Wednesday, November 29, 2006

How to Avoid Getting Ripped-Off Online

Most people think online security means simply protecting your credit card data from fraud and theft, but it actually goes way beyond that.

The potential for mayhem and just plain disruption of your life doesn't just mean credit card fraud - it can mean having your identity stolen, your life disrupted and spending hours cleaning up after an online 'vandalism' attack.

You must protect yourself from everyone from the teenage computer hacker to the organized crime syndicate using computer worms and keystroke logging viruses.

The great news is that a number of simple techniques should protect you against the vast majority of threats, since the evil doers will simply move on to easier pastures.

Update your anti-virus files

The widespread 'Bad Trans' worm logged keystrokes and transmitted potentially sensitive data such as credit card and social security numbers to the 'bad guys'.

Though this virus contained a high level of criminal intent, it was easily blocked by anyone with up-to-date anti-virus files.

If you don't have anti-virus software with current virus definitions installed, you leave the door wide open for security problems.

Install a 'Firewall'

A firewall helps prevent unauthorized access to your computer by 'hackers'.

It closes off the entry points (called open 'ports') carried by virtually every computer connected to the Internet.

A common misconception is that firewalls are only for people with cable or other high-speed connections.

Even if you use a dial up connection to get online, a firewall can help you detect and prevent people from logging on to your computer, stealing files or even using your computer to break into others!

Use secure sites

Only give sensitive data such as credit cards, social security numbers and important passwords over a secure connection.

This means the little yellow lock appears in the lower part of your browser and nobody but the website you are connected to should be able to read the data you send.

Change passwords often

An easy way for you to protect your sensitive data and email is to change your passwords on a monthly basis, or even more often depending on how frequently you use computers away from home.

If you log on to your email at the library, in 'cyber cafes' or any other remote computer then the possibility exists that computer could have a key-stroking virus present.

This means everything you type into the computer (passwords, birthdays, social security numbers, credit cards) could be logged and used by someone else.

Change your passwords at lease once a month.

Though not fool-proofArticle Submission, these security tips should help reduce your vulnerability and keep you safer online.

Computer Network Designing

Computer network design requires a good understanding of the topologies such as a bus, ring, star, so on. Designing a network has to follow certain rules. The set of rules governing the setup of a network is called its topology. Ethernet, today, is the most popular topology in use. It consists of computers and peripherals cabled together in specific ways. Ethernet is relatively cheaper, easy to set up and use, and faster. There are two types of Ethernet – Standard and Fast Ethernet.

To talk of the cables, you can use the twisted-pair (also known as 10BaseT) or the thin coax (also known as 10Base2) for your network cable. The choice, however, will depend on the type of network you’re setting. You can use both the types together. Twisted pair cabling is cheaper, flexible, and ideal for cabling short distances. You can use thin coax for larger networks.

A network interface card (NIC) connects the network computer to the network cabling. While some NICs are installed inside the computer others may need PCI slots. A network adapter is needed when the network is supposed to support very high speed data transfer.

The final piece you need to get through the network design is a hub. It is used to gather groups of PCs together at a central location. The type of your network and data transfer support required will again decide the type of hub the network requires.

Understanding the roles of these bits of hardware and the nature of network to be built takes you a long way in deigning the ideal computer network.

Understanding the implementation of network protocol and services design also contributes to a good computer network design. You can use other area networks besides LANs and WANs. A good knowledge about the different forms of area networks and their roles in network designing throws up better ideas for the framework.

However, the two significant elements influencing network designing are the bandwidth and latency supported by a network.

Bandwidth in computer networking means the rate at which data can travel through a network connection or interface. It is usually expressed in bytes per second (bps). Bandwidth, however, is just one element that dictates the speed of a network. Latency, the other important element of speed refers to the delays in processing different types of network data. Usually, tools such as ping and trace-route assess latency by determining the time taken by a network packet to travel from source to destination and back.

Once you have planned the budget and the various factors influencing a network design, you can think about the various template designs. You can think of a symmetric computer network, where all devices can transmit and receive data at equal ratesBusiness Management Articles, or an asymmetric one which can supports different proportion of data or bandwidth in different direction.

