Complete Computer & Mobile Security Information
Last Updated: 2/19/2014 - Optimized for Firefox 27.0.1
I created these websites ONLY to provide free information to help other people
I am NOT a business of any kind, and make NO money providing this information
There is NOTHING for sale here - Feel free to link to any of my pages
Caveat Emptor - I am not responsible for any problems
I try to present accurate info - Double check any advice, before taking it
I apologize, but I am not able to help with your problems
Please try HERE to find sites that may be able to Help you
** CLICKING ONCE on a Desired, Listed subject will take you to that information **SPAM / JUNK EMAIL Information Recalls / Warnings REGISTRY WINDOWS TIPS
INDEX - SECURITY INFORMATION INDEX and JUMP TABLEWHAT DO DO IF YOUR SYSTEM IS INFECTEDCOMPUTER SECURITY TUTORIAL - START HERERECOMMEDATIONS FOR COMPUTER SECURITYCOMPLETE COMPUTER VIRUS INFORMATION
** ALERTS - WINDOWS (all recent versions) VULNERABILITIES **|
Advisories, Microsoft | Advisory Sites / Databases |
Advisories, Specific | Advisories by OS, Product, & Vendor |
ALERTS - NEWLY SEEN|
ActiveX | ADOBE |
Ad Trackers (cell phones) | Adware Detectors |
Anomynity - be anonymous| Anti-Malware Reviews |
Anti-Virus Checker Reviews| ANTI-KEY LOGGERS |
Apple Computers | Articles / News |
AURORA Exploit |
Backdoors | Backups |
BANKING Online |
BEGINNER'S GUIDE | Beladen |
Best Anti-Malware Suites| BetterPrivacy - Flash Cookies |
BHO - Browser Helper Objects |
BIOS Passwords | BlackBerry Vulnerabilities |
Black Listed Web Sites (Malware) |
Blended Threats | Bluetooth Vulnerabilities |
Books - Security, Malware, Rootkits, Spyware, Trojans, Viruses,... |
BOOT CDs / Floppies | Booting - What programs run? |
BOOT LOGGING | BOOTING SAFE MODE |
BOOT VIRUSES | BOTs / BOTNETS / ZOMBIES|
BOTs - Recently spotted | BREDOLAB BOT/TROJAN |
Browser Hijacking | Browser REDIRECTION |
Browser Security | Browser - Surf more Safely |
Browser Vulnerabilities | BUGS / Recalls / Scams / Warnings / Fraud|
Business Data Security |
Carbon Monoxide | Cell Phones |
CERT | Certificates |
Check your Password | Check your PCs Vulnerabilites|
CISCO | Cleanup your computer & disk|
COMPLAINTS | Compression / Decompression |
Conferences & Papers |
Computer LANGUAGES | CONFICKER / Downadup |
COOKIES | Copy Protection |
Cordless Phones | CPU HOGS - Tame them |
CRAMMING | CrapWare Removal |
Credit Cards | Cross-Scripting |
DATA BREACHES |
Data Held for Ransom | Data in Motion |
DB, SQL,... Vulnerabilities | DHCP Attacks |
DNS Attacks | DNS CHANGER MALWARE |
DO NOT CALL PHONE LIST |
DoS - Denial of Service | Downloads |
Downloaders | Drive By Downloads |
DRM-Digital Rights Management | DropBox / DropSmack vulnerability |
Electronic gadgets infected |
EMAIL security | Email Viruses |
EMULATION (WINE,...) |
ENCRYPTION | Encryption Flaws |
ETHERNET / 802.11 (other - security topics not covered elsewhere) |
EULA | Events |
EXCEL Attacks / Flaws |
Facebook / Twitter / etc. | FAX HOAXES / MALWARE |
Fibre security problems | FILE RECOVERY / UNDELETE |
File Systems - ALL |
Firefox / Mozilla | FIREWALL Information |
FIREWALLS, HARDWARE| FIREWALLS, LINUX |
FIREWALL, SOFTWARE | Flash Cookies Delete |
Flash Cookies Information | Flaws / Vulnerabilities - Software |
FREE Security Programs | FREE Virus Checkers |
FREEZE YOUR CREDIT TO PREVENT THEFT |
FTP - Vulnerabilities |
GLOSSARIES - Malware | GLOSSARIES |
Google & Google Desktop | Government, Federal & Official Help |
Gpcode - Data Ransom | GPS Stalkers can find your You & your Child |
GRAPHICS can run malicious code |
GSM Vulnerabilities | Gumblar blended threat |
