{"id":7011,"date":"2019-10-05T22:20:19","date_gmt":"2019-10-05T22:20:19","guid":{"rendered":"http:\/\/on-line-interactivity.com\/blog\/2019\/10\/05\/the-top-twelve-threats-no-computer-us\/"},"modified":"2019-10-05T22:20:19","modified_gmt":"2019-10-05T22:20:19","slug":"the-top-twelve-threats-no-computer-us","status":"publish","type":"post","link":"https:\/\/on-line-interactivity.com\/blog\/the-top-twelve-threats-no-computer-us\/","title":{"rendered":"The Top Twelve Threats No Computer Us"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><body>&#13;<\/p>\n<div align=\"center\">&#13;<\/p>\n<p><a href=\"https:\/\/on-line-interactivity.com\">&#13;<br \/>\n  <img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/on-line-interactivity.com\/blog\/wp-content\/uploads\/2019\/12\/abbtop.jpg\" width=\"800\" height=\"120\"\/><\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/p>\n<p>&#13;<\/p>\n<table width=\"800\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tr>\n<td colspan=\"2\">&#13;<br \/>\n\t  &#13;<\/p>\n<div align=\"center\">&#13;<br \/>\n\t     <script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 728;\ngoogle_ad_height = 90;\ngoogle_ad_format = \"728x90_as\";\ngoogle_ad_type = \"text_image\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"336699\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n         ]]><\/script>   &#13;<br \/>\n\t  \u00a0<\/div>\n<\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<tr>\n<td width=\"260\" valign=\"top\">\n<p>\u00a0&#13;<br \/>\n\t  &#13;<br \/>\n\t  &#13;\n\t  <\/p>\n<div align=\"left\"><span class=\"style23\">&#13;<\/p>\n<p align=\"left\" class=\"style23\">Article Navigation <\/p>\n<p>&#13;<br \/>\n        <a href=\"index.html\"><font size=\"3\">Back To &#13;<br \/>\n          Main Page <\/font> <\/a> &#13;<\/p>\n<p\/><\/span><\/div>\n<p>&#13;<\/p>\n<p align=\"left\"\/>\n<hr\/>\n<p align=\"left\"><script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 250;\ngoogle_ad_height = 250;\ngoogle_ad_format = \"250x250_as\";\ngoogle_ad_type = \"text\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"FFFFFF\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n            ]]><\/script><\/p>\n<p>&#13;<br \/>\n            \u00a0<\/p>\n<p align=\"left\"><b><a href=\"index.html\"><font size=\"4\">&#13;<br \/>\n      <span style=\"background-color: #FF6600\">Click Here<\/span><\/font><\/a><\/b><font size=\"4\"><span style=\"background-color: #FF6600\"> &#13;<br \/>\n      for more articles<\/span><\/font><\/p>\n<\/td>\n<p>&#13;<\/p>\n<td width=\"514\" valign=\"top\">\n<div align=\"left\">&#13;<\/p>\n<table width=\"99%\" height=\"114\">\n<tr>\n<td height=\"45\"><span class=\"style7\"><!-- Search Google -->&#13;<br \/>\n<center>&#13;<\/p>\n<form method=\"get\" action=\"http:\/\/www.google.com\/custom\" target=\"_top\">&#13;<\/p>\n<table bgcolor=\"#ffffff\">\n<tr>\n<td nowrap=\"nowrap\" valign=\"top\" align=\"left\" height=\"32\">&#13;<br \/>\n<a href=\"http:\/\/www.google.com\/\">&#13;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.google.com\/logos\/Logo_25wht.gif\" border=\"0\" alt=\"Google\" align=\"middle\" width=\"75\" height=\"32\"\/><\/a>&#13;<br \/>\n<input type=\"text\" name=\"q\" size=\"31\" maxlength=\"255\" value=\"\"\/><input type=\"submit\" name=\"sa\" value=\"Search\"\/><input type=\"hidden\" name=\"client\" value=\"pub-5712520513640847\"\/><input type=\"hidden\" name=\"forid\" value=\"1\"\/><input type=\"hidden\" name=\"ie\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"oe\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"cof\" value=\"GALT:#008000;GL:1;DIV:#336699;VLC:663399;AH:center;BGC:FFFFFF;LBGC:336699;ALC:0000FF;LC:0000FF;T:000000;GFNT:0000FF;GIMP:0000FF;FORID:1;\"\/><input type=\"hidden\" name=\"hl\" value=\"en\"\/><\/td>\n<\/tr>\n<\/table>\n<\/form>\n<p>&#13;<br \/>\n<\/center>&#13;<br \/>\n<!