Above is just a joke!!! Please laugh

Personal and Home and Small Office Security

Cyber
Bulling
Disaster
Recovery
Email
Phishing
Identity
Theift
Spam
Spy
Ware
Virus
Web
Surfing
Wireless
Important Legal NOTICE!

Click Here To Read Important Legal NOTICE!


Cyber Bulling

Links
www.bewebaware.ca
www.bullyfreealberta.ca
www.bullyonline.org
www.cyberbully.org
www.cyberbullypolice.com
www.cybertip.ca
www.drphil.com
www.isafe.org
www.stoptextbully.com

Disaster Planning
Don't lose all your photos!

Is there any information on your computer that would cause you great difficulty/hardship/greef if it was erased?
My wife and I lost two years of documents because 2 hard drives and a backup tape were all damaged for different reasons at the same time>
What happens if you had a fire / thieft / flood / storm / war / etc.?
Your home insurance does not cover personal data or email. Some will not even cover Software or computers
For your own pease of mind do the following:
1) Make sure your computer is always conected to a good surge protector power bar with at least a $15,000 Guarentee. Don't go cheep, they do not work (I know). You can even get small one for your laptop when you travel.
2) Get a safty deposit box from your bank (Mid size).
3) Put all your install software/CDs and License Keys in your safe. (don't forget Wills/Marriage License/Deads to property/Stocks/Insurance/etc)
If you do not know your license keys try www.belarc.com Free Down
4) Back up all personal data (email & Documents) Regularly. For home PC's at least once a month. You need to keep at least two months/ 2 versions. One of the backups could go bad. (It has happened to me and my clients many times)
5) Keep at least one copy off your property like a bank safty deposit box or your work.
**HOW TO Backup** use any of the following:
- use a small USB key, just copy your data to it, very easy to use.
- Burn a CD or DVD
- Sign up for a free Email (Yahoo) Send yourself an attachment
- Internet Backup companys www.backup.com
- Tape is too vulnerable to damage
If you loose your hard drive data these www.drivesavers.com and other companies can help you recover the data. But it will cost you a lot of money. Prevention is a lot cheeper.

Email Phishing
They can steal your Credit cards and your Bank Accounts!

Phishing attacks have was the biggest threat in 2004. More than 18 million e-mail messages linked to Phishing have been stopped by MessageLabs Ltd. All financial (big and small even credit unions) are being targeted. Every senario that has a has a pin or password or identifies you can be used in a phising attach.
- No finacial institution will ever ask you from an email message for your pin or password
- Do not click on the link to a bank in an email message
- Copy the link in the email, then open internet explorer, then past it in the address bar at the top. Make sure it points to the right web site.
- Rest you mouse over the link (DO NOT CLICK) see to it shows you the link. Make sure it is the same as the description
- If your think there is a problem with your account, call dont email the company, and use the phone number from other paper records
- Check your bank records and balances regularly for unusual activity
- Look for the https:// rather then http://
- You need a healthy skepticism for any message and website
- If you think it is phising forward the email to reportphishing@antiphishing.org

Identity Theft

Personal information not to give out
Do not put any of the following on a family or personal website!
Monitor your kids and www.myspace.com
- Social insurance Number
- Driver's license number
- all account numbers + User ID/names
- debit and credit card numbers
- passwords + pins and security codes
- telephone numbers
- address
- family tree
- medical history
- No Personal Photos!!!!!

What is Spam?

There are two essential characteristics of all spam:
• It is unsolicited i.e. sent without the recipient’s permission
• It promotes products or services for sale.

Chain Letters:
Chain letters that invite you to forward the message on to your friends. Sometimes it will say you will get five cents for every email or bad luck if you send to less than five people. These are hoaxes created to promote spam. Never forward these emails thinking you will receive money or prises for each recipient of their email.

