(Computer) SECURITY RECOMMENDATIONS - David Woodsmall
Complete Guides, Recommendations, HowTos, & Advice on Defending Your Computer
2/28/2020 - Optimized for Firefox 73.0.1 (Quantum)
COPYRIGHT 1992 thru 2020 - David R. Woodsmall
I created these websites ONLY to provide free information to help other people
NOT responsible for Errors, Omissions, out-of-date Data, or ANYTHING else
COMPLETE COMPUTER SECURITY INFORMATION (may be too much info for most people)
COMPUTER RUNNING TOO SLOWLY?
Computer infected??? Bugs/Recalls/Scams/Warnings
INDEX - RECOMMENDED INFORMATION Jump Table
MUST DO COMPUTER SECURITY PRECAUTIONS |
Bugs / Recalls / Scams / Warnings |
Codewords |
COMPUTER RUNNING TOO SLOWLY? |
Data Security |
Disguise your Email address |
Email |
Firewalls |
Instant Messengers |
I USE THESE ITEMS FOR PROTECTION - THIS IS OVERKILL |
JAVA CONSOLE VERSION |
MUST DOs |
Malware / Spyware Checkers |
Passwords |
Password Safes, Encrypted |
Plain Text |
Ports |
Preview Pane |
REFERENCES |
Registry Fixes / Problems |
Resources, other, Related |
ROOTKIT REMOVAL |
RUNNING TOO SLOWLY? |
SECURITY Information - Complete |
SHOULD DOs - MORE technical |
SHOULD DOs - MOST technical |
SPAM Information |
Suggestions |
Telephone Security, Portables |
TeleMarketers - Block Them |
Updates |
Viewers - free Microsoft |
Virus Checkers |
Virus Information - Complete |
What to do if you suspect you have virus or malware problems |
WHERE is this IP address located and who owns it
Windows TIPS |
UPDATING WINDOWS
Wireless Security |
RECOMMENDATIONS - MUST DOs
Remember, information about you is on your PC, perhaps even your SS#
PROTECTING YOUR COMPUTER
1) Get & Install the latest Microsoft Windows security updates.
This can be done automatically in lots of versions of Windows.
IN THIS DAY AND AGE, I WOULD ALWAYS SET IT TO UPDATE WINDOWS AUTOMATICALLY
OR
Recent versions of Microsoft's Internet Explorer have a pull-down to access
Your computer, and recommend needed Windows Updates:
Select Tools -> Windows Update
You will have a chance to decide whether or not to install particular updates.
NOTE: Microsoft generally releases updates on the SECOND TUESDAY of the MONTH.
Other Operating systems are also under virus attack - check for security updates.
Click here for Linux virus information
2) Avoid using any Instant Messengers
Most reliable virus checkers now check Instant Emails, but do they check
the IM that you use? Click here for more information on IM problems
3) Shutdown (turn off) the Java Console (even recommended by Microsoft)
Note that some sites will not display correctly if Java is not running.
The latest, released, Java Console is Java 8.0 Update 191.
I am using version 8.191
NOTE - Firefox NO longer uses Java
I use the Firefox plug-in NoScript to selectively allow and
block ALL scripts, Java, Javascript & Cross-Scripting.
4) Microsoft says TURN OFF JAVASCRIPT
if you are running Internet Explorer. This may cause some websites to not run correctly.
Note that some sites will not display correctly if JavaScript is not running.
I use the Firefox plug-in NoScript to selectively allow and
block ALL scripts, including Java, Javascript & Cross-Scripting.
5) Check for Security updates for any software that you are running.
Almost all software has had security problems which can allow identity theft
or other destruction. Click here for some sites that cover these security breaches
Click here for more information on IDENTITY THEFT
PASSWORDS
6) SET YOUR ADMINISTATOR PASSORD (ensure that you remember it!)
(This makes it more difficult for Malware to change your system settings).
7) Do not pick simple passwords - combine upper case lower case and symbols.
8) Make passwords at least 10 characters in length
9) Do not use birthdates, names of relatives or pets as part of your password.
10) Do not use words found in a dictionary as passwords nor as part of passwords.
11) Submit your password here, to find out how strong is the password.
Generate Secure Passwords here
See also Encrypted Password "Safes" - Click here
EMAIL
12) Do NOT open/read/view Email from unknown persons.
