I've come across an interesting problem recently. I have customers calling me saying that they are getting email addresses in there inbox that that they don't know who the email address belongs to. That and they aren't getting any of the emails they should be getting. The first instance of this took a while to figure out, but I've seen it a few times sense then. I'm still tracking down "how" it happened, but when I did deeper, I found that a filter had been added to delete any email addressed to the originally intended recipient.
I'm not sure yet if its an email scam or just one of the latest email hoaxes. The main symptom in getting tons of junk mail addressed to other people. I've only seen it on webmail accounts and not the MSN, Yahoo, and Gmail services. It stands to reason that it would only happen if an email was opened inside the webmail. In general I talk people out of Outlook because of all the problems it keeps having to fix. Thunderbird is a far better choice, but even then the anti-virus on your personal computer needs to remain updated.
I just wanted to pass that along... if you are getting emails where you don't know who the email address belongs to - check your filters. Also if you notice that you are not getting your emails - check your filters.
Saturday, February 23, 2008
Friday, February 22, 2008
Firewall
A firewall protects your computer or a local area network( LAN )from external intrusions. It may be a hardware device or a software program running on a secure host computer. In either case, it must have at least two network interfaces, one for the network it is intended to protect, and one for the network it is exposed to. More than one type of firewall can be used to provide extra network security. A firewall can also screen internal traffic on a network, separating different departments or branches of a large company. In some cases, a business will configure a proxy server to block employee access to certain types of Internet content, such as streaming audio or video.
A firewall examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped. A firewall filters both inbound and outbound traffic. It can also manage public access to private networked resources such as host applications. It can be used to log all attempts to enter the private network and trigger alarms when hostile or unauthorized entry is attempted.
Firewalls can filter packets based on their source and destination addresses and port numbers. This is known as address filtering. Firewalls can also filter specific types of network traffic. This is also known as protocol filtering because the decision to forward or reject traffic is dependent upon the protocol used, for example HTTP, ftp or telnet. Firewalls can also filter traffic by packet attribute or state. If your home or business computer uses DSL, a cable modem, or some other type of always-on Internet connection, a firewall is extremely important.
There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria . The type of criteria used to determine whether traffic should be allowed through varies from one type of firewall to another. Firewalls may be concerned with the type of traffic, or with source or destination addresses and ports. They may also use complex rule bases that analyse the application data to determine if the traffic should be allowed through. How a firewall determines what traffic to let through depends on which network layer it operates at.
A Masters student in computer applications interested in writing articles, editing and proof reading Contact at: leenavijayakumar@gmail.com
A firewall examines all traffic routed between the two networks to see if it meets certain criteria. If it does, it is routed between the networks, otherwise it is stopped. A firewall filters both inbound and outbound traffic. It can also manage public access to private networked resources such as host applications. It can be used to log all attempts to enter the private network and trigger alarms when hostile or unauthorized entry is attempted.
Firewalls can filter packets based on their source and destination addresses and port numbers. This is known as address filtering. Firewalls can also filter specific types of network traffic. This is also known as protocol filtering because the decision to forward or reject traffic is dependent upon the protocol used, for example HTTP, ftp or telnet. Firewalls can also filter traffic by packet attribute or state. If your home or business computer uses DSL, a cable modem, or some other type of always-on Internet connection, a firewall is extremely important.
There are two access denial methodologies used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria . The type of criteria used to determine whether traffic should be allowed through varies from one type of firewall to another. Firewalls may be concerned with the type of traffic, or with source or destination addresses and ports. They may also use complex rule bases that analyse the application data to determine if the traffic should be allowed through. How a firewall determines what traffic to let through depends on which network layer it operates at.
A Masters student in computer applications interested in writing articles, editing and proof reading Contact at: leenavijayakumar@gmail.com
The Internets Most Popular Email Scams
Phishing Scams:
"Phishing" is a high-tech scam that uses spam or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or any other kind of confidential personal information. Identity theft is the goal of this scam.
