an email suggesting you log on to one of these sites and take advantage of one of its numerous "free offers." A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus. Another Fine Mess! I'm in the Anti-Spyware business, and I'm doing a lot of advertising to promote my website, but here I am online and on the phone, giving my personal information to.....who? Strangers basically, Geez! The majority of identity thefts occur thru contractors employing people in entry-level jobs that have not been properly screened. Not even Hackers,Phishers or Dumpster Divers account for as many! The ideal location for a Identity stealer would be in a out sourced agency that fails to use adequate screening processes. HackAttack P C. owners are constantly at risk from attacks by hackers.Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. This led to an unfortunate incident that involved my website being attacked, apparently by a skillful youth with a propensity for mischief. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. If your password becomes compromised, there are limitless consequences to what could happen. There are a few very important factors in keeping your passwords safe and secure that everyone should adhere to. The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. You must be diligent in your ability to detect and then protect your important computer data. Dialing Up a Scam: Avoiding the Auto-Dialer Virus For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine ? or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. These are the infections that slow your computers performance and expose your confidential information to hackers. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. The same scams that have reached us by telephone and in our mailbox can now be found on the World Wide Web and in email. Organizations such as the National Fraud Information Center have emerged to help people recognize shady schemes in order to prevent further victims. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. If you don't like the idea, find out what software can help you cover them. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. This action of mixing the molecules of the egg is encryption. Since the molecules are mixed-up, we say the egg has achieved a higher state of entropy (state of randomness). To return the scrambled egg to its original form (including uncracking the shell) is decryption. Impossible? Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. We all know that the brain runs on chemicals and waves. We know from medicines, vitamins, alcohol, drugs and food intake that we can alter those chemicals. And most of us understand that brain waves are about allow for the process of cognition. The computers we use also run on frequencies which are use to hearing about for instance Pentium Chips running 1.2 GigaHertz. Cell phones run 800 MHz approximately. Also the power supply in a computer runs on a certain cycle creating another set of waves. The Saga of the Annoying Adware When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. Adwares are some of the most derided objects in the web alongside viruses, spyware and other malicious softwares and programs. Although adwares are alleged to be the most benign form of spyware, most web users hate the blatant and bothersome way of advertising. Most are often tricked into clicking on such adwares and end up unintentionally downloading something far more serious. A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim. |
© Athifea Distribution LLC - 2013 |