-- Search Google -->&#13;<br \/>\n<\/span><\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"22\">\n<div align=\"justify\"><span class=\"style7\">&#13;<br \/>\n                <font color=\"#FB7014\" size=\"4\" face=\"Tahoma\">The Top Twelve Threats No Computer User Should Ignore by  Kai Chandler<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"19\">\n<div align=\"justify\"><span class=\"style2\">by: &#13;<br \/>\n                <font size=\"3\" face=\"Times New Roman\" color=\"#FB7014\">Kai Chandler<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<div id=\"article\">\n<td align=\"left\" height=\"12\"><span class=\"style2\">The Top Twelve Threats No Computer User Should Ignore&#13;<\/p>\n<p>The internet is undoubtedly a fantastic resource for&#13;<br \/>families and offers a rich vein of educational content. &#13;<br \/>However, there are potential dangers &#8211; welcome to the&#13;<br \/>seedy world of viruses, spam, trojans, pornography, spyware&#13;<br \/>and other nasties. &#13;<\/p>\n<p>Here are the Top Twelve Threats No Computer User Should&#13;<br \/>Ignore: &#13;<\/p>\n<p>1. Viruses &#8211; A computer program that copies itself. They&#13;<br \/>often disrupt your computer system or damage your data.&#13;<br \/>Viruses are usually received by email attachments so be&#13;<br \/>careful opening anything from a dubious source. They can&#13;<br \/>affect anyone, for example, the destructive Mydoom worm&#13;<br \/>affected one out of three small and mid-sized businesses.&#13;<\/p>\n<p>2. Spyware &#8211; Sends information about you and your computer&#13;<br \/>to somebody else. Spyware may send the addresses of sites&#13;<br \/>you have visited or worse still, transmit personal&#13;<br \/>information. With today&#8217;s concerns about identify theft&#13;<br \/>this is a real worry. For example, CoolWebSearch may hijack&#13;<br \/>web searches, home page, and other Internet Explorer&#13;<br \/>settings. Spyware is normally received as part of shareware&#13;<br \/>or freeware downloaded from the web.&#13;<\/p>\n<p>3. IP Spoofing &#8211; A technique to gain unauthorized access&#13;<br \/>to computers, whereby the intruder sends messages to a&#13;<br \/>computer with an address indicating that the message is&#13;<br \/>coming from a trusted host.&#13;<\/p>\n<p>4. Trojans &#8211; An apparently legitimate computer program&#13;<br \/>that is really intended to disrupt and damage computer&#13;<br \/>activity by sending information, perhaps even passwords&#13;<br \/>onto a third party without you knowing. As an example,&#13;<br \/>recent emails entitled &#8220;Osama Bin Laden Captured&#8221; attempted&#13;<br \/>to download the &#8220;Trj\/Small.B.&#8221; Trojan if the embedded URL&#13;<br \/>was clicked. This trojan attempts to hijack the PC.&#13;<\/p>\n<p>5. Spam &#8211; Unsolicited mail often promoting products of a&#13;<br \/>dubious financial or sexual nature. Don&#8217;t leave your email&#13;<br \/>address on websites and internet bulletin boards as they&#13;<br \/>are harvested by spammers.&#13;<\/p>\n<p>6. Adware &#8211; puts advertisements on your screen. These take&#13;<br \/>many forms including popups, popunders and advertisements&#13;<br \/>that appear later, even if your browser is closed. Some are&#13;<br \/>sent using the Windows Messenger service which allows a&#13;<br \/>spammer to direct an advertisement straight to your&#13;<br \/>computer by sequentially sending messages to IP addresses.