Welcome!

Welcome!

Saturday, August 7, 2010

Beware of Certain Entrecard & Adgitize Badge-Bearing Blogs

There are some blogs in the Entrecard and Adgitize programs that harbor dangerous virus and trojans. You may have seen the warning that Google sometimes places with a selection that the website may not be safe? Well, that warning does NOT appear on these renegade blogs, when you Google them.

I ran across one written by a well-known "troublemaker" in both Adg & EC. Once you're on his blog a program secretly downloads onto your computer and installs an "Anti Virus" program. A small icon may or may not appear on your toolbar. It will sit quietly, until you activate it by going to one of his other blogs! Here's what to do: hit ctrl+alt+delete and on your task manager simply kill firefox.exe or explorer or whatever your browser is. Don't go back to that blog! Other blogs leave a cookie on your PC so that if you re-visit them, a trojan silently loads on your computer! BE CAREFUL! These are trusted blogs that have been around for awhile. Sorry, can't name names, but if you're smart you'll figure it out!.

How to Implement Layered Security for Your Computer

Layer 1 is a personal firewall. A personal firewall is a software program installed on your computer that controls access to everything that enters or attempts to leave your computer. Think of it as having your own personal security guard at your house and he asks you for permission to let anyone enter the house or leave the house. You can purchase a firewall for under $50 but you can get some excellent firewalls free. I personally like the Comodo Personal Firewall or the Zone Alarm firewall.

Layer 2 is antivirus software. Antivirus software is another program installed on your computer that inspects the data on your computer for viruses, trojans and keyloggers. It does this by comparing the files on your computer with a known list of bad software aka signatures. The antivirus program also inspects data entering and leaving your computer, checks for virus signatures or uses an algorithm to detect suspicious data packets. You can purchase antivirus software, but again you can also get some very good antivirus programs for free. I like Avira Antivirus and Avast Antivirus. Don't use AVG Free, the free version does not offer "rootkit" protection which is a very common area of exploitation.

Layer 3 is protection from Spyware, Malware and Adware. These programs inspect data entering and leaving your computer and checks for known bad software signatures. If you are using Windows XP or Vista, then you are already running Windows Defender and are covered. If you would like additional protection you can download free programs such Adaware, Spybot Search & Destroy and Malwarebytes Anti-Malware.

Layer 4 is to make sure you are running Windows update on a weekly basis to ensure you have the latest security patches for your operating system. You must also check for weekly updates on each of the products you installed in the previous three layers. Most programs have a scheduling option so you can set it and forget it.

Layer 5 is scanning. You must ensure each of the products installed in the first three layers run a scan weekly. Again, most programs have a scheduling option so you can set it and forget it.

Layer 6 is passwords. All security threats don't necessarily come from the internet. Make sure the password you use to log on to your computer is not an easy one to figure out. Make sure the password contains a mix of upper and lower case letters, at least one number and a special character such as !, #, &,_ or *. Do not use your computer password for any online programs such as email, Facebook, bank accounts, etc... And if you use your computer in public places like a library or coffee shop, you will need to change it often. You would be surprised how many passwords and pin numbers get intercepted by bad guys looking over your shoulder.
(Bukisa ID #104889)

Content Source: How to Implement Layered Security for Your Computer - Bukisa.com

4 comments:

Gee said...

Uh-oh, I hope you could name names of just give us hints. Thanks!!

Anonymous said...

A popular grain.

Healthy Fitness Ideas said...

This is good advice. But malicious blogs can be reported to EC and Adg. and get banned, right? If Trojan software were being installed, wouldn't that threaten the whole visitor system that EC is built on?

Anonymous said...

The blogger in question is sneaky and tricky - knows when someone just downloaded a virus, so take sit out of the scipt for a few hours or days - sometimes you'll get a re-direct, sometimes a virus, this person has a lot of time and nothing to do but tinker with the blog. When EC or Adg checks it, it's fine.

Post a Comment

Be careful what you type : all IP addresses are being logged!

The 15 Commandments of Blogging

Ask yourself: WHAT SETS MY BLOG APART FROM MILLIONS OF OTHERS? Hold that thought. Come up with anything good? CLICK HERE! THIS IS HOW YOU DO IT!

Popular Posts