Sunday, February 24, 2008

Update Of An Old Favorite

Let me introduce you to a little tool known as CCleaner. CCleaner just released it's latest updates. It is a free tool that will in one swoop remove unused and temporary files from your system - allowing Windows to run faster, more efficiently and giving you more hard disk space. Cleans up the Recycle Bin, Temporary files and Log files. Works with Firefox, Opera, Media Player, eMule, Kazaa, Google Toolbar, Netscape, Office XP, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and more...

All this is fine and dandy at optimizing your windows and you can down load it HERE - but you did not let me finish... You need to know the rest of the story...


False advertising has duped many consumers into buying cheap worthless imitation Computer Cleaning Software - "disk-washer-erasers" that do not work - you might as well "throw your money away". If you have recently been the victim of a scam by one of these fly-by-night outfits you are strongly urged to "get your money back as quickly as possible, and not to use the Software under any circumstances because it could even damage your hard disk! If you take risks you could damage your computer and go to jail!" Because even if you downloaded something by accident and do not know it's there, you are still liable.

Deleting "Internet Cache and History" will NOT protect you. Formatting a disk does NOT delete the contents. Pressing Delete does NOT delete pictures.

Everything you EVER DID is STILL STORED IN YOUR PC.

CLICK HERE TO CLEAN YOUR PC PROPERLY

Saturday, February 23, 2008

Where Are All My Emails?

I've come across an interesting problem recently. I have customers calling me saying that they are getting email addresses in there inbox that that they don't know who the email address belongs to. That and they aren't getting any of the emails they should be getting. The first instance of this took a while to figure out, but I've seen it a few times sense then. I'm still tracking down "how" it happened, but when I did deeper, I found that a filter had been added to delete any email addressed to the originally intended recipient.

I'm not sure yet if its an email scam or just one of the latest email hoaxes. The main symptom in getting tons of junk mail addressed to other people. I've only seen it on webmail accounts and not the MSN, Yahoo, and Gmail services. It stands to reason that it would only happen if an email was opened inside the webmail. In general I talk people out of Outlook because of all the problems it keeps having to fix. Thunderbird is a far better choice, but even then the anti-virus on your personal computer needs to remain updated.

I just wanted to pass that along... if you are getting emails where you don't know who the email address belongs to - check your filters. Also if you notice that you are not getting your emails - check your filters.

Friday, February 22, 2008

Firewall

A firewall protects your computer or a local area network( LAN )from external intrusions. It may be a hardware device or a software program running on a secure host computer. In either case, it must have at least two network interfaces, one for the network it is intended to protect, and one for the network it is exposed to. More than one type of firewall can be used to provide extra network security. A firewall can also screen internal traffic on a network, separating different departments or branches of a large company. In some cases, a business will configure a proxy server to block employee access to certain types of Internet content, such as streaming audio or video.

A firewall examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped. A firewall filters both inbound and outbound traffic. It can also manage public access to private networked resources such as host applications. It can be used to log all attempts to enter the private network and trigger alarms when hostile or unauthorized entry is attempted.

Firewalls can filter packets based on their source and destination addresses and port numbers. This is known as address filtering. Firewalls can also filter specific types of network traffic. This is also known as protocol filtering because the decision to forward or reject traffic is dependent upon the protocol used, for example HTTP, ftp or telnet. Firewalls can also filter traffic by packet attribute or state. If your home or business computer uses DSL, a cable modem, or some other type of always-on Internet connection, a firewall is extremely important.

There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria . The type of criteria used to determine whether traffic should be allowed through varies from one type of firewall to another. Firewalls may be concerned with the type of traffic, or with source or destination addresses and ports. They may also use complex rule bases that analyse the application data to determine if the traffic should be allowed through. How a firewall determines what traffic to let through depends on which network layer it operates at.

A Masters student in computer applications interested in writing articles, editing and proof reading Contact at: leenavijayakumar@gmail.com

The Internets Most Popular Email Scams

Phishing Scams:

"Phishing" is a high-tech scam that uses spam or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or any other kind of confidential personal information. Identity theft is the goal of this scam.

The phisher sends you a fraudulent email that is designed to look like it was sent from a reputable company. The email directs you to a website that looks like it belongs to the reputable company, but is actually a spoof. You are asked to "update" your information here, and if you do, all that personal information goes straight to the phisher. uses this information for identity theft purposes such as making withdrawals from your bank and credit card accounts, ordering new credit cards which they promptly max out, etc.