&#13;<br \/>Always irritating, they are also often of a pornographic&#13;<br \/>nature.&#13;<\/p>\n<p>7. Diallers &#8211; for those of us still with dial up modems,&#13;<br \/>dialler programs redirect calls to a very expensive number.&#13;<br \/>You won&#8217;t know until you get the bill.&#13;<\/p>\n<p>8. Hijackers &#8211; Hijackers take control of your web browser&#13;<br \/>and may reset your home page, search bar and search pages.&#13;<br \/>They can redirect you to undesirable sites or stop you&#13;<br \/>going to particular sites.&#13;<\/p>\n<p>9. Hackers &#8211; With so much personal data available online&#13;<br \/>to anyone with a password you must be sure your password is&#13;<br \/>secure. If you are using your mother&#8217;s maiden name, your&#13;<br \/>cat&#8217;s name or your birthday then your password is at risk.&#13;<br \/>Here are two tips for making a secure password. Method One -&#13;<br \/>pick two random unrelated three letter words and two&#13;<br \/>digits. Mix them up and what do you have? A secure password&#13;<br \/>such as &#8220;red19cat&#8221; or &#8220;hotpin73&#8221;. Method Two &#8211; pick a short&#13;<br \/>sequence of words such as Now Is The Winter Of Our&#13;<br \/>Discontent Made Glorious&#8217; and you have a password of&#13;<br \/>&#8220;nitwoodmg&#8221;. You could even change the I&#8217;s and O&#8217;s to&#13;<br \/>digits.&#13;<\/p>\n<p>10. Phishing &#8211; Emails purporting to come from reliable&#13;<br \/>sources such as Paypal, Ebay or your bank. Often wanting&#13;<br \/>you to verify your account details, they can look very&#13;<br \/>realistic but are generally scams to harvest usernames and&#13;<br \/>passwords. Always open a new browser winder and type the&#13;<br \/>address there, rather than clicking on the link provided.&#13;<\/p>\n<p>11. Hoaxes &#8211; Chain letters, scams, false alarms. At best&#13;<br \/>they take up time and bandwidth but at worst vulnerable can&#13;<br \/>be victims of fraud. Pass it on!&#13;<\/p>\n<p>12. Stranger-danger &#8211; For those of us with children &#8211; do&#13;<br \/>you know what they actually do when they are online? Are&#13;<br \/>they working on homework tasks, downloading illegal music&#13;<br \/>or pornography? Or are they chatting to strangers in chat&#13;<br \/>rooms? You should consider blocking access to undesirable&#13;<br \/>sites and logging their activity with a surveillance tool.&#13;<br \/>Oh, and don&#8217;t forget that where children are concerned,&#13;<br \/>computers should always be kept in a family room and never&#13;<br \/>in their bedroom.&#13;<\/p>\n<p>Three Step Action Plan&#13;<\/p>\n<p>There are three essential steps that should be taken to&#13;<br \/>ensure your PC is kept threat-free.&#13;<\/p>\n<p>Firstly, be sensible when opening attachments or following&#13;<br \/>email instructions from apparently reputable sites.&#13;<\/p>\n<p>Secondly, make sure you are using the latest service pack&#13;<br \/>of Windows as Microsoft is continually closing loopholes to&#13;<br \/>tighten up security.&#13;<\/p>\n<p>Finally, there&#8217;s a range of low cost tools such as&#13;<br \/>firewalls, antivirus, spam blockers and spyware killers&#13;<br \/>available. Like everything else they vary in quality and&#13;<br \/>you tend to get what you pay for so always do your research&#13;<br \/>first and perhaps try a free trial before getting your&#13;<br \/>credit card out.