13) Do NOT open attachments that you are not expecting.
NOTE: There are now viruses that transmit themselves withOUT attachments,
and pretend to be from people you know.
14) Consider using an agreed-upon codeword in your emails (the subject line)
that include attachments, to people with whom you exchange attachments.
The codeword SHOULD mean that:
A) You sent the attachment, not a virus
B) That you checked your system and it is virus-free
I use "PACKRAT" as my codeword.
Other people are using my idea, and using their three Initials as their codeword.
15) Optionally, Read your email in plain text (not HTML), as some malware uses HTML.
Note that by not using HTML, any interesting effects created by HTML
will not be observed.
In Outlook 2003, click Tools -> Options -> Preferences -> Email Options and
check Read all standard mail in plain text.
ANTI-VIRUS - Use Virus Protection
16) Always run a well-reviewed VIRUS Checker,
Preferably as part of a full computer security suite.
Set it up to automatically get updates whenever you power up.
I always check for updates before checking Email or Browsing
I strongly suggest changing the scan option to scan ALL File types.
I strongly suggest using Symantec's Norton 360 Security Suite
It is still the top-rated, by most professional Testers.
It is about $75 dollars, but covers THREE (3) computers, has
Anti-Virus
Anti-Malware
Anti-botnet
Anti-Root-Kits
Scans incoming & outgoing Email
Can be set to scan the URLs on your FACEBOOK WALL
Scans Instant Messages (the major players)
Comes with an encrypted Password Safe (Identity Safe)
SafeWeb (alerts you if the web site you are trying to visit is known to be "bad".
I also use McAfee's Free Site Advisor plug-in in my Firefox web browser
Anti-Spyware
Software Firewall
Pulse updates (updates aer very quick and short)
Very fast and accurate detectiona and removal
PC Tuneup
Automated backup & Restore (has some free online storage for your backups)
I use and highly recommend Norton 360 for ALL Malware protection - NOT
Norton antivirus, Norton Internet Protectiuon nor any other software, ONLY NORTON 360
ROOTKIT REMOVAL
In this day and age, you will also need to occasionally run
some different Malware detectors, Especially ROOTKIT Removers
(Rootkits are very very stubborn forms of Malware, and they hide
extremely well).
(after at least backing up my System files via Creating a Windows Restore Point).
I run these three programs, in this order (They have saved me, before):
MalwareBytes Anti-Malware
Sophos Virus (and Rootkit) Removal Tool <= I generally found this to be the best for Rootkits
MalwareBytes Rootkit Remover (BETA)
OTHER MALWARE INFORMATION:
How Do I Know When a Virus Hits My Computer?
Viruses and Malware have been found in JPGs, PDFs, Word documents, Bluetooth Phones, etc.
COMPLETE LIST OF FILE SUFFIXES TO CHECK FOR VIRUSES
64-Bit Anti-Virus Programs (AMD64 / EM64T / x86_AMD)
LINUX Virus Checkers
On-line Virus Checkers
BROWSING the WEB (Internet)
17) Use Mozilla's Firefox instead of Windows Internet Explorer.
Internet Explorer 11.x was released - NOT for Windows XP or older.
(Note that Internet Explorer 13.x has been released, if you prefer it)
I AM using Firefox 73.0.1 (Quantum).
I do not update (anymore):
1) unless my plugins are already updated (they are)
2) or there is a security fix of some kind
There are a lot of exploits written to take advantage of the Internet Explorer.
NoScript - Version 11.0.12 - Extension for Firefox - YOU NEED THIS PROTECTION
NoScript blocks Cross-Site Scripting (XSS)
18) Remove temporary files and addresses of web sites that you have visited, after
you are down browsing. Most web browsers (Firefox, Internet Explorer,...) have
options that allow you to remove all temporary files, buffers and web addresses,
automatically when you exit your web browser. Examine your Browser's
security options for a means of deleting these potentially dangerous files,
A lot of valuable-to-hackers information is stored in temporary files on your
computer - files that you do not even know exist. Some commercial software, such as
Webroot's Window Washer attempt to remove these dangerous repositories
of potential identity theft. Norton and other companies make.
The FREE CCleaner works very well to remove temporary files.
