|
TIPS FOR YOUR PROTECTION (Community)
TIPS FOR YOUR PROTECTION // Community
Mar 10, 2004, 1:09pm
TIPS FOR YOUR PROTECTION
Hi everyone. Please read these tips, in case there is something here that
you are not aware of. These are tips to help stop the spread of viruses and
spam. Remember that you will not only be protecting yourself, but the
people that you have in your address book.
1. PLEASE PUT ALL EMAIL ADDRESS IN THE BCC SECTION AND NOT THE "To:" or the
"CC:" section. Using the Bcc: keeps all email addresses unknown to other
mail recipients. Please keep in mind that when other people's email
addresses are visible and accessible, they can easily be passed along from
one forward to another, and may end up on someone's computer that could have
a trojan (worm or virus) or spyware, and then these peoples addresses get
collected and end up getting unwanted things sent to them. It's up to each
individual to protect not only themself but any email friends.
To use the BCC: if it is not activated yet in your email, go up to "VIEW"
and click on "Show Bcc:", then that tab will appear in your email. Now you
can use that and put as many names as you want in there, each person in the
BCC will get the email, and it will not show any other names or addresses in
the email. You will notice that when Bcc has been used, you may notice the
words undisclosed recipients which is for the protection of each person
emailed.
2. Refrain from using the greeting card sites and putting in friends and
your own email addresses. If you want to send someone a birthday wish,
etc., cut, copy and paste the card, etc., into an email. Please do not use
their services by filling out the "send to" page. When you complete these
pages with addresses, these sites are major spammers. They are usually
affiliated with many other sites, and you will start to get spam from
companies and web sites that you have never even visited. Believe me, I
learned the hard way, and had to go shut down my email address, and get a
new one. If it's a flash that you want to send, you can copy the flash file
out of your temporary internet files folder (go to internet options, view
files, then copy the file to your desktop).
3. FILE SHARING PROGRAMS LIKE KAZAA you should think very hard before
using these programs. It's not just a decision, its a risk that if you are
willing to take, you may have to deal with some consequences. I know many
people that have received files that had viruses, files that were corrupt,
etc. Even a corrupt file can cause havoc with your operating system.
Remember that when you use these programs, you are downloading music and
files from peoples computers. You don't know the person, and it may very
well be someone who may not update their virus protection, they may not take
care of their system period, and they may not even have virus protection
period. You just don't know what you're getting. All it takes is one bad
file to screw up your computer and cost you money trying to get it fixed.
4. Downloading Software for free: Keep in mind that when you normally have
to pay for something, but you find it somewhere for free, you take your
chances with these. There are many sites that you can obtain software from,
and many times, there isn't a problem with any of it, other times, there is.
I am just saying that you take your chances, so be careful. Personally, I
have found that sites that contain any porn, you are best to stay away from
them entirely. They tend to be full of viruses. When in doubt......do
without.
5. When passing along an interesting email on to another, copy and paste
the email into another,and remove all of the forward signs and forwarded
addresses. Some people attach the email, and sometimes you have to open an
attached email, then open another email, which personally, is not only a
pain in the butt, but, it makes you weary if the attachment may contain any
worms/viruses. Emails can leave your computer without one, and pick up a
hitchhiker along the way. Personally, I do not open attached emails any
more, so if it's something you want me to read or see, copy and paste the
information into the main email. If I get an email, where the attachment is
an envelope, I just delete it. You can make your own call on that one, I'm
just telling you what I do.
6. Also as an added safety feature, even though Norton scans your email, if
there are attachments, I find it best to save them, then scan them again.
7. Please check the addresses always of what you receive. Certain
viruses/worms will mimic someone's address, but if you look close enough,
you will see an error in the address, if it is coming from an unknown
source. If you receive unexpected emails from what appears to be Microsoft,
or any corporation like that, unless you were expecting it, don't open it.
Some virus and worms that get emailed out will use popular names of
companies in hopes that you will open them. Many times they even use your
servers name.
8. There are a ton of hoaxes going around out there. These tend to come
from spammers trying to get address lists. Please don't pass these along.
