Notes Tone Unturned
(formerly Asia/Pacific Computer Services, closed down at the end of 2013).
This is now the PERSONAL website of Tony Austin, not a business site.
Do not contact me offering to provide business-related services, such as
Web Design and SEO, marketing campaigns, or any other such proposal.
If you do, you will be billed for wasting my valuable time!
NOTE: These pages are no longer being actively updated.

 
Test and Protect Your System's Security


Here are some websites which offer online system security testing - much of it FREE.

 Don't delay - do these checkups now! 
Find out if you have security exposures, test for spyware and adware,
check out your firewall effectiveness.

10 things you should do to a new PC before surfing the Web
5 safety tips for using a public computer

The jargon-free guide to computer and internet security

Read the EULA.... No, Really Read It
Data protection policies need to be well thought out and consider not only the systems in direct control of the business, but also the credentials by which employees can access those systems remotely. In this tip learn why, beyond policy, awareness is a key element to the protection of data in your business.

 Password Checker -- Test the strength of your passwords (from Micsoft store)

The Password Meter
This application is designed to assess the strength of password strings. The instantaneous visual feedback provides the user a means to improve the strength of their passwords, with a hard focus on breaking the typical bad habits of faulty password formulation.

5 tips for top-notch password security

How To Create Strong Passwords That You Can Remember Easily
"Creating strong passwords for all your online accounts is not a thing you should do. It is a thing you must do."

LinkScanner Online
LinkScanner will inspect a URL that you enter and test it in real-time for whether it is hiding any exploit code and, if so, what exploit. (Cybercriminals use "lure" sites to attract web users to sites they have invisibly infected with exploit code. This exploit code is then used to infect users' PCs with drive-by downloads of spyware, rootkits, and other malware.

Laptop Security Basics
Some rudimentary steps that you can take to prevent your laptop from being stolen.

AV-Comparatives - independent comparatives of Anti-Virus software

Home PC Firewall Guide (Personal firewall guide)

Gibson Research Corporation -
ShieldsUP!
Without your knowledge or explicit permission, the Windows networking technology which connects your computer to the Internet may be offering some or all of your computer's data to the entire world at this very moment!

AuditMyPC.com - Protect your PC - Microsoft

HackerWhacker - Sygate Online Services - Test My Firewall.com - AuditMyPC.com

Virustotal - offers a free service for scanning suspicious files using several antivirus engines.

www.iggyz.co - Lavasoft Ad-Aware - Zone Labs - Zone Alarm and IMsecure

WebAttack.com - Security Forumz

Privacy.net - Carry out a Privacy Analysis of your Internet Connection

Netcraft Anti-Phishing Toolbar - see the phishing Risk Rating of every site you visit


Eight Ways to Defend Against Pretexting (acquiring of personal information under false pretences)

Pretexting (from Wikipedia, the free encyclopedia) ...
Pretexting is the act of pretending to be someone who you are not, by telling an untruth, or creating deception. The practice of pretexting typically involves tricking a business into disclosing personal information of a customer, with the scammer pretending to be the customer.

The Ghost In The Browser -- Analysis of Web-based Malware
"As more users are connected to the Internet and conduct their daily activities electronically, computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain. Unfortunately, even a single visit to an infected web site enables the attacker to detect vulnerabilities in the userís applications and force the download a multitude of malware binaries. Frequently, this malware allows the adversary to gain full control of the compromised systems leading to the ex-filtration of sensitive information or installation of utilities that facilitate remote control of the host. We believe that such behavior is similar to our traditional understanding of botnets. However, the main difference is that web-based malware infections are pull-based and that the resulting command feedback loop is looser. To characterize the nature of this rising thread, we identify the four prevalent mechanisms used to inject malicious content on popular web sites: web server security, user contributed content, advertising and third-party widgets. for each of these areas, we present examples of abuse found on the Internet. Our aim is to present the state of malware on the Web and emphasize the importance of this rising threat."

TrueCrypt - FREE open-source disk encryption software for Windows XP/2000/2003 and Linux.


How Much Would Data Theft Cost You?
Calculate It online, using the Tech//404 Data Loss Cost Calculator
(a free, interactive tool designed to assess the impact of a data breach or identity theft data loss incident)


Is internet banking safe?
Each year online banking customers are being defrauded of millions of dollars. Can we keep the cyber crims from scamming us?