CCleaner also contains a GOOD Registry cleaner/fixer, which I have used many times.
I have NEVER heard of CCleaner's registry cleaner causing any problems BUT DO ask
to have the Registry backed up before CCleaner actually makes the updates (it
will ask if you want the Registry backed up.
There is now a free, portable version of CCleaner (use from a USB stick).
19) Norton's 360 has a built-in Web Security feature that alerts you if the
web site is known to contain Malware.
I am also using a free browser add-on, called McAfee's SiteAdvisor, which
warns me if the website that I am about to visit is known to contain Malware, is
known to not contain Malware, or is not currently known to SiteAdvisor.
In my case, I am using McAfee's SiteAdvisor plug-in that attaches to my FireFox web browser.
SiteAdvisor also works with Microsoft's Internet Explorer.
Microsoft has added SiteAdvisor info to their new "bing" search engine -
Google, Yahoo and now bing (Livesearch) display McAfee SiteAdvisor info.
You can download SiteAdvisor Version 3.4.0 from here (Click)
And, being super seccurity conscious, I am also using WOT - Web-Of-Trust
I suggest that you use TWO of the above three add-ons.
20) COOKIES
I set Firefox to delete cookies when I close the program
You can optionally choose to save selected cookies.
CCleaner will remove cookies - I would have CCleaner run
automatically at Windows Bootup, and then close.
Another Firefox plug-in, allows a one click to remove cookies for
sites that you are currently visiting. This is NOT really ncessesary.
21) FLASH COOKIES
Flash Cookies are NOT like regular browser cookies, and they can NOT
be deleted by programs the delete regular cookies. Flash Cookies will
still track your browsing even if you have no "regular cookies".
I use the Free BetterPrivacy Firefox plug-in to delete Flash Cookies.
ANTI-MALWARE/SPYWARE PROGRAMS - Use Malware/Spyware Protection
You should need to run ONLY Norton's 360 Security Suite.
IF YOU HAVE PROBLEMS then RUN SEVERAL AdWare/Malware/Spyware DETECTORS.
Click here for more information on Malware
DISCONNECT FROM THE INTERNET WHEN NOT USING IT
22) If your cable modem has a switch that disconnects the modem from
the Internet (your ISP), consider disconnecting from the Internet
when you are not actually using the Internet (I do this).
This prevents attacks on your computer when you are not using it.
Newer (post 2003?) Motorola cable modems have this disconnect switch.
DO NOT TURN OFF YOUR INTERNET MODEM IF YOU USE VoIP for a phone
connection - such as Vonage, or Time-Warner's Digital Phone, or
SKYPE - as this will disconnect your phone(s).
FIREWALLS
23) I am now using ONLY Norton's 360 Software Firewall (I turn OFF the Windows Firewall).
You want to PREVENT Mlaware from sending your data OUT to the Internet.
I DO USE AND HIGHLY RECOMMEND A HARDWARE FIREWALL (they are cheap,
you probably already have one in your Router), with a Stateful Packet Inspection (SPI) feature.
Click here for more information about Firewalls
Click here for more information about Hardware Firewalls
Click here for more information about Software Firewalls
24) I also suggest a hardware firewall (check with BestBuy, or a similar place) -
Hardware firewalls are often built into Ethernet/cable and DSL routers (you
PROBABLY already have one, if you use DSL or Cable for your internet connection).
Preferable get a firewall with either Stateful or Stateful Packet Inspection.
Hardware Firewalls are now fairly cheap ($30 - $ 50 - ask at a reputable store,
such as CompUSA or Best Buy [among others]).
Hardware Firewalls can do a better job of protecting your computer from
from incoming attacks, than a software firewall.
Click here for more information about Hardware Firewalls
Even better, there are now (more expensive) DPI Firewalls.
SUGGESTIONS
Data Security Suggestions
1) Do NOT store your Social Security Number on your
computer - it is too easily stolen - nor your bank or sotck account passwords.
2) Remove all Turbo Tax (or whatever you use) information
immediately after you are done with it (store it on CD
or Floppy disks - somewhere not on your computer) - and avoid
going online as much as possible, while this data is
on your computer (spyware may steal your data).
3) Never store any of your passwords on the computer (in plain text form [ie, only if encrypted]).