You are only making the spammers methods of obtaining address lists more
successful. There are several sites that you can check out whether its a
hoax. When wanting to find this out, in your search engine, type part of
the email. For example, the email regarding the baby needing the
transplant, and stating that AOL will donate 5 cents for every email sent,
well this is a hoax, and if you typed "......needing a transplant, aol etc.,
you will get this turn up. Just be creative when doing your search and you
will be successful. Put the main facts in the search engine. One hoax that
I have seen more times than I could count, is regarding the budweiser frogs
screensaver. This is also a hoax.
9. As for virus warnings, if you receive any from friends, check them out
with Symantec or whichever virus protection site you trust and use. Hoaxes
can be just as bad and annoying as an actual virus.
10. In addition to my Norton doing its daily scans, and live update, I do
manual updates different times within each day. If it were to check in the
morning, there just may be new definitions by that evening. I have seen
that many times. It only takes a few seconds on high speed.
11. Make sure your windows operating system has all of its updates. Please
check yourself manually in addition to its scheduled checks. Patches that
are required can prevent you from being attacked.
12. In regards to some of the fun things you can install on your computer,
be careful in the way that some of them cause conflicts with XP. You are
suppose to try to avoid installing any unnecessary little things on your
system.
13. THIS ONE IS IMPORTANT: STAY AWAY FROM GATOR AND THE BONZI BUDDY. Once
you have these installed they are a bugger to remove. Even after
uninstalling them, they leave behind files in the registry etc., that causes
the program's spyware to reinstall itself if you visit any participating
sponsors of these websites.
Mar 10, 2004, 2:10pm
13. USE A CONDOM WHEN HAVING SEX.
--
Brock,
IceFlare Network
Founder/Administrator
http://www.iceflare.net
[View Quote]"ciena" <nikona at comcast.net> wrote in message
news:404f2f8e$1 at server1.Activeworlds.com...
> TIPS FOR YOUR PROTECTION
>
>
> Hi everyone. Please read these tips, in case there is something here that
> you are not aware of. These are tips to help stop the spread of viruses
and
> spam. Remember that you will not only be protecting yourself, but the
> people that you have in your address book.
>
> 1. PLEASE PUT ALL EMAIL ADDRESS IN THE BCC SECTION AND NOT THE "To:" or
the
> "CC:" section. Using the Bcc: keeps all email addresses unknown to other
> mail recipients. Please keep in mind that when other people's email
> addresses are visible and accessible, they can easily be passed along from
> one forward to another, and may end up on someone's computer that could
have
> a trojan (worm or virus) or spyware, and then these peoples addresses get
> collected and end up getting unwanted things sent to them. It's up to
each
> individual to protect not only themself but any email friends.
>
> To use the BCC: if it is not activated yet in your email, go up to "VIEW"
> and click on "Show Bcc:", then that tab will appear in your email. Now
you
> can use that and put as many names as you want in there, each person in
the
> BCC will get the email, and it will not show any other names or addresses
in
> the email. You will notice that when Bcc has been used, you may notice
the
> words undisclosed recipients which is for the protection of each person
> emailed.
>
> 2. Refrain from using the greeting card sites and putting in friends and
> your own email addresses. If you want to send someone a birthday wish,
> etc., cut, copy and paste the card, etc., into an email. Please do not
use
> their services by filling out the "send to" page. When you complete these
> pages with addresses, these sites are major spammers. They are usually
> affiliated with many other sites, and you will start to get spam from
> companies and web sites that you have never even visited. Believe me, I
> learned the hard way, and had to go shut down my email address, and get a
> new one. If it's a flash that you want to send, you can copy the flash
file
> out of your temporary internet files folder (go to internet options, view
> files, then copy the file to your desktop).
>
> 3. FILE SHARING PROGRAMS LIKE KAZAA you should think very hard before
> using these programs. It's not just a decision, its a risk that if you
are
> willing to take, you may have to deal with some consequences. I know many
> people that have received files that had viruses, files that were corrupt,
> etc. Even a corrupt file can cause havoc with your operating system.
> Remember that when you use these programs, you are downloading music and
> files from peoples computers. You don't know the person, and it may very
> well be someone who may not update their virus protection, they may not
take
> care of their system period, and they may not even have virus protection
> period. You just don't know what you're getting. All it takes is one bad
> file to screw up your computer and cost you money trying to get it fixed.