Important: Severe Windows Security Flaw. What You Can Do Right Now To Secure Your Data

On 28 of December a severe Windows security flaw, WMF Flaw, was detected, in all Windows versions from Win98 to WinXP, no fixing patch exists yet. Using it, anyone can do any malicious action with your computer, steal or even erase your data.

This article will help you understand what it is and how YOU can fix it until Microsoft releases a patch.

By Washington Post: "Computers can be infected simply by visiting one of the Web sites or viewing an infected image in an e-mail through the preview pane [...] even if users did not click on anything or open any files."

"Microsoft said in a statement yesterday that it is investigating the vulnerability and plans to issue a software patch to fix the problem. The company could not say how soon that patch would be available."

"The vulnerability is in the Microsoft Windows Graphics Rendering Engine, that is why the exploit affects Windows versions from Win98 to WinXP.

Unlike other security vulnerabilities, this one allows a _data file_ to execute arbitrary code upon it being viewed. In other words, a (picture) data file can contain executable code to "help" Windows display it, and Windows will execute it unquestionably.

Your computer can be infected whenever Windows uses its default image viewer to display certain image types. This means there is a long list of applications that are vulnerable that rely upon the image viewer code. Windows uses this code when previewing images, for example.

What YOU can do right NOW, to secure your computer until a patch from Microsoft is released:

Go to Start > Run, paste there the following line: regsvr32 /u shimgvw.dll and press OK.

If everything goes right, you'll see the following message: "DllUnregisterServer in shimgvw.dll succeeded.

"It will disable the problematic dll, forcing all other programs to use their own engines, if exist. Keep in mind that this will disable thumbnail previews in Windows Explorer. One may experience problems with opening any image file after unregistering this dll.

(To reactivate this feature: Start > Run > regsvr32 shimgvw.dll)We will send another update, when the patch from Microsoft is released, with instructions how to apply the patch and re-activate the feature.

"And another important thing: since this is such a serious flaw, you may start getting phishing emails pretending to originate at Microsoft, urging you to do something with your computerBusiness Management Articles, apply some "patches". Don't do it.

Computer Security - The no 1 Issue In Personal Computing

The Internet is a wonderful place. Anyone with an Internet connection can stay in touch with family and friends via email. Starting an Internet business is easier than ever and can even lead to the lifestyle of your dreams. And, thanks to eBay, you can even hold a "virtual garage sale" without worrying about the weather or bothering the neighbors.

But the Internet is also a DANGEROUS place to be. In fact, YOU are at RISK right now.

Computer security is the most important issue of being on the Internet. Just consider the following statement - startling I know, but VERY true.

"If you are connected to the Internet and you don't have current anti-virus software, ALL security updates to your Operating system and browser, as well as a firewall properly configured, you have a virus or adware on your computer RIGHT NOW!"

That is what I've been telling clients of my computer repair business recently. Some of them listened and took action. Others didn't and had to learn this important lesson the very hard way.

Let's look at the problem first, then I'm going to give you FIVE ways you can solve that problem today!

First: the facts.

Fact 1. There are three types of programs that are attacking your computer right now: Spyware, Malware, and Adware. All three are programs that get downloaded to your computer as part of a legitimate download, then hang around sending data like your credit card numbers to the villains who write them.

While this article is too short to define each, all three types are a threat. For now let's call them all adware.

Fact 2. In the last 12-18 months I have not seen ONE unprotected computer that doesn't have a virus or adware.

Doing computer repair on a daily basis for a living I see a LOT of computers. Some units have OVER 50 pieces of adware on them. Please understand; these people are just like you and me, not some 14 year old gamer who will download anything. They THOUGHT they were being careful enough, and were shocked when they discovered that they had a problem.

Some of these machines even had anti-virus software, but weren't updated with the latest security patches.

Fact 3. While onsite or phone support service calls used to involve bad hard drives, equipment failure, or adding new devices, about 80% of all service calls now involve virus and adware removal.

Fact 4. It's getting worse. The adware and virus creators are getting smarter, and the software is getting much harder to remove.

Here is what you can do TODAY to solve the problem, a problem you might not have even been aware existed, yet could cost you untold hours of frustration as well as put your financial life at risk.

Step 1. Be aware! Does your computer run slower now than when you bought it? Do some software programs no longer work or "hang up"? Does your browser go to some strange home page? If so, the odds are 99.9% that you ARE infected.