Some of the most recent phishing attacks have spoofed the email and websites of well known companies, including eBa, Paypal, Yahoo, Pfizer, Bank of America, among others.

Work-At-Home Scams:

These are some of the more tempting spam scams. They offer those who need to make extra money the opportunity to do so, and invariably the email will state: "no experience necessary." The scammer often claims to have "inside information," and tries to bait you with the lure of quick money for next to no effort. More often than not, you are asked to pay anywhere from $35 to several hundred dollars to purchase the kits or materials that will not earn you a dime.

This scam often offers opportunities involving handicrafts, stuffing envelopes or medical billing on your home PC. If you fall for this scam, pay the fees for the handicraft or envelop-stuffing "kit," and complete the assembly of the crafts as instructed, you will be informed that your work is of poor quality and not worth paying for.

If you sign up for the medical billing "opportunity," you will be asked to purchase a list of doctors. These doctors are either fictional or do not want or need your services and never did.

Credit Repair Scams:

These scams tell promise to erase real and usually correct negative information that has been added to you credit report, so that you can qualify for loans, mortgages, unsecured credit cards, etc.

These services rarely deliver on their promise, and more often than not, will create a great many more problems in the long run. They have even been know to suggest that you commit fraud e.g. falsifying your social security number.

Guaranteed loans on easy terms:

Some email scams offer guaranteed, unsecured credit, such as a home-equity loans that does not require equity in your home, or credit cards regardless of your credit history.
This offer of credit is often extended by an off-shore bank.

This scam is often executed in conjunction with a pyramid scheme, which will encourage you to make earn money by signing up friends and family to participate in the scheme.

The promised offer of a home equity loans turns out to be a useless list of
lenders who will turn you down if you don't meet their qualifications. The promised credit cards never come through, and the pyramid money-making schemes invariably collapse.

Chain letters:

The spam email directs you to send a small amount of money to each of 4 or 5 names on a list, add your name to the top of the list and remove the last name on it, and then forward the updated list via bulk mail. Typically, the letter will claim the scheme is legal, and may refer to sections of US law as supporting proof of this. Not true.

These chain letters are almost always illegal, and nearly all those who participate in them lose their money.

Monday, February 18, 2008

What You Need To Know About Internet & Computer Security:

The Internet has leveled the playing field for entrepreneurs. With a reliable connection, and basic computer system (that become more powerful and less expensive each year), and very little capital, anyone can start there own online business. Ebay, Amazon, Craigslit, online stores, etc... the possibilities are endless. A doorway to hundreds and thousands per month. However, with every opportunity there are risks.

Miscalculations in protecting yourself can bring financial ruin from unauthorized use and data theft. Contrary to the popular belief that a small-size Internet business will make them safe from data hackers and online intruders, there is also a great risk and danger involved once you neglect to protect your computer system, especially the hacking and computer destruction activities that are increasing significantly as the Internet evolves over the years. Fact is that most small-time Internet entrepreneurs are blinded by the fact that they are not exempted from these notorious data thieves.

According to a research conducted by AMI-Partners, almost 50 percent of small and medium-sized online businesses failed to execute even the most basic security protection, which includes the installation of anti-spyware and anti-virus programs to their computer systems. This is one of the main reasons why the Mydoom worm triumphed, affecting one out of three small and medium-sized online businesses compared to one out of six large Internet companies. This was also discovered by the ISA or the Internet Security Alliance, a non-profit organization that handles information security issues. In other words, we can conclude that even small online businesses are more vulnerable to online threats of data theft and electronic sabotage.

Even more, every small online business owner must give data and network protection more attention due to the sophistication of data thieves. These thieves have now one of the advanced software programs and hardware necessary to break into the security measures implemented by data mangers. It would be a great waste of time and financial resources if your computer is left unguarded against these advanced data thieves and online hackers. You are on the verge of losing everything—including your computer, which is also a valuable investment.

Thus, it is important that you should consider data security and encryption as one of your top priorities. Keep in mind that your computer system is always vulnerable to this kind of attacks, even if you are just starting up. In fact, big businesses have more chances to recover compared to small business since big business have necessary funds available to recover from mishap. On the other hand, your small business has meager funds to start with your business—and an attack will be catastrophic for your small business.