4) Never store your 401K or Bank Account numbers permanently on your computer.
5) To file Identity Theft complaints with the Federal Government.
6) Consider using encryption for valuable data (too much trouble for most of us).
7) PERSONALLY, I would not store my data on the internet, but that is just my opinion.
General Suggestions
Don't install Demo programs unless you are really interested -
their installation or removal may cause problems
===== END OF SECURITY THINGS THAT YOU REALLY SHOULD DO =====
===== END OF SECURITY THINGS THAT YOU REALLY SHOULD DO =====
MORE ADVANCED THINGS THAT YOU SHOULD CONSIDER DOING
25) If possible, Close your Email Preview Pane (window).
(some viruses can be launched from the preview pane, without your
opening the Email itself):
In Microsoft Outlook 2003, click view and make sure AutoPreview
is UNselected.
In Mozilla Thunderbird, click view -> Layout and confirm that Message pane
is UNchecked. Pressing F8 toggles the preview pane on or off.
In Outlook Express 6, click view -> Layout and ensure that
Show preview pane is UNchecked.
26) Optionally, consider using a non-Microsoft Email program, such as
Mozilla's free Thunderbird. There are a lot of viruses written specifically for
Microsoft's Outlook, Outlook Express and their Address Books.
NOTE: Thunderbird 68.4.2 is out
I am using it.
Find the Best Email Software and Services - About.com
The complete guide to using Gmail with Thunderbird, Mozilla Mail
27) Make your file extensions VISIBLE:
Open Windows Explorer or any folder window and click:
Tools->Folder Options->View
Ensure that the option Hide file extensions for known file types is UNchecked.
Files that are executable (such as .com, .cmd .exe,...) are more dangerous than others.
Click here for more information
28) Check to see that your computer ports are closed (against hackers) (it's automated)
Your computer has thousands of "ports" that can be used be programs accessing the Internet.
Few of these ports need to be "open" (available for use by programs). An open Port can
be used by malicious software to gain access to your computer and/or information on your
computer. A lot of valuable-to-hackers information is stored in temporary files on your
computer - files that you do not even know exist. These open ports can be accessed by
Malware both on your computer, and not on your computer (on the Internet).
A port can be either OPEN (can be used to send/receive messages, including Malware),
CLOSED (the port will not process any messages, BUT an attacking computer is told
that the port is closed, meaning that an attacking computer now knows that your
computer exists, and may try to attack your computer, and STEALTH MODE,
where your computer port can not even be detected, nor will that port process any
incoming messages (denying Malware a chance to attack your computer via this port).
It is best if all of your Ports be in STEALTH MODE (some programs, games, etc,
will require that certain port(s) NOT be in Steath Mode (your software, games, etc.,
may need to use a paticular computer port.
I am currently using Norton's 360 Version 22.18.0.213 on my wife's computer. I've run
GRU's port tests, and found that ALL ports EXCEPT Port 22 are in Stealth Mode;
I don't yet know if I want to try to change port 22 from Closed to Steath.
Under my Zone Alarm Pro software Firewall, ALl ports are in Stealth Mode.
Some commercial software, such as Webroot's Window Washer attempt to
remove these dangerous repositories of potential identity theft. Norton (Symantec)
and other companies make similar products.
The Windows (DOS) command: netstat -an will list all your open ports.
(Start->Run->then type "CMD" and press enter.
Then enter the command: netstat -an.
For a list of netstat options, enter the DOS command: netstat /?
Batten Down Those Ports
Symantec Security Check
Click here for more information about computer ports
29) KEYLOGGERS / KEYJACKERS
A Keylogger's main purpose is to capture keystrokes made on your keyboard.
Captured keystrokes can yield your login IDs and Passwords.
Click here on HOW TO FOOL KEY LOGGERS - very useful on Trips
Because the keylogger is programmed to hijack data from the IE
"Protected Storage Area," Eckelberry recommends that IE users turn off the
browser's "AutoComplete" feature. That can be done by unchecking the
pre-checked boxes via Tools > Internet Options > Content.
The data stored in that IE feature is very lucrative for identity thieves.
The browser's AutoComplete tool is used to store all data entered on HTML
forms when purchasing products over the internet or filling out personal
information like addresses, phone numbers, and Social Security numbers.