Step 2. Install anti-virus software that automatically updates. There are several good choices out there that fit that criteria, Norton, MacAfee, AVG, PC-cillin are the top brands. The important thing is to make sure that the software is setup to update the virus signatures automatically.

Step 3. Install all security patches for your operating system. Go to the Microsoft site and run a test of your computer and software. It will tell you what updates you need to install and even install them for you.

There is no cost and it is extremely effective against many of the virus and adware out there. Go here to check your system: www.microsoft.com and look on the menu on the left for Windows Update and click on that. Depending on what operating system you have, it will take you to the appropriate update page. Also turn on auto-update if your operating system allows that feature.

Step 4. Install a firewall. A firewall looks at network traffic coming into or going out of your computer. Viruses or adware that may try and infect you is scrutinized and rejected. Windows XP has an included firewall (automatically turned on in the SP2 update) that can help but you may find a 3rd party program like Zone Alert (www.zonelabs.com) to be a better choice.

Step 5. Now that you know the danger, use a generous amount of common sense in reading email and surfing the web. If you get an email attachment from anyone you don't know, don't open it, ever!

If you know the person sending the attachment but it looks questionable, don't open it. You may also want to set your email to open only in text mode, that keeps any html (that can run a program) from doing any harm.

Never, and I mean never, click on a hyperlink in an email to fill out any financial, password, or login data. No legitimate vendor will ever ask you to do this under any circumstances.

When you are surfing the web and a window pops up and asks you to install a program, just say no. If you don't recognize the company or publisher, don't do it. You can go into your browser security section and make changes so that no outside source can make any installations or changes with out prompting you to approve.

Keep current backups of all your important data. We all know to do this, but so few actually do it. No matter the method - just do it!!!! If disaster strikes, your critical data will be safe.

By following these five tips you will have peace of mind knowing that your online experiences, be they playing games or making money or something totally different, are safe as well as enjoyable.

Protect your data, and your peace of mindFree Web Content, by taking action on these five steps today.

Protect Yourself From Spyware Snoops

Your best protection against this particular privacy invasion is to learn about this hideous misuse of the Internet and act accordingly, using software that is readily available and very inexpensive--even free in many cases.

"Spyware is a technological disease that is proliferating each day. It threatens the efficiency of our computers and Internet services as well as the security of our personal information and private transactions, " said Congresswoman Mary Bono (R-CA) when explaining her introduction of H.R. 2929 in April, 2004. "The Safeguard Against Privacy Invasion Act" (SPI Act) works to protect individuals and companies from unknowingly downloading spyware by requiring that "consumers receive a clear and conspicuous notice prior to downloading spyware."

Many experienced Web users have already learned how to recognize spyware, avoid it, and delete it. According to officials at the Federal Trade Commission (FTC), all computer users should "get wise to the signs that spyware has been installed on their machines, and then take appropriate steps to delete it."

Clues that spyware is on a computer include: a barrage of pop-up ads, being redirected to unwanted websites, a sudden or repeated change in your computer's Internet home page, new and unexpected tool bars, new and unexpected icons at the bottom of your computer screen, keys that do not work (for example, the "Tab" key that does not work when you try to move to the next field), random error messages, and sluggish or exceedingly slow performance when opening programs or saving files.

The good news is that computer users can prevent spyware installation, readily detect that which is already installed, and easily delete it from that system. Experts from the FTC and across the technology industry offer these suggestions: update your operating system and Web browser software; download free software only from sites you know and trust; do not install any software without knowing EXACTLY what it is; minimize "drive-by" downloads; don't click on any links within pop-up windows; and install a dependable personal firewall to stop uninvited guests from accessing your computer.

If you think your computer may have spyware on it, experts advise that you take three steps. First, get an anti-spyware program from a vendor you know and trust. Next, set it to scan on a regular basis--at least once a week--or perhaps even once a day. Finally, delete any software programs the anti-spyware detects.

A specific type of Spyware is referred to as "Adware"--advertising supported software. Like Spyware, Adware will usually install components on your computer that will send marketing information whenever you are online. Unlike Spyware, however, Adware contains a disclosure telling you that they will be using your information. It is VERY important to read the privacy policy when downloading Adware.

Run a systems check on your computer, use common sense when downloading from unknown Internet sites and invest in some reliable Spyware blocker software. Best wishes for safe surfing!

