Internet Safety

This month I want to talk about Internet Safety. Most of us go through our lives using the Internet for work, pleasure, and interpersonal connection. We surf, crawl, chat, utilize Social Networking and enjoy almost instantaneous access to information and multi-media. We don\'t generally think about the fact that the Internet is perhaps one of the last largely ungoverned places left on the planet. I defy anyone to say that the Internet is a 'Safe' place. Nothing this large and complex can exist without its inherent risks and dangers.

Command and Control and Intelligence are what the Internet was designed for; not to surf eBay or post provocative pictures in chat rooms. When you think about the amount of information we give away every time we log on to a site or post our latest pictures and video on our Social Networking site of choice it\'s a bit scary. It\'s scary in the fact that; you have no direct control over your information once you put it online.

The Internet is a goldmine of intelligence, but if you can find information on almost any subject almost instantaneously; then others can access personal and often confidential information about you. Firewalls, routers and passwords are great security features and we use them to keep unwanted intrusion into the personal information on our computers. All of these high tech security features mean nothing when we freely put our information in places where anyone can access it at will without the need to breach all of these security protocols.

So what\'s the solution? Never accessing the net is generally not an option. Living 'off the grid' is not only impractical; it\'s also immaterial in that somewhere; somehow there is information about you in someone\'s database. A picture tagged on someone\'s wall; a mention of your name in a paper or published newsletter. Any reference, mention or sniff of you will be searchable. Don\'t believe me; feel free to Google yourself. The very fact that you know what I\'m talking about has just proved my point. So even if you\'ve never been online, you could still become victimized by your information being there.

A lot of how we approach teaching people how to increase their online safety is based on our Personal Safety Triangle© concept. The first point on the triangle is Situational Awareness. Just like the real world there are places online that are inherently more risky or dangerous to visit. Part of Situational Awareness when it comes to Internet Safety is Education. Take the time to do some research and learn how computers and the Internet work. Also learn about Spyware, Malware, Phishing, Phreaking, Hacking, Cracking and other tools used to gain access to you or your information. Knowledge is not power, it is the ability to apply knowledge that makes a person powerful. Keep this in mind when it comes to Internet safety.

Target Hardening is the second point on the triangle, and is accomplished by the use of Threat Analysis to determine where you could be vulnerable, how access would be initiated and what information they would want access to. It is a series of step by step tactical decisions that examines all potential safety/security risks/deficits and takes pro-active measures to resolve them. It is important to understand that both security and the methods to bypass it are always evolving. What works today, may not tomorrow. Target Hardening is a dynamic and fluid process must take these ever changing variables into account.

Emergency Response & Mitigation is the last point of the triangle. In terms of your safety and security online this is the action and implementation of everything you\'ve learned and done previously. There are many levels of response for threats. Some are automated; such as when you\'re antivirus software detects and quarantines a suspected file. Others are as simple as blocking and unwanted individual on Social Networking or chat sites or as complex as involving international law enforcement. It is important that your response be commensurate with the threat. It is equally important that one is not hyper-vigilant or too lax in how they perceive and respond to potential threats online.

Internet Safety Tips
  • In families with children; keep computers in common living areas where adult monitoring and supervision can occur.
  • Use filtering and monitoring software to block unwanted sites or content. *There are a lot of easy ways to bypass these functions
  • Parents should check the 'Chat logs' that accompany online chat sessions as well as have access to all passwords/accounts for any young people in the house.
  • Educate your children on Internet safety protocols and responsibility.
  • Educate yourself on issues ranging from Internet safety and security and how criminals utilize the internet to stalk, lure or recruit potential victims.
  • Utilize a router to increase the security of your home network. If you use a wireless router ensure that the security features are locked so that your network is less vulnerable.
  • Utilize the firewall that comes with your operating system or on your anti-virus software. It is another layer of protection between your information and the Internet.
  • Antivirus/Spyware protection should be kept updated and always on. Scan your system periodically for threats.
  • Be aware of the limitations of security features on Social Networking sites. There is no such thing as a completely secure server. If security was that tight it would not be practical to connect and network.
  • Keep in mind when tagging photos, videos or other media that they become material for search engines. Always keep in mind that you have no control over who views this material or how its Metadata will be used once it is placed online.
  • Be wary when banking or giving personal information such as credit card numbers, PIN numbers etc online. There are many ways for identity theft to occur; it is a multi-billion dollar criminal enterprise. *Never give your SIN or other personal identification numbers as a requirement to join a site or group.
  • Be aware when utilizing online dating services or classifieds. There is limited security screening involved to become a member of these sites. Paying to join by credit card is not the same thing as a security check. These can only be accomplished through law enforcement. I\'m sure even Ted Bundy had a credit card or two.
  • Run a periodic check of your credit history. Equifax and Trans Union are a couple of the larger companies. The small fee that you pay is worth the peace of mind that no one is accessing your credit.
  • When on Social Networking sites or chat rooms, immediately block or report anyone that attempts to engage you in conversation or conduct that makes you uncomfortable or frightened. There are laws in place to deter this type of behavior. Report serious threats or incidents to the police or cyber tip lines.
  • Be extremely careful when responding to 'official' email. There are a lot of Phishing and Internet scams out there. If it sounds too good to be true then it is.
Kerry Sauve