The phisher sends you a fraudulent email that is designed to look like it was sent from a reputable company. The email directs you to a website that looks like it belongs to the reputable company, but is actually a spoof. You are asked to "update" your information here, and if you do, all that personal information goes straight to the phisher. uses this information for identity theft purposes such as making withdrawals from your bank and credit card accounts, ordering new credit cards which they promptly max out, etc.
Some of the most recent phishing attacks have spoofed the email and websites of well known companies, including eBa, Paypal, Yahoo, Pfizer, Bank of America, among others.
Work-At-Home Scams:
These are some of the more tempting spam scams. They offer those who need to make extra money the opportunity to do so, and invariably the email will state: "no experience necessary." The scammer often claims to have "inside information," and tries to bait you with the lure of quick money for next to no effort. More often than not, you are asked to pay anywhere from $35 to several hundred dollars to purchase the kits or materials that will not earn you a dime.
This scam often offers opportunities involving handicrafts, stuffing envelopes or medical billing on your home PC. If you fall for this scam, pay the fees for the handicraft or envelop-stuffing "kit," and complete the assembly of the crafts as instructed, you will be informed that your work is of poor quality and not worth paying for.
If you sign up for the medical billing "opportunity," you will be asked to purchase a list of doctors. These doctors are either fictional or do not want or need your services and never did.
Credit Repair Scams:
These scams tell promise to erase real and usually correct negative information that has been added to you credit report, so that you can qualify for loans, mortgages, unsecured credit cards, etc.
These services rarely deliver on their promise, and more often than not, will create a great many more problems in the long run. They have even been know to suggest that you commit fraud e.g. falsifying your social security number.
Guaranteed loans on easy terms:
Some email scams offer guaranteed, unsecured credit, such as a home-equity loans that does not require equity in your home, or credit cards regardless of your credit history.
This offer of credit is often extended by an off-shore bank.
This scam is often executed in conjunction with a pyramid scheme, which will encourage you to make earn money by signing up friends and family to participate in the scheme.
The promised offer of a home equity loans turns out to be a useless list of
lenders who will turn you down if you don't meet their qualifications. The promised credit cards never come through, and the pyramid money-making schemes invariably collapse.
Chain letters:
The spam email directs you to send a small amount of money to each of 4 or 5 names on a list, add your name to the top of the list and remove the last name on it, and then forward the updated list via bulk mail. Typically, the letter will claim the scheme is legal, and may refer to sections of US law as supporting proof of this. Not true.
These chain letters are almost always illegal, and nearly all those who participate in them lose their money.
"Phishing" is a high-tech scam that uses spam or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or any other kind of confidential personal information. Identity theft is the goal of this scam.
The phisher sends you a fraudulent email that is designed to look like it was sent from a reputable company. The email directs you to a website that looks like it belongs to the reputable company, but is actually a spoof. You are asked to "update" your information here, and if you do, all that personal information goes straight to the phisher. uses this information for identity theft purposes such as making withdrawals from your bank and credit card accounts, ordering new credit cards which they promptly max out, etc.
Some of the most recent phishing attacks have spoofed the email and websites of well known companies, including eBa, Paypal, Yahoo, Pfizer, Bank of America, among others.
Work-At-Home Scams:
These are some of the more tempting spam scams. They offer those who need to make extra money the opportunity to do so, and invariably the email will state: "no experience necessary." The scammer often claims to have "inside information," and tries to bait you with the lure of quick money for next to no effort. More often than not, you are asked to pay anywhere from $35 to several hundred dollars to purchase the kits or materials that will not earn you a dime.
This scam often offers opportunities involving handicrafts, stuffing envelopes or medical billing on your home PC. If you fall for this scam, pay the fees for the handicraft or envelop-stuffing "kit," and complete the assembly of the crafts as instructed, you will be informed that your work is of poor quality and not worth paying for.
If you sign up for the medical billing "opportunity," you will be asked to purchase a list of doctors. These doctors are either fictional or do not want or need your services and never did.
Credit Repair Scams:
These scams tell promise to erase real and usually correct negative information that has been added to you credit report, so that you can qualify for loans, mortgages, unsecured credit cards, etc.
