Wednesday, February 21, 2007

Remove Rogue Desktop Icons Created By Spyware.

If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000 you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?


1. When you buy a computer, many vendors place icons to selected products and services on your desktop, such as links to high-speed Internet Service Providers (ISPs) or add-on services vendors think you may need.


2. As you install software on your Windows machine, icons may appear, either to start the application or link to the manufacturer's website. Installing just one program could add three or more icons to your desktop!


3. It's easy to accidentally drag a Favorite, bookmark, text file, or other icon to your desktop, creating an icon.


Normally, it's easy to delete Windows desktop icons. Just place your mouse pointer on the offending icon, then right-click it and choose "Delete", clicking "Yes" to confirm if prompted.


However, what if the rogue icons are for adult websites, unfamiliar search engines, or other websites you don't recall visiting? You may try removing these icons but get an error, or after removal they still reappear again and again and again!


If so, then more than likely spyware, adware, or other malware has infected your machine. It may have been through file trading software, an inadvertent "yes" click when a popup window asked you to install software, 'freeware' that included adware, or other means. To remove the rogue icons, you need to remove the malware creating these icons.


Removing spyware and adware can be a time-consuming process, fraught with potential disaster as it is possible to accidentally remove files that render your operating system unusable. However, the following software products can help with this process as long as you read the instructions carefully, make backups, and get expert advice if you're not completely sure about removing what they ask you to do:


* Ad-Aware: http://www.lavasoft.com/


* Microsoft Windows AntiSpyware: http://www.microsoft.com/athome/security/spyware/software/


* Pest Patrol: http://www.pestpatrol.com/


* Spybot Search and Destroy: http://safer-networking.org/


* Spy Sweeper: http://www.webroot.com/


So, how can you prevent these icons from appearing in the first place? Practice safe computing.


* Backup your machine. If it does get infected to the point of being unusable, at least you won't lose all your important files.


* Install security-related operating system updates so spyware and adware cannot enter your system through well-known exploits.


* Download or buy a virus scanner, and keep it updated! Virus scanners cannot detect all spyware, but it doesn't hurt to have one. Check online or visit your local computer software store.


* Purchase a hardware or software firewall, and keep it updated! Firewalls help protect your computer from common exploits that spyware or adware can use to infect your machine.


* Consider using a different web browser. Though it is not perfect, Mozilla Firefox is currently less susceptible to spyware than Internet Explorer, mainly because it lacks certain technology (such as ActiveX) that is often exploited by malware writers. Note that depending on your web use, certain websites may not work correctly with other web browsers.


By practicing safe computing and using spyware-removal software, you can help remove rogue desktop icons from your desktop and keep others from appearing.


Andrew Malek is the owner of the MalekTips computer and technology help site. Visit his anti-spyware page for more advice on removing adware, spyware, and other malware.

How to Manage Your Username and Password The Easy and Secure Way.

Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. I'm now even more paranoid after I joined YMMSS because I use online payment systems on weekly basis if not daily.


I used to use Microsoft Excel to manage my usernames, passwords, and other registration information, both online and offline. Excel is not safe because there are programs to crack password protected Excel workbooks and I even cracked the spreadsheet and VBA source code password for one of my old Excel financial models I developed. Today I still use Excel to store some personal information but I only save the Excel file on my another PC that is not connected to Internet.


In my article "6 Essential Steps to Protect Your Computer On the Internet", I highly recommended the award winning RoboForm. Free version of RoboForm (http://www.roboform.com) does come with limitations such as 10 Passcards only. If you don't want to buy the Pro version (costs $29.99 as of my writing), there is an easy-to-use freeware (see below) you can download right now and manage unlimited usernames and passwords.


Download freeware Password Safe from SourceForge.net - the Open Source community.


https://sourceforge.net/projects/passwordsafe/


Here are some great features of Password Safe:


- No installation is required. Simply download and double click the pwsafe.exe file.


- Easy portable. Just copy and paste the EXE file and .dat database file to any disks. Be aware that when you open Password Safe in the other disk, you need to specify the database file location (the .dat file).


- One master password unlocks an entire password database that can contain all your other passwords.


- Grouping. Usernames and passwords can be grouped into different categories you define, eg. Email Address, Payment, etc. You are in total control.


- Strong, random password generation.