&#13;<\/p>\n<p>http:\/\/www.surfcontrols.com specializes in providing&#13;<br \/>reviews and recommendations of top-rated tools to help&#13;<br \/>protect your online experience. There&#8217;s a quick reference&#13;<br \/>list to dozens of top sites promoting different aspects of&#13;<br \/>safe surfing packed with useful information and there&#8217;s&#13;<br \/>also a great set of top tips for safe surfing.&#13;<\/p>\n<p>Copyright Kai Chandler (#12t5109)&#13;<\/p>\n<p>&#13;<br \/>\n About the author:<br \/>&#13;<br \/>\n &#13;<br \/>\n  Kai Chandler is a project manager and journalist <br \/>particularly interested in tools and techniques to protect <br \/>his family and computer against spam, porn, viruses and <br \/>malware. As a father of two he is keen to ensure that <br \/>his children enjoy a safe surfing surfing experience. His <br \/>reviews of the very best parental internet filters, <br \/>anti-virus, anti-spam, anti-spyware and surveillance tools <br \/>are at <a href=\"http:\/\/www.surfcontrols.com\" target=\"_blank\" class=\"navigation\" rel=\"noopener noreferrer\">http:\/\/www.surfcontrols.com<\/a>It&#8217;s essential reading <br \/>for any parent and computer owner. <\/p>\n<p><font size=\"-2\">Circulated by <a href=\"http:\/\/www.geekzonehosting.com\">GeekZoneHosting.Com &#8211; Register a domain name and get hosting for your own Adsense Website just like this one<\/a><\/font>&#13;<\/p>\n<hr size=\"-1\"\/><\/span><\/td>\n<p>&#13;\n            <\/p><\/div>\n<\/tr>\n<\/table>\n<\/div>\n<p align=\"left\">\u00a0        <\/p>\n<p>&#13;\n      <\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<\/table>\n<hr width=\"800\" noshade=\"noshade\"\/><a href=\"https:\/\/on-line-interactivity.com\/ADSENSEWEBSITES\">RETURN TO ADSENSE BUSINESS-IN-A-BOX MASTER ARTICLE INDEX<\/a><\/p>\n<hr width=\"800\" noshade=\"noshade\"\/>\n<div class=\"fb-share-button\" data-href=\"https:\/\/on-line-interactivity.com\/\" data-layout=\"button\" data-size=\"large\"><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fon-line-interactivity.com%2F&amp;src=sdkpreparse\" class=\"fb-xfbml-parse-ignore\" rel=\"noopener noreferrer\">Share<\/a><\/div>\n<p>&#13;<\/p>\n<div id=\"fb-root\"\/>&#13;<br \/>\n<script async=\"\" defer=\"defer\" crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v4.0&amp;appId=103650273035821&amp;autoLogAppEvents=1\"\/><!-- End of FACEBOOK SHARE BUTTON CODE --><span class=\"style6\"><br \/><span class=\"style2\">\u00a92019 - All Rights Reserved by <a href=\"http:\/\/HelpMeFindFreedom.Online\">HelpMeFindFreedom.Online<\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/span><\/span><\/div>\n<p>&#13;<br \/>\n<\/body><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; \u00a0 &#13; \u00a0&#13; &#13; &#13; &#13; Article Navigation &#13; Back To &#13; Main Page &#13; &#13; &#13; \u00a0 &#13; Click Here &#13; for more articles &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; The Top Twelve Threats No Computer User Should Ignore [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-7011","post","type-post","status-publish","format-standard","hentry","category-adsense-business-in-a-box"],"_links":{"self":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/7011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/comments?post=7011"}],"version-history":[{"count":0,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/7011\/revisions"}],"wp:attachment":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/media?parent=7011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/categories?post=7011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/tags?post=7011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}