There are hundreds of software providers that came up with latest solutions to guarantee the safety of your computer system. In addition, there are also Internet security services to guarantee protection of your online data against Internet hackers. By incorporating high level of encryption technology, hackers will have a hard time intercepting the data being stored in your computer system or while it is transmitted to a certain network of computer systems.

Every business has expenses and risks, but Internet security should be a priority. I only takes one hacker to bring a 'work from home' career to it's knees.

Wednesday, February 13, 2008

After The Storm

Without reveling to much detail that will get me in trouble... I work for an internet provider that covers 20+ states. I am tech support. I'm the guy that takes the heat when your internet goes down. Pretty good at it too... fix over 90% of the problems. Bad modems and farmer John digging up the high speed cables are out of my control.

Heads up - if you are still using AOL please do your self a favor and leave now. This is to far over your head and I grow weary of the mind set.

There have been a lot of winter storms and just plain ole bad weather across the land lately, and here is what I here the most. First I hear about how power was just restored to a community and the first thing people do is use there phones to complain about not having internet. Oblivious to the fact that the head end needs to reboot there servers also to get everyone back online.

Most folks realize that they need to reboot there modem to get a sync light but neglect to rest there routers also. First things first... You must have a solid sync light or connection light on the modem. If not, then chances are that repairs are being made on a 'city wide' basis. So what works 9 out of 10 times is this. Unplug the modem and router and turn off the PC. Plug in the modem by its self so it can establish an IP address to the rest of the world. Give it about 60 - 90 seconds. Then plug in the router. Again giving it time to grab an IP from the modem. Lastly turn on the computer. Now the NIC has a chance of finding your router.

There are many other things that could go wrong, but like I said, this works over and over again. These are just a few basic steps you can take before calling up your internet provider saving everyone time and frustration.

Sunday, February 3, 2008

Top 5 Rules For Fighting Spam

How prevalent is Spam? According to Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org):

“Studies show unsolicited or “junk” e-mail, known as spam, accounts for roughly half of all e-mail messages received. Although once regarded as little more than a nuisance, the prevalence of spam has increased to the point where many users have begun to express a general lack of confidence in the effectiveness of e-mail transmissions, and increased concern over the spread of computer viruses via unsolicited messages.”

In 2003, President Bush signed the “Can Spam” bill, in December of 2003 which is the first national standards around bulk unsolicited commercial e-mail. The bill, approved by the Senate by a vote of 97 to 0, prohibits senders of unsolicited commercial e-mail from using false return addresses to disguise their identity (spoofing) and the use of dictionaries to generate such mailers. In addition, it prohibits the use of misleading subject lines and requires that emails include and opt-out mechanism. The legislation also prohibits senders from harvesting addresses off Web sites. Violations constitute a misdemeanor crime subject to up to one year in jail.

One major point that needs to be discussed about this: spam is now coming from other countries in ever-greater numbers. These emails are harder to fight, because they come from outside our country’s laws and regulations. Because the Internet opens borders and thinks globally, these laws are fine and good, but do not stop the problem.

So what do you do about this? Her are the top 5 Rules to do to protect from spam.

Number 1: Do what you can to avoid having your email address out on the net.
There are products called “spam spiders” that search the Internet for email addresses to send email to. If you are interested, do a search on “spam spider” and you will be amazed at what you get back. Interestingly, there is a site, WebPoison.org, which is an open source project geared to fight Internet "spambots" and "spam spiders", by giving them bogus HTML web pages, which contain bogus email addresses
A couple suggestions for you: a) use form emails, which can hide addresses or also b) use addresses like sales@company.com instead of your full address to help battle the problem. c) There are also programs that encode your email, like jsGuard, which encodes your email address on web pages so that while spam spiders find it difficult or impossible to read your email address.

Number 2: Get spam blocking software. There are many programs out there for this. (go to www.cloudmark.com or www.mailwasher.net for example). You may also buy a professional version. Whatever you do, get the software. It will save you time. The software is not foolproof, but they really do help. You usually have to do some manual set up to block certain types of email.

Number 3: Use the multiple email address approach.
There are a lot of free email addresses to be had. If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else.

Number 4: Attachments from people you don’t know are BAD, BAD, BAD.

A common problem with spam is that they have attachments and attachments can have viruses. Corporations often have filters that don’t let such things pass to you. Personal email is far more “open country” for spamers. General rule of thumb: if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT. Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well.

