[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[EquisMetaStock Group] Re: zero defaults and virus question



PureBytes Links

Trading Reference Links

------------------------------------------------------------------------
You cannot reply to this message via email because you have chosen not
to disclose your email address to the group.

To reply:  http://groups.yahoo.com/group/equismetastock/post?act=reply&messageNum=5424
------------------------------------------------------------------------

<I can't understand how to make my PC invisible on the netĄ±. Please 
enlighten.

Liu,
The web site GRC.Com has a full and detailed description of how to 
make your PC invisible to the hackers in their "Shields Up" free test 
for your computer. Today, the hackers run scanners on the internet to 
detect computers that are on-line. The scanner sends out an address 
to see if there is a response. If there is a response, then they can 
log into your PC to examine files from across the world. Then they 
secretly download their trojan into your PC without your knowledge. 
Once on your PC, the trojan goes to work monitoring keystrokes, sites 
visited, recording your passwords & account information. The trojan 
then relays this information back to the hackers by logging on to 
their site while you are on line.... just as Internet Explorer logs 
you on line to another computer. Anyone on the Internet can display 
what is on your hard drive just as easily as you can with your 
keyboard ! 

If there is no response to the hacker's scanner, then it goes to the 
next address. Your PC has an address on the net that it responds to 
just like the mailman responds to your street address. Actually your 
PC has several net addresses that it will respond to, called PORTS. 
The secret to making your PC invisible on the net is to shut down all 
ports except the ones that YOU actually want to use.   

This is where Zone Alarm available at www.zonealarm.com is required. 
Zone Alarm shuts down all ports to and from the internet and does not 
allow ANY traffic unless you give permission. IF a hacker had 
installed a Trojan on your PC, it would be denied access to the 
Internet until you give it permission. While you will certainly give 
Internet Explorer and Outlook Express permission to connect, I don't 
think you would give some strange and unknown program permission. I 
once downloaded a utility from the Internet that is extremely useful. 
However about once a month it tries to get on to the Internet and 
Zone Alarm won't let it. I also will not give it permission. It has 
NO business or reason to get internet service.  

Likewise Zone Alarm will not allow ANYONE on the Internet to gain 
access to your PC without permission. However if you WANT to download 
a file from some site, I'm sure you will give Zone Alarm permission 
for that site's access. There is a special port for downloading 
files, and that port is kept closed by Zone Alarm until you WANT to 
open it.  

So lets say you install Zone Alarm. How do you know that it works as 
advertised? Log into www.GRC.COM to "Test Your Shields." and you will 
get a full report on just how stealthy your PC is.  You can also 
download their free test which simulates a Trojan. 

There are some days while I'm on-line that I get dozens of hacker 
attacks. Some from as far away as Russia and the Middle East. How do 
I know? Anyone attempting to get into my computer also leaves his 
internet address for a response to the scanner. Zone Alarm tracks 
these addresses so you can automatically examine them if you want to. 

Bottom line: Your PC is an OPEN BOOK to every hacker out there unless 
you install Zone Alarm or another similar FIREWALL. Zone Alarm is the 
best fire wall available because it blocks internet access both into 
and out of your PC.   

For more, plase visit www.GRC.COM and www.ZoneAlarm.Com. 

Grizz

--- In equismetastock@xxxx, kunfliu <no_reply@xxxx> wrote:
> Hi, Grizz:
> 
> Thanks for your value information; but I still canĄŻt understand 
how 
> to make my Ą°PC is invisible on the netĄ±. Please enlighten me.
> 
> 	Regards.
> 
> Liu
> 
> 
> --- In equismetastock@xxxx, "grizz003" <grizz002@xxxx> wrote:
> > Keith and all,
> > I am a programmer and I am extremely familiar with virus, trojans 
> and 
> > also how to keep them OUT of your PC. 
> > 
> > 1) First of all and MOST important: NEVER NEVER NEVER open any 
> email 
> > file attachments that is "executable." Executable means a 
> standalone 
> > program that can run in your PC. How do you know? Look at the 
> > filename.EXT. The extension tells us if the attachment is 
> executable, 
> > and includes EXE, COM, SCR, DOC { DOC files can carry a SCR }, 
BAT  
> > and PIF. There are more, but these are the most popular. To make 
> this 
> > easier to manage, here is a simple rule: Graphic and TXT file 
> > attachments are currently the only ones immune from virus, ALL 
> OTHERS 
> > can carry a virus.  The SAFE file attachments include TXT, GIF, 
> JPG, 
> > MPG, and BMP.
> > 
> > 2) Install the program Zone Alarm from www.zonealarm.com This 
> program 
> > will warn you of all file attachments which COULD carry a virus. 
It 
> > prevents access from the net into your PC, and it prevents any 
> > program already ON your PC from accessing the internet. All 
access 
> to 
> > or from the net is blocked until you give permission. The souce 
of 
> > the file requesting internet service is given so you can delete 
it 
> if 
> > necessary. You are also warned of any net site that is attempting 
> to 
> > break into your PC. You can issue temporary or permanent 
> permissions. 
> > 
> > 3) Never trust a virus program. They are always a day late and a 
> > dollar short. They cannot ever protect you from NEW virus that 
show 
> > up each week. They cannot protect you from virus that are 
designed 
> to 
> > mutate ( change their signature ).
> > 
> > 4) Verify that your PC is invisible on the net and immune from 
> > trojans by running the free utilities at WWW.GRC.COM.
> > 
> > 
> > Follow these 4 easy steps, and you unlikely to EVER suffer from 
> > another virus or trojan.
> > 
> > Grizz
> > 
> > --- In equismetastock@xxxx, <keithld@xxxx> wrote:
> > >      in case my first reply didn't get through properly,   Roy  
> and 
> > Ron, thanks for your suggestions  to  answer my questions.
> > > 
> > > about a month ago, I formatted my drive (again) trying to solve 
> the 
> > results of a virus  and installed and ran Nortons immediately 
after 
> > the format, and have ran it continuously since, it updates 
> > automatically.
> > > about a  week ago, I noticed some of my emails to groups were 
> > coming back to me with the message deleted and the symbol similar 
> > to      yp      inserted instead, someone had previously told me 
> this 
> > is evidence of a virus, again!
> > > I then confirmed Nortons was current and ran a full scan---  no 
> > virus
> > > I then reinstalled AVG from    grisoft.com , a free virus  
> program 
> > which last time found the virus when Nortons didn't,
> > >  scanned--no virus
> > > I then ran Taucan, supposed to find trojans     ----no virus
> > > so, 3 scans  and found nothing.
> > > 
> > > a couple of days ago, a friend  sent me a fix to a virus he'd 
got 
> > and may have passed on,  and there it was!
> > > I had the "bear"     jdbgmgr.exe 
> > > I don't mind getting a virus, (the price of being on the net)  
> but 
> > i'd at least like to be able to search for, find it and get rid 
of 
> it 
> > and,especially, not pass it on to others innocently    
> > > 
> > > I'm sorry for the longwinded  mail but felt it better to 
explain 
> > once fully.
> > > 
> > > the question is ?   is there a good virus program out there at 
> > all?    many others must have the same problems
> > > 
> > > all comments appreciated    thanks    Keith
> > > 
> > > 
> > > 
> > > 
> > >  
> > > 
> > > 
> > > ---
> > > Outgoing mail is certified Virus Free.
> > > Checked by AVG anti-virus system (http://www.grisoft.com).
> > > Version: 6.0.408 / Virus Database: 230 - Release Date: 24/10/02


To unsubscribe from this group, send an email to:
equismetastock-unsubscribe@xxxxxxxxxxxxxxx

 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/