How to protect your cards and accounts online

10 Things Everyone Should Know About Bank Errors
Whether money is accidentally put in your account or taken out, this article can help you know what to do so your finances and those of others remain secure.

Fight Identity Theft Blog
100 Guides and Resources for Keeping Your Personal Information Safe

Identity Theft Protection Hub
Business Resources - Law Resources - Computer Security Resources - Background Checks Resources


ACCC - Australian Competition and Consumer Commission ...
Little black book of scams - The little black book of scams highlights a variety of popular scams that regularly target consumers and small business in areas such as fake lotteries, internet shopping, mobile phones, online banking, employment and investment opportunities. It also offers consumers tips on how to protect themselves from scams, what they can do to minimise damage if they do get scammed and how they can report a scam. >> The little black book of scams - PDF file direct download

Encrypt your files to keep them safe
When using a computer, privacy is paramount. And even more so if you run your own business. Discover how you can help protect private customer and financial information by using its Encrypting File System (EFS) with Windows XP Professional.

PC Flank's Tests ...
Browser Test - Trojans Test - Stealth Test - Advanced Port Scanner - Firewall Leaktest

Free Home Office/Personal Firewall Test and Free Business Server/Firewall Test
Firewall Leak Tester
Matousec's Comprehensive List and Analysis of Personal Windows Firewalls

Microsoft Strider URL Tracer with Typo-Patrol ...
When a user visits a Web site, her browser may be instructed to visit other third-party domains without her knowledge. Some of these third-party domains raise security, privacy, and safety concerns. The Strider URL Tracer, available for download here, is a tool that reveals these third-party domains, and it includes a Typo-Patrol feature that generates and scans sites that capitalize on inadvertent URL misspellings, a process known as typo-squatting. The tool also enables parents to block typo-squatting domains that serve adult ads on typos of children's Web sites.

Fundamental Computer Investigation Guide for Windows
This Solution Accelerator from Microsoft shows you how to use Windows SysInternals to investigate suspicious activity, and helps you determine when to turn over an investigation to law enforcement. The guide gives you best practices on how to collect, preserve, analyze, and report on key data using techniques that will stand up in a court of law.

Nessus
"The world's most popular vulnerability scanner
used in over 75,000 organizations world-wide. Many of the world's largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. The Nessus Project was started in 1998 to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner."

File Research Center -- Free File and Process Information
Provides a free scanning service to identify what is running on your computer, plus free information about safe and unsafe files, processes, services, spyware, adware, malware, trojans, and other programs that may be on your computer.

Safe online havens for kids
At a time when cyber stalking is daily news, it's no wonder parents are often confused about which websites they should let their children visit. But if you want to stay on top of what kids are doing online without being too intrusive, and be able to make occasional cool suggestions, read this article.

Microsoft's Windows Live Safety Center
(a FREE service designed to help ensure the health of your PC ... Check for and remove viruses, learn about threats, improve your PC's performance, get rid of junk on your hard disk)

And not to forget your battle against SPAM ...

HIGHLY RECOMMENDED
Get the most out of your mail

You owe it to  yourself to buy a copy of  MailWasher Pro
I personally have purchased and rely heavily on MailWasher PRO ourselves!
But there's also the MailWasher FREE version

 MailWasher Pro not only bounces spam email also reports spam back to a central database ...
FirstAlert! - MailWasher Pro's global network of users easily and actively reports spam to FirstAlert! administrators who verify the spam and add it to the database. Once added to the database, spam messages are transformed into a unique digital fingerprint. MailWasher Pro users interact with the database in real time, which means that any spam messages in the users email that match a digital fingerprint are eliminated. No other FirstAlert! subscriber ever receives the same spam.

MailWasher Server - stops spam at the server before it infiltrates your organization. Its primary purpose is to help organizations stop spam, and unwanted email impacting employee productivity and valuable network resources.
 

Contact via Skype ... Click this button to start a Skype call.
You must have Skype installed on your computer.
          - - - - - - - - - - -
Our user name for Skype is "notestracker"
(also for MSN Messenger, Yahoo Messenger, and ICQ, but we don't always have these running). (click this button to call)

My weblogs ...
Notes Tone Unturned ~ Basic Questions ~ NotesTracker news ~ Leave Good Enough Alone