Number 5: Email services now have “bulk-mail” baskets. If what you use currently does not support this, think about moving to a new vender. The concept is simple. If you know someone, they can send you emails. If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle. Spam Blocking software has this concept as well, but having extra layers seems critical these days, so it is worth looking into.

Beware Of Spyware

Adaware and Spyware are an ever increasing nuisance for computer users everywhere, but also a booming industry. According to Webroot Software, Inc., the distribution of online advertisements through spyware and adware has become a $2 billion industry. On top of that most folks open the doors on there hard drives and invite it in... With out naming names, a popular weather program and emoticon tool come to mind.

The aggressive advertising and spying tactics demonstrated by some of these programs, require an equally aggressive response from a seasoned eradicator. Sunbelt Software is such a company. A leader in Anti-Spyware, Anti-Spam, Network Security and System Management tools, they gave consistently remained on the cutting-edge of anti-spyware programming since 1994.

One of their more notable software applications is CounterSpy 1.5. CounterSpy is designed to detect and remove spyware that is already in your computer system. Additionally, it provides real-time protection while preventing browser hijacking and changes to your computer’s Registry.

Other notable features include:

>>> Detection and Removal of Tracking Cookies – while it is true that applications like Microsoft AntiSpyware Beta are free, they do not include the ability to detect and remove tracking cookies like CounterSpy does.
>>> History Cleaner - erases any traceable trails left on your computer as you surf the Internet.
>>> Secure File Eraser - a powerful deletion tool that can completely eliminate all files you want removed from your computer including images, music, movies and applications.
>>> PC Explorer - allows you a look into files and areas that are normally inconvenient to access, such as your startup programs, browser helper objects, and ActiveX programs that are being downloaded or used.
>>> Support for Older Operating Systems – includes Windows 98SE, Windows ME, and Windows NT.

Recommended by PC World, ConsumerSearch, and Dell, CounterSpy holds one of the highest effective ratings for spyware removal. It also received high marks from TopTenReviews (2006) for ease of use, customization/installation, and help/support. For only $19.95 per machine, users can receive a one year subscription with updates, upgrades, and technical support from real live humans. CounterSpy definitely provides ease of use and afford ability for just about any computer user from the novice to the expert.

Viruses Can Erase Your Hard Drive In The Blink Of An Eye

New computer viruses are created at about 100 a day to annoy us and to wreck havoc on our computer systems. Here are ten of the nastiest ones that have made national news even. All a pain in the neck and all have the potential to destroy every bit of work on your hard drive. New viruses are created daily. This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.

Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.

Virus: W32.Beagle.CO@mm
A mass-mailing worm that lowers security settings. It can delete security-related registry sub keys and may block access to security-related websites.

Virus: Backdoor.Zagaban
A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.

Virus: W32/Netsky-P
A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.

Virus: W32/Mytob-GH
A mass-mailing worm and IRC backdoor Trojan for the Windows platform. Messages sent by this worm will have the subject chosen randomly from a list including titles such as: Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

Virus: W32/Mytob-EX
A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH. W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. This virus spreads by sending itself to email attachments harvested from your email addresses.

Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
This family of worm variations possesses similar characteristics in terms of what they can do. They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network. Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).

Virus: Zafi-D
A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe. It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension. W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".

Virus: W32/Netsky-D
A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.

Virus: W32/Zafi-B
A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com. A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”

Intelligent Explorer? Sounds safe don't it?

Let the buyer beware!

I recently hit, by mistake, what I thought was an Explorer upgrade option. It turned out to be a pop-up appearing legitimate but really was not. It uploaded a product called Intelligent Explorer on my machine. What a nightmare!

I did some research on the web and found messages like this one from a BullGuard Antivirus Forum,

"PLEASE HELP!!! I HAVE A SPYWARE, TROJAN AND HIJACKER ON MY COMPUTER. I HAVE RUN BULLGUARD, CWSHREDDER AND AD-AWARE. ALL HAVE PICKED UP THE VIRUSES AND SAID THAT THEY HAVE BEEN MOVED/REMOVED BUT WHEN I LOG ONTO THE INTERNET THAT DAMN INTELLIGENT EXPLORER TOOLBAR IS SHOWING"

Another message from spywareinfo Forum goes something like this:

"Hey I'm having issues with something called Internet explorer toolbar - Intelligent explorer. I can’t find a way to remove it from my comp and I really don’t want to reinstall windows. I've used spybot, ad-ware, and cw shredder but nothing seems to work."