- Copy username and password to clipboard so that you don't have to type them. Always keep in mind that you should never type any username and password.


- Browse to URL. With one click, the URL related to your username and password can be opened in your default web browser. Another save on typing.


- You can create more than one password database (but you have to memorize more than one master password. Not recommended.)


Here are some tips of using Password Safe (version 2.04) and managing password in general.


Tip #1 - Always create a strong master password (Safe Combination as used in the software).


Strong password should meet the following criteria:


- At least 8 characters long to prevent cracking. The longer the better.


- The password should contain lowercase, uppercase, numeric, and any other characters that are available on keyboard.


- Ideally you should not use any meaningful words or numbers in the password. Totally random password is the best.


Tip #2 - Let PasswordSafe generate random password for you.


To generate random password:


- Click the menu item Edit.


- Select Add Entry (or use corresponding icon button).


- When the dialogue window opens, on the right hand side, you can see a Random Password Generate button. Click it, a random password will be automatically inserted in the Password field.


The generated random password is constructed according to the password policy defined in Password Safe. You can modify the default policy.


- Click the menu item Manage. - In the dropdown menu, click Options. - Click the Password Policy tab. - Change the policy based on the strong password criteria stated above.


Some sites only allow alphanumeric passwords so make sure you select the appropriate check boxes when this is the case.


Tip #3 - Very Important: Never type your master password when open PasswordSafe.


Keylogger spyware can record keystrokes.


How can you enter master password without typing? I do this.


Step 1: Open a Notepad file (.txt).


Step 2: Copy and paste an article from any Internet website to this .txt file.


Step 3: Select characters from this article and copy, paste to form your master password.


Tip #4 - Very Important: Never lose your master password.


I memorize my master password. In addition, I also physically write it down to a hand written study material that has my previous uni works. Among the 1,000's of words, I placed my 22 characters master password in two different pages in encrypted format that can let me derive my master password.


Tip #5 - Categorize username and password.


When you add a new entry, you need to specify Group, Title, Username, Password, and Notes. The entries that share the same Group name will be gathered together automatically.


One Group can contain another Group as its sub Group. For example, I have Email Address group which contains three sub-groups as Friend, Work, Family.


Tip #6 - For security reasons, always use Copy Username to Clipboard and Copy Password to Clipboard.


Remember, never type username and password on a web form. This is how to do it.


- Highlight an entry.


- Right click mouse.


- In the pop-up menu, select Copy Username to Clipboard or Copy Password to Clipboard


- Go to your login form, paste the username or password.


You can use mouse to do copy and paste. If you prefer short-cut keys, this is how.


Copy: Ctrl+C Paste: Ctrl+V


Tip #7 - Use "Browse to URL" rather than typing URL in browser address bar.


When you enter a new entry or edit an existing one, you can enter a URL (must start with http://) at the first line in the Notes field. You can save website login page's URL in this field. When you need to open a login page in browser, right click the entry and click Browse to URL in the pop-up menu. Then the login page will be opened in your default web browser automatically.


Tip #8 - Don't forget to backup your password database file.


Use the Make Backup menu item to save a second copy of your password file.


Tip #9 - Store your backups in a different offline computer or location.


This is a widely used backup strategy.


Tip #10 - Use the Notes field to store as many information as you want. Very handy for memo.


If you don't have two computers, you need to use other storage media to save a second copy of your backup file and version them by date (easy to track back). Other storage media can be zip drive, thumb drive, floppy disk, CD, etc.


Off site backups are also important. Don't overlook this. You lose all your data if you lose both your computer and your other storage media all together for any reason.


Many companies provide online storage services for a fee. You can store any digital files (you should password protect these files first) on their secure servers. Search Google and you will find a lot.


I have two computers. One is used to surf net and it does not have any sensitive info stored on it. Another one is for my development work (not connected to Internet) and it has my backup files. I also store my backups in a thumb drive and CDs sometimes.


The author, Jerry Yu, is an experienced internet marketer and web developer. He is a proud member of YMMSS. Visit his site Get Paid Full Time Income By Reading Ads Online - YMMSS for FREE "how-to" step-by-step action guide to kick start a successful online business, tips, knowledge base articles, and more.

Top 10 Ways to Get Spyware or Viruses on Your Computer.

virus-spywareIf you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Many people want to know what they did to get infected. Unfortunately, usually it was just one wrong click.


