Afforadble Web Hosting Company | Ever Smile Hosting

Check who is Invisible on Yahoo! Messenger (YM)

http://www.imvisible.info/

Check who is Invisible on Yahoo! Messenger (YM)
IMvisible is the one of the fastest free Yahoo Messenger invisible detector

Have you ever wondered why a person in your contact list appears offline to you all the time? Now you can spy your buddy to see his real yahoo status. Use our Yahoo Messenger Invisible Scanner to detect if a user is in fact offline or just invisible.“Internet Safety”
“Internet Safety” the term has been getting vague with the increasing virus outbreaks nowdays. PC Magazine once conducted a survey in which they asked the participants to rate their broadband ISP services and the results were astonishing. Most of users didn’t completely understand the seriousness of potential threats or how to protect their PCs. Here are the top 5 Myths about safe surfing over internet.

Myth 1 - I don’t keep important things on my PC, so I don’t have to worry about security. Your PC can be infected over internet
Long time ago,this was partially true… but the hybrid worms and viruses of today like Blaster, hidrag and others blindly spread across internet to thousands or millions of PCs in a matter of hours, without regard for who owns them, what is stored there, or the value of the information they hold for the sole purpose of wreaking havoc. Even if your computer is not attacked directly, it can be used as a zombie to launch a denial-of-service or other attack on a network or to send spam or pornography to other PCs without being traced. Therefore, your civic responsibility is to protect your PC so that others are protected.

Myth 2 - I can protect my PC if I disconnect from the Internet or turn it off when I’m not using it.
Wrong. You are a target,If you connect to the Internet at all. You could download a virus when you connect to internet and it may not be activated immediately, not until you read your email offline days after. Viruses nowadays spread wildly through USB/Pen drives, pirated cd’s or torrents or file from networks.

Myth 3 - I can protect myself from viruses by not opening suspicious e-mail attachments. Some viruses simply get activated by reading or previewing an e-mail
Wrong again. The next virus you get may come from your best friend’s or boss’ computer if his e-mail address book was compromised for simulating an attack. Hybrid worms can enter through the Web browser through loopholes and it is possible to activate some viruses simply by reading or previewing an e-mail. You simply must have a PC-based antivirus package or a firewall.

Myth 4 - I have a Macintosh (or a Linux-based system), not a Windows system, so I don’t have to worry about being attacked.
It is true that most attacks target Microsoft Windows–based PCs, but there have been attacks against Mac OS and Linux systems as well. Some experts have predicted that the Mac virus problem will get worse, because Mac OS X uses a version of Unix. And although these systems have some useful security features, they can still be attacked.

Myth 5 - My system came with an Anti-virus package, so I’m protected.
Not quite. Firstly, if you haven’t activated your antivirus to scan incoming web traffic automatically, you don’t have a good Anti-virus and malware protection software. Secondly, new threats appear daily, so an antivirus package is only as good as its last update so its a must to activate the auto-update features to keep your guard up against the latest threats. Thirdly, an antivirus package can’t protect you from every threat. Malwares, spywares are running in the wild out there and every now and then malicious code penetrate weak systems. You need a combination of solutions, including, at minimum, antivirus, a personal firewall ,an anti spyware/malware package and a plan for keeping your operating system and software up to date with

0 comments:

Copyright © 2010 - 2013 - Hacking is Good - is created by RAMKUMAR.M
www..ramtele.blogspot.com - RAMKUMAR.M