How2-4Newbies eZine Logo

eZine Home Current Issue Archives

Articles About UsHow2-4Newbies Home Page

 

How2-4Newbies e-Zine

Volume 1 Issue 3
July 15, 2004

divider bar

You are receiving this e-Zine because you or someone using your computer subscribed to it. If this is an error, please accept our apologies. Unsubscribe information can be found at the bottom of this ezine.

divider bar

Editors Comments

One of the most basic needs is training. No one knows it all. And while it is not necessary to know everything, it is very much necessary to know where to find what you do need to know and how to use it.

If you aren't willing to learn ... then you will stay right where you are now.

You MUST be persistent, consistent and ready to invest in YOU, to upgrade your learning skills and your knowledge of how to market effectively on the Internet.

Working offline or online, Business is Business. Forget that and you will never stand a chance at success.

If you are here to find the fast cash and the quick fix to instant hyped riches then you do not have the right stuff to succeed.

Fran Klasinski

divider bar

Quikonnex

divider bar

In This Issue

Editor's Comments
Top Ad
Ski's Security Stinger
Middle Ad
Article
:
Building a Business on the Internet
Bottom Ad
Legal Stuff

divider bar

Ski's Security Stinger Logo

In Search of Trovirmaw's

If you've spent any amount of time on the internet you know how important it is to make sure your computer is safe and secure from all predators. Trovirmaw's are Ski's shortcut name for Trojans, virus, malware, adware and worms.

Even casual surfers, or those who only send a few emails every day need to protect their personal information from prying eyes... and keep their system safe from attackers.

Read on, for what applies to one segment of user applies to all, none more, none less...

It is you, the casual computer user, who is most vunerable because you do not understand how your use of the computer relates to the world of the hacker and sender of worms and virus. You are the key to the success of any worm propagating.

If you are, or plan on doing business online, it's absolutely essential for you to be aware of these security problems. For the business and list owner, there is so much more at stake.

Not only are you, as a online business owner, responsible for protecting your own information and computer system, you're in a position to infect many more computers than the average internet visitor does.

Just think about the shear number of contacts you have compared to the casual surfer... with their list of family and friends. How many email addresses do you have in your system files that don't even show up in your address book. Even if you don't have a big list of contacts yet, think of all your affiliate and domain addresses in files throughout your system.

Every email you've ever sent or received is hidden on your hard drive somewhere. You can thank Bill and his merry band of programmers for that. If I know where to look, why not your friendly neighborhood hacker. Or come to think of it that nice bunch over at MicroSoft? And my my, let us not forget your friendly government that wishes to protect you from cradle to the grave?

Leave all that data improperly protected and you could infect hundreds, maybe thousands of computers.

As a business or list owner, you have an obligation to your subscribers, contacts and customers to do everything in your power to protect your system, and their's... your personal information and their's!

As a business or list owner, online or off, you must treat protecting customer data very seriously. The security of your customer/contact data should be your first priority... yes, even before profits.

So, even though you may have heard all this before, you need to take the time to read it again. After all, you are a professional, right? What you don't understand, ask. We'll get you the answers or tell you where to find them.

Also information has been included on anti-virus software for Mac users, and those that use the Linux Operating System.

What is a Computer Virus Anyway?

By their very nature the threats associated with viruses are changing rapidly,thus computer viruses have captured the attention of net users since their first noted existence was recorded.

On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazingly negative effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become.

A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.

All computer viruses are man made.

A simple computer virus that can make a copy of itself over and over again, is relatively easy to produce, much like a human virus.

Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt.

An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. These are becoming more common, with variations.

What is a Worm?

A computer worm is a self-replicating computer program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; a worm is self-contained and does not need to be part of another program to propagate itself.

In addition to replication, a worm may be designed to do any number of things, such as delete files on a host system or send documents via email.

More recent worms may be multi-headed and carry other executable programs that would do all sorts of damage to your computer. To the point that even your BIOS is destroyed.