>
> 4. Downloading Software for free: Keep in mind that when you normally
have
> to pay for something, but you find it somewhere for free, you take your
> chances with these. There are many sites that you can obtain software
from,
> and many times, there isn't a problem with any of it, other times, there
is.
> I am just saying that you take your chances, so be careful. Personally, I
> have found that sites that contain any porn, you are best to stay away
from
> them entirely. They tend to be full of viruses. When in doubt......do
> without.
>
> 5. When passing along an interesting email on to another, copy and paste
> the email into another,and remove all of the forward signs and forwarded
> addresses. Some people attach the email, and sometimes you have to open
an
> attached email, then open another email, which personally, is not only a
> pain in the butt, but, it makes you weary if the attachment may contain
any
> worms/viruses. Emails can leave your computer without one, and pick up a
> hitchhiker along the way. Personally, I do not open attached emails any
> more, so if it's something you want me to read or see, copy and paste the
> information into the main email. If I get an email, where the attachment
is
> an envelope, I just delete it. You can make your own call on that one,
I'm
> just telling you what I do.
>
> 6. Also as an added safety feature, even though Norton scans your email,
if
> there are attachments, I find it best to save them, then scan them again.
>
> 7. Please check the addresses always of what you receive. Certain
> viruses/worms will mimic someone's address, but if you look close enough,
> you will see an error in the address, if it is coming from an unknown
> source. If you receive unexpected emails from what appears to be
Microsoft,
> or any corporation like that, unless you were expecting it, don't open it.
> Some virus and worms that get emailed out will use popular names of
> companies in hopes that you will open them. Many times they even use your
> servers name.
>
> 8. There are a ton of hoaxes going around out there. These tend to come
> from spammers trying to get address lists. Please don't pass these along.
> You are only making the spammers methods of obtaining address lists more
> successful. There are several sites that you can check out whether its a
> hoax. When wanting to find this out, in your search engine, type part of
> the email. For example, the email regarding the baby needing the
> transplant, and stating that AOL will donate 5 cents for every email sent,
> well this is a hoax, and if you typed "......needing a transplant, aol
etc.,
> you will get this turn up. Just be creative when doing your search and
you
> will be successful. Put the main facts in the search engine. One hoax
that
> I have seen more times than I could count, is regarding the budweiser
frogs
> screensaver. This is also a hoax.
>
> 9. As for virus warnings, if you receive any from friends, check them out
> with Symantec or whichever virus protection site you trust and use.
Hoaxes
> can be just as bad and annoying as an actual virus.
>
> 10. In addition to my Norton doing its daily scans, and live update, I do
> manual updates different times within each day. If it were to check in
the
> morning, there just may be new definitions by that evening. I have seen
> that many times. It only takes a few seconds on high speed.
>
> 11. Make sure your windows operating system has all of its updates.
Please
> check yourself manually in addition to its scheduled checks. Patches that
> are required can prevent you from being attacked.
>
> 12. In regards to some of the fun things you can install on your
computer,
> be careful in the way that some of them cause conflicts with XP. You are
> suppose to try to avoid installing any unnecessary little things on your
> system.
>
> 13. THIS ONE IS IMPORTANT: STAY AWAY FROM GATOR AND THE BONZI BUDDY.
Once
> you have these installed they are a bugger to remove. Even after
> uninstalling them, they leave behind files in the registry etc., that
causes
> the program's spyware to reinstall itself if you visit any participating
> sponsors of these websites.
>
>
|
Mar 10, 2004, 2:10pm
14...rather
--
Brock,
IceFlare Network
Founder/Administrator
http://www.iceflare.net
[View Quote]"brock" <BrockL at iceflare.net> wrote in message
news:404f3e01$1 at server1.Activeworlds.com...
> 13. USE A CONDOM WHEN HAVING SEX.
>
> --
> Brock,
> IceFlare Network
> Founder/Administrator
> http://www.iceflare.net
>
>
> "ciena" <nikona at comcast.net> wrote in message
> news:404f2f8e$1 at server1.Activeworlds.com...
that
> and
> the
other
from
> have
get
> each
"VIEW"
> you
> the
addresses
> in
> the
and
> use
these
a
> file
view
> are
many
corrupt,
very
> take
bad
fixed.
> have
> from,
> is.