It appears that Intelligent Explorer allows other software to be downloaded to your machine and this is where the problem occurs. What is even more remarkable is that by downloading Intelligent Explorer, their license grants them the right to install software add-ins on your computer at their will. Take a look at what the software license for Intelligent Explore says (go to http://www.ieplugin.com/terms.html to read it all):

"You grant to us the right, exercisable by us until you uninstall the Software or this agreement is otherwise terminated, to provide to you the Service of downloading and causing to be displayed advertising material on your computer, through ‘pop-up’ or other display while you use your browser. You acknowledge and agree that installation of the Software may automatically modify toolbars and other settings of your browser. By installing the Software you agree to such modifications."

The company, IBC incorporated, is incorporated in Belize. I really can't believe this license!

One end user found highly objectionable pop-up advertisements generated by this software bundled with Intelligent Explorer in the form of extreme pornography.

I have yet to break this.

Intelligent Explorer is a plug-in, which can create a new home page, as well as start up and endless loop of pop-ups. You can remove the view bar, but then starting up Internet Explorer will cause it to reappear. I asked some friends to help, and no one could tell me what to do.

This is what I did:

I bought a copy of a program called XoftSpy and it removed the software. It took two scans and a reboot to do it. This is not an advertisement for this product. They advertised it was free, which it was to run, but then I had to buy it to actually fix anything. It cost me $40 and I am sure that there are freeware products out there as well, but that is what ended the nightmare for me. Other spyware products I have seen out there include spybot, NoAdware, Spyware Eliminator, Pal Spyware Remover, and Spyware C.O.P.

Let the buyer beware!

The Importance of Encryption and Making Your System Secure

Protecting your emails and files with encryption and cryptographic software is done in several ways. Here we will discuss a few different ways to make systems more secure. Two programs are mentioned that will help encrypt information. There are many more programs out there that will help, but these programs are good and a good place to start as any. They have the added benefit of both being free with source code available.

Will encryption stop thieves from accessing my information?

Encryption simply makes it harder for people to gain access to important information, like passwords or sensitive information in a file. The first thing you should know about encryption is that the algorithm that is used to encrypt can be simple or more complex and that affects how securely what you have encrypted is protected. Encryption systems have been broken when the method of encryption is understood by hackers and is easy to break.

Why encrypt my email?

It should be noted that email is far less secure than paper mail for two very good reasons: first, electronic data can be accessed easily over an Internet and secondly, electronic data is really simple to copy. There is a very good chance that someone has snooped around in your email despite your best intentions to stop it.

How can I encrypting my email?

There are many programs out there that can help you encrypt your email. A very popular one is PGP (Pretty Good Privacy) or its Gnu offshoot GPG.

PGP (http://www.pgpi.org/) self-describes itself this way: This "is a program that gives your electronic mail something that it otherwise doesn't have: Privacy. It does this by encrypting your mail so that nobody but the intended person can read it. When encrypted, the message looks like a meaningless jumble of random characters. PGP has proven itself quite capable of resisting even the most sophisticated forms of analysis aimed at reading the encrypted text."

Why bother to encrypt my files?

The answer to this boils down to what you store on your computer. If you have financial data with important information like social security numbers, email addresses, account numbers and passwords, then you open yourself up to losing very valuable information. Most corporate Internet security employees will attest to the widespread theft of very valuable information. As long as you are connected to the Internet you are vulnerable.

How do I go about encrypting my files?

AxCrypt File Encryption Software (http://axcrypt.sourceforge.net/) Self-described as "Free Personal Privacy and Security for Windows 98/ME/NT/2K/XP with AES-128 File Encryption, Compression and transparent Decrypt and Open in the original application."

Friday, February 1, 2008

Phishing For Your Identity

We have all received emails directing us to visit a familiar website where they are being asked to update their personal information... your bank, credit card company, Paypal. The website needs you to verify or update your passwords, credit card numbers, social security number, and even shut down your Paypal account it you do not comply. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Instead if just clicking through, you should look at the link that highlights when you hover over the link. But this slight oversight take you to a site that unfortunately, you find out much later is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been “phished”.

Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.

It is not at easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.
A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.

Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.