These services rarely deliver on their promise, and more often than not, will create a great many more problems in the long run. They have even been know to suggest that you commit fraud e.g. falsifying your social security number.
Guaranteed loans on easy terms:
Some email scams offer guaranteed, unsecured credit, such as a home-equity loans that does not require equity in your home, or credit cards regardless of your credit history.
This offer of credit is often extended by an off-shore bank.
This scam is often executed in conjunction with a pyramid scheme, which will encourage you to make earn money by signing up friends and family to participate in the scheme.
The promised offer of a home equity loans turns out to be a useless list of
lenders who will turn you down if you don't meet their qualifications. The promised credit cards never come through, and the pyramid money-making schemes invariably collapse.
Chain letters:
The spam email directs you to send a small amount of money to each of 4 or 5 names on a list, add your name to the top of the list and remove the last name on it, and then forward the updated list via bulk mail. Typically, the letter will claim the scheme is legal, and may refer to sections of US law as supporting proof of this. Not true.
These chain letters are almost always illegal, and nearly all those who participate in them lose their money.
Monday, February 18, 2008
What You Need To Know About Internet & Computer Security:
The Internet has leveled the playing field for entrepreneurs. With a reliable connection, and basic computer system (that become more powerful and less expensive each year), and very little capital, anyone can start there own online business. Ebay, Amazon, Craigslit, online stores, etc... the possibilities are endless. A doorway to hundreds and thousands per month. However, with every opportunity there are risks.
Miscalculations in protecting yourself can bring financial ruin from unauthorized use and data theft. Contrary to the popular belief that a small-size Internet business will make them safe from data hackers and online intruders, there is also a great risk and danger involved once you neglect to protect your computer system, especially the hacking and computer destruction activities that are increasing significantly as the Internet evolves over the years. Fact is that most small-time Internet entrepreneurs are blinded by the fact that they are not exempted from these notorious data thieves.
According to a research conducted by AMI-Partners, almost 50 percent of small and medium-sized online businesses failed to execute even the most basic security protection, which includes the installation of anti-spyware and anti-virus programs to their computer systems. This is one of the main reasons why the Mydoom worm triumphed, affecting one out of three small and medium-sized online businesses compared to one out of six large Internet companies. This was also discovered by the ISA or the Internet Security Alliance, a non-profit organization that handles information security issues. In other words, we can conclude that even small online businesses are more vulnerable to online threats of data theft and electronic sabotage.
Even more, every small online business owner must give data and network protection more attention due to the sophistication of data thieves. These thieves have now one of the advanced software programs and hardware necessary to break into the security measures implemented by data mangers. It would be a great waste of time and financial resources if your computer is left unguarded against these advanced data thieves and online hackers. You are on the verge of losing everything—including your computer, which is also a valuable investment.
Thus, it is important that you should consider data security and encryption as one of your top priorities. Keep in mind that your computer system is always vulnerable to this kind of attacks, even if you are just starting up. In fact, big businesses have more chances to recover compared to small business since big business have necessary funds available to recover from mishap. On the other hand, your small business has meager funds to start with your business—and an attack will be catastrophic for your small business.
There are hundreds of software providers that came up with latest solutions to guarantee the safety of your computer system. In addition, there are also Internet security services to guarantee protection of your online data against Internet hackers. By incorporating high level of encryption technology, hackers will have a hard time intercepting the data being stored in your computer system or while it is transmitted to a certain network of computer systems.
Every business has expenses and risks, but Internet security should be a priority. I only takes one hacker to bring a 'work from home' career to it's knees.
Miscalculations in protecting yourself can bring financial ruin from unauthorized use and data theft. Contrary to the popular belief that a small-size Internet business will make them safe from data hackers and online intruders, there is also a great risk and danger involved once you neglect to protect your computer system, especially the hacking and computer destruction activities that are increasing significantly as the Internet evolves over the years. Fact is that most small-time Internet entrepreneurs are blinded by the fact that they are not exempted from these notorious data thieves.
