Search
Search Keyword: Total 24 results found.
Tag: security Ordering
Setting a Good Example Online

Years ago when I first came on line.  You heard more about computer users being yelled at, trolled, ignored, cussed out, and very much abused on forum and group boards for not asking a question in the right manner.  I have notice that trend on many boards, and groups has been changing.  There is not as much so called "old school" as there use to be. In the beginning of the year of 2000. You learned which boards you had to post to a certain way, and you did not dare stray from their way of posting.  Or else, they would cut you up, and have you for dinner.  Then throw your left overs out for the rest of the pack to have a go at it.  They were a ruthless bunch.  Called "old school".  It was OK to ask a question.  "But I am watching you.  You better post it right or else!"  For some.  It was like a game, or time of passage.  As soon as someone posted wrong.  Out came old school to tear them a new hole.   Some forums, boards, and groups were ruthless.  Many people did not dare post to these type boards.  They chose instead just to read the post, and move on to the next board.  Then in 2001, a change started to take hold. Overnight new boards, forums, and groups emerged.   With a new set of rules.  As long as you did a search first, and put as much info in as possible in your post when you asked a question, or that you knew,  they would help you.  Yes a few were still ruthless.  But many on these new boards started to tell old school to back off.  They realized old school was running off potential customers.  So some complained, and after much consideration, they changed.  I decided my group at Yahoo, was going to be one of these new boards.  We were one of the first that did not care about how a question was asked.  I did not want any one yelled at, or abused in that matter.  Granted it was hard at times.  Because I had old school and new school on my group.  But we prevailed.  We won the hearts over.  We Showed everyone by setting a good example.  We did not stop there either.  The next example we set for our users to follow was the fact that on our group the user was expected to keep their computer secure as much as they could.   For many, they were not even doing this.  They may have a firewall, but many had no anti-virus software.  Some had neither.  We set up guidelines for the users to follow, thus a rule was born, and they pretty much followed our lead to keep their computer secure at all times.  Yes we have had a few failures.  But for the most part our computer users tackled computer security with as much robust that they could muster.  We were also the first to do this, as far as I know were were.  When many of the computer groups on Yahoo were spreading viruses, our group was humming along as though it was just another day.  Yes a few managed to pick up a virus or a worm here or there.  But what ever was hitting Yahoo Groups at the time did not grind our group to a halt. It never has. We follow these same rules today.  Have no need to change them.   Honestly I don't see how a computer group can function without setting up some basic security guidelines for the members to follow.   If everyone did this, I believe the Internet would be a better place.  Tell them they have to do their part to help keep the Internet secure, by keeping their computer secure.  Make it a rule. After all...  The Internet has both businesses, and consumers on it together. From all walks of life.  Not just consumers. Not just businesses.  The time has come too demand secure computers.  Would you please make this a common rule on your group, forum, or board? Please set a good example.