Tuesday, November 28, 2006

Your anti-virus is not the answer to your total Internet Security

Do you think your anti-virus software is all that you require for protecting your system from cyber criminals? Is it all that you need to prevent your machine from becoming a spam producing mill? Is it all that protects your children from obscene material, prevents your employees from degrading their performance by using Internet unproductively, protecting your personal/private documents from any modifications or unauthorized access, killing your precious bandwidth through pop up Ads and securing you against Spywares? The answer to these questions is a big NO.

The anti-virus software simply protects your system against viruses, worms and trojans but the cyber criminals have become so intelligent today that they know how to circumvent through the security policies and attack the systems with other types of tools. If you have an anti-virus software in place and think that you are secured from all potential Internet threats, you need to rethink.....as your children may fall into pornographic loop, your bank details may be stolen and the productivity of your organization may go down the drain. So, what is the solution???

The recently launched product from MicroWorld, eScan Web and Mail Filter for Windows, protects your system on a real time basis against threats like:

Unsecured content,
Spam,
Pornography,
Unproductive use of Internet,
Spyware,
Pop Up Advertisements etc.

The product has been developed to run efficiently with any antivirus software you might already have on your system.

"This product has been developed keeping into consideration the security requirement of our users who already have an anti-virus in place but are vulnerable to other new potential e-threats", said Mr. Govind Rammurthy, CEO and MD, MicroWorld. “People already having an anti-virus installed on their systems if want to secure themselves from other potential e-threats also usually do not find software which can gel with their existing anti-virus and provide them a good security. Considering this requirement of our users we have launched this new product in the market which we expect would get phenomenal response"Free Reprint Articles, he futher says.

Very Important: Update on Severe Windows Security Flaw. What To Do Right Now To Secure Your Data

Earlier we warned you about a serious security flaw, so-called "WMF flow." Several days later nearly one hundred different instances of exploitation of this newly discovered vulnerability had been found.

"Desktop users that suffered the effects of the IMF exploit describe it as a devastating experience to find their desktop computers completely taken over by an attacker.“

When it hit, the screen suddenly said, ‘Congratulations, you’re infected!’” said Brad Dinerman, vice president of information technology at MIS Alliance, a professional services outsourcing firm in Newton, Mass. It was clear that the computer running XP was no longer in his control.“

It had root access, it wouldn’t let me log off or do anything,” Dinerman said. He said he ended up having to re-build the machine from scratch. He noted that his machine had been up-to-date in terms of software patches, anti-virus and anti-spyware software. ""...exploit has so many variants that anti-virus firms are having a difficult time keeping up with the exploit’s changes in attack code."

How to Sound Like the Expert You Are

Other people's articles interest me for two major reasons. 1. I'm a copywriter, so I use them as an information resource to write my own articles. 2. I market my writing services on the internet, so I'm always seeking out exciting new business relationships. Articles speak volumes about an author's intelligence and integrity. If I like what you write, I may do business with you as well as pass your good name along to others who can use what you offer.

Some articles meet my criteria for being "expert-level," and others don't. Trust me, I'm not the only one out there who's judging. Position your articles at the top of your category and increase your credibility a thousandfold! Read on for some helpful article-writing tips.

1. Use the active voice. Move your audience to action with action words. This means eliminating forms of the verb "to be" in all their wishy-washiness. Is, am, are, was, were: these sad excuses for verbs will weaken your message and put your audience right to sleep. Replace them wherever possible with action verbs, and make your message pop!

2. Direct the reader. Lately I've come across articles where the author tells the reader what they 'could' do. What a lame way to offer advice! Which of these sentences motivates you: "You could start your own affiliate program" or "Start your own affiliate program"? People want to be told what to do; not what they can, could, should or might do. Take a firm stand, and give your reader a direction to go in!

3. Be specific. Want to know the quickest way to lose your reader? Give them a broad topic and then don't follow it with any details. I speak on behalf of all the information-seekers when I say this: if you have valuable insights to share, then please take care to explain them fully. You don't have to go on for paragraphs. Just a few gems of wisdom are greatly appreciated, and will establish you as someone who really knows his stuff. If you're hazy on how to do this, always ask yourself the who, what, when, where, how and why of the topic at hand.

