Back to: Home Page Back to: SUPPORT Page
SAFE BROWSING BEST PRACTICES
Recommended reading: safe-internet-browsing-best-practices
One of the easiest ways malware, spyware, and adware can access your computer is through downloads; therefore, it's important to take precautions when downloading content to your computer, whether it is a software program, the latest pop song, or a cool game. There are two things that provide the best defense against infected downloads: your computer's security programs and your own judgment. This is why it's important to make sure all of your security programs are up to date and that your firewall is turned on.
You can also protect your computer by treating all downloads as suspicious until you determine they are safe. The following tips will help you download content safely.
Save downloads vs. running them
When prompted, it is best to save a download to your hard drive instead of running it. This gives your antivirus program time to check downloads before you open them.
Read the rest here: Click me
Experiencing high internet usage?Games Apps and Online TV are currently the worst usage hoggers.
FAKE ANTI-VIRUS SOFTWARE and MALWARE (malware is hostile, intrusive or annoying software.)
Do not be tricked by 'scareware', such as pop-ups on your browser, that tempts computer users to download fake anti-virus software that may itself be malware.
Once installed, the software may steal data or force people to make a payment to register the fake product. Some malware mislead users by exaggerating reports about spyware, adware or viruses on your computer in an attempt to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases will also mess up your system.
Malware spreads through search engines like Google via a method known as "SEO poisoning." The sites are designed to game search engine algorithms and show up when users search for certain topics. It is always a good idea to Block Pop-ups in your browser preferences.
TROJANS and RE-DIRECTION TO FAKE WEBSITES
If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
"Do not download Flash Player from a site other than adobe.com," said David Lenoe, Adobe's product security program manager, in an entry on Adobe Product Security Incident Response Team's PSIRT blog. "This goes for any piece of software . If you get a notice to update, it's a good idea to go directly to the site of the software vendor and download the update directly from the source. If the download is from an unfamiliar URL or an IP address, you should be suspicious.")
GENERAL ADVICE ON HOW TO AVOID INFECTION IN THE FIRST PLACE:
1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
2. Check out what you are downloading. Only download media and applications from well-known and trusted Web sites, i.e. the developersí own web sites or the Microsoft/ Apple App Store. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
3. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through your Antivirus application.
4. Consider using firewalls and other security features.
5. Avoid Peer-to-peer sharing applications. Download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your machine. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks may apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hackingAre there any other Wi-Fi capable devices on your network (e.g. cellphones)?Reliability and security downloads are important. They prevent hackers from damaging your operating sytem (e.g. OSX) and its programs.
PHISHING AND POTENTIAL IDENTITY THEFT:
"Phishing" (also known as "carding" or "spoofing") refers to email that attempts to fraudulently acquire personal information from you, such as your account password or credit card information. On the surface, the email may appear to be from a legitimate company or individual, but it's not.
As a general rule, never send credit card information, account passwords, or extensive personal information in an email unless you verify that the recipient is who they claim to be. Many companies have policies that state they will never solicit such information from customers by email, and that includes your bank, credit card company, and Apple.I recommend installing an app which tells you how many Megs or Gigs you have used from the internet on your device.
Click here for Bandwidth+
Experiencing high internet usage? Did your internet stop working?
Any issues or topup requests, call the cellphone number or my landline telephone or email me or Skype me.
Only contact me after restarting your modem & devices.
To reduce usage: I recommend switching off your computer(s) when you do not use them. Alternatively you may unplug the network cable from the modem-router or switch off the wireless button of your laptop.
Usage could be any of the following:
1. Viewing online advertising: moving pictures or movies on websites.
2. Server-side type websites, e.g. Facebook, Google, that use built-in programs (apps) such as a built-in chat program, or a "preview".
3. Skype only uses much bytes when one uses voice or video (webcam).
In text-chat mode usage is minimal.
To switch of video receiving and sending open Skype, click Tools > Options > Video Settings > Untick "Enable Skype Video".
4. Online streaming movies. (for example Facebook or YouTube movies)
5. Talks are streaming videos.
that means that it is a live video&voice which downloads as you view it.