It also has a feature that stores usernames and passwords for Web sites that
require you to login.
One example of this is online banking Web sites that include Web-based mail
servers like Hotmail or Gmail, he explained.
Some commercial software, such as Webroot's Window Washer attempt to remove these
dangerous repositories of potential identity theft. Norton and other companies make
similar products. These products, as far as I know, don't remove keyloggers, just
some of the data that keyloggers try to steal.
Click here for more information about Keyloggers/Keyjackers
30) ENCRYPTED PASSWORD "SAFES"
FREE with Norton's 360.
There is software available to protect your passwords and to provide them
to sites without you entering the passwords, preventing keyloggers
from capturing your passwords by logging your keystrokes. I do not know
how well these programs work. I am using Identity Safe, part of
Norton's 360 Security Suite. I have also heard about:
RoboForm 6.9 (ENCRYPTED PASSWORD PROTECTION)
More information on Password safes, including Free Versions
31) POP-UPS - Block them
Between Norton's 360 security suite and shutting down the Windows
Messenger Service (see the next line, below), you should not have pop-ups,
unless you have Malware on your computer.
Shutdown the POP-UPS from Windows Messenger Service
32) Optionally, consider disguising your Email address to confuse
Email address gathering bots, or use throw-away Email addresses.
Click here for more information on Disguising your Email Address
====== END OF OPTIONAL, MORE DIFFICULT SECURITY THINGS =====
====== END OF OPTIONAL, MORE DIFFICULT SECURITY THINGS =====
OTHER SITES WITH COMPUTER PROTECTION TIPS
R.U.N.S.A.F.E.
Ten Commandments of PC Security
WHAT TO DO IF YOU THINK YOU HAVE VIRUS / MALWARE PROBLEMS
How Do I Know When a Virus Hits My Computer?
Free malware check - are you Infected or Not? - Computer Helpers ...
Are You Infected? Detecting Malware Infection
RUBotted - a free program to find Out if Your PC is Part of a Botnet
A) Try running all of your anti-virus and anti-Malware programs, if the virus or malware
program will let you run them (lots of viruses try to cripple your anti-virus program)
ONLINE VIRUS CHECKERS
ONLINE MALWARE / SPYWARE CHECKERS
nanoScan - online Malware/Virus scanner - recommended by PC Magazine
B) I also occasionally use the free CWShredder - a CoolWebSearch Trojan Remover.
C If the Virus will let you, go to a web site that does free virus scanning and fixing
online (from their web site).
D If the virus prevents you from accessing anti-virus sites, and has disabled your virus checker,
you could (for knowledgable users) boot up a Linux CD with anti-virus programs in it,
that run from Linux to check Windows systems. Click here for more information
E If all else fails, purchase the highly rated Spy Sweeper, $30/yr, $ 40/2 years.
F I have also used, purchase SpyWare Doctor - $30
They offer a free scan, but charge the $30/yr if you want to remove the pests.
In my personal opinion, I prefer Spy Sweeper.
G) use Hijack This to capture data for experts to decipher for you
H) What to do if your system is infected - CERT
What to do when a virus is found on a computer
Dealing with an infected PC - Malware - Microsoft
Disinfecting macro viruses - Sophos
Procedures to nurse a sick and quarantined Windows computer back to health
BOOT CDs & FLOPPIES
I) Check with these free help sites
For more information on VIRUSES, Click here
For more information on MALWARE, Click here
For more information on SPYWARE, Click here
For more information on ADware, Click here
SHOULD DOs - More Technical
1) Set your Internet and Intranet trust Levels
2) SPAM filters - you may want to consider them.
Spam-Proof Your In-Box
3) Your passwords are probably easily revealed
4) No-Cost Ad Blocking - You should NOT need this
5) Block Web Ads - You should NOT need this
6) Read & follow PCworld's 10-step PC Security suggestions
7) Let Windows Handle PC Maintenance for You - schedule tasks
8) What is running on your PC - USE CAUTION IF YOU REMOVE ANYTHING
It is a good idea to back up your Computer Registry files
before making any changes. Windows XP makes a backup
everytime that you reboot, so that you have the option
of going back. For older versions of Windows, you may
need to manually create a registry backup.