Here are the top reasons people get infected and how to prevent these common internet security threats.


10. Exchanging files in chat rooms.
You should never download files from sources you don't trust. Viruses and other internet security threats can look like valid files or photos. Always scan files with a virus scanner before opening them.


9. Clicking on popup ads.
If you're like most people, you probably don't like popup ads. But whether you like them or not, you should never click on them. Popup ads can take you to a website that secretly downloads adware onto your computer. Enabling a popup blocker on your computer can help protect you. Some popups come from adware programs that have downloaded onto your computer, so if you still see popups after installing a popup blocker, scan your computer for spyware or adware.


8. Email attachments.
Viruses can be sent out as email attachments to infect your computer if you open them. If you download your email into an email program, scan all email attachments with a virus scanner. Most major webmail programs scan attachments before you download them, but you should still not download files from unknown sources. "Phishing" email, claiming to be from your bank or other financial institution which asks you to provide personal information or download something to your computer is another common email threat.


7. Instant messaging.
Because people are cautious with email attachments, new viruses are spreading through instant messaging programs. Infections look like valid files or photos, so always be careful accepting file transfers, even from sources you trust.


6. Downloading music.
Many websites that advertise free music downloads are loaded with spyware. You can even get spyware from these websites without manually starting a download. Other sites make you accept a spyware download to get the music you want.


5. Browsing websites.
Some websites use "drive-by downloads" - misleading dialogue boxes to secretly install spyware programs. Sometimes spyware can install even if you do not choose "yes" or "accept". Keep your browser security settings on default to protect yourself against these infections.


4. Installing free programs or screen savers.
Check the license agreement of any program you install to confirm it does not come bundled with other programs. License agreements are supposed to explain if the software you are downloading will cause advertisements or other downloads. These programs may have long or confusing license agreements where they have buried this information. Always carefully read what you agree to before you download free software.


3. Adult-related websites.
Many of these sites make a profit by forcing viewers to download spyware and adware to access their site. You may not be able to view these sites if you are using a secure browser or have your security settings too high.


2. P2P programs like Kazaa or Limewire.
If you share music using peer-to-peer networks, you may be forced to download advertising software onto your computer. This software can generate popups from within your computer. In these cases, you may see popups even if you are not online.


1. Gaming websites.
It may seem that viewing spoilers for online games will let you win faster, but it can slow down your computer with spyware. Mick Lathrop, part of StopSign's Spyware Research team says, "I get most of my spyware samples from gaming-related websites." Avoid any site that requires a software download to access information.


Even if you have an anti-virus product on your computer, confirm that it protects against the growing threat of spyware. Enable a popup blocker and firewall for further protection. Using safe browsing habits and good security software can keep you safe on the internet.


Marla Porter is part of the Product Development Team at eAcceleration Corp., the makers of StopSign anti-virus and spyware remover. StopSign detects and removes viruses, trojans, spyware, worms, keyloggers and browser hijackers. Learn more about StopSign at http://www.stopsign.com. StopSign is a product of eAcceleration Corp: http://www.eacceleration.com.

Tuesday, February 20, 2007

Tips For Stopping SPAM.

If you are buried in SPAM then you're not alone. It's been suggested that as much as 50% to 75% of the e-mail traffic on any given day is SPAM. Reading through SPAM is a waste of your time and it subjects you to potential viruses, trojan horses, and sexual material which can be quite offensive. Here are some tips on how to win the SPAM war:


1. Use a throwaway email address when posting to public news groups and chat rooms and for your Yahoo or MS Messenger Chat accounts. You can get free email addresses at Yahoo, HotMail and other places. Use your personal ISP-provided email address only to communicate with trusted sources. If you are an AOL user then set up an additional email account to use for public posting purposes. When your free or spare email account starts getting abused just close it and open another.


2. Take the time to set up different email addresses for different purposes. Have one for business communications, another for personal and another one for shopping online. That way you can avoid the risk of exposing one e-mail address to all of your contacts.


3. If you own your own web site then the chances are that your hosting account comes with the ability to create new e-mail addresses on the fly. These are addresses that will automatically forward to your main address. If you have that capability then use a unique address for each web site or mailing list that you choose to join. For example, if your site name is abc.com and you decide to join the mailing list located at xyz.com, you would join using the address xyz@abc.com. If you start getting SPAM to this address then you know that the people who run xyz.com are responsible. You can complain to them and their ISP and you can easily delete that email address.