I always get the same question when it comes to security.  "How do I secure my computer to keep it from getting infected all the time?" Your security may not be failing.  It could be the person handling the keyboard and mouse.  Some see the warnings, and just ignore them.  Others see the warnings, don't understand them, and install/view anyway.  Plus some others see the warnings, and could care less about them, because it is not their computer.  Many people are also overwhelmed because they have several computers in the home scattered from one end of the home to the other.  So it makes it hard for them to keep track of how the computer is doing if they can't keep track of the location.  Mainly this would be laptops/notebooks.  In other homes it is the number of people using just one laptop/notebook or desktop, and keeping track of them to make sure they are not defeating the security settings/software.  Oh and we must not forget the computers that are never updated through windows update, never scanned, and the security software is never updated. I guess they like the pretty icons sitting in their task bar or something?  Or maybe the lack of the icons sitting in the task bar?  Because a few have even disabled their security software. Years ago a lady contacted me by email saying that her neighbors boy came over about once a week, and always when he left her computer was infected.  She asked me "what is a person to do?"  I said, "Plain and simple, he doesn't use your computer anymore."  She emailed me back stating... "I don't want to be rude."  I emailed her back and asked,  "And he is not being rude to you?"  I got a thank you back from her a month later.  She said it was the first month she had gone through without her computer being infected in the last eight months.  In the eight months this lady was not rude.  She did more cleaning of her computer, than she did actually using it.  She was more worried about being rude, than trying to protect her investment.   She had a great security setup, but the neighbors boy ignored her security even after she explained to him her rules. What was she thinking? Another email I got was from a guy.  He said his son was the problem every security he put in place this kid broke.  He even caught the boy on the computer at like 2:30am in the morning.  He wanted to stop him.  When I found out it was a laptop.  I could not help but to laugh to myself.  I emailed him back and told him to put the computer in his bedroom, under the bed, or in the closet so his son would not have access to it.  Then ground the boy from using the computer for a while.  Clean the computer if it needs cleaned, update everything make sure the security software is always running, and if he brakes the rules about the security settings again then take the computer from him, and tell him he is not using it if he can't follow the rules.  The older the child, the longer the no access to computer. A few days later I got a email back thanking me.  He said it just didn't dawn on him to parent the child.  The boy was sixteen, and he just did not think to do this. Another household both parents emailed me to inform me that they had a problem just keeping track, and keeping the computers clean.  I can't imagine what this household was like.  All I can tell you is their house was a revolving door.  Teens from everywhere.  Mainly because their four children were in sports.  So they had all of their desktops in a central location.  But anyone could use them.  All of the computers had XP and Vista.  They asked for suggestions.   My suggestions were for all of the computers to have passwords on the teen accounts, and parents accounts.  The guest account would be locked down.  They could not download anything etc.  They would have the most limits on this account on each of the computers.  No one (their teens or themselves) could give out the passwords to their own accounts to anyone.  The only password that was given out was to the limited account.  Just in case someone was able to guess or find out their account passwords, it would be a good idea to change the passwords every 60 days on the teen accounts and every 30 days on the parents accounts.  Someone from the home would be at or around the desktops when in use by someone outside the home.  All accounts used a different desktop background too.  You just about have to have this rule when there are so many using the computer.  if need be, change the passwords more often.   It puts a strain on the household. But it is necessary.   This is just in case one of the visitors knows how to go around your security.  So if that account's security does end up being breached, you can check the time and date of the breech, and have a general idea of who did it. It's not fool proof.  But most don't know how to change all of, or how to breech the settings on the computer.  So naturally you can find out.   As for the different desktop backgrounds for each account... This is done so you will know which account they are logged into.  You need only to glance at the screen to know.  This family took this one step further though.  They put a picture on the guest account that was only available to the guest account, and not to the others.  They were able to give privacy to the guest, and be assured they were logged into the right account.  This same account used a certain theme as well.  They could see from across the room, or at the door which account they were logged into.   They had emailed me later on and said they only had trouble with one guest because of this set up.  They did not tell me what the problem was.  They just said they had to stop this one guest from using their computers.  Other than that.  It has worked for them having this setup.  Their computers are more secure than they ever have been.  But it also put a strain on the family.  Because they only used their account, and no one else's...  They had to become more aware of what they themselves were doing on their account.  There was restrictions as to what they could download, because of size of the download, and where the download was located on line.  They followed my rules for downloading WOT and siteadvisor as well.  This made them more aware of the potential danger on line.  A lot of it they did not realize was on the websites they visited.  But they were thankful for the setup because it has saved them several times.  They were already avid users of security software like firewalls, and anti-virus programs. But they changed out their anti-virus software because it was not doing a good job.  They were now happy. Which brings me to another example of another user that emailed me stating that her anti-virus software was just not catching the bad stuff.  Her computer was infected at least once every month or two months.  It is not important to tell you the name of the anti-virus software she was using, but just to inform you that you are not stuck with a anti-virus software if it is not working, then change to something else.  Many things can cause this.  It could be the what you have installed on your computer.  What browser you use.  What firewall you use.  Or the lack of steady updates from the anti-virus software vendor.  What ever the case you are not stuck to always use that anti-virus software.  Change to something else.  You can choose free, or pay.  But be sure that you give the software a free run before you buy first.  That includes firewalls.  If your computer slows down, crashes, or is not able to catch the bad stuff then move on to another security software.  Keep in mind also that certain security software does not play nice with other security software on certain Operating Systems all the time.  Sometimes security software will have glitches, that will just about ruin a computers performance, or ruin the security on your computer.   So if you have a new security software keep a eye out for glitches, rather if they are small or large.  There very well could be something going on in the back ground that you are not aware of.   Your computer should run better, or the same, not worse after installing security software.  Run a test to see how the software is performing too. Firewall test:  https://www.grc.com/x/ne.dll?bh0bkyd2 and anti-virus test: http://www.virusportal.com/com/downloads/down_run.shtml  This lady thought she had to use the software that was installed on her computer when she bought it.  This simply is not true.  The choice is yours, not the security vendor, nor the vendor you purchased your computer from.  The choice is always yours to change to a different vendor for ALL of your software that you need, or want.

