Enter your email address:

Delivered by FeedBurner

Home Page








Subscribe here
Add to 

My Yahoo!
This page is powered by Blogger. Isn't yours?

Host your Web site with PureHost!

eXTReMe Tracker

  Monday, November 10, 2008 – Permalink –

WinPatrol Protection

Installation warnings

A favorite trick of spyware programs is to make changes to the Registry. They attempt to do this in the background without your knowledge. WinPatrol is like having a guard dog on duty to warn when intruders are skulking about.

Scotia, New York, August 9th, 2005

"BillP Studios announced today that results of recent tests show WinPatrol PLUS with R.I.D. will detect 100% of the top spyware threats on a Microsoft Windows-based PC. Recent results by independent testers confirmed WinPatrol's "Real-time Infiltration Detection" methodology is effective in alerting users to newly installed software."

"WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. You'll be removing dangerous new programs while others download new reference files.

WinPatrol isn't the only software we recommend for complete safety but with Scotty on Patrol you'll find yourself informed on what's going on inside your computer. WinPatrol puts you back in control of your computer so you'll know what programs are and should be running at all times."

See all Topics

Labels: ,

<Doug Klippert@ 3:53 AM

Comments: Post a Comment

  Friday, October 24, 2008 – Permalink –

Security and the Net

Is any place safe?

This from
"One of the biggest misconceptions is that hackers will target only large companies. The truth is computers get attacked for a variety of reasons. Some of these include the following:

  • Snooping: Reading private mail and other personal files.
  • Destroying or corrupting computer data: Making files unusable, or making a whole computer unusable.
  • Stealing computer data: Taking credit card numbers, e-mail addresses, company information and so on.
  • Stopping computers from functioning properly: Blocking incoming traffic so that intended users cannot get access, etc.
  • Misusing computer resources: Sending spam without you knowing it, etc.
  • Pranks: practical jokes, breaking in just because it's a challenge.

The bottom line, don't think your network is safe just because you're not that important or well-known. Assuming that you aren't personally targeted, moderately secure networks usually cause hackers to attack elsewhere. Yet attacks can come from many different sources and your computer should be equipped to deal with each of these types of attacks."


Check out your computers vulnerability at
(Gibson Research Corporation)

Also see:

See all Topics

Labels: , ,

<Doug Klippert@ 3:37 AM

Comments: Post a Comment

  Thursday, April 24, 2008 – Permalink –

Virus Information

Source list

"A virus is a type of program that can replicate itself by making (possibly modified) copies of itself. The main criterium for classifying a piece of executable code as a virus is that it spreads itself by means of 'hosts'.

A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable disk. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.

Viruses are sometimes confused with worms. A worm, however, can spread itself to other computers without needing to be transferred as part of a host. Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread.

Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms."


Virus Information

Google Directory

Panda Software:

Virus Course

This is a two-hour basic course, through which you will acquire a basic knowledge on viruses and on how to be protected against them.
The course consists of twelve chapters:

  1. The beginning.
  2. Basics.
  3. Viruses and their effects.
  4. Types of virus.
  5. Example of virus.
  6. Example of hoaxes.
  7. Virus entry-points.
  8. What is an antivirus program?
  9. How to combat viruses?
  10. Is my computer protected?
  11. Suspected virus infection?
  12. Some tips.

See all Topics

Labels: ,

<Doug Klippert@ 6:26 AM

Comments: Post a Comment