According to a research conducted by AMI-Partners, almost 50 percent of small and medium-sized online businesses failed to execute even the most basic security protection, which includes the installation of anti-spyware and anti-virus programs to their computer systems. This is one of the main reasons why the Mydoom worm triumphed, affecting one out of three small and medium-sized online businesses compared to one out of six large Internet companies. This was also discovered by the ISA or the Internet Security Alliance, a non-profit organization that handles information security issues. In other words, we can conclude that even small online businesses are more vulnerable to online threats of data theft and electronic sabotage.
Even more, every small online business owner must give data and network protection more attention due to the sophistication of data thieves. These thieves have now one of the advanced software programs and hardware necessary to break into the security measures implemented by data mangers. It would be a great waste of time and financial resources if your computer is left unguarded against these advanced data thieves and online hackers. You are on the verge of losing everything—including your computer, which is also a valuable investment.
Thus, it is important that you should consider data security and encryption as one of your top priorities. Keep in mind that your computer system is always vulnerable to this kind of attacks, even if you are just starting up. In fact, big businesses have more chances to recover compared to small business since big business have necessary funds available to recover from mishap. On the other hand, your small business has meager funds to start with your business—and an attack will be catastrophic for your small business.
There are hundreds of software providers that came up with latest solutions to guarantee the safety of your computer system. In addition, there are also Internet security services to guarantee protection of your online data against Internet hackers. By incorporating high level of encryption technology, hackers will have a hard time intercepting the data being stored in your computer system or while it is transmitted to a certain network of computer systems.
Every business has expenses and risks, but Internet security should be a priority. I only takes one hacker to bring a 'work from home' career to it's knees.
Wednesday, February 13, 2008
After The Storm
Without reveling to much detail that will get me in trouble... I work for an internet provider that covers 20+ states. I am tech support. I'm the guy that takes the heat when your internet goes down. Pretty good at it too... fix over 90% of the problems. Bad modems and farmer John digging up the high speed cables are out of my control.
Heads up - if you are still using AOL please do your self a favor and leave now. This is to far over your head and I grow weary of the mind set.
There have been a lot of winter storms and just plain ole bad weather across the land lately, and here is what I here the most. First I hear about how power was just restored to a community and the first thing people do is use there phones to complain about not having internet. Oblivious to the fact that the head end needs to reboot there servers also to get everyone back online.
Most folks realize that they need to reboot there modem to get a sync light but neglect to rest there routers also. First things first... You must have a solid sync light or connection light on the modem. If not, then chances are that repairs are being made on a 'city wide' basis. So what works 9 out of 10 times is this. Unplug the modem and router and turn off the PC. Plug in the modem by its self so it can establish an IP address to the rest of the world. Give it about 60 - 90 seconds. Then plug in the router. Again giving it time to grab an IP from the modem. Lastly turn on the computer. Now the NIC has a chance of finding your router.
There are many other things that could go wrong, but like I said, this works over and over again. These are just a few basic steps you can take before calling up your internet provider saving everyone time and frustration.
Heads up - if you are still using AOL please do your self a favor and leave now. This is to far over your head and I grow weary of the mind set.
There have been a lot of winter storms and just plain ole bad weather across the land lately, and here is what I here the most. First I hear about how power was just restored to a community and the first thing people do is use there phones to complain about not having internet. Oblivious to the fact that the head end needs to reboot there servers also to get everyone back online.
Most folks realize that they need to reboot there modem to get a sync light but neglect to rest there routers also. First things first... You must have a solid sync light or connection light on the modem. If not, then chances are that repairs are being made on a 'city wide' basis. So what works 9 out of 10 times is this. Unplug the modem and router and turn off the PC. Plug in the modem by its self so it can establish an IP address to the rest of the world. Give it about 60 - 90 seconds. Then plug in the router. Again giving it time to grab an IP from the modem. Lastly turn on the computer. Now the NIC has a chance of finding your router.
There are many other things that could go wrong, but like I said, this works over and over again. These are just a few basic steps you can take before calling up your internet provider saving everyone time and frustration.
Subscribe to:
Posts (Atom)