[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[EquisMetaStock Group] Re: zero defaults and virus question



PureBytes Links

Trading Reference Links

------------------------------------------------------------------------
You cannot reply to this message via email because you have chosen not
to disclose your email address to the group.

To reply:  http://groups.yahoo.com/group/equismetastock/post?act=reply&messageNum=5425
------------------------------------------------------------------------

Grizz:

Thanks for your brilliant illustrations. I would take your advice 
immediately. 

Regards.
 
 Liu

--- In equismetastock@xxxx, "grizz003" <grizz002@xxxx> wrote:
> <I can't understand how to make my PC invisible on the netĄ±. 
Please 
> enlighten.
> 
> Liu,
> The web site GRC.Com has a full and detailed description of how to 
> make your PC invisible to the hackers in their "Shields Up" free 
test 
> for your computer. Today, the hackers run scanners on the internet 
to 
> detect computers that are on-line. The scanner sends out an address 
> to see if there is a response. If there is a response, then they 
can 
> log into your PC to examine files from across the world. Then they 
> secretly download their trojan into your PC without your knowledge. 
> Once on your PC, the trojan goes to work monitoring keystrokes, 
sites 
> visited, recording your passwords & account information. The trojan 
> then relays this information back to the hackers by logging on to 
> their site while you are on line.... just as Internet Explorer logs 
> you on line to another computer. Anyone on the Internet can display 
> what is on your hard drive just as easily as you can with your 
> keyboard ! 
> 
> If there is no response to the hacker's scanner, then it goes to 
the 
> next address. Your PC has an address on the net that it responds to 
> just like the mailman responds to your street address. Actually 
your 
> PC has several net addresses that it will respond to, called PORTS. 
> The secret to making your PC invisible on the net is to shut down 
all 
> ports except the ones that YOU actually want to use.   
> 
> This is where Zone Alarm available at www.zonealarm.com is 
required. 
> Zone Alarm shuts down all ports to and from the internet and does 
not 
> allow ANY traffic unless you give permission. IF a hacker had 
> installed a Trojan on your PC, it would be denied access to the 
> Internet until you give it permission. While you will certainly 
give 
> Internet Explorer and Outlook Express permission to connect, I 
don't 
> think you would give some strange and unknown program permission. I 
> once downloaded a utility from the Internet that is extremely 
useful. 
> However about once a month it tries to get on to the Internet and 
> Zone Alarm won't let it. I also will not give it permission. It has 
> NO business or reason to get internet service.  
> 
> Likewise Zone Alarm will not allow ANYONE on the Internet to gain 
> access to your PC without permission. However if you WANT to 
download 
> a file from some site, I'm sure you will give Zone Alarm permission 
> for that site's access. There is a special port for downloading 
> files, and that port is kept closed by Zone Alarm until you WANT to 
> open it.  
> 
> So lets say you install Zone Alarm. How do you know that it works 
as 
> advertised? Log into www.GRC.COM to "Test Your Shields." and you 
will 
> get a full report on just how stealthy your PC is.  You can also 
> download their free test which simulates a Trojan. 
> 
> There are some days while I'm on-line that I get dozens of hacker 
> attacks. Some from as far away as Russia and the Middle East. How 
do 
> I know? Anyone attempting to get into my computer also leaves his 
> internet address for a response to the scanner. Zone Alarm tracks 
> these addresses so you can automatically examine them if you want 
to. 
> 
> Bottom line: Your PC is an OPEN BOOK to every hacker out there 
unless 
> you install Zone Alarm or another similar FIREWALL. Zone Alarm is 
the 
> best fire wall available because it blocks internet access both 
into 
> and out of your PC.   
> 
> For more, plase visit www.GRC.COM and www.ZoneAlarm.Com. 
> 
> Grizz
> 
> --- In equismetastock@xxxx, kunfliu <no_reply@xxxx> wrote:
> > Hi, Grizz:
> > 
> > Thanks for your value information; but I still canĄŻt understand 
> how 
> > to make my Ą°PC is invisible on the netĄ±. Please enlighten me.