I
> from
paste
> an
> any
a
the
attachment
> is
> I'm
email,
> if
again.
enough,
> Microsoft,
it.
your
come
along.
a
of
sent,
> etc.,
> you
> that
> frogs
out
> Hoaxes
do
> the
> Please
that
> computer,
are
> Once
> causes
>
>
|
Mar 10, 2004, 3:31pm
[View Quote]
> TIPS FOR YOUR PROTECTION
>
<snip>
Very good setup. I would add that if you can manage it, use some kind of firewall like ZoneAlarm Free <http://www.zonelabs.com/store/content/home.jsp> or Kerio's Personal Tiny firewall <http://www.kerio.com/us/kpf_download.html>.
There are several available on the net free (and they are really free versions!!).
As for emails - if you have some complains - save the headers with it so the people who handles it can decipher what's going on (at least for some level).
E.g. - several people get the virus maskarading my server (please not that it is a mail sent to me):
From - Mon Mar 01 21:40:16 2004
Return-path: <3fbbcd05 at news.andras.net> // again a faked return path - the virus software can insert this header
Received: from andras.net (pcp01466071pcs.lpaxtn01.pa.comcast.net [68.82.250.15]) - this is a very important header. It claims the message came from "andras.net" but in the brackets you can clearly see it came from an absolutely different machine (from comcast - which is in the US, not in Hungary)
by andras.net (andras.net [194.152.129.221]) // this is the receiving mail server, your one will be different
(MDaemon.PRO.v6.8.5.R) // those are mail server specific headers YMMV
with ESMTP id 21-md50000000038.tmp
for <andrass9 at andras.net>; Mon, 01 Mar 2004 21:19:47 +0100
From: 3fbbcd05 at news.andras.net // the From header is easy to forge - just insert into your mail client a different email address for the sender
To: andras at andras.net // this is supposed to be your address
Subject: Re: Word file // some random subject line
Remember: Never open any attachment you are not expecting to receive from a reputable source!!!
The latest viruses are spread by people opening blindly the attachments - the are not using any program flaws - just flaws in human nature (curiosity factor?) .
FU set to community
--
Andras
"It's MY computer" (tm Steve Gibson)
Mar 10, 2004, 5:25pm
Oh!!! Now you tell me! I had to reformat my computer EVERY DAY because
someone would email me a "kewl game" or "the file you asked for" and I'd
HAVE to open it, even though it was a 5k exe file and claimed to be the
half life source code. You mean I'm allowed to delete ultra obvious
viruses? Ha what next, you'll tell my I'm allowed to disable scripting in
IE?
Mar 10, 2004, 9:31pm
These are really good, would it be okay if I put these on a webpage (and
giving you credit, of course)? :)
Ryan
Citizen #323279
[View Quote]ciena wrote:
> TIPS FOR YOUR PROTECTION
>
>
> Hi everyone. Please read these tips, in case there is something here that
> you are not aware of. These are tips to help stop the spread of viruses and
> spam. Remember that you will not only be protecting yourself, but the
> people that you have in your address book.
>
> 1. PLEASE PUT ALL EMAIL ADDRESS IN THE BCC SECTION AND NOT THE "To:" or the
> "CC:" section. Using the Bcc: keeps all email addresses unknown to other
> mail recipients. Please keep in mind that when other people's email
> addresses are visible and accessible, they can easily be passed along from
> one forward to another, and may end up on someone's computer that could have
> a trojan (worm or virus) or spyware, and then these peoples addresses get
> collected and end up getting unwanted things sent to them. It's up to each
> individual to protect not only themself but any email friends.
>
> To use the BCC: if it is not activated yet in your email, go up to "VIEW"
> and click on "Show Bcc:", then that tab will appear in your email. Now you
> can use that and put as many names as you want in there, each person in the
> BCC will get the email, and it will not show any other names or addresses in
> the email. You will notice that when Bcc has been used, you may notice the
> words undisclosed recipients which is for the protection of each person
> emailed.
>
> 2. Refrain from using the greeting card sites and putting in friends and
> your own email addresses. If you want to send someone a birthday wish,
> etc., cut, copy and paste the card, etc., into an email. Please do not use
> their services by filling out the "send to" page. When you complete these
> pages with addresses, these sites are major spammers. They are usually
> affiliated with many other sites, and you will start to get spam from
> companies and web sites that you have never even visited. Believe me, I
> learned the hard way, and had to go shut down my email address, and get a
> new one. If it's a flash that you want to send, you can copy the flash file
> out of your temporary internet files folder (go to internet options, view
> files, then copy the file to your desktop).