Solving their problems was easy, some of them had a hard time accepting the truth.  Others, well let's just say they had a duh moment.   

Every day Many of the website businesses are working hard to screw you over.  Every day board meetings abound asking the all mighty important question of... "What will our users do if we expose their private data online?"  As soon as they say "yes lets do it!"  Advocates everywhere come out of the Internet abyss to cry foul after the trifle deed is carried out.  The users do the normal thing.  They rant, scream, cuss, rage, threaten, and troll the boards, comment sections, blogs, and email every Tom, Dick, and Sally they know about the situation, and what their readers need to do about it.  Then as soon as the advocates think they have the users "on their side" so to speak.  The users do a complete about face, and do nothing to stop the abuse of their data.  They just clean up the mess, and carry on.Their show looked good, until it came down to doing the right thing of showing Internet business just who was boss.   Maybe their rants looked good in text form on the many websites that have in the past picked up the topics on privacy discussion issues?  Maybe they wanted to "look good".  But when push came to shove, they did nothing.  Just a few thousand or so maybe more or less took action.  Then members took a rebound of even more users joining the social network.  Membership is up. Which has grown from a little over 400 million to the 500 million mark.  It was like they told the website... "There, there, everything is ok.  I forgive you for exposing my personal life to the whole world." Even though the fix was not given by the website staff, but by third party advocates trying their best to turn a wrong, into a right.  Helping the thousands, millions of social members to hide their private data from the masses.   The fixes came in a rush in just a few hours after the breech.  (I thank each and everyone one of you for providing the fix/tutorials.) But what does this say about the members?  Well... They either don't give a damn, or they have piss for brains.  Maybe both.  Whatever the case, the social site is stronger than ever.  It's like the breech of their data didn't faze them.  Maybe they have gotten use to all of these breeches?  There have been quite a few.  Many have made it to their snail mail addressed directly to them.  Laptops lost, or stolen, CDs misplaced, or stolen.  Databases hacked.  But this social network had none of this happen to them.  They deliberately opened up their user profiles for the whole world to see.   It could be as some suggested that they could not leave because they could not entice their family, friends, and business associates to follow them to another social website.  What ever the case you better believe that the social network studied, dissected, examined, tore apart every conceivable outcome that their users could of done to fight back after they exposed their profiles.  They knew they had their users in their pocket.  They knew, or had ball park figures of what the damage would, or could be.  They knew their social database consisted of a lot of loyal members, that would not leave because they could not get their friends to move also.  I bet they talked for months before they pulled their stunt.  They knew because users have not taken a stand against any website that breeched their privacy.  There never has been a mass exit of users from any type of website online after a major breech of privacy.   Not anything substantial enough to cause damage to the Internet business itself that caused the breech.Years, months, days from now if you’re on the Internet and your privacy is breeched by an online website once again.  You may get help.  But again... You may not get any help.  Because everyone knows that you can only cry wolf for so long.  Even the advocates grow tired of you.  They all think you don't care.  "Big Deal!"  "So what if my personal life is on the Internet."  It is only years later that you realize that one breech cost you dearly.  Because somewhere on the Internet is an archive of YOUR stupidity, YOUR drunken state, YOUR rant, in video, picture, text, or audio.   The upcoming new boss, or even a local place of membership...  wont stand idle and allow you to work for them, or be a member with them... because of your stupidity stunt that should of stayed private that they just happen to find on the Internet. So the next time someone pulls a stunt with your personal information.  Maybe you need to think twice before ignoring it.  Show them you ARE boss.  Unless you do, there will be more board meetings asking that important question of "what will the users do if we expose their personal data?" And it may not be a posh social website this time that spreads your personal information all over the Internet. It will happen because websites watch websites for trends, and outcomes. They watch and they learn.  Eventually they implement the same thing, or similar on their own websites. The question is "what have you learned? Have you learned anything?  Or do you still have piss for brains, and don't care? Will you let the next one do as they please with your private data?  Or will you take a stand, and fight back?  It's up to you.  You can make, or brake our privacy rights. Do nothing... Then you are really screwed.  Take a stand, and the Internet learns you will no longer take their sorry poor excuses.  Next time fight back by clicking on that un-subscribe button or link.  I don't want to hear a peep out of you until you have.  I am sick of the rants, screams, cussing, rages, threatening, and trolling of the boards.I know some of you will say they got what they deserved they never should of put their private info on the web in the first place.  But let’s be reasonable.  Today’s Internet is not the same as it was in the 90's even.  Today it is all about "sociability".

