You're Working Too Hard, I'm Not
Internet Security
Home | Testimonials | Understanding YMMSS | Internet Security | Payment Processors | Before Joining YMMSS | Joining YMMSS

YMMSS has been so successful that anyone who has joined for a while makes money.  Unfortunately, some members' Intgold accounts were hacked in and money stolen.  In view of this, it is of paramount importance that members should be on guard against hackers.  I hope you will find the following helpful.
 
 
Firewall
 
A combination hardware and software buffer that many companies or organizations have in place between their internal networks and the Internet.  A firewall allows only specific kinds of messages from the Internet to flow in and out of the internal network. This protects the internal network from intruders or hackers who might try to use the Internet to break into those systems.
 
I use Norton Internet Security 2004 and I am very satisfied with it.  It has Personal Firewall, Intrusion Detection, AntiVirus, Privacy Control, Ad Blocking, Antispam, Parental Control (but I don't need this one).  Besides, I also have Norton System Works that helps me deal with all kinds of computer problems.
 
 
 
 
Spyware
 
Spyware is also known as adware, malware, trackware, scumware, thiefware, snoopware, sneakware.  They get into your computer secretly and record your Internet activities and sensitive information, such as your passwords, etc. and send it to advertisers and/or hackers.

The following are symptoms of spyware infection:

  • sluggish PC performance
  • increased pop-up ads
  • unexplained homepage change
  • mysterious search results

You get spywares if you do the following:

  • You visit websites or open spam email, automatically installing on your machine without you knowing
  • You visit any media-supported website and it assigns you a tracking cookie
  • You share music, files or photos with other users
  • You install software applications without fully reading license agreements
  • I use the following to scan my computer every day to ensure my computer is free from spywares:

    Spybot ---- It is free and welcome donation.  Easy to use and recommended.

    SpywareBlaster ---- It is free.  It does not scan your computer but prevents your computer from installing spywares.

    Yahoo Toolbar Antispy ---- Free to download.  Easy to use.

    Spysweeper --- It costs $30.  Highly recommended.

    No Adware ---- Free to download. 

    When I use them, I always check for the lastest updates.

     

     

     

    No Adware

    Spysweeper

    Yahoo Anti Spy

    SpywareBlaster

    Spybot

     
     
     
    Keyloggers
     
    A Keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a key logger will reveal the contents of all emails composed by the user.
     
    I use Advanced Anti Spy to prevent keyloggers from entering my computer.  It offers a 30 day free trial, then you can decide if you would like to purchase it for about $50.  Every time when a keylogger software tries to enter my computer, it alerts me and prohibits the keylogger at once.
     
    Click the following link to download Advanced Anti Spy for free.

    Advanced Anti Spy

     
     
     
    Phishing
     
    A new kind of fraud is called "phishing".  Scam artists send out tens of thousands of forged e-mail messages at a time disguised as a legitimate message from a large, well-known institution.

    Usually, the bogus messages purport to come from banks though retailers haven't been immune from it.
    The typical phishing message says there is some problem with the recipient's account and they should immediately click on a Web link in the message that redirects their browser to a Web site that looks like the institution's real site.

    But the site is a forgery, and when the victim fills in his name and personal information like account numbers and PINs, Social Security numbers or Social Insurance numbers and credit card numbers and hits "submit," the site sends that information to the thieves, who can be as far away as Eastern Europe or Asia. The thieves then sell the information to ID theft rings that steal the victim's identity by applying for credit cards or loans in the victim's name.
     
    You should NEVER click on the link in any emails to go to your payment processors or online banks.
     
     
     
     

    Trojan
     
    A Trojan ( also known as Trojan horse ) is a software
    program in which harmful or malicious code is contained within another seemingly harmless program.  When this program excutes, the Trojan performs a specific set of actions, usually working toward the goal of allowing itself to persist on the target system.  Trojan can allow hackers to open backdoors on your system, giving them access to your files and even network connectivity.
     
    I use House Call and Trojan Remover to scan for viruses and Trojans and clean my computer.
     
    House Call is free and Trojan Remover is not.  Trojan Remover offers a 30 day free trial and you need to pay for about $30 if you would like to purchase it.

    House Call

    Trojan Remover

     
     
    You can check how secure your computer is with Shields Up.  The following is the summary report Shields Up gave me after they examined the security level of my computer:
     
    Your Internet port 139 does not appear to exist!
    One or more ports on this system are operating in FULL STEALTH MODE! Standard Internet behavior requires port connection attempts to be answered with a success or refusal response. Therefore, only an attempt to connect to a nonexistent computer results in no response of either kind. But YOUR computer has DELIBERATELY CHOSEN NOT TO RESPOND (that's very cool!) which represents advanced computer and port stealthing capabilities. A machine configured in this fashion is well hardened to Internet NetBIOS attack and intrusion.
    Unable to connect with NetBIOS to your computer.
    All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet

    Shields Up

     
     
    Tips:
     
    1.  Use a different password for each payment processor. 
     
    2.  When choosing a password, use any combination of letters, numbers, and signs like #@)&".  Your password should be extremely difficult for anyone to guess.
     
    3.  Don't make up a short password.  A short password is relatively easier for a hacker to try all the combinations.
     
    4.  When you use a computer at a library, or at an Internet cafe, don't buy anything or make any payments online.  You have no idea how secure these computers are. 
     
    5.  Try to use cut and paste to put in your passwords instead of typing your passwords. 
     
    6.  With Intgold, the primary password and the secondary password should not be the same.
     
    7.  Don't save the password when your browser asks you to do so.
     
    8.  Update your spyware removal programs regularly.

    Continue here >>>>>>