>
> 3. FILE SHARING PROGRAMS LIKE KAZAA you should think very hard before
> using these programs. It's not just a decision, its a risk that if you are
> willing to take, you may have to deal with some consequences. I know many
> people that have received files that had viruses, files that were corrupt,
> etc. Even a corrupt file can cause havoc with your operating system.
> Remember that when you use these programs, you are downloading music and
> files from peoples computers. You don't know the person, and it may very
> well be someone who may not update their virus protection, they may not take
> care of their system period, and they may not even have virus protection
> period. You just don't know what you're getting. All it takes is one bad
> file to screw up your computer and cost you money trying to get it fixed.
>
> 4. Downloading Software for free: Keep in mind that when you normally have
> to pay for something, but you find it somewhere for free, you take your
> chances with these. There are many sites that you can obtain software from,
> and many times, there isn't a problem with any of it, other times, there is.
> I am just saying that you take your chances, so be careful. Personally, I
> have found that sites that contain any porn, you are best to stay away from
> them entirely. They tend to be full of viruses. When in doubt......do
> without.
>
> 5. When passing along an interesting email on to another, copy and paste
> the email into another,and remove all of the forward signs and forwarded
> addresses. Some people attach the email, and sometimes you have to open an
> attached email, then open another email, which personally, is not only a
> pain in the butt, but, it makes you weary if the attachment may contain any
> worms/viruses. Emails can leave your computer without one, and pick up a
> hitchhiker along the way. Personally, I do not open attached emails any
> more, so if it's something you want me to read or see, copy and paste the
> information into the main email. If I get an email, where the attachment is
> an envelope, I just delete it. You can make your own call on that one, I'm
> just telling you what I do.
>
> 6. Also as an added safety feature, even though Norton scans your email, if
> there are attachments, I find it best to save them, then scan them again.
>
> 7. Please check the addresses always of what you receive. Certain
> viruses/worms will mimic someone's address, but if you look close enough,
> you will see an error in the address, if it is coming from an unknown
> source. If you receive unexpected emails from what appears to be Microsoft,
> or any corporation like that, unless you were expecting it, don't open it.
> Some virus and worms that get emailed out will use popular names of
> companies in hopes that you will open them. Many times they even use your
> servers name.
>
> 8. There are a ton of hoaxes going around out there. These tend to come
> from spammers trying to get address lists. Please don't pass these along.
> You are only making the spammers methods of obtaining address lists more
> successful. There are several sites that you can check out whether its a
> hoax. When wanting to find this out, in your search engine, type part of
> the email. For example, the email regarding the baby needing the
> transplant, and stating that AOL will donate 5 cents for every email sent,
> well this is a hoax, and if you typed "......needing a transplant, aol etc.,
> you will get this turn up. Just be creative when doing your search and you
> will be successful. Put the main facts in the search engine. One hoax that
> I have seen more times than I could count, is regarding the budweiser frogs
> screensaver. This is also a hoax.
>
> 9. As for virus warnings, if you receive any from friends, check them out
> with Symantec or whichever virus protection site you trust and use. Hoaxes
> can be just as bad and annoying as an actual virus.
>
> 10. In addition to my Norton doing its daily scans, and live update, I do
> manual updates different times within each day. If it were to check in the
> morning, there just may be new definitions by that evening. I have seen
> that many times. It only takes a few seconds on high speed.
>
> 11. Make sure your windows operating system has all of its updates. Please
> check yourself manually in addition to its scheduled checks. Patches that
> are required can prevent you from being attacked.
>
> 12. In regards to some of the fun things you can install on your computer,
> be careful in the way that some of them cause conflicts with XP. You are
> suppose to try to avoid installing any unnecessary little things on your
> system.
>
> 13. THIS ONE IS IMPORTANT: STAY AWAY FROM GATOR AND THE BONZI BUDDY. Once
> you have these installed they are a bugger to remove. Even after
> uninstalling them, they leave behind files in the registry etc., that causes
> the program's spyware to reinstall itself if you visit any participating
> sponsors of these websites.
