Friday, March 31, 2006
Don't accept "home-grown" security fixes
Phishers attack smaller banks
Thursday, March 30, 2006
cnet news adds The Big Picture
Phish Fry starts
Hearing loss bites Apple
Throw-away email accounts
One way to combat this is to use a temporary email account when you order online. You wait for any needed emails to arrive (confirming the order, etc.), then you delete (throw away) the email account. You could, of course, keep the email account active until you actually start receiving spam or until it expires. Either way, it helps keep spam out of your normal, personal mailbox.
You can get a list of sites that offer free temporary email acounts at Prospector - Free Stuff. Make sure to check the free email account site's privacy policy first. You don't want to get spammed by signing up for the temporary account, do you?
Tuesday, March 28, 2006
Spam? Fight back!
Monday, March 27, 2006
Groups name Adware, Malware offenders
Tuesday, March 21, 2006
Security tips from Comcast
- How do I stop spam?
- How does a spammer get my email address?
- What's with an email I got but it's not my address listed?
- Home user's Computer Security Checklist
- How to handle ID Theft
- Online fraud risk test
Comcast also recommends reviewing "How do I get my email program to reveal the full headers?" at SpamCop.net.
Monday, March 20, 2006
Getting Podcasts
Friday, March 17, 2006
Obese pix need file size diet!
Many Windows XP users are in the bad habit of taking their photos and then attaching them to an email message without making any changes. It's not a big deal if you have broadband, right? Wrong. Consider that you may be sending your ultra-cool-gotta-see-it pix to people who really don't want to deal with huge images. The more megapixels your camera has, the more likely that you're a bloated pic offender.
The solution is to edit photos down to a reasonable file size before attaching to emails. Windows XP users can easily resize those images using Microsoft's free " Image Resizer" PowerToy. After you install the tool, just right-click on an image in Windows Explorer and choose to resize it to a smaller dimension better suited as an email picture or attachment.
If you have an image editor, it's a also good idea to improve the images where needed, then "optimize" them to further reduce file size before shipping them on to unsuspecting friends.
This information is based on a blurb by David Chernicoff in the "Windows UPDATE Client" email newsletter anyone get for free from Windows IT Pro. The magazine offers several of these free emailed newsletters. Drop by their site and make your choice.
Thursday, March 16, 2006
Blasting Web Ads
If you have a real need to reduce displayed advertising, consider taking the following actions:
- Turn on your browser's Pop-up blocker. Only allow pop-ups on sites you choose.
- Use FlashSwitch to toggle Flash off/on as you want, since some ads are now done in Flash.
Wednesday, March 15, 2006
Google Safe Browsing for Firefox
Tuesday, March 14, 2006
Fed site keeps you on guard
Sunday, March 12, 2006
Email scam pretends to be from IRS
Anti-Phishing, Pharming tips from Microsoft
Microsoft "Live" tools
Friday, March 10, 2006
Microsoft blogs
The Internet Explorer 7 blog lets you keep track of the latest news and comments about this upcoming major upgrade. In fact, there's even a more specialized IE 7 blog, ClearType in IE7. And speaking of fonts, you may find the Font Blog interesting.
Wednesday, March 08, 2006
Mac OS X attack succeeds in 30 min
Splogs and Blog comment spamming
After blogs got popular, spammers latched onto them too. This happened fast and seems to have caught Blogger.com (bought by Google) by surprise. Some spam blogs serve solely to drive traffic to other spam sites. The text of such sites may be nonsense, with the links being the only thing the spammer is really interested in having on the page.
Spam in Blogs is called comment spamming. To reduce automatic spam attacks of blog comments, Blogger now offers:
- Comment moderation -- the blog administrator has to approve a comment before it actually gets posted.
- Word verification. They added the option to require entry of some letters ("word verification") that are displayed as a graphic. Automatic ("bot") type processes can't cope with that.
- Screening of blogs that are included in the "Next Blog" feature of the Blogger NavBar (which some blogs hide).
- A "Flag" button on the Blogger NavBar. This lets a person "flag" a blog as questionable and ripe for review for elimination.
- Fight Splog
- Splog Reporter started on October, 2005 in response to spamming of blogs. Splog Reporter equates Splogs with terrorism of the blogosphere.
- Splog Reporter adds Firefox extension
- Spam of blogs (cnet news.com )
- Splog Spot bills itself as the world's largest splog database.
- Fight Splog! reports that 442 splogging servers have been identified as used in attacks.
- Blogging industry infected with splog flu
ProBlogger reports that Blog search engine owner Mark Cuban has criticised Google for not blocking sploggers, who are using its free blogspot.com to create tons of splogs daily. Cuban says that blog search engine sites may need to start deleting any blogs from offending domains such as blogspot.com or ones that end in ".info".
Tuesday, March 07, 2006
IE 7 will handle "feeds"
Sunday, March 05, 2006
Track down those trying to use your 'puter
Well, you can figure out who owns the source IP by looking at the Firewall logs. For example, my ZoneAlarm firewall "More info" option showed that the computer that had sent the data packet that caused an alert to be entered into the log was 70.224.246.43. OK, but exactly who owns that computer IP address and who should I email for details, assuming I want more information?
Luckily, the "WHOIS" database at ARIN (as well as some others) gives a free listing of such information, based on the registration of the IP address/web site. Just enter the IP address at their site and you get detailed information. Try the above IP address and see what you get.
If you have a web address (URL) instead of an IP address, you can get information via the general WHOIS database at whois.net or AllWhoIs.com. For example, enter umc.org into the AllWhoIs Search field and click on "Search". Scroll down through the results to see what data is available.
With such tools, you can often trace attempts to get into or out of your computer. It's important to check on these attempts periodically, if only for peace of mind. I do so every month or so.
And remember -- it's important to check who's trying to send information out of your computer as well as who's trying to get in. Check on both types of attempts.