PureBytes Links
Trading Reference Links
|
------------------------------------------------------------------------
You cannot reply to this message via email because you have chosen not
to disclose your email address to the group.
To reply: http://groups.yahoo.com/group/equismetastock/post?act=reply&messageNum=5425
------------------------------------------------------------------------
Grizz:
Thanks for your brilliant illustrations. I would take your advice
immediately.
Regards.
Liu
--- In equismetastock@xxxx, "grizz003" <grizz002@xxxx> wrote:
> <I can't understand how to make my PC invisible on the netĄ±.
Please
> enlighten.
>
> Liu,
> The web site GRC.Com has a full and detailed description of how to
> make your PC invisible to the hackers in their "Shields Up" free
test
> for your computer. Today, the hackers run scanners on the internet
to
> detect computers that are on-line. The scanner sends out an address
> to see if there is a response. If there is a response, then they
can
> log into your PC to examine files from across the world. Then they
> secretly download their trojan into your PC without your knowledge.
> Once on your PC, the trojan goes to work monitoring keystrokes,
sites
> visited, recording your passwords & account information. The trojan
> then relays this information back to the hackers by logging on to
> their site while you are on line.... just as Internet Explorer logs
> you on line to another computer. Anyone on the Internet can display
> what is on your hard drive just as easily as you can with your
> keyboard !
>
> If there is no response to the hacker's scanner, then it goes to
the
> next address. Your PC has an address on the net that it responds to
> just like the mailman responds to your street address. Actually
your
> PC has several net addresses that it will respond to, called PORTS.
> The secret to making your PC invisible on the net is to shut down
all
> ports except the ones that YOU actually want to use.
>
> This is where Zone Alarm available at www.zonealarm.com is
required.
> Zone Alarm shuts down all ports to and from the internet and does
not
> allow ANY traffic unless you give permission. IF a hacker had
> installed a Trojan on your PC, it would be denied access to the
> Internet until you give it permission. While you will certainly
give
> Internet Explorer and Outlook Express permission to connect, I
don't
> think you would give some strange and unknown program permission. I
> once downloaded a utility from the Internet that is extremely
useful.
> However about once a month it tries to get on to the Internet and
> Zone Alarm won't let it. I also will not give it permission. It has
> NO business or reason to get internet service.
>
> Likewise Zone Alarm will not allow ANYONE on the Internet to gain
> access to your PC without permission. However if you WANT to
download
> a file from some site, I'm sure you will give Zone Alarm permission
> for that site's access. There is a special port for downloading
> files, and that port is kept closed by Zone Alarm until you WANT to
> open it.
>
> So lets say you install Zone Alarm. How do you know that it works
as
> advertised? Log into www.GRC.COM to "Test Your Shields." and you
will
> get a full report on just how stealthy your PC is. You can also
> download their free test which simulates a Trojan.
>
> There are some days while I'm on-line that I get dozens of hacker
> attacks. Some from as far away as Russia and the Middle East. How
do
> I know? Anyone attempting to get into my computer also leaves his
> internet address for a response to the scanner. Zone Alarm tracks
> these addresses so you can automatically examine them if you want
to.
>
> Bottom line: Your PC is an OPEN BOOK to every hacker out there
unless
> you install Zone Alarm or another similar FIREWALL. Zone Alarm is
the
> best fire wall available because it blocks internet access both
into
> and out of your PC.
>
> For more, plase visit www.GRC.COM and www.ZoneAlarm.Com.
>
> Grizz
>
> --- In equismetastock@xxxx, kunfliu <no_reply@xxxx> wrote:
> > Hi, Grizz:
> >
> > Thanks for your value information; but I still canĄŻt understand
> how
> > to make my Ą°PC is invisible on the netĄ±. Please enlighten me.
> >
> > Regards.
> >
> > Liu
> >
> >
> > --- In equismetastock@xxxx, "grizz003" <grizz002@xxxx> wrote:
> > > Keith and all,
> > > I am a programmer and I am extremely familiar with virus,
trojans
> > and
> > > also how to keep them OUT of your PC.