>
>
|
Mar 10, 2004, 10:09pm
put it on your webpage but dont give me credit. im sure it came from
somewhere else i just passed it on to u guys :)
[View Quote]"ryan" <temp1 at floridawolf.com> wrote in message
news:404fa540$1 at server1.Activeworlds.com...
> These are really good, would it be okay if I put these on a webpage (and
> giving you credit, of course)? :)
>
> Ryan
> Citizen #323279
>
> ciena wrote:
that
and
the
other
from
have
get
each
"VIEW"
you
the
addresses in
the
and
use
these
a
file
view
are
many
corrupt,
very
take
bad
fixed.
have
from,
is.
I
from
paste
an
any
a
the
attachment is
I'm
email, if
again.
enough,
Microsoft,
it.
your
come
along.
a
of
sent,
etc.,
you
that
frogs
out
Hoaxes
do
the
Please
that
computer,
are
Once
causes
|
Mar 10, 2004, 10:11pm
lol sorry . i would have sent it sooner but i just saw it myself from
another group.
[View Quote]"baro" <baronjutter at shaw.ca> wrote in message
news:404f6bb5$1 at server1.Activeworlds.com...
> Oh!!! Now you tell me! I had to reformat my computer EVERY DAY because
> someone would email me a "kewl game" or "the file you asked for" and I'd
> HAVE to open it, even though it was a 5k exe file and claimed to be the
> half life source code. You mean I'm allowed to delete ultra obvious
> viruses? Ha what next, you'll tell my I'm allowed to disable scripting in
> IE?
>
>
|
Mar 10, 2004, 10:29pm
This is great! With your permission I'd like to copy and paste this into an
email to send to some of my RL family and friends who are more puter
illiterate than I am (which is saying alot!! hahaha). I'm always getting
emails from them with not only those stupid "chain letters" but also a TON
of forwarded attachments which I just delete anyway. I mean TheLion and I
run scans on everything anyway, but why take the risk??? And if I get one
more email about that "social studies project" that some elementary school
is doing, ........or telling me if I forward a sappy friendship poem to
everyone in my address book to bring me good luck for the rest of my
life.....I'll puke on my keyboard. ;-"D
[View Quote]"ciena" <nikona at comcast.net> wrote in message
news:404f2f8e$1 at server1.Activeworlds.com...
> TIPS FOR YOUR PROTECTION
>
>
> Hi everyone. Please read these tips, in case there is something here that
> you are not aware of. These are tips to help stop the spread of viruses
and
> spam. Remember that you will not only be protecting yourself, but the
> people that you have in your address book.
>
> 1. PLEASE PUT ALL EMAIL ADDRESS IN THE BCC SECTION AND NOT THE "To:" or
the
> "CC:" section. Using the Bcc: keeps all email addresses unknown to other
> mail recipients. Please keep in mind that when other people's email
> addresses are visible and accessible, they can easily be passed along from
> one forward to another, and may end up on someone's computer that could
have
> a trojan (worm or virus) or spyware, and then these peoples addresses get
> collected and end up getting unwanted things sent to them. It's up to
each
> individual to protect not only themself but any email friends.
>
> To use the BCC: if it is not activated yet in your email, go up to "VIEW"
> and click on "Show Bcc:", then that tab will appear in your email. Now
you
> can use that and put as many names as you want in there, each person in
the
> BCC will get the email, and it will not show any other names or addresses
in
> the email. You will notice that when Bcc has been used, you may notice
the
> words undisclosed recipients which is for the protection of each person
> emailed.
>
> 2. Refrain from using the greeting card sites and putting in friends and
> your own email addresses. If you want to send someone a birthday wish,
> etc., cut, copy and paste the card, etc., into an email. Please do not
use
> their services by filling out the "send to" page. When you complete these
> pages with addresses, these sites are major spammers. They are usually
> affiliated with many other sites, and you will start to get spam from
> companies and web sites that you have never even visited. Believe me, I
> learned the hard way, and had to go shut down my email address, and get a
> new one. If it's a flash that you want to send, you can copy the flash
file
> out of your temporary internet files folder (go to internet options, view
> files, then copy the file to your desktop).