However, even in the absence of such a payload, a worm can wreak havoc just with the network traffic generated by its reproduction. Mydoom, for example, caused a noticeable worldwide Internet slowdown at the peak of its spread.

MyDoomA, supporting aliases such as Novarg, Shimgapi alebo Shimg [it becomes a DLL file], shut down unix vendor the SCO site, forcing it to move to another web URL until the attacks were controlled. While MyDoomB caused a noticeable worldwide Internet slowdown at the peak of its spread.

A common payload is for a worm to install a backdoor [another name for a port] in the infected computer, as was done by the Sobig and Mydoom worms. A backdoor in the case of a worm is the opening of a port. A port is a doorway though which a program can access the world wide web.

These zombie computers are used by spam senders for sending junk email or to cloak their website's address. Spammers are thought to pay for the creation of such worms, and worm writers have been caught selling lists of IP addresses of infected machines.

Others try to blackmail companies with threatened DDOS attacks. The backdoors can also be exploited by other worms, such as Doomjuice, which spreads using the backdoor opened by Mydoom.

Whether worms can be useful is a common theoretical question in computer science and artificial intelligence.

The Nachi family of worms, for example, tried to download then install patches from Microsoft's website to fix various vulnerabilities in the host system (the same vulnerabilities that they exploited).

This eventually made the systems affected more secure, but generated considerable network traffic, rebooted the machine in the course of patching it, and, maybe most importantly, did its work without the explicit consent of the computer's owner or user. As such, most security experts deprecate worms, whatever their payload.

What is a Trojan Horse?

A Trojan Horse is a destructive program that masquerades as a benign application.

Unlike viruses, Trojan Horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.

They can destroy the operating system of your computer. They are at times difficult to find and get rid. There are times if they are not in a essential portion of your computer the entire file would have to deleted from your computer.

What is Spyware?

Spyware is software which monitors your activities on the internet and sends the information back to marketing companies. Many marketing companies think that this is fine to do. They want and sell this information, for them it is part and parcel on doing business on the web. But it is not alright, it is an invasion of your privacy.

Spyware is often installed by using software such as 'Kazaa' or 'Bonzai Buddy'. The basic principals apply as with dialers, if you don't know what you are doing or what the software will install - DON'T DO IT! The little monkey on Bonzai maybe cute, but he's telling someone everything you do on the net, and then putting up pop up windows (which you blame on the site you are visiting) when you access the web, not very nice.

What is Adware?

Official definition:

"Adware is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. The justification for adware is that it helps recover programming development cost and helps to hold down the cost for the user.

Adware has been criticized for occasionally including code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge."

What is a Dialers?

The first way to stop dialers and spyware is not to visit the type of sites they are usually on.

When visiting any website NEVER agree to download or install ANY package a site tries to send unless you are sure you know what it is.

Sites using flash etcetara may ask you to download the flash player, this kind of thing is fine, but still be sure to read carefully any messages which may appear, and ensure the certificates, if offered, are genuine by checking the names are correct eg. macromedia.com, if it says macramedia.com it will certainly be a fake!

Make sure you read that last sentence over so that you can see the meaning of it!

What is a Pop Up Message?

These are not like pop up windows that one sees on entering, while being on or exiting a a web site. Pop Up Messages use a function of windows called the 'messenger service.' This allows messages to be sent to machines on a network. The abusers are randomly sending messages to IP addresses and if you are the unlucky one a pop up message will appear.

These do not install dialers or viruses but are VERY annoying, Message Subtract will allow you to block these messages by disabling the service.

What is Scumware?

Scumware, in case you haven't yet heard of it is a webmaster's worst nightmare! Imagine a program which could place links on your site which you didn't want there. Links to your competitors, links to pornography and changes to your advertisements so that they don't earn you any money. Just last year, people would have dismissed this as impossible but today this is a real and growing problem.