4. Check your facts. If your article shows promise, someone may very well come along and want to use it in their own marketing presentation. You may be quoted, and your name passed on as an expert in your field. If you intend to be an expert, then take care to back your arguments with solid evidence. There's nothing worse than seeing your article plastered all over the internet only to learn later that it contained the wrong information.

5. Include examples. Here's an example of how to include an example. Let's say you're writing about a weight-loss program. You've already told your reader that countless people have benefited tremendously while on the program. Now create a powerful image of the program with three short success stories from real people with real-live testimonials. Examples drive the point home and build your reputation as an expert!

6. Don't be a rambler. We talked about authors who don't provide enough detail within their articles. An opposite but equally novice offense is to include too much detail! Don't be tempted to go off on tangents that don't relate to the main idea. When developing your paragraphs and points of interest, follow the Goldilocks rule: not too long, not too short, but just right. If you feel like taking a portion of your article and going on for pages about it, great! Just be sure to do it in a different article.

7. Proofread. An expert article author always submits flawless work. Always, always, always proofread your writing before you hit Submit. All of the major word processing programs offer spellcheck, so there's no excuse not to use it. Also keep in mind that spellcheck won't always catch the error. For example, if you type 'thing' instead of 'think,' your computer will accept 'thing' as a valid word and your mistake will go undetected. So proofread thoroughly with your own two eyes, and be sure that your article is 100% error-free.

What's It Going To Be

First you have to make a big decision... Apple or Windows. They both have great features, and are both more user friendly for each individule user. Windows is compatible with several computer manufacturers, including HP Pavilion, Compaq, and Dell. Now, in my case, I need to take a close look at each option, as I have specific uses for my machine. When purchasing a computer you should be aware of what your main purpose with it is. For some it is business, others gaming, and for many, it is used for school. Make sure you test each version, Apple and Windows. If Apple seems the most compatible with your purpose, then congradulations! Your choice is made. But if you decide Apple is not right for you, take a look at all the operating systems that there is for Windows. There are several, each with different features, and you should choose the one that is right for you.As you can seeFree Articles, the purchase of a computer is not always black and white. What's it going to be for you

The Value of a Computer Information Systems Degree

Many parents these days are encouraging their children to consider a computer information systems degree for their future career. Parents can sense the trends of the present job market and they know that computer related degrees are a wonderful way of approaching college. A computer information systems degree provides a person with valuable knowledge that are in demand in most modern businesses. Knowledge about computers in todays world gives a person an edge over individuals who are computer illiterate.

I have a brother who was fond of computer games when he was a child. His interests influenced him to go after a computer systems information degree in college and these days he has got himself a lucrative business. It was amazing to see him progress through his schooling. He was very dedicated and interested in his course and earned his degree in a short period of time. My brother has certainly made a wise decision in pursuing a computer information systems degree.

The use of computers is still expanding. The present trends clearly show that computers will continue to play a major role in human life. If you want to be familiar with computers by taking up a computer systems information degreeFree Reprint Articles, you can hop on the Internet and discover the available opportunities. Start working your way towards a wonderful computer career via a computer information systems degree.

The Essentials of Wireless Security

Typically ‘normal’ users of products such as wireless routers dismiss any security concerns as only really being applicable to commercial concerns. After all, who would be interested in a small local set-up of two, maybe three computers? You may be surprised. There are many horror stories circulating about unsecured wireless networks, and unfortunately there is a grain of truth in most of them.

The most common form that a danger to a private network can take is known as variously as ‘War-driving’, ‘war-walking’, ‘war-flying’ or ‘war-chalking.’ This involves an unscrupulous person literally driving, walking or even flying around in an attempt to find an unsecured wireless network. Once one is found a nearby wall is commonly ‘chalked’, indicating to any other passer-by the presence of a ripe target. The name itself is taken from the act of ‘war-dialling’, a term coined by the film ‘WarGames’, where random telephone numbers were dialled in the hope of finding a computer on the other end of the line.

If a network is found, then the potentialconsequences can range from the fairly innocuous to the criminal. At the very lowest level a third-party can connect to the network and access the Internet connection from the router. If the legitimate owner of the network is on a capped service this can consume a considerable chunk of their bandwidth, leading to extra charges being levied for resources which they never realised were being used. Of far more consequence are some of the uses to which this stolen bandwidth could be put. In a worst case example a paedophile cruising around the area could spot the chalk marking and connect to the compromised network. Without the knowledge of the network owners they could connect to any manner of illegal sites, with no record of their passing traceable to them. Because the trail would stop cold at the door of the person who has provided them with the free access.

