The non conformer's Canadian Weblog

August 9, 2013

The full extent of Internet crime – MICROSOFT FIRSTLY FAILED TO DO IT’S JOB

 

“Right now, the Internet currently has 2.6 billion people using it. It would be fair to say two-thirds are exposed,” says a digital forensic and security expert .   If ONE  were to recreate the Internet now it would NEED TO be done a whole lot differently  as it  was originally designed as a way to communicate and they had refused originally  to include in the design   the  thinking also of the security needs.  Most people with a computer still do not have adequate security protection and they do as a result have loads of viruses even on their own computers still..  they need better software protection.  https://thenonconformer.wordpress.com/2009/04/09/the-average-illiterate-computer-users-are-taking-a-great-risk/

.

Do  see

also
or

.

Microsoft Corp. is paying a hacking expert more than $100,000 for finding security holes in its software, one of the largest such bounties awarded to date by a high-tech company.  http://www.theglobeandmail.com/report-on-business/international-business/us-business/hacking-expert-wins-more-than-100000-exposing-microsoft-security-holes/article14746287/

.

hacker

Be aware of what’s happening. Be mindful of what you are clicking on.. Be aware of what you are downloading. Be aware of what e-mail you accept.. Be careful before you open your removable media.  Many malicious programs attack your computers and spread via USB storage. USB Disk Security can protect your computer against any threats via removable media. Update Windows and other programs often too. Computers are vulnerable to many threats that can inflict various types of damage resulting in significant losses. 

One reason for the multitude of security concerns faced by all computer users is that the internet and the operating systems were originally even not developed with computer data security in mind, thus many of the techniques security professionals are now trying to put putting into place are reactionary and the hackers are using these same methods to overcome the securities… Attackers have many  choices when deciding whom to target when attempting to steal sensitive information. They can target the consumer, their computer, the connection between the computer and the E-Commerce site, or the web server and the services that allow it to run properly for a start..

Just some Types of the common  Computer Security Threats
A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer or has convinced you to download it . Rootkits are not necessarily malicious, but they may hide malicious activities. Attackers may be able to access information, monitor your actions, modify programs, or perform other functions on your computer without being detected.
.
Botnet is a term derived from the idea of bot networks. In its most basic form, a bot is simply an automated computer program, or robot. In the context of botnets, bots refer to computers that are able to be controlled by one, or many, outside sources. An attacker usually gains control by infecting the computers with a virus or other malicious code that gives the attacker access. Your computer may be part of a botnet even though it appears to be operating normally. Botnets are often used to conduct a range of activities, from distributing spam and viruses to conducting denial-of-service attacks .
.

Adware is software that displays advertisements on your computer.
Advertising pop-ups
A backdoor Trojan allows someone to take control of another user’s computer via the internet without their permission.
Bluejacking is sending anonymous, unwanted messages to other users with Bluetooth-enabled mobile phones or laptops.
Bluesnarfing is the theft of data from a Bluetooth phone.
Boot sector viruses spread by modifying the program that enables your computer to start up.
Browser hijackers change the default home and search pages in your internet browser.
Cookies are files on your computer that enable websites to remember your details.
A denial-of-service (DoS) attack prevents users from accessing a computer or website..
Document or “macro” viruses take advantage of macros – commands that are embedded in files and run automatically.
Many of the most prolific e viruses distribute themselves automatically by email.
Worms are programs that create copies of themselves and spread via internet connections.  
Mousetrapping  prevents you from leaving a website.
Page-jacking is the use of replicas of reputable web pages to catch users and redirect them to other websites.
Parasitic viruses, also known as file viruses, spread by attaching themselves to programs.
Pharming redirects you from a legitimate website to a bogus copy, allowing criminals to steal the information you enter.
Phishing is the use of bogus emails and websites to trick you into supplying confidential or personal information or posting false mail..

The  “state-of-the-art internet hacking ” prevails because there were and are  so many back doors accessible (Definition of ACCESSIBLE. 1: providing access. 2. a: capable of being reached ; also: being within reach world wide do cause major damage or security breaches do still too often occur..

” The official Royal Navy website was shut down after a hacker compromised its DATA SECURITY  Computer details of former and current defence staff were posted  online by an unknown Romanian citizen known only via his codename as  TinKode. The hacker, who claims to have committed the breach after detailing  the incident on his blog, posted the “hash values” for staff passwords  on the internet. These hash values are essentially a key for cybercriminals to enable them to easily crack user passwords.”

How do you know your computer is Protected or infected? Unfortunately, there is no   one security program even that protects against all hackers.. sad but true, and  there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer’s normal operations. All are undesireable.

If someone is spying on your computer, usually a remote connection from another computer is used. Remote control of a computer is a big problem because not only is someone spying on you, but this method of spying leaves certain ports, or “back doors,” open. This causes system damage and allows computer viruses to install themselves through these doors without your knowledge.

” The security measures of online retailers vary immensely. The methods used to gather, store, and distribute information is implemented differently across the web. Many companies and corporations that collect sensitive data do not have proper security protocols put into place, which may compromise personal information. Common errors that online businesses make when processing transactions will be analyzed and critiqued. This includes information security and the protocols that they should put into place both in terms of their computer infrastructure, data collection and the establishment of personnel protocols, such as the handling of sensitive information and password changes. The transactions between the client and server will be examined along with the protocols used in the sharing of information, such as secure socket layers and their different certificates, encryption and security measures that are utilized. E-commerce firms must ensure that they control access to their information assets and the use of their networks by designing and implementing controls that will diminish the dissemination of sensitive information. There are possible vulnerabilities on a client’s machine that can lead to data being compromised before it is uploaded to the server. There are a multitude of possible scenarios where sensitive data can be stolen or misplaced when processing an online transaction. The methods used to steal and compromise sensitive data is dynamic and ever changing. Their purpose is to target applications and architectures that are widely used, such as instant messaging, email, standardized shopping carts, redundant coding schemes, database programs, and security techniques and encryption.   Traditional E-commerce security can be broken down into a three-tier model where the client, server, and database are    The monitoring of sensitive information, authentication techniques, virus detection tools, fraudulent connection discovery, database storage, encryption techniques, virus and cracking vulnerabilities, and firewall protection  is required by all…”

.

Even today still the 2 biggest requests I get  besides can I have some money? are what do I do with my Problem spouse? and my problemed, slow Computer 

see also

https://thenonconformer.wordpress.com/2012/02/01/how-can-i-speed-up-or-improve-my-home-pc-microsoft-computer-performance-overall/ 

http://postedat.wordpress.com/2010/11/16/microsoft-fix-it-even-improve-performance-safety-and-security-in-internet-explorer/

https://thenonconformer.wordpress.com/2009/02/22/windows-7-vista-computer-operating-systems/

 

Blog at WordPress.com.

%d bloggers like this: