Security on the net:Security on the Internet

Security net

Shopping online offers lots of benefits that you won't find shopping in a store or by mail. For example, the Internet is always open - seven days a week, 24 hours a day. And, bargains can be numerous online. Shopping on the Internet also can be as safe as shopping in a store or by mail. Keep in mind the following tips to help ensure that your online shopping experience is a safe one.

Use a secure browser.
This is the software you use to navigate the Internet. Your browser should comply with industry security standards, such as Secure Sockets Layer (SSL) or SET Secure Electronic Transaction. These standards encrypt or scramble the purchase information you send over the Internet, ensuring the security of your transaction. Most computers come with a browser already installed. You also can download some browsers for free over the Internet.

Shop with companies you know.
Anyone can set up shop online under almost any name. If you're not familiar with a merchant, ask for a paper catalog or brochure to get a better idea of their merchandise and services. Also, determine the company's refund and return policies before you place your order.

Keep your password(s) private.
Be creative when you establish a password, and never give it to anyone. Avoid using a telephone number, birth date, or a portion of your Social Security number. Instead, use a combination of numbers, letters, and symbols.

Pay by credit or charge card.
If you pay by credit or charge card online, your transaction will be protected by the Fair Credit Billing Act. Under this law, consumers have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. In the case of unauthorized use of a consumer's credit or charge card, consumers are generally held liable only for the first $50 in charges. Some cards may provide additional warranty or purchase protection benefits.

Keep a record.
Be sure to print a copy of your purchase order and confirmation number for your records. Also, you should know that the federal Mail or Telephone Order Merchandise Rule covers orders made via the Internet. This means that unless stated otherwise, merchandise must be delivered within 30 days, and if there are delays, the company must notify you.

Pay your bills online.
Some companies let you pay bills and check your account status online. Before you sign up for any service, evaluate how the company is securing your financial and personal information. Many companies explain their security procedures on their Web site. If you don't see a security description, call or email the company and ask.

Security net

Security on the net: Viruses that will come to computer


Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage. New viruses are created daily. This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.

Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.

Virus: W32.Beagle.CO@mm
A mass-mailing worm that lowers security settings. It can delete security-related registry sub keys and may block access to security-related websites.

Virus: Backdoor.Zagaban

A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.

Virus: W32/Netsky-P
A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.

Virus: W32/Mytob-GH
A mass-mailing worm and IRC backdoor Trojan for the Windows platform. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

Virus: W32/Mytob-EX
A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.

Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER

This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).

Virus: Zafi-D
A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".

Virus: W32/Netsky-D
A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.

Virus: W32/Zafi-B

A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”

4STNXJT2HNV5


tags: security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net security net