Here are some Important Do’s and Make Sure You Do’s and Don’t for prevent and protection for your computer as well as and Importantly your Internet Browsing.

Problems that can happen to anyone is to contract a redirect virus or hijacker they both can change your settings put droppers in pc and access private and personal info, i got one from Google play store ended up being from a translator i installed.

You don’t want to uninstall your system protection you may need to change it. While you can’t run more than 1 anti-virus program on your computer, BUT you CAN run more than one malware / adware /bloatware, etc, program … I suggest the following:

  • Malwarebytes– keep running at all times!
  • Eset– try the ONLINE scanner to find the issues on your computer [mine scanned for over 18 hours so be patient!]
  • SpyBot– another one **NOTE** there are more you just have to search and research!
  • CCleaner – schedule yourself to use this at least on a weekly basis! Cleans registry and many other useful tools for files – browsers – more
  • HiJackThis– can show you what files are running from system, toolbars, searchers etc! BECAREFUL what you delete, DO NOT have all files checked to clean automatically checked in Preferences!
  • RESET BROWSERSmake sure you are only one allowed access thru them ie: no guest or other users listed as in Google Chrome Settings, Reset all browsers make sure too that the Home Pages and Search settings are what you put in if its different then that’s part of the BUG OR VIRUS.
  • CHECKYOUR EXTENSIONS and ADD-ONS in ALL of your Browsers, i had to uninstall Opera browsers because there suddenly came a loader and was using the browser to connect to internet without my input!
  • BE CAREFULof add-ons you install, use only reputable ones like adblock Plus, make sure that if u add ie: Google app that it comes from Google!

If resetting browsers doesn’t work reinstall them uninstall first SAVE or BACKUP contact list and bookmarks after you save them scan them with one of the above tools

  • ROOT KITS– THESE ARE EXTREMELY DANGEROUS and can not only wreck your computer but STEAL your information ie: Banking Info and a like. Kaspersky Tools you can d/l them free from their site kaspersky.com run them! You can search for more MAKE SURE THEY ARE REPUTABLE!
  • WEBROOT– switched when Kaspersky’s security software closed all my incoming and outgoing
    connections and their fix was to open them all ….wow good protection fix right? NOT!
  • LASTPASS– password manager this will allow you to save your passwords and Lastpass will log u in ….no keyboard input means NO KEYLOGGERS can get passwords u type in.
  • COOKIES– Privacy Settings try setting it to DO NOT ALLOW 3rd PARTY, make sure you ADD EXCLUSIONS OR EXCEPTIONS in FIREWALLBROWSERS & ANTI-VIRUS software!
  • TEMP DIRECTORY– THIS IS IMPORTANT – any application or many applications that are bugs and viruses tend to use the TEMP folder to run their apps, make sure that you check the paths of the app’s to see if any are running from that directory!
  • CLEAR TEMP FILES– open start menu type in %temp% and enter …a windows explorer window will open and show all of the temp files and there could be 100’s or just a few ….SELECT ALL & DELETE!

** NOTE **
SOME temp files will not delete due to fact that they are in use for instance ..Skype or adobe … It won’t let you delete them …IF you see a file that is part of the BUG / VIRUS or suspicious and can’t delete it open it with notepad select all and delete, u can also try to rename file ….be careful not do something bad and delete or rename useful files.

*** NOTE ***

DON’T DO SYSTEM RESTORE!!! ….WHY? ….Because if you have a virus and it most likely will be in your System Restore Point so all you are going to do is reinstall the bug! You should actually turn off system restore until you get it fixed as soon as you get issue fixed THEN CREATE A RESTORE POINT!!!! Then you can leave it set to on.

  • TASK MANAGER & RESEARCH– [ i open my task manager every time i’m on the internet you can see if files are popping up and disappearing, monitor what processes are active and on most u can end processes. If there are processes you don’t recognize RESEARCH the file names in google or what ever searcher u use.
  • URL Validators– your virus program probably has an option to protect webpage access monitoring to show you if there is a problem with the page such as malware/adware or suspicious activity, can use WOT to show u and will even give u heads up on your search results. There are also online URL validators bookmark them to ur toolbar menu so u can pull them up when needed.
  • ACTIVE CONNECTIONS– see what connections are currently active in processes or like my webroot has a feature that shows active connections, this will allow to see if there are unknown outgoing or incoming apps accessing and using your internet to spread and seek out private information that you have on your pc and transmit it to their sources.

