Thursday 31 March 2011

How to secure Your emails


HTML E-Mail

Disable HTML for e-mail or choose to view all messages as plain text if your e-mail client has such options - the better ones do; or use an e-mail content filter for web bugs and embedded content originating from a server other than the one belonging to the sender of the e-mail. Today's cleverly-coded e-mail worms can execute just by viewing HTML-formatted e-mail.

E-Mail Attachments

- Never allow your e-mail client to "View Attachment Inline" ...unless you are sure it arrived    from a trusted sender.

- Never open e-mail attachments from strangers.
- Use encryption software for sending your most private e-mail messages. If you don't, keep in mind that what you are sending is the equivalent of a postcard.
- Never, ever use e-mail to send confidential information such as credit card numbers, bank account numbers, or your Social Security number.
- Never respond to e-mail asking for confidential information. Any e-mail you receive requesting your credit card numbers, bank account numbers, or Social Security number either via e-mail or a web site link is surely an identity theft or phishing scam.

How to disable JavaScript in e-mail programs:

Outlook
  1. Select the "Options..." command under the Outlook "Tools" menu.
  2. Select the "Security" tab in the "Options" dialog box.
  3. Under "Secure Content" section, select "Restricted sites" in the Zone Window.
  4. Click on the "Zone settings..." button.
  5. Click "OK" for the warning dialog box which pops up on the screen.
  6. In the "Security" dialog box, make sure that the "Restricted sites" icon is selected.
  7. Make sure that the security level slider control for the zone is set to "High".
  8. Click on the "Custom Level..." button.
  9. Scroll down to the "Active scripting" entry in the settings list in the "Security Settings" dialog box.
  10. Select "Disable" for "Active scripting" entry.
  11. Press the "OK" button in the "Security Settings" dialog box.
  12. Press the "OK" button in the "Security" dialog box.
  13. Press the "OK" button in the "Options" dialog box.
Note on Outlook: By following this procedure, you will accomplish two things. First, you will configure the e-mail client so that all of its network activity happens in the "Restricted" security zone. Second, you will increase the security of the Restricted zone beyond its default setting so that "Active scripting" is disabled. The end result is that your e-mail program will disable Active scripting (which includes JavaScript) whenever it shows you an e-mail, thereby preventing the e-mail wiretap exploit.

Mozilla Mail
  1. Select "Edit" from the menu bar.
  2. Select "Preferences" from the drop-down list.
  3. Select "Advanced" from the Category list.
  4. Select "Scripts & Windows" from the Advanced list.
  5. Uncheck the box next to "Mail & Newsgroups" under "Enable JavaScript for:"
  6. Important: Leaving "Navigator" checked applies to your browser window only. The option in step 5 applies to e-mail only.
  7. Click on "OK" to save your settings and close the "Preferences" window.
  8. (NOTE: Unlike with Netscape or Outlook, in Mozilla this option is unchecked by default... but it is a good idea to look for yourself.)
Mozilla Thunderbird
  1. Select "Tools" from the menu bar.
  2. Select "Options" from the drop-down list.
  3. Select "Advanced" from the Category list.
  4. Uncheck the box next to "Enable JavaScript in mail messages".
  5. Click on "OK" to save your settings and close the "Preferences" window.
  6. (NOTE: Unlike with Netscape or Outlook, in Thunderbird this option is unchecked by default... but it is a good idea to look for yourself.)
Netscape Messenger
  1. Select "Edit" from the menu bar.
  2. Select "Preferences" from the drop-down list.
  3. Select "Advanced" from the Category list.
  4. Uncheck the box next to "Enable JavaScript for Mail and News".
  5. Important: Leaving "Enable JavaScript" (version 4.x) or "Enable JavaScript in Navigator" (versions 6/7) checked applies to your browser window only. The option in step 4 applies to e-mail only.
  6. Click on "OK" to save your settings and close the "Preferences" window.
Eudora
  1. Click on "Tools".
  2. Click on "Options".
  3. Click on "Viewing Mail".
  4. Uncheck the box "Allow executable in HTML content". 

Five Steps to Safety while surfing:


1. Ensure your Operating System is up to date and safely configured

Ø  Windows can be set to download security updates automatically and prompt you for permission to install them. http://windowsupdate.microsoft.com/
Ø  Make sure the security settings on your Web browser are at medium or high. If you are using Internet Explorer this can be done by going to Tools>Internet Options>Privacy.
Consider using a more secure browser such as Firefox or Internet explorer

2. Check your system for viruses

2. Check your system for viruses

A virus is so called because it reproduces itself by using the facilities of the host PC to copy itself to removable media and attach itself to emails, without your knowledge.. Most commonly you get one by opening an email attachment or copying (from deceptive software on the Internet or a bootleg CD) a program containing the virus, on to an unprotected PC. They take over the compromised PC and either trash your data or use your PC like a zombie to send hundreds or thousands of emails containing copies of itself, and/or spam, maybe with copies of your confidential data, to everybody in your address book.
There are many virus checking services offered free by the various Anti Virus vendors, such as

#1 BitDefender Antivirus
#2 Kaspersky Anti-Virus
#3 Webroot Anti-Virus
#4 Norton Anti-Virus
#5 Eset Nod32 Anti-Virus
#6 AVG Anti-Virus
#7 G Data Anti-Virus
#8 Avira Anti-Virus
#9 Vipre Anti-Virus
#10 Trend Micro PC-cillin Anti-Virus
These are the best 10 antivirus rating in 31 march 2011


