Notes Tone Unturned (formerly Asia/Pacific Computer Services, closed down at the end of 2013). This is now the PERSONAL website of Tony Austin, not a business site. Web Design and SEO, marketing campaigns, or any other such proposal. If you do, you will be billed for wasting my valuable time! |
Test and Protect Your System's Security |
|
Here are some websites which offer online system security testing - much of it FREE.
Don't delay - do these
checkups now!
Find out if you have security exposures, test for spyware and adware,
check out your firewall effectiveness.
10 things you should do to a new PC before surfing the Web
5 safety tips for using a public computer
The jargon-free guide to computer and internet security
Read the EULA.... No, Really Read It
Data protection policies need to be well thought out and consider not only the systems in direct control of the business,
but also the credentials by which employees can access those systems remotely. In this tip learn why,
beyond policy, awareness is a key element to the protection of data in your business.
Password Checker -- Test the strength of your passwords (from Micsoft store)
The Password Meter
This application is designed to assess the strength of password strings. The instantaneous visual feedback
provides the user a means to improve the strength of their passwords, with a hard focus
on breaking the typical bad habits of faulty password formulation.
5 tips for top-notch password security
How To Create Strong Passwords That You Can Remember Easily
"Creating strong passwords for all your online accounts is not a thing you should do.
It is a thing you must do."
LinkScanner Online
LinkScanner will inspect a URL that you enter and test it in real-time for whether it is hiding any exploit code
and, if so, what exploit. (Cybercriminals use "lure" sites to attract web users to sites they have invisibly infected with exploit code.
This exploit code is then used to infect users' PCs with drive-by downloads of spyware, rootkits, and other malware.
Laptop Security Basics
Some rudimentary steps that you can take to prevent your laptop from being stolen.
AV-Comparatives - independent comparatives of Anti-Virus software
Home PC Firewall Guide (Personal firewall guide)
Gibson Research Corporation -
ShieldsUP!
Without your knowledge or explicit permission, the Windows networking technology which connects your computer to the Internet
may be offering some or all of your computer's data to the entire world at this very moment!
AuditMyPC.com -
Protect your PC - Microsoft
HackerWhacker -
Sygate Online Services -
Test My Firewall.com -
AuditMyPC.com
Virustotal - offers a free service for scanning suspicious files using several antivirus engines.
www.iggyz.co -
Lavasoft Ad-Aware -
Zone Labs - Zone Alarm and IMsecure
WebAttack.com -
Security Forumz
Privacy.net -
Carry out a Privacy Analysis of your Internet Connection
Netcraft Anti-Phishing Toolbar - see the phishing Risk Rating of every site you visit
Eight Ways to Defend Against Pretexting (acquiring of personal information under false pretences)
Pretexting (from Wikipedia, the free encyclopedia) ...
The Ghost In The Browser -- Analysis of Web-based Malware
"As more users are connected to the Internet and conduct their daily activities electronically,
computer users have become the target of an underground economy that infects hosts with malware or adware for financial gain.
Unfortunately, even a single visit to an infected web site enables the attacker to detect vulnerabilities in the user’s applications
and force the download a multitude of malware binaries. Frequently, this malware allows the adversary to gain full control
of the compromised systems leading to the ex-filtration of sensitive information or installation of utilities that facilitate
remote control of the host. We believe that such behavior is similar to our traditional understanding of botnets.
However, the main difference is that web-based malware infections are pull-based and that the resulting command feedback loop is looser.
To characterize the nature of this rising thread, we identify the four prevalent mechanisms used to inject malicious content
on popular web sites: web server security, user contributed content, advertising and third-party widgets.
for each of these areas, we present examples of abuse found on the Internet. Our aim is to present the state of malware
on the Web and emphasize the importance of this rising threat."
TrueCrypt -
FREE open-source disk encryption software for Windows XP/2000/2003 and Linux.
How Much Would Data Theft Cost You?
Calculate It online, using the
Tech//404 Data Loss Cost Calculator
(a free, interactive tool designed to assess the impact of a data breach or identity theft data loss incident)
Is internet banking safe?
Each year online banking customers are being defrauded of millions of dollars. Can we keep the cyber crims from scamming us?