INSTALLING SOFTWARE – make sure when installing software programs that

  1. You SCAN with security protection apps!
  2. Make sure you know that it’s coming from the ACTUAL AUTHOR & WEBSITE!
  3. Most Importantly – ALWAYS Do CUSTOM INSTALL…WHY? many programs out there add additional software called Adware and Bloatware which both can be a bothersome process to get rid of!  Even Adobe Flash will ask you on the second screen and is AUTOMATICALLY CHECKED AS A DEFAULT ACTION, to install McAfee on your computer DO NOT do this, you hopefully already have an anti-virus program on your pc and you can only run ONE at a time! So ALWAYS look at where it’s installing and what it’s installing you can save yourself a lot of heartache and misery and time trying to rid these other programs

There are forums that help you search and clean viruses like Tech Guy’s or just search and join tech forums a like!

As well as all actions you take, BE CAREFULL LOOK AND IF YOU ARE NOT SURE, DON’T DELETE UNTIL YOU RESEARCH THE FILES!!!

One thing I want to mention is that there are features on your cell phones that can be used against you it’s called CYBERSTALKING or CYBERCASING, HOW? Many photos are embedded with a geotag longitude and latitude at showing where they were taken and yes folk this is including your iPhone, this is also retrievable from the photos you upload to websites.  The information that these predators get can be used with Google street maps to pinpoint your exact location.

These actions can be verified  International Computer Science Institute (ICSI). Researchers Gerald Friedland and Robin Sommer wrote that they successfully obtained the home addresses of people who had posted photos in ads on Craigslist, despite those people having opted to keep their addresses hidden in their postings.

Creepier still, they were also able to obtain addresses where home videos of children had been shot, by searching under the tag “kids” on YouTube. They then proceeded to search for recent videos from those same users, that had been shot over 1,000 miles away. Within 15 minutes, they were able to determine that 13 of these video posters were likely still away on vacation, leaving their homes available for burglary.  (http://www.gizmag.com/online-predators-can-determine-where-posted-photos-and-videos-were-shot/15818/, July 25, 2010)

Many cell phones have this feature and is usually set by default it’s something you should check …your children could be made at target as well!

Articles Worth Reading on The Subject of CyberStalking

Presidential Proclamation – National Stalking ….

 Combating Cyber Crime

 Cyber Crime – FBI

PARENTS BEWARE: INSTAGRAM & KIK MESSENGER ARE A DANGEROUS COMBINATION & WHAT SOCIAL DANGERS TO CHECK FOR …

 Smartphones Are Used To Stalk, Control Domestic Abuse Victims

 Here Is Some Useful Information To Report Cyber Crimes:

Reporting  Computer Crimes Department’s

Type of Crime
Appropriate federal investigative law enforcement agencies
Computer intrusion (i.e. hacking)
§  FBI local office
§  U.S. Secret Service
§  Internet Crime Complaint Center
Password trafficking
§  FBI local office
§  U.S. Secret Service
§  Internet Crime Complaint Center
Counterfeiting of currency
§  U.S. Secret Service
Child Pornography or Exploitation
§  FBI local office
§  if imported, U.S. Immigration and Customs Enforcement
§  Internet Crime Complaint Center
Child Exploitation and Internet Fraud matters that have a mail nexus
§  U.S. Postal Inspection Service
§  Internet Crime Complaint Center
Internet fraud and SPAM
§  FBI local office
§  U.S. Secret Service
§  Federal Trade Commission (online complaint)
§  if securities fraud or investment-related SPAM e-mails, Securities and Exchange Commission (online complaint)
§  Internet Crime Complaint Center
Internet harassment
§  FBI local office
Internet bomb threats
§  FBI local office
§  ATF local office
Trafficking in explosive or incendiary devices or firearms over the Internet
§  FBI local office
§  ATF local office

Always keep yourself protected because the internet WON’T has become a breeding ground for chaos and destruction from the, excuse my language THESE @SSHOLE HACKERS, that think it’s a good and fun thing to destroy YOUR private property as a gainful measure for whatever hole they need to fill.  I’m not saying it’s all bad there is an unlimited amount of knowledge, fun, and networking using the internet you just have to keep in mind of the dangers when using the internet.

Hope This Helps!!

Southern Belle

Advertisements