PureBytes Links
Trading Reference Links
|
------------------------------------------------------------------------
You cannot reply to this message via email because you have chosen not
to disclose your email address to the group.
To reply: http://groups.yahoo.com/group/equismetastock/post?act=reply&messageNum=5424
------------------------------------------------------------------------
<I can't understand how to make my PC invisible on the netĄ±. Please
enlighten.
Liu,
The web site GRC.Com has a full and detailed description of how to
make your PC invisible to the hackers in their "Shields Up" free test
for your computer. Today, the hackers run scanners on the internet to
detect computers that are on-line. The scanner sends out an address
to see if there is a response. If there is a response, then they can
log into your PC to examine files from across the world. Then they
secretly download their trojan into your PC without your knowledge.
Once on your PC, the trojan goes to work monitoring keystrokes, sites
visited, recording your passwords & account information. The trojan
then relays this information back to the hackers by logging on to
their site while you are on line.... just as Internet Explorer logs
you on line to another computer. Anyone on the Internet can display
what is on your hard drive just as easily as you can with your
keyboard !
If there is no response to the hacker's scanner, then it goes to the
next address. Your PC has an address on the net that it responds to
just like the mailman responds to your street address. Actually your
PC has several net addresses that it will respond to, called PORTS.
The secret to making your PC invisible on the net is to shut down all
ports except the ones that YOU actually want to use.
This is where Zone Alarm available at www.zonealarm.com is required.
Zone Alarm shuts down all ports to and from the internet and does not
allow ANY traffic unless you give permission. IF a hacker had
installed a Trojan on your PC, it would be denied access to the
Internet until you give it permission. While you will certainly give
Internet Explorer and Outlook Express permission to connect, I don't
think you would give some strange and unknown program permission. I
once downloaded a utility from the Internet that is extremely useful.
However about once a month it tries to get on to the Internet and
Zone Alarm won't let it. I also will not give it permission. It has
NO business or reason to get internet service.
Likewise Zone Alarm will not allow ANYONE on the Internet to gain
access to your PC without permission. However if you WANT to download
a file from some site, I'm sure you will give Zone Alarm permission
for that site's access. There is a special port for downloading
files, and that port is kept closed by Zone Alarm until you WANT to
open it.
So lets say you install Zone Alarm. How do you know that it works as
advertised? Log into www.GRC.COM to "Test Your Shields." and you will
get a full report on just how stealthy your PC is. You can also
download their free test which simulates a Trojan.
There are some days while I'm on-line that I get dozens of hacker
attacks. Some from as far away as Russia and the Middle East. How do
I know? Anyone attempting to get into my computer also leaves his
internet address for a response to the scanner. Zone Alarm tracks
these addresses so you can automatically examine them if you want to.
Bottom line: Your PC is an OPEN BOOK to every hacker out there unless
you install Zone Alarm or another similar FIREWALL. Zone Alarm is the
best fire wall available because it blocks internet access both into
and out of your PC.
For more, plase visit www.GRC.COM and www.ZoneAlarm.Com.
Grizz
--- In equismetastock@xxxx, kunfliu <no_reply@xxxx> wrote:
> Hi, Grizz:
>
> Thanks for your value information; but I still canĄŻt understand
how
> to make my Ą°PC is invisible on the netĄ±. Please enlighten me.
>
> Regards.
>
> Liu
>
>
> --- In equismetastock@xxxx, "grizz003" <grizz002@xxxx> wrote:
> > Keith and all,
> > I am a programmer and I am extremely familiar with virus, trojans
> and
> > also how to keep them OUT of your PC.
> >
> > 1) First of all and MOST important: NEVER NEVER NEVER open any
> email
> > file attachments that is "executable." Executable means a
> standalone
> > program that can run in your PC. How do you know? Look at the
> > filename.EXT. The extension tells us if the attachment is
> executable,
> > and includes EXE, COM, SCR, DOC { DOC files can carry a SCR },
BAT
> > and PIF. There are more, but these are the most popular. To make
> this
> > easier to manage, here is a simple rule: Graphic and TXT file
> > attachments are currently the only ones immune from virus, ALL
> OTHERS
> > can carry a virus. The SAFE file attachments include TXT, GIF,
> JPG,
> > MPG, and BMP.
> >
> > 2) Install the program Zone Alarm from www.zonealarm.com This
> program
> > will warn you of all file attachments which COULD carry a virus.
It
> > prevents access from the net into your PC, and it prevents any
> > program already ON your PC from accessing the internet. All
access
> to
> > or from the net is blocked until you give permission. The souce
of
> > the file requesting internet service is given so you can delete
it
> if
> > necessary. You are also warned of any net site that is attempting
> to
> > break into your PC. You can issue temporary or permanent
> permissions.
> >
> > 3) Never trust a virus program. They are always a day late and a
> > dollar short. They cannot ever protect you from NEW virus that
show
> > up each week. They cannot protect you from virus that are
designed
> to
> > mutate ( change their signature ).
> >
> > 4) Verify that your PC is invisible on the net and immune from
> > trojans by running the free utilities at WWW.GRC.COM.
> >
> >
> > Follow these 4 easy steps, and you unlikely to EVER suffer from
> > another virus or trojan.
> >
> > Grizz
> >
> > --- In equismetastock@xxxx, <keithld@xxxx> wrote:
> > > in case my first reply didn't get through properly, Roy
> and
> > Ron, thanks for your suggestions to answer my questions.
> > >
> > > about a month ago, I formatted my drive (again) trying to solve
> the
> > results of a virus and installed and ran Nortons immediately
after
> > the format, and have ran it continuously since, it updates
> > automatically.
> > > about a week ago, I noticed some of my emails to groups were
> > coming back to me with the message deleted and the symbol similar
> > to yp inserted instead, someone had previously told me
> this
> > is evidence of a virus, again!
> > > I then confirmed Nortons was current and ran a full scan--- no
> > virus
> > > I then reinstalled AVG from grisoft.com , a free virus
> program
> > which last time found the virus when Nortons didn't,
> > > scanned--no virus
> > > I then ran Taucan, supposed to find trojans ----no virus
> > > so, 3 scans and found nothing.
> > >
> > > a couple of days ago, a friend sent me a fix to a virus he'd
got
> > and may have passed on, and there it was!
> > > I had the "bear" jdbgmgr.exe
> > > I don't mind getting a virus, (the price of being on the net)
> but
> > i'd at least like to be able to search for, find it and get rid
of
> it
> > and,especially, not pass it on to others innocently
> > >
> > > I'm sorry for the longwinded mail but felt it better to
explain
> > once fully.
> > >
> > > the question is ? is there a good virus program out there at
> > all? many others must have the same problems
> > >
> > > all comments appreciated thanks Keith
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > > ---
> > > Outgoing mail is certified Virus Free.
> > > Checked by AVG anti-virus system (http://www.grisoft.com).
> > > Version: 6.0.408 / Virus Database: 230 - Release Date: 24/10/02
To unsubscribe from this group, send an email to:
equismetastock-unsubscribe@xxxxxxxxxxxxxxx
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
|