Tips to Prevent More Spam
- Protect your email address - treat it like your phone number
- Use an email service that offers spam-fighting tools, like Yahoo or HotMail
- Never send your password, credit card numbers, or any personal information in an email
- Don't post your email address in public places (e.g., newsgroups, message boards, chat rooms) where spammers mine for email addresses
- Use a Disposable Email Address when posting online Yahoo or HotMail
- Never respond to unsolicited email or try to unsubscribe - this can alert the sender that your email address is valid
- Never click on a URL or web site listed in spam - this will also alert the sender that your email address is valid

8 ways spammers can get your email address
1. From user registrations at unscrupulous sites
2. From user newsgroup postings
3. From user chat sessions
4. From spambots that crawl the web for any @ sign
5. From email lists the spammer buys
6. From mailing lists to which users subscribe
7. By randomly generating name combinations (Dictionary) for your domain
8. By harvesting all the email addresses on your company's server

You might already know that blacklist services track IP addresses that are known to be used to send spam. So any mail filter that supports blacklist services can query the services for a given IP address.

Spam Links

www.dnsbl.us.sorbs.net
www.glocksoft.com SpamCombat, spam-fighting software for Windows
www.spamcop.net
http://www.spamhaus.org/ The Spamhaus Block List (SBL) is a realtime DNS-based database of IP addresses of senders of Unsolicited Bulk Email (Spam), designed to help email administrators enforce incoming mail policy

What is SpyWare?

Spyware are deceitful programs that do things to your computer with out user permission. Spyware is a program or technology that aids in gathering information about a person or organization, often without their knowledge, and includes programs like hijackers and keyloggers. Adware is typically a program that displays advertising through pop-up or pop-under windows while you are surfing the Web. Spyware can collect personal information and /or change settings. Spyware companies are doing this for finacial gain.

SpyWare Catchers

www.lavasoftusa.com Ad-Aware
www.safer-networking.org Spybot Search & Destroy
http://www.microsoft.com/spyware Beta (Not Fully Tested Yet) Free
netfiles.uiuc.edu you'll find a long list of spyware packages, both standalone and enterprise
www.webroot.com Security products by WebRoot. Washers, Spyware, Privacy & filtering software.

What is a Virus?

Virus Software

Recomended www.grisoft.com/us/us_index.php A free for personal use anti-virus scanner is AVG.
www.airscanner.com anti-virus software for Windows Mobile devices
http://antivirus.cai.com/ eTrust Anti virus
Recomended www.avast.com a free antivirus software called Alwil
www.freedom.net Anti-Virus, Personal Firewall and Parental Control
http://www.my-etrust.com/microsoft/index.cfm?
www.pandasecurity.com Panda Virus Checker
www.pestpatrol.com Checks for viruses, Trojans, spyware
www.windowsitpro.com/WindowsSecurity/ Lots of virus and security info
www.stop-sign.com Virus Protection
www.sophos.com/ Sophos Anti Virus
www.sybari.com/home/ Virus Antigen
enterprisesecurity.symantec.com/Symantec Internet Security Threat Report Symantec Virus Protection
housecall.trendmicro.com/ Free online virus checker
www.trendmicro.com Trend Micro Virus Checker
www.zeroknowledge.com/privacy/default.asp Freedom Antivirus

Digital Cell Phone virus . . . called Telefonica what will they thing of next?


Web Surfing

When Things go wrong. You can do alot yourself



Government Stay Safe Online Awareness
csrc.nist.gov
www.cybercrime.ca
www.cybertip.ca
www.getnetwise.org
www.onlinesecurity.com
www.safefamilies.org/download.php Free Internet Filtering and Parental Control
www.safety-council.org
www.staysafeonline.info

Wireless Protection

- Activate encryption WPA better then WEP, use at least 10 characters and letters and numbers so no one can listen / sniff
- Change routers default password to something difficult
- Change the default SSID something not obvious
- Disable SSID broadcast
- Using MAC address creates a restricted guest list, no one can just jump on
- Don't use DHCP, no one can just jump on
Do not use wireless keyboards. Your keystrokes are not encrypted. Anyone within 30 feet (with a modified antena) can read your password and everything you type.

My Rules For Online usage
My desktop wall paper for my kids computers you are welcome to use rules.bmp

A poster 8.5 x 11 that I created in MS Word 2000. rules.doc
All kids who use the computers in my house must agree to this poster.
Back To Main Page Important Legal NOTICE!

Click Here To Read Important Legal NOTICE!


Updated October 10, 2007
Copyright© 2007 by Dana Shea

Copyright© All rights Reserved. No part of the contents of this site may be reproduced
or transmitted in any form or by any means without written permission.
Any questions or problem links please email