>
> 3. FILE SHARING PROGRAMS LIKE KAZAA you should think very hard before
> using these programs. It's not just a decision, its a risk that if you
are
> willing to take, you may have to deal with some consequences. I know many
> people that have received files that had viruses, files that were corrupt,
> etc. Even a corrupt file can cause havoc with your operating system.
> Remember that when you use these programs, you are downloading music and
> files from peoples computers. You don't know the person, and it may very
> well be someone who may not update their virus protection, they may not
take
> care of their system period, and they may not even have virus protection
> period. You just don't know what you're getting. All it takes is one bad
> file to screw up your computer and cost you money trying to get it fixed.
>
> 4. Downloading Software for free: Keep in mind that when you normally
have
> to pay for something, but you find it somewhere for free, you take your
> chances with these. There are many sites that you can obtain software
from,
> and many times, there isn't a problem with any of it, other times, there
is.
> I am just saying that you take your chances, so be careful. Personally, I
> have found that sites that contain any porn, you are best to stay away
from
> them entirely. They tend to be full of viruses. When in doubt......do
> without.
>
> 5. When passing along an interesting email on to another, copy and paste
> the email into another,and remove all of the forward signs and forwarded
> addresses. Some people attach the email, and sometimes you have to open
an
> attached email, then open another email, which personally, is not only a
> pain in the butt, but, it makes you weary if the attachment may contain
any
> worms/viruses. Emails can leave your computer without one, and pick up a
> hitchhiker along the way. Personally, I do not open attached emails any
> more, so if it's something you want me to read or see, copy and paste the
> information into the main email. If I get an email, where the attachment
is
> an envelope, I just delete it. You can make your own call on that one,
I'm
> just telling you what I do.
>
> 6. Also as an added safety feature, even though Norton scans your email,
if
> there are attachments, I find it best to save them, then scan them again.
>
> 7. Please check the addresses always of what you receive. Certain
> viruses/worms will mimic someone's address, but if you look close enough,
> you will see an error in the address, if it is coming from an unknown
> source. If you receive unexpected emails from what appears to be
Microsoft,
> or any corporation like that, unless you were expecting it, don't open it.
> Some virus and worms that get emailed out will use popular names of
> companies in hopes that you will open them. Many times they even use your
> servers name.
>
> 8. There are a ton of hoaxes going around out there. These tend to come
> from spammers trying to get address lists. Please don't pass these along.
> You are only making the spammers methods of obtaining address lists more
> successful. There are several sites that you can check out whether its a
> hoax. When wanting to find this out, in your search engine, type part of
> the email. For example, the email regarding the baby needing the
> transplant, and stating that AOL will donate 5 cents for every email sent,
> well this is a hoax, and if you typed "......needing a transplant, aol
etc.,
> you will get this turn up. Just be creative when doing your search and
you
> will be successful. Put the main facts in the search engine. One hoax
that
> I have seen more times than I could count, is regarding the budweiser
frogs
> screensaver. This is also a hoax.
>
> 9. As for virus warnings, if you receive any from friends, check them out
> with Symantec or whichever virus protection site you trust and use.
Hoaxes
> can be just as bad and annoying as an actual virus.
>
> 10. In addition to my Norton doing its daily scans, and live update, I do
> manual updates different times within each day. If it were to check in
the
> morning, there just may be new definitions by that evening. I have seen
> that many times. It only takes a few seconds on high speed.
>
> 11. Make sure your windows operating system has all of its updates.
Please
> check yourself manually in addition to its scheduled checks. Patches that
> are required can prevent you from being attacked.
>
> 12. In regards to some of the fun things you can install on your
computer,
> be careful in the way that some of them cause conflicts with XP. You are
> suppose to try to avoid installing any unnecessary little things on your
> system.
>
> 13. THIS ONE IS IMPORTANT: STAY AWAY FROM GATOR AND THE BONZI BUDDY.
Once
> you have these installed they are a bugger to remove. Even after
> uninstalling them, they leave behind files in the registry etc., that
causes
> the program's spyware to reinstall itself if you visit any participating
> sponsors of these websites.
>
>
|
Mar 10, 2004, 10:37pm
LOL i know what u mean. i delete chain letters. Like i have time to mess
with them . not! dont need my permission it came from another group and im
sure she was passing it alomg from where she got it.. i am just passing it
along too :)
[View Quote]"lioness." <nobody at nowhere.net> wrote in message
news:404fb2ed at server1.Activeworlds.com...