1) I use Norton's 360 Registry Cleanup
2) Lately, I bought and use the Highly recommended PC Tools Registry Repair
to find and fix Registry problems.
3) I also HIGHLY recommend the free CCleaner for fixing Registry problems.TELEPHONE SECURITY - PORTABLE PHONES
1) Do NOT use analog portable phones - anyone can eavesdrop.
2) Get only Digital phones that use ENCRYPTION.
TELEMARKETERS - SLOW THEM DOWN
1) Get an UN-listed phone number
2) Get a "TeleZapper" - $50 (I think there are now some for $39)
Radio Shack, Best Buy,... sell TeleZappers.
A) TeleZappers generate a tone that tells automated calling
systems that your phone number is not good.
B) Newer automated calling systems supposedly ignore this
tone, but TeleZapper works for me.
3) List yourself with the national Do Not Call List
NOTE - this is somewhat scarey as:
A) It expires in 2008 ? - then "they" have your phone number
B) It won't block off-shore telemarketers
Do Not Call Registry Violation Complaint - www.donotcall.gov
4) Consider Caller-ID - but why should we need it?
5) Consider blocking incoming calls that do not identify their phone number
(I don't know what this costs - requires Caller-ID).
Check with your telephone service provider for costs and implementation.
6) The FCC requires phone companies to provide a FREE service whereby you can
press a few buttons after receiving a harassing phone call, and the FCC
will go after the caller, even removing their phone service.
DO NOT BUY CALLERID, which they push, DEMAND THIS SERVICE.
Free File Viewers for Microsoft products
Office Online File Converters and Viewers
WINDOWS TIPS
Windows Tips
WIRELESS SECURITY
1) Always use Encryption, preferably WPA2
A) WAP - Click here for more WAP info
B) WEP - Click here for more WEP info
C) WPA - Click here for more WPA info
D) WPA2 - WPA2 (WPA2) so far (9/2006) is the strongest wireless encryption publicly available.
Use WPA2 if at all possible.
2) Always use MAC addresses to block unknown users
(set your hardware to only accept connections from known hardware MAC addresses).
Because too many people know the defaults and too many users never change the defaults:
3) Always change the Router/Access point/Switch/Hub's login name of the Administrator account
4) Always change the Router/Access point/Switch/Hub's Administrator's password
5) Always change the Network Name (often called the SSID)
Click here for more information on Wireless Security
I USE THESE FOR COMPUTER PROTECTION
A Hardware Firewall/Switch/Cable Modem.
Symantec's Norton's 360 Security Suite - for THREE computers
(Anti-virus, anti-malware, anti-spyware, anti-netbots, anti-Root-Kits,...)
Piriform's Windows Crap Cleaner (you should use the free CCleaner) - deletes temporary files.
CCleaner can also clean your Registry file (works fine, for me).
I occasionally run Trend Micro's FREE CWShredder
I always install all Windows XP & Microsoft software updates as soon as they are released.
Note that Microsoft releases Windows updates on the Second Tuesday of each Month.
Occasionally, there will be an emergency release on other days.
For really stubborn (FREE ?) Browser Hijack problems, try HijackThis Version 2.0.2
Run HijackThis (2.0.2) and click Do a system scan and save a log fil
- highly recommended, although I have not had the need to use it.
- MORE HIJACK THIS INFORMATION & SITES THAT ANALYZE HIJACKTHIS LOGS
TO UPDATE MICROSOFT WINDOWS XP
1] Open an Internet Explorer window (You must use IE, not Firefox, Opera,...).
2] Click on Tools and select Windows Update
3] Then follow instructions.
4] Do this regularly, at least the SECOND WEDNESDAY of every month.
While Microsoft updates come out the SECOND TUESDAY of every month, sometimes
the updates are released about 6 PM Eastern Time, so I suggested Wednesday.
PROTECTING YOUR COMPUTER HARDWARE
You should seriously consider putting ALL of your
computer hardware on a good Surge Proector - ALL cables/wires going to your
computer should be surge protected. This includes any Ethernet and Phone
wires (if you use them with your computer), and your cable modem's Cable (if you
use a cable modem). EVERY electrical path into your computer should be filtered by
a surge protector to cut down on the risk of surges destroying some or all of your
computer.
