Quote:
I have to say most comunities I see have similar allready posted, theres likely to be thousands of them kicking about, some better some not, yours is the first post I have ever seen which just offers some tips and is actually copyrighted. Your choice of course and you can understand someone being annoyed if someone has copyied word for word but I really think this is somewhat OTT. Why dont you just add a copyright to your sig, then you would cover every post you make. I say this because you could very easily come accross one of those other guides which may not be older and looks very similar and I would dread to think you would really try to sue someone for something they may actually not have done. Im guessing next, when anyone who recomends using one of the softwares you have chosen to mention after reading your post will also have to credit your post as the original source ? </end sarcasm> By the way I have used amongst some others spybot S & D for some time and there are regular updates. Avast is a very good free AV package with excellent live protection, unlike AVG free edition. Shorewall is an excellent firewall as your main entry blockade (sorry not for windows users), and then you can use other firewalls on your internal computers if you so wish. Its not just about having closed ports, a closed port will tell a hacker that a computer exists at the address, (when a hacker locates a computer they then scan for anything open, its one of those situations where any hole will do), a port in stealth mode will slow down a scan on your IP and give away nothing about a computer in existence. You should also ensure that your internet entry unit never responds to any form of ping, (unless you need it to for a specific reason, but thats the same as using an open port). |
Yes very useful, thanks
|
Thanks for the info!!!
|
Quote:
With regards to browsers, IE has the most vulneralbilities because it is most widely used. It's the same argument between Microsoft and open source; the PC and Mac. While the tools we use are important it is how we use them that plays a bigger role. |
Quote:
I suggest you start reading these three blogs: Benjamin Edelman, Spyware Warrior, and Vitalsecurity.org. Then check out this list: http://research.pestpatrol.com/search/browse.aspx (see the first definition? Adware 628 types) Pick one like 180Solutions and read what it loads onto your machine. Quote:
Adware is actually MORE dangerous than spyware and malware. YOU KNOW where they are coming from, you don't on the adware. Liz |
Just with a "hacker" the definition of "Adware" got twisted in the mix. What you're defining is "Spyware".
|
changed to firefox now . thanx for the help
|
Yup, and i found the software in googles software pack to be helpful as well
|
Hi all
I hope you can help me. when i turn on my pc normaly it displays cpu tem system spec ect and after this it loads windows but recently when i turn it on the lights on the base unit come on but nothing apears on screen no system specs nothing. could you please tell me what is wrong with my pc. THANK you |
Everything is acceptable but Trojan horse make me very nervous. I think somebody upgrading that Trojan garbage it could bug us all time long.
|
All times are GMT. The time now is 06:56 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2024, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|