Basically, scumware is software on your computer. Sometimes you get it with software you download, other times you may download the software for something else and it will also change websites you view.

The scumware is a browser add-on which allows it to recognise words in web pages, then underline them so that when they are clicked a menu pops up asking if the user wants to go to an advertiser's site. Some current scumware includes Gator, Surf+ and TopText. You may not have downloaded any of these but if you have programs such as KaZaa, you may have inadvertantly downloaded one of these with it.

What are Computer Hoaxes?

Virus hoaxes are false reports about non-existent viruses, often claiming to do impossible things.

Unfortunately some recipients occasionally believe a hoax to be a true virus warning and may take drastic action removing requested files as suggested in the hoax email and end up removing a key DLL file or shutting down their complete network.

Always check out these impending threats of doom before you commit an action that could destroy your computer or at least cost you an expensive trip to the tech shop.

Sophos offers a free hoax info feed which allows you to display "always-fresh" information on your website or intranet about the most prevalent hoaxes. By using the feed from Sophos you can ensure your website carries useful, up-to-the-minute data on the "hottest" hoaxes with very little effort.

http://www.sophos.com/virusinfo/infofeed/more.html

Virus and Hoax Information Feeds

Sophos currently provides three types of information feed for use on your website or intranet: the latest virus alerts, top viruses in the previous month and the most troublesome virus hoaxes in the last 24 hours. Please take a look at the examples further below to see how you can alter the look and feel of your feeds by changing the color scheme, cell padding, the number of columns and the font size.

What are the methods by which these pieces garbage get into your computer? Well lets go over the ways that you can pickup, acquire, or have one latch onto your computer.

Some of these wingers can now even get into the very basic of your computers operating system. Which is called the BIOS. One should go into this area with the help of a Tech because if you mess up this area you might as well and go and get another computer.

As you have already read one can let these things can get in by the way of an e-mail attachment, downloading infected software, visiting a website that has a hostile program embedded on it, downloading a program from an unknown source, running an infected program that you have gotten from a friend though a floppy or cd.

The steps that you can use to keep the garbage out and your computer clean and tidy?

The things that you can do to keep the garbage out of your computer is by:

Keeping your anti-virus and firewall software up-to-date at ALL TIMES! Not just once a month or week. But each and every time that you get onto the net. The why of this is because there are so many viruses, worms, trojan horses, and other nasties coming out each and everyday.

By not accepting any form of software from any place or anyone that you are not familiar with. Even then I would scan the download, floppy, or cd that I get from a friend before using the software on it.

Also going to one or more of the sites that I have written later on in this report and test your computer will help in keeping these things out.

Why do I need a Firewall?

You need a Personal Internet Firewall if:

Your computer's files need to be accessed remotely across the Internet.

You are operating any sort of Internet server such as Personal Web Server.

You use any sort of Internet-based remote control or remote access program such as PC Anywhere, Laplink, or Wingate.

You want to properly and safely monitor your Internet connection for intrusion attempts.

You want to preemptively protect yourself from compromise by "inside the wall" Trojan horse programs like NetBus and Back Orifice.

What's a Firewall?

You can probably guess what a firewall does just from its name. The idea is a simple one, which is why it works so well:

A firewall ABSOLUTELY ISOLATES your computer from the Internet using a "wall of code" that inspects each individual "packet" of data as it arrives at either side of the firewall - inbound to or outbound from your computer - to determine whether it should be allowed to pass or be blocked.

Do Anti-Virus and Firewall software always work together?

Not all anti-virus systems work well with the firewalls that are on the market. One of these is Norton. It will only work well with its own firewall. The main way that you can see that these software are incompatible is that they at the very least stop working. At the worst as that happened to me one time, you have to re-insert your operating system.

I would like to add, this is not for Bill Gates sake, but yours as the reader of this report to get and use the XP Pro version operating system and not the Home version. This is because the Home version can be only installed 3 times directly from the original disk before you have to buy a new code. XP Home Edition is not designed to do a full install after the three times. That to me would be a real pain in the pocket book.