4. Don't list your email address on your own web site in plain html or as a link to a contact form. Spammers use automated robots to capture these addresses and add them to SPAM databases. Instead use an email cloaking script whenever you need to show your email address. You can search at Google.com using the phrase "email cloaking" and come up with a lot of options. Just pick the one that works best for your particular needs.


5. Do not buy anything from a company that sends you SPAM. Not only might the company or offer be a scam but you are jumping right into the fire by letting spammers know that your email address is active and that you buy from spammers. Your address will be sold to thousands of other spammers.


6. Never reply to a spammer or click the "remove my address" link. That only lets them know that your address is good.


7. If your email service or email client comes with SPAM filters use them.


8. You might want to think about subscribing to a SPAM prevention service. Search on Google.com for "SPAM prevention service" and review your options.


Following these simple tips could cut your SPAM down by as much as 90%. Wouldn't that be great!


Copyright ฉ 2004 Cavyl Stewart. Discover 52 Ways To Do More With Software by signing up for my exclusive Free ecourse. Get resources, tips, reviews and recommendations you can use right now to help you achieve more, easier, and cheaper! 100% Original content. Visit: http://www.find-small-business-software.com/52ways.html

Protecting Yourself With A Porn Filter.

The harmful affects of pornography use and addiction are well documented by science. As with most things in life, prevention is the most effective way to avoid ever having a problem with pornography.


The internet is a wonderful place to access information, read updated news, and connect with people from all over the globe. Unfortunately, pornography on the internet is everywhere, and it isn't always easy to avoid. Even people taking responsible measures to keep porn off of their computer screens can stumble across it sometimes. The tips found in this article will help you protect yourself and your family online from inappropriate pictures and text.


Take measures to filter spam. Spammers can make money if only one person of the thousands of people they send sexually explicit emails to clicks on their ad and pays for their service. Do everything you can to keep those emails from ever reaching your inbox. If you have allowed your children to have their own email accounts, filtering spam is the best way to ensure inappropriate images never become accessible to them through email. A quick list of things you can do to eliminate spam includes:



  • Only give your email address out to people you know and trust. Do not put your personal email address down for every mailing list or website that asks for it. Many free email services exist now - set up a free account with one of them and use that to sign up for mailing lists.

  • Never click on any links in spam and if at all possible, avoid ever opening the email. Both of these actions confirms to spammers that you actively use your email account and you will likely start to receive more spam.

  • Purchase and use a spam filter. Many come packaged with a porn filter as well as other features that will help keep inappropriate content off of your computer screen.


  • Be careful what you download. This should be a universal precaution you take by now each and every time you download something off the internet. Viruses, spyware, and pornography can very easily be hidden in the files that you download - prevention in this case is much easier than fixing the problem after the files have already made their way onto your hard drive. Only download files from sources that you trust, and if you ever have a question as to whether something contains a virus or pornography, do NOT download it.


    Use a search engine to find websites. Pornographers use domain names that are similar to popular websites or brands in hopes that people will type in the address incorrectly and end up at their pornography site. I knew a child that wanted to look up codes for his favorite video game, so he typed in the name of the game and ".com." He had the presence of mind to close the browser and tell his parents, but was still exposed to the material.


    One of the best ways to avoid this is searching for the address in Google. Then you can preview the results in a text-only format before clicking on the link to go to the page. Many of the popular search engines have a built-in porn filter that you can adjust to control the type of content you don't want to appear in the search results. Others even offer "for kids" versions of their search engines that only return pages deemed appropriate for children.


    Use filtering software that includes a porn filter. No matter how careful you are about the sites you visit, chances are good that someday you will accidentally come across a porn site. A porn filter will help ensure that inappropriate material is blocked when you or someone in your family stumbles across a pornographic website. The parents of the boy who stumbled across pornography while looking for his favorite Nintendo game quickly installed a porn filter to make sure their son was protected in the future.


    Avoid pornography offline. Porn was around long before the internet. Carry around your own internal porn filter and avoid places that you know will have inappropriate images, movies, or books displayed. If your children are with you, be extra cautious of where they are in the store. If you think there is a chance that they may be able to access inappropriate material while you are shopping, let the store manager know of your concerns. Likely, you are not the only one who is worried about the issue, and real changes can come about from one person simply speaking up.