> This is great! With your permission I'd like to copy and paste this into
an
> email to send to some of my RL family and friends who are more puter
> illiterate than I am (which is saying alot!! hahaha). I'm always getting
> emails from them with not only those stupid "chain letters" but also a TON
> of forwarded attachments which I just delete anyway. I mean TheLion and I
> run scans on everything anyway, but why take the risk??? And if I get one
> more email about that "social studies project" that some elementary school
> is doing, ........or telling me if I forward a sappy friendship poem to
> everyone in my address book to bring me good luck for the rest of my
> life.....I'll puke on my keyboard. ;-"D
>
>
>
>
> "ciena" <nikona at comcast.net> wrote in message
> news:404f2f8e$1 at server1.Activeworlds.com...
that
> and
> the
other
from
> have
get
> each
"VIEW"
> you
> the
addresses
> in
> the
and
> use
these
a
> file
view
> are
many
corrupt,
very
> take
bad
fixed.
> have
> from,
> is.
I
> from
paste
> an
> any
a
the
attachment
> is
> I'm
email,
> if
again.
enough,
> Microsoft,
it.
your
come
along.
a
of
sent,
> etc.,
> you
> that
> frogs
out
> Hoaxes
do
> the
> Please
that
> computer,
are
> Once
> causes
>
>
|
Mar 10, 2004, 11:13pm
LOL Thank you so much. ;-"D
[View Quote]"ciena" <nikona at comcast.net> wrote in message
news:404fb4b5 at server1.Activeworlds.com...
> LOL i know what u mean. i delete chain letters. Like i have time to mess
> with them . not! dont need my permission it came from another group and im
> sure she was passing it alomg from where she got it.. i am just passing it
> along too :)
> "lioness." <nobody at nowhere.net> wrote in message
> news:404fb2ed at server1.Activeworlds.com...
> an
getting
TON
I
one
school
> that
viruses
the
or
> other
> from
could
> get
> "VIEW"
Now
in
> addresses
notice
person
> and
wish,
not
> these
usually
I
get
> a
flash
> view
before
you
> many
> corrupt,
and
> very
not
protection
> bad
> fixed.
normally
your
there
Personally,
> I
doubt......do
> paste
forwarded
open
a
contain
up
> a
any
> the
> attachment
one,
> email,
> again.
> enough,
> it.
> your
> come
> along.
more
its
> a
> of
> sent,
and
hoax
> out
I
> do
in
seen
> that
> are
your
participating
>
>
|
Mar 11, 2004, 6:43am
Dont be stupid. Useful tips here... Some people may not know.
--
Ry - #323710
AWRPG - Citizen of Kao'a
[View Quote]brock <BrockL at iceflare.net> wrote in message
news:404f3e01$1 at server1.Activeworlds.com...
> 13. USE A CONDOM WHEN HAVING SEX.
>
> --
> Brock,
> IceFlare Network
> Founder/Administrator
> http://www.iceflare.net
>
>
> "ciena" <nikona at comcast.net> wrote in message
> news:404f2f8e$1 at server1.Activeworlds.com...
that
> and
> the
other
from
> have
get
> each
"VIEW"
> you
> the
addresses
> in
> the
and
> use
these
a
> file
view
> are
many
corrupt,
very
> take
bad
fixed.
> have
> from,
> is.
I
> from
paste
> an
> any
a
the
attachment
> is
> I'm
email,
> if
again.
enough,
> Microsoft,
it.
your
come
along.
a
of
sent,
> etc.,
> you
> that
> frogs
out
> Hoaxes
do
> the
> Please
that
> computer,
are
> Once
> causes
>
>
|
Mar 11, 2004, 10:32pm
Some things sound like a good idea but it sounds like somoenes super
paranoide
Mar 11, 2004, 11:39pm
i rather be paranoid and safe than stupid and sorry.
[View Quote]"r i c h a r d" <richard.lazenby1 at ntlworld.com> wrote in message
news:40510522$1 at server1.Activeworlds.com...
> Some things sound like a good idea but it sounds like somoenes super
> paranoide
>
>
|
|