7. Compress and resize pictures before emailing/uploading them.
8. Convert scanned TIF pictures to JPEGs.
9. Block Spam emails by blocking their email addresses.
10. Online games (e.g. Casino games)
12. Change Facebook Account settings so that Facebook or Twitter stops sending automated email messages.
14. Websites with music running in the background.
15. Uninstall unwanted program such as peer-to-peer download-and-file-sharing programs. e.g. Limewire
16. Downloading music or videos or programs.
17. Llistening to internet-radio music. Similar to audio-streaming or voice-streaming.
18. Do not leave your web browser open on a site with automatically refreshing content.
20. Emails: Use "text-only" format instead of HTML.
21. Do not register to unnecessary mailing lists.
22. Facebook, chat, photos, music, slideshows, research, google, website editing, DropBox, movies,
23. Antivirus updates
24. Free automatic OSX security patches
25. Free automatic OSX service pack donwload
26. Free automatic OSX reliability patches
27. Online backup programs constantly backing up.
28. please do a full advanced virus scan of all your computers.If there is a virus on any of your computers which is either accessing an illegal network or is sending out automatic emails, then I may disconnect you after notifying you.In reading this, you acknowledge that Karl has no power to control the content of the information passing over the Internet and its applications, including e-mail; chatrooms; news groups etc, and that Karl cannot be held responsible or liable, directly or indirectly, for any of the abovementioned content, in any way for any loss or damage of any kind incurred as a result of, or in connection with your use of, or reliance on, any such content.The customer acknowledges and agrees that Karl shall without limitation have no responsibility for, or liability in respect of any data lost as a result of this system including the loss of emails.Karl urges customers not to reply to unsolicited mail or "spam", not to click on any suggested links provided in the unsolicited mail. Doing so remains the sole responsibility of the customer and Karl cannot be held liable for the Customer being placed on any bulk mailing lists as a result.
Where the customer has authorised a minor to use any of the Karl's services or access its websites, you accept that as the parent/legal guardian of that minor, you are fully responsible for: the online conduct of such minor; controlling the minor's access to and use of any services or websites; and the consequences of any misuse by the minor, including but not limited to transactions entered into by the minor using such access.Karl cannot be held liable for any business dealings you have with any third parties on the Internet. Further, Karl assumes no responsibility whatsoever for any charges you or any user of your account incurs when making purchases or other transactions in this manner. Further, the responsibility for ensuring compliance with all applicable customs and exchange control laws in connection with any such transactions shall be the customer's.
Terms and conditions may change without prior notice.
Fake anti-virus programs, unwanted programs, misleading applications:A fake (anti-virus or Registry cleaner) program is a type of misleading application that pretends to be security software, but which actually provides the user with little or no protection whatsoever and, in some cases, can actually facilitate the installation of malicious code that it purports to protect against. It lies that it can remove unwanted applications such as spyware or adware. These scams cheat users out of money by charging for their fraudulent product, but the personal and credit card information that users provide to register these fake products could also be used in additional fraudulent activity. Ref: http://www.symantec.comThey can even be disguised as needed video codecs or browser plug-ins to view web content. They also get onto your machine through unpatched software vulnerabilities. Ref: http://www.symantec.comOnline backup programs: is somebody offering you to backup all your confidentail data for you for free? I wonder how they cover their costs.In the case of experiencing high usage:
You may have a virus or peer-to-peer software installed on your machine.
Common peer-2-peer software is limewire, e-mule, e-donkey, Kazaa and Morpheus. Peer-2-peer software, if not configured correctly, will allow users on the internet to download software from your computer which can result in a large portion of your Gigs being used without you knowing about it.Scan your system for viruses (Full Scan) with a quality antivirus program such as Norton before changing any of your passwords.Do not unsubscribe from an unwanted mailing list, this only confirms to them that your email exists. Never contact your enemy.Peer-2-peer file-sharing programs:
- software to swap music, video and other files over the Internet. Many free P2P file sharing programs exist.
The settings of these programs need to be checked: Disable file sharing or the programs need to be removed:
e.g. BitTorrent, Ares, BearShare, Kazaa, Morpheus, Limewire, eDonkey, Overnet, eMule,
The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location.A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.Traffic is simply the number of bits that are transferred on network connections.A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 1.5mB (1.5megabyte = 1500 Kilobytes = 1500,000 bytes). This is typically large for a web page. In comparison, Yahoo's home page is about 887KB.
For comments and ideas please contact Karl. Back to: Home Page