    Take the appropriate precautions now to avoid pornography. If you or someone you know has a problem with pornography use or addiction, seek professional help. Pornography problems not only affect the individual viewing the picture but everyone who interacts with that person.


    Nick Smith is a client account specialist with 10x Marketing - More Visitors. More Buyers. More Revenue. For a porn filter and more information about protecting your family online, visit ContentWatch, Inc.

    The Tasteless Internet Meat of Criminals.

    Spam. You've all heard of the crazy pink meat in a can, but what's it got to do with the Internet? Well, it's also the namesake for a major problem in the World Wide Web-unsolicited junk email. Problem! We're talking serious pain in the butt both as a waster of time, space, and money. It is estimated that around half of all email received on the Internet is this sneaky illegal attempt at selling fake consumer goods, pornography, and a whole plethora of 'helpful' services. It's taking up half of all email on the Earth, and it's costing businesses' billions in wasted time, as well as filling personal email accounts to the limit so important messages aren't received. It seems everywhere there's a leap in technology for humanity, there's also a group of people who want to stretch the realm of criminal activity to another level.


    The good news is that as it's such a prominent problem, the 'good guys' have made it a main priority on their 'To do' lists. Software has been created to block Spam and is being updated constantly. Recently Bill Gates, richest human on Earth and self-made mogul of software masters' Microsoft spoke of his aim to eliminate Spam by the year 2006. Obviously a lot of people would be quite appreciative if they could achieve this goal.


    Supposedly most of the billions of junk emails originate from about 200 people who are intelligent enough to cover their tracks. They have multiple ways of finding out email addresses and then sending thousands upon thousands of unwanted messages to you and I. It usually costs them next to nil so if even one low-quality product sells they receive a profit. That's why they do it; just another greed-induced means of getting rich quick without working for it like the rest of us.


    Well, there's a couple main ways of dealing with the Spam dilemma. The main one, and most easy, is to just delete the messages or empty your folder (after moving desired messages to another folder) straight off the server without downloading or 'looking' at the messages. This gives the 'evil' sender the knowledge that you're not reading the mail and therefore the traffic you receive goes down dramatically.


    Another way to block the Spam is to use software like Magic Mail Monitor (http://mmm3.sourceforge.net/) or Mailwasher (http://www.mailwasher.net/), which work well at destroying the unwanted, pink, tasteless, unworldly email meat by showing you the mail straight from the server without downloading it.


    So, show the criminals you're aware and not ignorant and take the first steps to bringing the Spam Empire down. Protect yourself and eventually the Spam will go where all filth is destined, into the trash.


    About The Author


    This article is written by Mr.Jesse S.Somer who writes for M6.net.

    Internet Shopping - How Safe Is It?

    Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with. They are afraid of being scammed, and rightfully so. Online shopping can be a completely safe and rewarding experience provided you are dealing with a legitimate, reputable retailer. But how do you know if they are legitimate???  Here lies the "fear of the unknown."


    Well, as with anything in life, there are precautions to take, questions you should ask yourself, and signs to look out for. Provided you are careful with who you decide to purchase from, online shopping can be a very convenient and pleasurable experience.


    Important Safety Precautions:


    Take a good look around the website. Make sure you read their Privacy Policy. A privacy policy let's you know the procedures and methods they have in place to secure your personal information. Find the answers to these questions...Do they share your information with others? Some companies sell or distribute your information to other companies. You may wind up on everybody's mailing list. Do they have security measures in place to protect your information (i.e. SSL)? SSL is the abbreviation for Secured Socket Layer. SSL is security software that encrypts information transmitted between browsers. What this means in layman's terms is that your personal information such as name, address, credit card number, etc. is coded or scrambled so that anyone who may try to intercept this information as it is transmitting cannot read it. But don't just rely on them telling you that their site is secure, check for yourself. You will know when you are in a secure browser by looking at the bottom browser bar on your computer (lower right). If the browser is secure, you will see a security lock image. Also check the web address in your top browser bar. Secure web addresses begin with "https" whereas, non-secure pages begin with "http."