Of course this is a very worst-case example, and as such very unlikely. Even in today’s climate of moral decrepitude this sort of occurrence would, we hope, be extraordinarily rare. But hopefully it will help drive home the point that securing your network should be taken very seriously indeed. But what can you do to protect yourself?

I would recommend that all wireless networks should make use of the WEP (Wired Equivalent Privacy) encryption option which comes as standard with almost all routers and base stations. Although turned off by default this feature is absolutely essential. Utilising either 64-bit encryption, which creates a 64bit encryption based on a 40-bit key with a 24-bit initialisation vector, or 128-bit encryption which makes use of a 104-bit key with a 24-bit initialisation vector, a secure password is created. This password should only be given to known and trusted wireless devices, blocking access to any interloper. This, although not secure against dedicated crackers, provides a more than adequate protection to dissuade the nosy or the vast majority of war-drivers.

Too few people enable this basic protection, or are even aware it exists. However in some regards protecting your network can be as essential as your childhood inoculation against tetanus. So please, take just a few minutes of your time to configure your WEP encryption, and to help protect yourself.

Protect Your Most Vital Business Asset with Security Software

This is the reality of the world in which we live today. We can’t just lock ourselves up in our homes and wish the problems away. Life must go on. What we’ve got to do is fight back. And we have to protect ourselves the best way that we can.

Fortunately, security is big business these days. There really is no end to the security options that are available on the free market. And when it comes to protecting your computer system, your options are limited only by the balance in your checking account.

So much of our non-sleep time is spent on the computer. Think about your own situation. If you’re running a small business, especially when you’re just starting out, the PC often is your only other partner in the office. You entrust this partner with every crucial component of your business – your accounting, your inventory, your CRM, your communication, your vital documents, your sales and marketing information, your project management, even your on-line store.

You’re handing off quite a lot of responsibility to this partner. Granted, it’s a machine, and it’s got the internal capacity to handle such an enormous responsibility. But even the most powerful of personal computers is vulnerable if it’s not given the protection it needs to survive in this world of never-ending assault.

Viruses, hackers, SPAM, pop-ups, Trojans and more are out there lurking, waiting to bring each and every unprotected computer system to its knees.

And you might not realize this, but there are programs out there that can log your keystrokes. Don’t understand the implications of this? Well, every time you enter your login name, your passwords, your credit card numbers, loggers capture and store the keystroke sequence. If you ever find unauthorized transactions on your credit cards, your account numbers might very well have been stolen by someone using a keystroke logger.

Have you provided your business partner with the protection it needs to withstand this type of daily attack? You better hope your answer is yes. Otherwise, you’re playing a dangerous game of Russian Roulette.

A good Internet security system will keep your business and personal data safe. It will thwart viruses before they have an opportunity to wreak havoc on your computers. It will guard against unauthorized users, a.k.a. hackers and phishers – those whose sole purpose is to steal your identity. It will be able to recognize and filter out SPAM. And those annoying pop-up ads? They’ll be blocked before they even have a chance to rear their ugly heads.

When you need even more protection, it’s available, too. Encrypt your instant messages and keep Instant Messaging spam, or SPIM, at bay. Internet security software can also provide you will a listing of all web contacts, inbound as well as outbound, and will notify you of instances of unauthorized access. Plus, it can filter e-mail scripts and perform other tasks to help your computer system hide from Internet scanners.

So, if you’ve not done so already, it’s time you purchase an Internet security suite for your computer system. Register it so that you get updates the moment they are available. But don’t get too comfortable. RememberScience Articles, even the most advanced Internet security suite can only guard against known enemies. And new ways of assaulting your computer are being conceived every day. And that’s the reality of the world in which we live.

Hackers Given Access to IRS Computers

The Treasury Department inspector general conducted a study to see if IRS employees could be manipulated into providing information that would compromise computer security. Treasury Department inspectors called IRS agents and managers posing as computer technicians. The inspectors told the employees that they were trying to fix problems with the computer network platform. They then asked the employess to provide the login and passwords for their administrative accounts. More than one-third of the agents provided the information and even allowed the inspectors to change the passwords.