Click here for more Hardware Proection information
SOME OF MY OTHER RELATED RESOURCES
64-bit Security Software
64-bit Virus Checkers
Acronyms/Glossary PC/SAN/NAS/QA/Wireless/Linux/Network/Video/Pharma/WIN/wms..
Advisories, Security & Virus
Adware
Articles on Computer Security
Articles on Viruses and related problems
Backdoors
Bluetooth
Books - Woodsmall's Recommended Technical Books
Boot Viruses
Browser Security
Cookies
Email viruses
Encryption
Ethernet / 802.xx
Firewalls
Glurges
Hardware, Protecting your
Identity Theft
Instant Messaging (IM)
IP Filters/Filtering, Port Forwarding & IP Firewall Administration
IP Masquerade
keylogging / keyjacking
Linux Security
Linux virus checkers for Windows and Linux
Malware
Modems
PDA viruses
Popups
Phone viruses
RAID
Registry fixers
Root-kit hacks
SPAM
Spyware
Trojans
Vandals
Virus Information
Web bugs
WHERE is this IP address located and who owns it
Wireless Security
Worms
REFERENCES
Security / Virus Books
Complete Computer Security
Virus Info
Woodsmall's Recommended Technical Books
OTHER RESOURCES - Caveat Emptor
stay tuned
OTHER INFORMATION
- Acronyms / Glossary
- Woodsmall's Recommended Technical Books
- Bioinformatics / Pharma Information and Terms
- BUGS / RECALLS / SCAMS,... Page
- Buses & Networks, other
- Closings **
- Connectors, Pinouts & Wiring Info
- DATABASE Info
- Digital - DVD, Music, Photography, Printers, Recording, Video
- DISABLING SYSTEM RESTORE - Sometimes needed while eradicating stubborn viruses
- Embedded / Firmware / Real-Time / Driver Information
- Encryption, Compression, RFID, Smart Cards, AI, & Fuzzy Logic
- ERGONOMICS
- Ethernet, 802.11x, Fast Ethernet, Gigabit Ethernet, isoEthernet
- Fibre Channel
- GRAPHICS INFO
- Hoaxes |
- HOME SECURITY & HOME MAINTENANCE
- HOTEL/MOTEL INFO
- HOUSE & TAX INFO
- IP, IPsec, IPv4, IPv6, FCIP, iFCP, PPP, SoIP, TCP, TCP/IP, TOE, VoIP
- LEGACY computer LANGUAGES / Architectures
- Linux
- MAPS
- Myths |
- NetWare
- Network, Buses, USB & Communications Info
- NEWS LINKS
- NEWS - Current Technical
- NORTH CAROLINA INFO
- Organizations
- PERSONAL: airlines, airports, cars, discount, tires, Financial, Fix-it, Movies, ETC **
- Pharma / Bioinformatics
- Problems - Bugs - Recalls - Scams - Warnings
- Programming, Agile, C, C++, Design, Algorithms, Patterns, OO, Refactoring, ADO
- QA
- Recommended Computer Security Steps
- REFERENCES |
- References - Other, Postage, Converters, Dictionaries, Languages
- Registry Fixes / Problems |
- SAN / NAS / SATA / Storage / CIM / Device Discovery
- SCSI / iSCSI / RAID / SAS / SMI-S
- Searching
- Secure Connections
- SECURITY, Computer
- SPAM Information
- Standards
- Technical, Mostly Computer, Info
- Testing
- TIME, TIME ZONE INFO
- TOOLS (power, hand, wood)
- TRAFFIC **
- TRAVEL INFO
- UML
- UNIX
- Virus Info
- Vista
- WEATHER & TIME INFO
- Web Development: C#, CSS, DHTML, HTML, Java, JavaScript, Perl, Python, Ruby, VSGML, VBScript, VRML, XML,...
- Windows Tips
- Wireless / PDA / Handhelds
- XP Info
- I am NOT a business of any kind, and make NO money providing this information
- There is NOTHING for sale here - Feel free to link to any of my web pages
- I am sorry that I am not able to help you with your problems
** CLICKING ONCE on a Desired, Listed subject will take you to that information **
- Privacy Policy
- Terms of Use
- We NEVER get paid anything for endorsements of any kind
- LINKEDIN - David Woodsmall
- David Woodsmall - Main Web page