The bottom line is they let themselves down, they let the IT community down as well. What a shame.

weebit

Test Your Facebook Privacy Settings

When your privacy went south at Facebook many cried foul.  They had every right to cry foul.  But now you have a tool to make sure that your Facebook account is private, and as secure as it can be. 

According to Symantec, malware's million mark was reached in the latter portion of 2007(1).  In 2006 Microsoft released a report stating that for fifteen months their malware removal tool scanned and found 16 million instances of malicious software on 5.7 million unique Windows-based computers.(2) For the month of March 2010 1,456,524 give or take a few computers were infected.(3) Keep in mind this is just one report from a on-access scanner. Which literally means the anti-virus software was downloaded and installed and run a scan  for the first time which found the malware. For some time now I have checked the stats on what the malware is up too.  How much malware is there? How many computers were infected? How many websites?   ...So how many websites were infected? Sophos detected an average of roughly 5,000 infected Web pages a day for 2007.(4)  Then in 2008 they detected an average of around 15,000 infected Web pages a day. 79 percent of those 15,000 are legitimate websites. In 2008 Symantec observed an average of 75,158 active bot-infected computers per day.(5) Today Trend Micro reports 26,669 computers were scanned this past 24 hours, and found to be infected after a scan done by HouseCall, on-line virus scanner for PC. In the past thirty days Trend Micro's on-line scanner  HouseCall scanned and found 16,488,049 infected computers.(6) That number is rising every second you read this article. Kaspersky noted In 2009, the system for analyzing vulnerabilities identified 404 different vulnerabilities, and a total of 461,828,538 vulnerable files and applications were detected on users’ computers. They analyzed the 20 most common vulnerabilities, which made up 90% (415,608,137) of all vulnerable files and applications identified on computers running their anti-virus software.(7) The number of computers infected with Conficker.A or Conficker.B dropping from a high of around 6.7 million in late October 2009 to around 6.3 million machines in January 2010. The number of Conficker.C infections has declined from 400,000 computers in late October 2009 to roughly 280,000 in January 2010.(8)(9)

The number of malware (malicious software) samples that Symantec saw in 2009 was 71% higher than in 2008. In total, Symantec identified almost 2.9 million items of malicious code during that 12 month period. (10) Amazing?  I just wanted you to see some numbers here so you could grasp somewhat of a count.  Keep in mind that I just gave you stats from just a few websites over a few years. It is no where near the total for all infected computers.  It does not give a accurate count on total on-line, and on-access scans for ALL computers active on the Internet today, and a few years past. Plus at any time the number of malware can change.  You are just seeing a small percentage of the amount of infected computers online. You need to see these numbers because, just having someone tell you to keep your computer secure is not enough.  Today's computer users are vast.  You are always a target.  Regardless if you are reading e-mail, or visiting a webpage you are at risk. This also is regardless if the e-mail or website you are visiting or reading has a good reputation or not. It does not matter. YOU are a target. YOU need to have a secure computer.  Security list links: http://newbies-pc.com/8896/index.php?option=com_content&view=article&id=91:security-links-a-must-have&catid=47:security Some of these links are pdf files (1)http://www.computerworld.com/s/article/print/9075518/Malware_count_blows_past_1M_mark (2)http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html (3)http://www.securelist.com/en/analysis/204792106/Monthly_Malware_Statistics_March_2010 (4)http://www.toptechnews.com/story.xhtml?story_id=59415 (5)http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf (6)http://wtc.trendmicro.com/wtc/default.asp (7)http://www.securelist.com/en/analysis/204792101/Kaspersky_Security_Bulletin_2009_Statistics_2009 (8)http://www.computerworld.com/s/article/9145018/Conficker_worm_hasn_t_gone_away_Akamai_says? (9)http://www.confickerworkinggroup.org/wiki/pmwiki.php/ANY/InfectionTracking (10)http://news.bbc.co.uk/2/hi/technology/8630160.stm

This is a overview of the Windows Operating Systems Security features.  Windows XP was not added to this because I wanted to concentrate on just the two newest Windows Operating Systems.  This is just a short review nothing elaborate.  Keep in mind I have access to a Vista computer, but no access to a Windows 7 computer.  My report comes from observations online, and from computer users themselves.    