    Setting up accounts with online stores is quite common. However, many people are leery of this because they don't understand why it is sometimes necessary. Generally, the only information you are providing is your name, address, email address, and sometimes your phone number. This is all necessary information that the store needs in order to ship your order or contact you regarding your order. Setting up an account with the retailer usually provides you with additional such as tracking the status of your order. On the other hand, if the account set-up asks for more than just your basic contact information, then you may not want to proceed. You should not be required to provide your social security number, bank account number, or birthdate. This information is much more personal and should not be necessary to have an order shipped.


    Read the shipping and returns policies before making a purchase. Make sure you feel comfortable with them. Find answers to these questions...What is their shipping timeframe? Is it within a reasonable amount of time? Will they notify you if it will take longer than anticipated? What choices will you have then? Do they allow returns? Are there restrictions on what items you can return and explanations as to why? Do they make sense?


    Don't make huge purchases right off the bat. Make a small, low cost purchase with the company and consider it a low-risk test of their credibility. This allows the retailer a chance to prove themselves worthy of your business, but limits the monetary risk you are taking. Should all go well, you can make a larger purchase in the future with peace of mind, now knowing that this is a legitimate business.


    There are many advantages to purchasing online and as long as you are careful with who you choose to deal with you can reap the rewards.


    Here are some of the benefits:


    Convenience: Why fight the crowds in the stores, especially during the holidays, when you can sit at home on your computer and shop. And price comparisons are just a click away when shopping on the internet. There's no need to fight traffic running from store to store looking for the "best deal." You can have your purchase delivered to your doorstep within a few days.


    Prices: Online retailers and storefronts purchase their products from the same manufacturers. However, an online retailer doesn't have the costly overhead that a storefront has (i.e. Lease payments on the building, heat and electric, just to name a few). Therefore, the online retailer doesn't have to markup the price as much as the storefront in order to make the same profit. So you, the consumer, come out the winner!


    Store Hours: Online retailers are open 24 hours a day, 7 days a week. Shop at your convenience.


    So as long as you take some simple precautions, shopping online can be a very pleasurable, time saving and money saving experience.


    For safe shopping, great prices on lingerie, and excellent customer service, please visit our store at http://www.gottahavitny.com

    HackAttack

    P C. owners are constantly at risk from attacks by hackers. Spy ware, viruses, trogan horses, and all sorts of other malevolent programs are all trying to take control of your computer.


    What can we do about it? How can we be sure that we are properly protected against them?


    A hacker will generally not be interested in doing damage to your PC. His main interest is in gaining control of your computer so that he can use it to send out hundreds of thousands of e-mails in your name with the intention of crashing your mail server.


    This can get you into very serious trouble with the server. This is something that you do not want. How are you going to prove that you were not to blame?


    How do the hackers do it? What tools do they use?


    A port scanner. What is a port scanner? A port scanner can locate PCs that are on line and check for an open port. A hacker using a program such as 'Super Scan' can find an open port to gain entrance to your computer. Once in, he can use your computer as if it were his own. The only difference is that to all intents and purposes it is you that is causing all of the trouble.


    The main port that the hacker is interested in is port 80. This is the one that you use to log on to the internet.


    I am not going to confuse you with all the various programs that are designed to show you what ports are open at any particular time. What you need to know is how to protect your computer against these attacks.


    There are a number of programs designed to show you what is going on inside your PC. I will give you a short list of some that are recommended by some of the program makers.


    The one that I would not be without is: www.testmyfirewall.com As its name implies it will test your firewall for flaws and scan for open ports and any other security problems you may have. You do have a firewall, don't you?


    Another one is: www.pestscan.com This will scan for any nasties that are already on the computer.


    Lastly, I use: http://www.security.symantec.com This will run a security check of all my systems.


    Don't put of what you should be doing today. Make sure that your protection is doing its job. Check that you have the latest version of whatever protection you are using. An out of date system is worse than useless. It gives a false sense of security and suddenly you find yourself in serious trouble with your ISP.


    It is your responsibility to ensure that your computer will not cause problems for someone else. There are so many free systems out there that you have no excuse for not using one or more of them.


    Be safe. Be happy. Be responsible. All the best. ?Bob?


    ---


    Robert has been on line for over four years and earns a very good living from some of the very best affiliate programs on the web. This is one of his favorites. If you are interested in growing your very own opt-in mailing list in the shortest possible time, take a look now.


    http://www.bz9.com/robjfar 'It's free.'

    Security News