List of some harmful virus affecting Operating system
Read carefully from these atleast one will affect your Pc,if u are not aware of virus,Beware of virus

OPRAH WINFREY VIRUS:
 Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.
PAUL REVERE VIRUS
This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.
POLITICALLY CORRECT VIRUS:
 Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."
RIGHT TO LIFE VIRUS:
Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
ROSS PEROT VIRUS
Activates every component in your system, just before the whole darn thing quits.
ARNOLD SCHWARZENEGGER VIRUS
Terminates and stays resident. It'll be back.
FEDERAL BUREAUCRAT VIRUS:
 Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.
TERRY RANDALL VIRUS:
 Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.
TEXAS VIRUS
Makes sure that it's bigger than any other file.
CONGRESSIONAL VIRUS:
 The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.
PBS VIRUS
Your programs stop every few minutes to ask for money.
ELVIS VIRUS:
Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.
OLLIE NORTH VIRUS
Causes your printer to become a paper shredder.
SEARS VIRUS:
 Your data won't appear unless you buy new cables, power supply and a set of shocks.
JIMMY HOFFA VIRUS
Your programs can never be found again.
KEVORKIAN VIRUS
Helps your computer shut down as an act of mercy.
IMELDA MARCOS VIRUS:
 Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.
LAPD VIRUS:
 It claims it feels threatened by the other files on your PC and erases them in "self defense".
ORAL ROBERTS VIRUS
Claims that if you don't send it a million dollars, it's programmer will take it back.

3. Install a Firewall

A personal firewall blocks unauthorised network connections from either entering or leaving the computer. This helps protect you either from malware entering your PC, or using it to attack others.  You can download the following personal firewall from:
http://www.zonelabs.com/store/content/company/products/znalm/freeDownload.jsp


4. Block SpyWare and Identity Theft

"Spyware" is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet, it gathers information such as email addresses, passwords, phone numbers, and credit card numbers, and relays it to advertisers or other interested parties. It is not to be confused with "Cookies" which are small files that contain a record of the last time you visited a web site; many e-commerce sites require their use to recognise returning visitors.

5. Be vigilant to protect your privacy

Ø  Identity theft can ruin your credit rating and take months of effort to recover from. Exercise caution in your business affairs.
Ø  If you receive an email allegedly from your bank, or Ebay, PayPal, FedEx, etc, asking you to verify your credit card data, it is almost certainly a scam, called "phishing".  Sometimes it is inexpertly done and the web site address is not the real address but some variation on it. For example, ebay-accounts.com rather than ebay.com; or yourbankname.kr rather than yourbankname.ie. Report such attempts to the financial institution involved.
Ø  Actually read the privacy policy and terms and conditions of a site before you give them personal data. Look for the check box that sometimes says "Allow third parties to send me emails" and sometimes "I do not want my address given away". Legitimate companies will allow you to unsubscribe from an e-mail list by replying with 'remove'. Best practice is not to send unsolicited commercial email at all. But never reply to spammers, as your reply verifies that they have found a valid e-mail address, and you’ll be on their list and everyone else's that they can sell that verified address to. 


Wednesday 30 March 2011

Computer Basics


  What is a Computer?

computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem.

 Basic Parts

       Hardware
            1.  The hardware is the part of the computer you can touch and see. (ex. keyboard, mouse, monitor)
        Software
            1.  The software is a part of the computer you cannot touch but is very important. 
                The software is all the programming that makes the computer run; controlling
                everything that the computer does.

Glossary of Terms

The Monitor is the display screen, similar to a
 television screen.







The Computer, tower or case is the heart of the system. 
This is a box that contains all the parts that make
 the computer work.





The Keyboard is what you type on, similar to 
a typewriter





  
The Mouse is the small hand held device that attaches
 to the computer. It may have two or three buttons.  
The mouse is used to move the 
cursor (pointer) on the 
computer screen.




A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers are sometimes sold with computers, but more frequently are purchased separately. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing.








The Scanner similar to a color photocopier 
is a device that captures pictures or documents,so that they can be seen or used on the computer.






The Laptop also known as a notebook computer is a small personal computer designed for mobile use. A laptop integrates all of the typical components of a desktop computer, including a display, a keyboard, a pointing device (a touchpad, also known as a track pad, or a pointing stick) and a battery into a single portable unit. 






A Hard drive is a device that holds all the information that is stored on a computer.  Unlike a floppy disk the hard disk cannot be removed from the computer but stores much more information








A USB Flash Drive (sometimes just called a “flash drive”)
 looks like a plastic tube that can be put into a slot in the 
front of the modern computer. Older computers 
will require you to insert it in a slot in the back
or you may not be able to use the drive at all
depending on the age of the computer.  
These disks hold information and can be 
used to exchange information between computers




A Floppy Disk (sometimes just called a “disk”) 
looks like a plastic card that can be put into a
 slot in the front of the computer.  These disks 
hold information and can be used to exchange 
information between computers. This type of
 data storage is archaic and obsolete








A CD-ROM is very similar to a stereo’s CD player. 
It not only plays music but can also retrieve
 information stored on CD's. It is also
 available in other formats such as 
DVD-ROM