> > >
> > > 1) First of all and MOST important: NEVER NEVER NEVER open any
> > email
> > > file attachments that is "executable." Executable means a
> > standalone
> > > program that can run in your PC. How do you know? Look at the
> > > filename.EXT. The extension tells us if the attachment is
> > executable,
> > > and includes EXE, COM, SCR, DOC { DOC files can carry a SCR },
> BAT
> > > and PIF. There are more, but these are the most popular. To
make
> > this
> > > easier to manage, here is a simple rule: Graphic and TXT file
> > > attachments are currently the only ones immune from virus, ALL
> > OTHERS
> > > can carry a virus. The SAFE file attachments include TXT, GIF,
> > JPG,
> > > MPG, and BMP.
> > >
> > > 2) Install the program Zone Alarm from www.zonealarm.com This
> > program
> > > will warn you of all file attachments which COULD carry a
virus.
> It
> > > prevents access from the net into your PC, and it prevents any
> > > program already ON your PC from accessing the internet. All
> access
> > to
> > > or from the net is blocked until you give permission. The souce
> of
> > > the file requesting internet service is given so you can delete
> it
> > if
> > > necessary. You are also warned of any net site that is
attempting
> > to
> > > break into your PC. You can issue temporary or permanent
> > permissions.
> > >
> > > 3) Never trust a virus program. They are always a day late and
a
> > > dollar short. They cannot ever protect you from NEW virus that
> show
> > > up each week. They cannot protect you from virus that are
> designed
> > to
> > > mutate ( change their signature ).
> > >
> > > 4) Verify that your PC is invisible on the net and immune from
> > > trojans by running the free utilities at WWW.GRC.COM.
> > >
> > >
> > > Follow these 4 easy steps, and you unlikely to EVER suffer from
> > > another virus or trojan.
> > >
> > > Grizz
> > >
> > > --- In equismetastock@xxxx, <keithld@xxxx> wrote:
> > > > in case my first reply didn't get through properly,
Roy
> > and
> > > Ron, thanks for your suggestions to answer my questions.
> > > >
> > > > about a month ago, I formatted my drive (again) trying to
solve
> > the
> > > results of a virus and installed and ran Nortons immediately
> after
> > > the format, and have ran it continuously since, it updates
> > > automatically.
> > > > about a week ago, I noticed some of my emails to groups were
> > > coming back to me with the message deleted and the symbol
similar
> > > to yp inserted instead, someone had previously told
me
> > this
> > > is evidence of a virus, again!
> > > > I then confirmed Nortons was current and ran a full scan---
no
> > > virus
> > > > I then reinstalled AVG from grisoft.com , a free virus
> > program
> > > which last time found the virus when Nortons didn't,
> > > > scanned--no virus
> > > > I then ran Taucan, supposed to find trojans ----no virus
> > > > so, 3 scans and found nothing.
> > > >
> > > > a couple of days ago, a friend sent me a fix to a virus he'd
> got
> > > and may have passed on, and there it was!
> > > > I had the "bear" jdbgmgr.exe
> > > > I don't mind getting a virus, (the price of being on the
net)
> > but
> > > i'd at least like to be able to search for, find it and get rid
> of
> > it
> > > and,especially, not pass it on to others innocently
> > > >
> > > > I'm sorry for the longwinded mail but felt it better to
> explain
> > > once fully.
> > > >
> > > > the question is ? is there a good virus program out there
at
> > > all? many others must have the same problems
> > > >
> > > > all comments appreciated thanks Keith
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > ---
> > > > Outgoing mail is certified Virus Free.
> > > > Checked by AVG anti-virus system (http://www.grisoft.com).
> > > > Version: 6.0.408 / Virus Database: 230 - Release Date:
24/10/02
To unsubscribe from this group, send an email to:
equismetastock-unsubscribe@xxxxxxxxxxxxxxx
Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
|