Article Source:

About the Author
I am a full time Peace Officer and the Director of StreetSense Safety and Security Inc. Our company teaches Personal Safety and Self Defense courses, corporate team building and security training. I\'ve been involved in the combat arts for the past 25 years and enjoy teaching, running and spending time with my family

How to Make Computer Virus Free

By Stalis Ethica

Something weird can happen on your computer anytime. When you check email, work on a research paper or play a game, you may suddenly get a pop-up message noticing you that certain viruses have infected your computer. If have just downloaded a program or visited a website and all of a sudden your computer is crashing, running slowly, or rebooting itself, the it is likely that you are the victim of a computer virus.

A computer virus is actually a software program, which can get into your computer when downloading a file that has the virus. You must remove the virus so that your computer can run correctly. Computer viruses can wreak havoc on a computer system and start damaging other files. The viruses can cause multiple pop-up ads to come out, slow down your computer operation, and start stealing your personal information such as security passwords and bank account numbers.

Today it appears as if no one is safe from malicious code. Every several years seems to bring reports of a new, more harmful virus that can wreck our computers and networks. However, if your computer has viruses, you should not panic. It is time for you to fix the viruses. Following the correct tips for computer virus repair enables you to improve your chances of getting rid of the viruses from your computer immediately.

Here are the steps that you can try to make your computer virus and malware free:

  • Avoid opening suspicious e-mail attachments. Viruses usually enter your computer via e-mail attachments or temporary internet files. Thus, you should open one only if you are expecting it and sure about its contents.

  • Avoid visiting websites that are notorious for spreading malicious software. Peer-to-peer networks and pornography sites are commonly known for distributing various viruses that can harm your computer.

  • Ensure that your firewall is always active. Most computers come with a standard firewall program that can track the network activity of the computer and enables suspected malware programs from entering the system.

  • Install anti-virus software on your computer. Get the good ones and keep them updated.

  • Scan your computer regularly using your anti-virus software and select a deep or thorough scan so that the software can scan the entire file system. You should quarantine or remove any available viruses before they can spread and wreck your computer system.

  • Avoid carrying infected folders or files back into your clean computer after being recovered. Before you back up your files, conduct a virus scan of your entire computer.

After all, it is important to notice any behavior alterations in your system. If your computer slows down with pop-up ads that begin appearing or other unusual behavior starts occurring, then you should conduct a virus scan immediately. If the action does not solve the problem, then you need have your computer fixed by a virus specialist.

Stalis Ethica is an experienced article writer and a writer manager with scientific background. She specializes in writing informative articles in various niches.

Article Source:

  • Get this book to learn more on computer virus!

  • <center>

    Is Somebody Spying On You Through Your Webcam? How To Spot The Symptoms

    By Evgeni D Vial

    Malware has come a very far way..
    The internet is evolving, the techniques used by hackers are rapidly changing and thus making it harder to keep pace with them. Malware has come a far way since the launch of the internet, and nowadays it has become very easy to spy on someone.
    Lot's of people (mostly teens/young adults) find their way into breaking into your computer and stealing important data, such as bank account details, etc.. But they can also just peek very deep into your private life.

    How do they do this? Using a Trojan Horse virus.

    If you don't know what a Trojan is, think of it as if you left the backdoor open of your house, allowing anybody to sneak into your home, stealing stuff, and grabbing a key to the door so that they can return anytime without you knowing. Creepy huh?

    The Trojan Horse virus primary objective is to allow a remote user(the hacker) gaining access to a victim's machine without their knowledge. Once that has been achieved, the intruder can do anything with the machine that the user can do.

    The virus can perform a specific set of functions once it is executed:
    • Logging every character you type and send it back to the hacker
    • Capturing live feed from your webcam and microphone.
    • Delete sensitive files and data.
    That's right, and this is what nobody tells you:
    These kids have a very big sense of humor, and love to brag about what they have hacked in the past. For example, they upload some pictures of the victim on a forum (usually people with the same interest) and then they openly talk about how ugly the victim is, how much porn he visits a day and often how he/she managed to scare him so much they called the police.

    But frankly, the police won't do anything about it. And this is still infringement on privacy right?
    So we'll have to solve this ourselves (protecting with software)

    The problem is.. In the past few years, hackers have become very good at cranking out new, slightly altered, variants of their spyware, designed to evade antivirus detection. Basically, the trojan gets encrypted so antivirus products will detect some Trojans, but not all of them. 40 percent of the infected PCs that it spotted last year were already using up-to-date antivirus programs.

    Make sure you have a safe firewall running, an updated operating system, and an updated anti-virus solution!

    Spyware is a very big issue nowadays. With the upcoming technology, everyone can leap in somebody's life and follow every step they are doing. Want to know how to protect yourself against these kind of threats?

    Visit to raise awareness about this.

    Article Source:

    Undestand webcams better in order to protect yourself. Get Guide to Webcams now! Click on the picture below.