Internet Security

Internet Security is an important thing to have these days to safeguard against Hackers and viruses. Firewalls offer great protection by allowing you to control internet traffic flow through your computer, and block unwanted users from accessing your computer via the internet. I can recommend 2 such firewalls. ZoneAlarm by Zonelabs and Conseal PC by Signal9 Solutions. Both offer comprehensive security for your computer and are free to download. So simply click the links below and protect your valuable computer data today.

[Disclaimer]: I have posted this as protective and safety information ONLY . I in no way condone or encourage the malicious use of any of this information. I also accept no responsibility for any information which I provide. What you do with it is entirely up to you. You deal with the consequences :o)

Horizontal Rule

Security Tips & Updates


Security Tip: To increase computer security disable the File and Printer sharing option that provides other computers access to a machine running any version of Windows. Go to Start-Settings-Control Panel and double-click the Network icon. In the dialogue box that opens, search the list of installed network components for "File and Printer Sharing for Microsoft Networks." If this item is present, highlight it and then click the Remove button.

Virus Update: For those of you who have downloaded the lifestages.txt virus, click on the link to get the fix (Thanks go to Mikey for this virus fix).

Horizontal Rule

Internet Security Terms

I Have included some Internet Security terms, that might help you understand a little more about what is happening to you during your time on-line. I urge you to absorb this information, It's important if you are at all concerned about your system's security.

Denial-of-service (DoS) attack Flooding an IP address with data, causing computers to crash or lose their connection to the Internet. Most DoS attacks are aimed at large Web servers, with the objective of rendering the target site unavailable to visitors.
Distributed denial-of-service (DDoS) attack Using multiple computers to launch a DoS attack. A hacker comandeers several outside computers and uses them as platforms to launch the attack, magnifying its intensity and cloaking the hacker's identity.
Hacker Someone who deliberately gains access to other computers, often without a users knowledge or permission. Malicious hackers do this to steal valuable information, disrupt service, or cause other damage
IP (Internet Protocol) address The identifying number of a computer or other device. Two machines connected directly to the Internet cannot have the same IP address at the same time. Computers with static IP addresses (most systems with DSL or cable modem connections) always use the same IP address; those with dynamic addresses (most systems with dial-up connections) are assigned a new IP address each time they log onto the Internet.
Personal Firewall Software that keeps unauthorised users from accessing a stand-alone PC. It also prevents malicious programs from sending data out.
Port An electronic connection that allows data to travel between a client PC and a server over a network.
Port scan (or port probe) Data sent by a hacker over the internet to locate a PC or network and determine whether it has open ports that will accept a connection.
Stealth mode A protective setting that hides a port so it isn't visible over the internet. A port that has been put into stealth mode will give no reply to a port scan, thereby providing no evidence that a computer exists at the scanned IP address.
Trojan horse A malicious program masquerading as something harmless, usually an e-mail attachment or a download that you open and run. A Trojan horse opens your computer to incursions by a hacker.

Horizontal Rule


ZoneAlarm Firewall

ZoneAlarm by ZoneLabs

Conseal PC Firewall

Conseal PC by Signal 9 Solutions