> > 
> > 	Regards.
> > 
> > Liu
> > 
> > 
> > --- In equismetastock@xxxx, "grizz003" <grizz002@xxxx> wrote:
> > > Keith and all,
> > > I am a programmer and I am extremely familiar with virus, 
trojans 
> > and 
> > > also how to keep them OUT of your PC. 
> > > 
> > > 1) First of all and MOST important: NEVER NEVER NEVER open any 
> > email 
> > > file attachments that is "executable." Executable means a 
> > standalone 
> > > program that can run in your PC. How do you know? Look at the 
> > > filename.EXT. The extension tells us if the attachment is 
> > executable, 
> > > and includes EXE, COM, SCR, DOC { DOC files can carry a SCR }, 
> BAT  
> > > and PIF. There are more, but these are the most popular. To 
make 
> > this 
> > > easier to manage, here is a simple rule: Graphic and TXT file 
> > > attachments are currently the only ones immune from virus, ALL 
> > OTHERS 
> > > can carry a virus.  The SAFE file attachments include TXT, GIF, 
> > JPG, 
> > > MPG, and BMP.
> > > 
> > > 2) Install the program Zone Alarm from www.zonealarm.com This 
> > program 
> > > will warn you of all file attachments which COULD carry a 
virus. 
> It 
> > > prevents access from the net into your PC, and it prevents any 
> > > program already ON your PC from accessing the internet. All 
> access 
> > to 
> > > or from the net is blocked until you give permission. The souce 
> of 
> > > the file requesting internet service is given so you can delete 
> it 
> > if 
> > > necessary. You are also warned of any net site that is 
attempting 
> > to 
> > > break into your PC. You can issue temporary or permanent 
> > permissions. 
> > > 
> > > 3) Never trust a virus program. They are always a day late and 
a 
> > > dollar short. They cannot ever protect you from NEW virus that 
> show 
> > > up each week. They cannot protect you from virus that are 
> designed 
> > to 
> > > mutate ( change their signature ).
> > > 
> > > 4) Verify that your PC is invisible on the net and immune from 
> > > trojans by running the free utilities at WWW.GRC.COM.
> > > 
> > > 
> > > Follow these 4 easy steps, and you unlikely to EVER suffer from 
> > > another virus or trojan.
> > > 
> > > Grizz
> > > 
> > > --- In equismetastock@xxxx, <keithld@xxxx> wrote:
> > > >      in case my first reply didn't get through properly,   
Roy  
> > and 
> > > Ron, thanks for your suggestions  to  answer my questions.
> > > > 
> > > > about a month ago, I formatted my drive (again) trying to 
solve 
> > the 
> > > results of a virus  and installed and ran Nortons immediately 
> after 
> > > the format, and have ran it continuously since, it updates 
> > > automatically.
> > > > about a  week ago, I noticed some of my emails to groups were 
> > > coming back to me with the message deleted and the symbol 
similar 
> > > to      yp      inserted instead, someone had previously told 
me 
> > this 
> > > is evidence of a virus, again!
> > > > I then confirmed Nortons was current and ran a full scan---  
no 
> > > virus
> > > > I then reinstalled AVG from    grisoft.com , a free virus  
> > program 
> > > which last time found the virus when Nortons didn't,
> > > >  scanned--no virus
> > > > I then ran Taucan, supposed to find trojans     ----no virus
> > > > so, 3 scans  and found nothing.
> > > > 
> > > > a couple of days ago, a friend  sent me a fix to a virus he'd 
> got 
> > > and may have passed on,  and there it was!
> > > > I had the "bear"     jdbgmgr.exe 
> > > > I don't mind getting a virus, (the price of being on the 
net)  
> > but 
> > > i'd at least like to be able to search for, find it and get rid 
> of 
> > it 
> > > and,especially, not pass it on to others innocently    
> > > > 
> > > > I'm sorry for the longwinded  mail but felt it better to 
> explain 
> > > once fully.
> > > > 
> > > > the question is ?   is there a good virus program out there 
at 
> > > all?    many others must have the same problems
> > > > 
> > > > all comments appreciated    thanks    Keith
> > > > 
> > > > 
> > > > 
> > > > 
> > > >  
> > > > 
> > > > 
> > > > ---
> > > > Outgoing mail is certified Virus Free.
> > > > Checked by AVG anti-virus system (http://www.grisoft.com).
> > > > Version: 6.0.408 / Virus Database: 230 - Release Date: 
24/10/02


To unsubscribe from this group, send an email to:
equismetastock-unsubscribe@xxxxxxxxxxxxxxx

 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/