The IRS has rules in place that prohibit employees from divulging passwords. Despite these rules, employees gave several reasons for providing the information. Some said they were not suspicious of foul play while others wanted to be helpful to the technicians. Some employees were suspicious, but were given permission to provide the information by the managers in their departments.

The taxpayer database maintained by the IRS contains incredibly valuable information. The hacks of Choicepoint and LexisNexus pail in comparison to a hack of the IRS database. Imagine a hacker getting access to the tax identification numbers of every person and business in the United States. Making matters worseScience Articles, the database also contains the name and number of every account kicking out interest and dividends for each taxpayer including bank accounts and investment accounts. The exposure of such information would be a windfall for identity theft scams.

The IRS has responded to the study by sending an email to all employees alerting them of the rules regarding divulging information. You have to wonder how long the employees will keep it in mind.

Basic Steps To Optimize Your Internet Security

First, here are some tips to make windows safer :

For basic security and update patches install Service Pack 2 for Windows XP or Service Pack 4 for Windows 2000.

Once a month use Windows Update so you can get the latest pacthes.

When you download software from the Internet make sure you download it from the original website.

Always run anti Trojan and anti virus software.

Even if you don't use it you have to make your Internet Explorer as safe as possible.

When you access the Internet you are browsing the web using a browser such as Internet Explorer.The Internet Explorer contains several security vulnerabilities. You should make it as safe as possible or switch your default browser to an alternative. You will have to set some options from the Manage Add-Ons in the Internet Options. You will see a list of add-ons that can be activated or deactivated. If you see any unusual entries just deactivate them so you can be sure you don't have a trojan/worm.

Under Internet Options -> Security -> Internet -> you will see the Edit Level.You should set it to high in order to disable most of the security threats.

Your Web Browser should be ok now. Let's see what we have to do from our email point of view.

Because it's built-in in their Windows system lots of users like to use Outlook Express for emailing. But it's a fact that it contains many security vulnerabilities so I advise you to use alternatives. If you use a web based Email (you can browse your email with your web browser) you can delete viruses even if you don't download them to your PC.

Make sure you have installed an Anti Virus for 100% virus protection. One that I've found to be very good and never disappointed me is the AVG Anti virus. If you take the time to regularly update it you will be safe enough with it.

Lots of people install Firewalls because they belive their Internet security will be higher. I personaly disagree. If you do not know how to best configure it, and you have to know much about the tech behind it to do soFeature Articles, it will just make your PC slow and software not working.You can just use the Windows XP SP2 firewall for basic security.

All this tips should make your PC safer. I browse the Internet every single day for some time now and they worked great for me. I haven't met a virus/worm for some time now.

Computer Security - What Exactly Is It

The major technical areas of computer security are confidentiality, integrity and authentication/availability.

* Confidentiality, also known as secrecy or privacy, means that the information you own cannot be accessed by unauthorized parties. Breaches of confidentiality range from the embarrassing to the disastrous.
* Integrity means that your information is protected against unauthorized changes that are undetectable to authorized users. The integrity of databases and other resources are usually compromised through hacking.
* Authentication means that an user is who he claims to be.
* Availability means that the resources are accessible by authorized parties. Examples of availability attacks are the 'denial of service' attacks.

Other important things that the computer security professionals are concerned about are access control and nonrepudiation. Access control refer not only to the fact that users can only access the resources and services they are entitled to, but also to the fact that they can't be denied to access the resources they legitimately expect. Nonrepudiation means that a person who sends a message cannot deny he sent it and vice versa.

In addition to these technical aspects, the concept of computer security is very large. Computer security's roots are drawn from disciplines like ethics and risk analysis and the major topics that are concerning it are computer crime (tries to prevent, detect and remedy attacks) and identity/anonymity in cyberspace.

Although confidentiality, integrity and authenticity are the most important things when it comes to computer security in general, for everyday internet users, privacy is the most important one, because many people think that they have nothing to hide or the information they give doesn't seem sensitive when they register with an internet service/site.

But remember that, on the internet, information is very easily shared among companies and small pieces of related information from different sources can be linked together to form something alot more complex about a person. Because of this, nowadays, the ability to maintain control over what information is collected about themFeature Articles, who may use it and how it can be used is extremely important.