How to protect your cards and accounts online
10 Things Everyone Should Know About Bank Errors
Whether money is accidentally put in your account or taken out, this article can help you know what to do
so your finances and those of others remain secure.
Fight Identity Theft Blog
100 Guides and Resources for Keeping Your Personal Information Safe
Identity Theft Protection Hub
Business Resources
- Law Resources
-
Computer Security Resources
-
Background Checks Resources
ACCC - Australian Competition and Consumer Commission ...
Little black book of scams -
The little black book of scams highlights a variety of popular scams that regularly target consumers and small business
in areas such as fake lotteries, internet shopping, mobile phones, online banking, employment and investment opportunities.
It also offers consumers tips on how to protect themselves from scams, what they can do to minimise damage if they do get scammed and how they can report a scam.
>> The little black book of scams -
PDF file direct download
Encrypt your files to keep them safe
When using a computer, privacy is paramount. And even more so if you run your own business.
Discover how you can help protect private customer and financial information by using its Encrypting File System (EFS) with Windows XP Professional.
PC Flank's Tests ...
Browser Test -
Trojans Test -
Stealth Test -
Advanced Port Scanner -
Firewall Leaktest
Free Home Office/Personal Firewall Test
and
Free Business Server/Firewall Test
Firewall Leak Tester
Matousec's Comprehensive List and Analysis of Personal Windows Firewalls
Microsoft Strider URL Tracer with Typo-Patrol ...
When a user visits a Web site, her browser may be instructed to visit other third-party domains without her knowledge.
Some of these third-party domains raise security, privacy, and safety concerns.
The Strider URL Tracer, available for download here,
is a tool that reveals these third-party domains, and it includes a Typo-Patrol feature that generates and scans sites
that capitalize on inadvertent URL misspellings, a process known as typo-squatting. The tool
also enables parents to block typo-squatting domains that serve adult ads on typos of children's Web sites.
Fundamental Computer Investigation Guide for Windows
This Solution Accelerator from Microsoft shows you how to use Windows SysInternals to investigate suspicious activity,
and helps you determine when to turn over an investigation to law enforcement. The guide gives you best practices
on how to collect, preserve, analyze, and report on key data using techniques that will stand up in a court of law.
Nessus
"The world's most popular vulnerability scanner
used in over 75,000 organizations world-wide. Many of the world's largest organizations are realizing significant cost savings
by using Nessus to audit business-critical enterprise devices and applications. The Nessus Project was started in 1998
to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner."
File Research Center -- Free File and Process Information
Provides a free scanning service to identify what is running on your computer, plus free information about
safe and unsafe files, processes, services, spyware, adware, malware, trojans,
and other programs that may be on your computer.
Safe online havens for kids
At a time when cyber stalking is daily news, it's no wonder parents are often confused
about which websites they should let their children visit. But if you want to stay on top of what kids are doing
online without being too intrusive, and be able to make occasional cool suggestions, read this article.
Microsoft's
Windows Live Safety Center
(a FREE service designed to help ensure the health of your PC ... Check for and remove viruses,
learn about threats, improve your PC's performance, get rid of junk on your hard disk)
And not to forget your battle against SPAM ...
HIGHLY RECOMMENDED Get the most out of your mail You owe it to yourself to buy a copy of MailWasher Pro I personally have purchased and rely heavily on MailWasher PRO ourselves! But there's also the MailWasher FREE version MailWasher Pro not only bounces spam email also reports spam back to a central database ... FirstAlert! - MailWasher Pro's global network of users easily and actively reports spam to FirstAlert! administrators who verify the spam and add it to the database. Once added to the database, spam messages are transformed into a unique digital fingerprint. MailWasher Pro users interact with the database in real time, which means that any spam messages in the users email that match a digital fingerprint are eliminated. No other FirstAlert! subscriber ever receives the same spam.
MailWasher Server - stops spam at the server before it infiltrates your organization.
Its primary purpose is to help organizations stop spam, and
unwanted email impacting employee productivity and valuable
network resources. |
Contact via Skype ...
(click this button to call)
My weblogs ...
Notes Tone Unturned ~ Basic Questions ~ NotesTracker news ~ Leave Good Enough Alone