Ad-aware (Aims at Adware/Spyware.) http://www.lavasoftusa.com/ SpybotSD Aims for the dialers, trojans, hijackers and security/privacy issues. http://www.safer-networking.org/ Spyware Blaster http://www.wilderssecurity.net/spywareblaster.html A-spy For trojans hiding in startup entries. http://vipmeister.com/dl/aspy/aspy.html StartupList, HijackThis and CoolWebShredder http://www.merijn.org/files/hijackthis.zip http://www.merijn.org/files/cwshredder.zip http://www.merijn.org/cwschronicles.html http://www.merijn.org/htlogtutorial.html Info on above and more. http://www.generation.net/~hleboeuf/spyware.htm Parasites: Cookies, Dialers, Keyloggers, Trackers http://www.generation.net/~hleboeuf/bhoindex.htm ~ Spyware Information ~ http://www.mvps.org/inetexplorer/Darnit.htm http://www.cexx.org/adware.htm http://www.mvps.org/winhelp2002/unwanted.htm Online Antivirus scanners: ================ http://housecall.trendmicro.com/housecall/start_corp.asp http://www.kaspersky.com/remoteviruschk.html http://www3.ca.com/virusinfo/virusscan.aspx http://security.symantec.com/sscv6/default.asp http://www.pandasoftware.com/activescan/activescan.asp http://us.mcafee.com/root/mfs/default.asp http://commandondemand.com/eval/index.cfm http://www.ravantivirus.com/scan/ http://www.bitdefender.com/scan/licence.php http://www.drweb-online.com/en/online_check.asp http://www.pcpitstop.com/antivirus/default.asp http://scan.sygatetech.com/prestealthscan.html Anti-virus programs: (not in any type of order) -------------------- KAV (Kaspersky) http://www.kaspersky.com/ eZ Antivirus (Computer Associates) http://www.my-etrust.com/products/Antivirus.cfm Vet (Computer Associates) http://www.vet.com.au/html/products/index.html Sophos http://www.sophos.com/products/software/antivirus/ nod32 http://www.nod32.com/ Norton http://www.symantec.com/nav/

Comodo http://www.comodo.com/home/internet-security/free-internet-security.php

ADVANCED does not mean that newbies should not read these pages outlined below. Read them because I say to read them regardless if you know what they are discussing or not. One day you will pick up on this, and you will already have a some what general idea of what the content is, and you will pick up on it very quickly. Far better to read these pages than to keep yourself in the dark. So don't ignore them. Some of these page are geared towards a regular user. Others are geared towards a ADVANCED user, and the Professional. The pages are just some I came across, that I thought others may like to read. Post a comment if you have questions, or a new link to add. Some ideas on a few pages may ruffle a few feathers. I don't expect you to agree with everything they say. But before you get hot under the collar, do some research on it first. Then post your research , along with your reason for disagreeing. Installing the first three anti-spyware software is a personal preferance. I say to do this because just like some anti-virus software can miss some viruses, so can anti-spyware vendors miss a few. Center for Internet Security - Standards http://www.cisecurity.org/ http://www.cert.org/ http://isc.incidents.org/ ANS Top 20 Vulnerabilities - The Experts Consensus http://www.windowsecurity.com/ http://www.sans.org/top20/ http://www.security-forums.com/index.php http://www.securityfocus.com/ http://samspade.org/ http://www.itsecurity.com/ http://www.governmentsecurity.org/ http://www.bbb.org Federal Trade Commission - Consumer Information Security http://www.ftc.gov/bcp/conline/edcams/infosecurity/ Home PC Firewall Guide http://www.firewallguide.com/ Excellent page for everyone Internet Security Tips http://www.mbna.com/netaccess/mbnaspotlight.html LINKS http://www.isr.net/2005/NP01/cert_cybercrime.html http://www.onlyreviews.com/index.html honest opinions on internet oportunities keep in mind that just because they get a review here check with the BBB and get their two cents worth also. Regardless of how good/bad the review looked it still could be biased. http://www.secinf.net/ Network Security Library http://www.bbb.org/wise/index.asp The Wise Consumer: Online Newsletter

A good majority of people will do a search, and click on the first couple links of the search results.  Other's may go through two or three pages of search results. Many are unaware that search results are unbiased when it comes to secure content.  They only need to contain the "right" search terms. This doesn't mean that you should avoid search engines.  But you should pretty much have a idea if the URL you are fixing to click is from a reputable website, or from a website out to do you, or your computer harm.   