What are the differences between a software firewall and a hardware firewall?

The main and basic differences between a software and hardware firewall, is that a software firewall is a program that filters out the wrong packets, while letting the right ones though. While a hardware firewall does it though a series of electronic circuits.

Does your anti-virus and firewall software work together?

How to test to see if your anti-virus and firewall software are working.

Anti-Virus Testers:

http://www.virus-info.com/sim.asp

Symantec Corporation tests your exposure to a wide range of online threats both security & virus:

http://security.symantec.com/

PestScan is part of Pest Patrol... It finds all sorts of nasties that can be on your computer from surfing the net. Like key loggers, spyware, spyware cookies, adware, browser helper objects and many more...

http://www.pestpatrol.com/

How to test to see if you have any open ports {doorways} on your computer.

AuditMyPC Security Scan

Easy to use and FREE port scan. Checks about 1500 ports and checks for ports opened by trojans.

http://www.auditmypc.com/

Firewall Test 1

If you're new to computer security, then Firewall Test 1 is for you. It checks your system for commonly used ports. It also tests for ports commonly used by Viruses and Trojans. On average, your computer should not have any open ports.

OR

Firewall Test 2

For users familiar with Firewall Testing. You can scan predefined ports from 1 to 65,535 or type in just the ports you wish checked. These firewall tests are broken up into blocks. This prevents accidental Denial Of Service incidents and allows our security scans to remain the fastest around.

Till next time ... be safe!

Chris Klasinski

Editor's note: Please go to our How2-4Newbies Resources page to see all the Links to items mentioned in the article.

Letters to Editor

 

 

 

 

divider bar

Contact List Builder eBook

Building a Business on the Internet

The common fallacy is that all you need to start your own business on the web, is a computer, internet access, and the desire to succeed.

If that were more than a basic truth then every one would be up and running their own business in an instant.

The reality is, there are some tools and resources that without them, you will not make real money on the Internet.

We can show you how to choose these tools and how to market with them effectively.

The Needs Grow

Then there is the sometimes scary need of how to create a web page, a sales letter, what a Domain name is and the need for one and why, a good hosting package, and creating forms.

The list goes on and it covers a lot of mundane every day needs that any business creates by its very existence. It can all sound so overwhelming when you grab the whole setting at one time.

But I can assure you, each of the above steps are not that hard to learn to do.

Constructing the Dream

Picture a house you would like to own. Now if you see all the peaks and valleys of construction needs, the room sizes, the wood, the mortar, the brick, the interior finishing, then you know it has to be built step by step and the carpenter has to know the tools needed and the materials that will shape the finished product.

You also realize it takes more than a carpenter to build this dream home. And so it is with your online business. The first rule to success is to network with good mentors who will shorten the learning curve with sound business practices you can count on.

We have a super team to get you started in the right direction with the least amount of confusion.

Just as your dream home needs a solid foundation to rise upon, so you need a solid foundation in some basic skills that will take you where you want to go.

If you put in even a small amount of effort to accomplish this with our help, you will be way ahead of all those people who are losing money. Are you ready to get started?

divider bar

Terms of Service
This double-optin standard is part of our qualifying your true interest, gives you a second chance to change your mind, and foremost, meets all standards of the CAN SP*AM laws and privacy acts.

Contact Information:
Chris and Fran Klasinski
107-50 Trip Blvd
Trenton, Ontario Canada K8V 5Z7
(613) 394-0868 EST (GMT-5)

Throughout our three eZines, you will come across articles, tips and tricks and loads of common sense advice on marketing on the Internet.

Together We Succeed eZine

Optin-ListBuilder.com eZine

 


about us ] eZine Home ] Archives ] Articles ] How2-4Newbies Home ] TOS ] Privacy ]

How2-4Newbies.com Copyright © 2004 All Rights Reserved