You are viewing our Forum Archives. To view or take place in current topics click here.
(Read)(updated)tips for safety on the internet!
Posted:

(Read)(updated)tips for safety on the internet!Posted:

XXJVlagikzv2
  • Powerhouse
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
<<<<<<<<These are only a small few tips I will update this regularly >>>>>>>



We all know how many scammers and wannabe hackers there is on the internet, there are many things that can be done to keep the most important of your internet accounts safe!
Here are some useful tips and things to know.


Phishing scams and Avoiding them!

Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.

With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.

Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.

Tips to Avoid Being a Victim of Phishing

1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.

2. Dont use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browsers address bar to get into a website.

3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon in your browsers address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN
.







Viruses and worms
What Is A Virus?

A virus is a man-made computer program that infects a file or program on our computers. Each time the infected program is run, the virus is also triggered. It spreads itself by infecting other programs on the same computer.

What Is A Worm?
A worm is also a man-made program that replicates itself. However, unlike a virus, it does not infect other program files on the computer. Instead, a worm spreads itself automatically to other computers through email, over a network and via Internet Relay Chat (IRC).

How Do We Get Infected?


Viruses and worms can infect desktop computers, laptops and network servers and reach our PCs from email, web sites, downloaded files and loadable media (e.g. floppy disks, CD-ROMs and DVDs).


How Does A Virus Or Worm Infection Affect Us?
Unfortunately, the effects of an infection are pretty unpleasant. The virus or worm, can,

Disable the computer
Add, modify or delete files or reformat the hard disk
Steal addresses held in our computer to send on virus-infected emails to our friends, colleagues, clients or customers
Send unsolicited bulk email (spam) to those in our mail address books and other users





Cookies mmmmm

What Are Tracking Cookies?
When we browse web sites, the web server for the web site sends a cookie to our web browser (e.g. Internet Explorer), which it then stores on our computer hard drive.

Cookies are small text files containing information that identifies each user. When you move to another page or return to the site at a later time, the web server asks your browser for the cookie, so it can 'recognize' who you are.


How Cookies Can Affect Us?
Cookies are often used by advertisers to track our browsing and buying habits and create profiles of users for targeted marketing.

Multiple sites may read from the same cookie and share the information or, they can sell it on without the knowledge or consent of the user.

Although not a serious security threat, cookies are a privacy risk.





Types of Trojans and how to stop them

Commonly mistaken as a virus, a Trojan is a malicious program disguised as something else. It could contain a virus or worm, but it is not one. For a Trojan to be a virus, it would need to replicate. It is difficult to recognize a Trojan before it starts attacking your computer.

What can they do?
Trojans are just as destructive as viruses and worms. Because they do not replicate, Trojans have the victims unknowingly send them to other people.
most common use is for remote administration
.


How do you get them?
The most common way of getting a Trojan is by opening an infected attachment to an email or downloading an infected file and launching the executable.

how to avoid them?

Only download from trusted sites. Ask someone to verify it before opening attachments from an unknown person. There are also email Trojan hoaxes where people send email saying if you got a certain email, something will happen to your computer.

How to remove them?
To remove one, virus-protection programs need to be installed. Most can also detect Trojans and prevent them from causing harm. Keep in mind no virus protection program is 100 percent effective at stopping all threats.

Types of Trojans
The types of Trojans are remote access Trojans, keyloggers, password sending Trojans, destructive Trojans, denial of service attack Trojans, proxy/wingate Trojans, FTP Trojans and software detection killers. Each is dangerous and performs malicious actions in different ways.







PlayStation3 Data Theft
For your security, Sony Playstation Network is asking customers to follow this advice:
As there were usernames, email addresses and log-in details stolen from the PlayStation network user database, it is recommended that you change all of your passwords related to PSN as all data was stored in a plain text format!! Duhhh Playstation?WTF?

Also!
Be especially aware of email, telephone and postal mail scams that ask for personal or sensitive information. Sony will not contact you in any way, including by email, asking for your credit card number, social security, tax identification or similar number or other personally identifiable information.
Fraudsters can use your identity details to:
1.open bank accounts
2.obtain credit cards, loans and state benefits
3.order goods in your name
4.take over your existing accounts
5.obtain genuine documents such as passports and driving licences in your name.

so it is important that you be very aware and keep an eye on all you stuff i.e e-mails and other accounts!






Check how trusted a website is by going here [ Register or Signin to view external links. ]

These are only a small few tips I will update this regularly



Last edited by XXJVlagikzv2 ; edited 2 times in total
#2. Posted:
Adam-
  • TTG Senior
Status: Offline
Joined: May 02, 201113Year Member
Posts: 1,298
Reputation Power: 74
Status: Offline
Joined: May 02, 201113Year Member
Posts: 1,298
Reputation Power: 74
Thank you very nice post
#3. Posted:
iBanksy303
  • Resident Elite
Status: Offline
Joined: Apr 22, 201113Year Member
Posts: 212
Reputation Power: 8
Status: Offline
Joined: Apr 22, 201113Year Member
Posts: 212
Reputation Power: 8
Thanks this is a really good post
#4. Posted:
-Art-
  • TTG Master
Status: Offline
Joined: Aug 12, 201013Year Member
Posts: 886
Reputation Power: 37
Status: Offline
Joined: Aug 12, 201013Year Member
Posts: 886
Reputation Power: 37
Nice post, Keep it up.

Go into detail in the Type(s), Trojan E.t.c.
#5. Posted:
XXJVlagikzv2
  • Powerhouse
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
Adam- wrote Thank you very nice post


iBanksy303 wrote Thanks this is a really good post


Your welcome guys
#6. Posted:
-Ben-
  • TTG Champion
Status: Offline
Joined: Feb 03, 201014Year Member
Posts: 8,154
Reputation Power: 394
Status: Offline
Joined: Feb 03, 201014Year Member
Posts: 8,154
Reputation Power: 394
man thats a great post
good job
#7. Posted:
XXJVlagikzv2
  • Powerhouse
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
TTG_iTriKz wrote Nice post, Keep it up.

Go into detail in the Type(s), Trojan E.t.c.

yeah sure will...I will update it in about an hour or so and go into further detail in that area
#8. Posted:
-ReaperUK-
  • TTG Senior
Status: Offline
Joined: Jan 27, 201113Year Member
Posts: 1,643
Reputation Power: 0
Status: Offline
Joined: Jan 27, 201113Year Member
Posts: 1,643
Reputation Power: 0
Nice post helpful man....
#9. Posted:
XXJVlagikzv2
  • Powerhouse
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
put some stuff in on Trojans and a video
#10. Posted:
XXJVlagikzv2
  • Powerhouse
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
Status: Offline
Joined: Jun 07, 201014Year Member
Posts: 473
Reputation Power: 17
I added some info on the PSN situation!
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.