 This is a extensive list of tips to help you protect your computer against viruses.  No method is 100% secure, but this should really help you cut back on them, or even have large breaks in-between infections.  I follow these rules my self, but most call me a pro, but I consider myself as self taught, and somewhat wise.  I have not had a virus in nine years.  (knock on wood)

 

 

Botnets are computers that are controlled by remote.  In late 1999 Sans Institute researchers noticed remote executable code on thousands of Windows computers. They also found that the code was encrypted, and they were not able at that time to find out exactly what the code was used for.  In February of 2000 the controlled computers launched a DDoS attack, many sites online like eBay were attacked and lost the internet connection, or had major slow downs off and on for a week trying to defend themselves because of the attack.  Amazon was also attacked that week along with other high profile business websites.    

I have seen many that use all kinds of social networks online.  What follows is just my point of views, and observations on this subject / topic.

These are just a few tips for the members. :) Occasionally I do post just random tips.  They fit in no one type category.  Just browse through them, and pick out your favorites. 

When you buy a computer it is no different than when you purchase a car, or any other big ticket item.  You always check the integrity of the car. How well the car does, gas mileage, style, seating, engine, etc.  You want the most bang for the buck you spend, and certain options are a must like power breaks and a/c. A computer is no different. With a computer you check the integrity of the parts, (hardware), software, and the Operating System, make sure you will be able to carry out the important aspects of the things that matter to you the most when you log on to your computer, etc. Plus make sure your computer is secure as possible.
There will come a time that you will install a Windows Update, and the update wont play nice with your computer.  If it starts to act up on day one of the install, then this is the time to remove it.  Some updates just get worse as you restart, or boot your system.  So act as soon as you spot trouble. 

For those not knowing .  Here is a eye view of one in action. Be sure to visit the link also.  They have quite a bit of good information on this topic. 

 Here is the video on youtube http://www.youtube.com/watch?v=zxytdLwDLqg  or visit the link below. 

A live Twitter phishing attack from Sophos Labs on Vimeo.

 

Children love the computer. They will log on and stay on the computer all the time, or take up another users time unless you limit their use of the computer this can cause many headaches for family's. As I have said in the past, place the computer in a high traffic area of your home. Never allow a child, or even a teenager to have a computer in their bedrooms. Or permit them to have access to a computer that is placed in a private area of your home. This is really asking for trouble. Preditors are all over the internet, waiting for the opportunity to exploit your child(ren). Preditors are pros, and know what buttons to push.

 

 Years ago your password did not amount to much.  You could use your pet's name, child's, wife, or husband, and get away with it.  But today there are just too many password crackers out there waiting for you to be none creative.  They want you to be lazy so they can use a password cracker software to crack your password in less than two minutes.  With today's computers having 4gb of Ram, and more than one processor, you just are making their life more easier to get to your personal account.  You could be even opening a door up, so they have access to your wireless service.  You can't be lazy anymore.  You have to be creative, and make strong passwords. Thus I created this page to help you protect your personal accounts, files, wireless connections, etc.  Take this seriously, because you never know if someone is after your lifestyle, your livelihood, you could even wake up tomorrow, and find that your identity is gone.

So your computer got infected and you are not too sure how it happened? This can happen to the best of us.  But here are the main reasons as to why.

My son-in-law bought a laptop, This is his first one. He wanted the flexibility to be able to work from any location in his home instead of being tied to a desk. So,  he had to learn about setting up a wireless network so he could use the laptop in the living room, out in the yard, or anywhere that he wanted.If you don't take security precautions others can tap into your home network quite easily. Here are the top eight tips for keeping your home network safe.

In the 1970's or somewhere in there the Creeper Virus was launched.  On a US military computer network which was the forerunner to our modern Internet. The virus was written for the Tenex operating system. The infected computers displayed a scroll across the screen that said:  I'M THE CREEPER : CATCH ME IF YOU CAN

<< Start < Prev 1 2 Next > End >>