HACKED Data - Latest Sites |
HACKERS, Anti | Hardening Linux |
Hardware Diagnostics | Hardware, Protecting your |
HDDs - ATA, EIDE, ESATA, IDE, SATA, SATA IO, SAS, SCSI, XSATA |
HELP SITES (get help) | HIDS - Host Intrusion Detection System |
HOAXES | Home Computer Security Specifics |
your HOME SECURITY | HOSTS file |
HTML Injection |
I AM USING THESE PROGRAMS TO PROTECT MY COMPUTER |
Identity Theft | IDS - Intrusion Detection System |
IM - INSTANT MESSAGING | INTEL |
INTERNET EXPLORER | Intrusion Detection Languages / CISL |
Intrusion Prevention | IP Abuse |
IP Address - Where is it Located and who owns it? |
IP Filters / Filtering | iPhone (Apple's) |
IP Management | iPOD |
IPS | IP Security Abuse / Problems |
ISO IMAGES |
ISO 17799 & ISO17799 | iTunes |
Keyjacking | Keyloggers - FOOLING |
Keylogging | LinkScanner-Safe Link? |
Linux Firewalls | Linux ROOTKITS |
Linux Security | Linux Virus Checkers |
Locked Files? - Delete? | LOG FILES - LINUX |
MAC Address | MAC / OS X |
Malware | Malware Alerts |
Malware - How some Malware works |
MALWARE REMOVERS (antiMalware, antiSpyware)- REVIEWS | 2013 | 2012 |
Malware - Remove Specific | Malware - Remove Unknown |
Malware - Other Removers |
Man in the Middle - attack | MD5 |
Media Player Vulnerabilities | Messenger Service Spam |
Microsoft - NON-Windows | Mobile Malware / Viruses |
NAT | Network Security |
NEWS Sources - Security| NIDS - Network Intrusion Detection System |
Nine Ball |
NoScript - Firefox add-on | Novell security issues |
Online BANKING |
Online Malware Checkers | Open Office |
Open Source anti-virus | Open Source Vulnerabilities |
Oracle | Organizations - Anti-Malware |
Outlook / Outlook Express | Overwriting Viruses |
PASSPORTS with RFID | PASSWORDS - BIOS |
Password Strength Checking |
Password Stealing | PASSWORDS - Generate Strong |
Password (Key) Safes |
Passwords - Tips/Encrypted | PASSWORDS - WINDOWS |
PDA Viruses | PDF Vulnerabilities |
Pharming | Pharming, Drive by |
Phaxing | Phishing |
Phones - Cell, Wireless,... | Photograph SCAMS / Doctored |
Popup STOPPERS | Port Knocking |
Port Number Assignments | Port Stealth Mode |
PowerPoint Problems |
Programming Vulnerabilities | Psyb0t or Bluepill Worm |
PUP - Potentially Unwanted Programs |
QuickTime | RAM SCRAPERS |
RANSOMWARE | REBATE PROBLEMS |
RECOMMENDATIONS for Securing your PC |
RECOVERY / RESCUE DISK - WINDOWS |
RECOVERY / RESCUE DISKS - LINUX |
REFERENCES | RFID |
REGISTRY - Windows File | REMOVING Specific Spyware/Malware |
Road Runner Security
Root-kits - Detect Them | Rootkits - LINUX |
Root-kits in the News | ROUTERS Flaws/Problems |
SONY's use of Root-kits | SAMBA |
SAFE MODE BOOTING | SCAMS |
SCAM RESOURCES - Is it really a SCAM? |
SCANNERS, Malware |
SECURE CONNECTIONS| Secure Connections Vulnerabilities|
SECURITY CHECKING |
SECURITY PROBLEMS | SECURITY, REFERENCES |
SIEM / SEM / SIM | SiteAdvisor (McAfee) |
SECURITY, SOLUTIONS | Shopping Safely Online |
SKYPE Security issues | SLAMMING |
SLOW COMPUTER/BROWSER FIXES|
Smart Phones (all) |
SMiShing | SNMP |
SONY's USE OF ROOT-KITS | SPAM |
Spear-Phishing | SPIM - SPAM In IM |
Spoofing | SPYWARE |
SQL Injection | STALKERS get Child's BEDROOM/Playground location |
Storage Security | SYMBIAN |
TERRORISM, anti | Thunderbird |
TROJANS | Trojan Removal Tools |
Unix Security | USB Security |
VANDALS | Vibrant Media - Malware |
VIRUS INFO - Complete | VIRUS MELT Removal |
VISTA | VML & Markup Languages |
VOIP / IP Security | VULNERABILITIES |
Waled Malware | WAP
Watering Hole Attack | WEP |
WEB BUGS | WEB / Internet Security |
WEB PAGE Security |
WEB, IP & EMAIL ABUSE - White Papers |
What Windows Programs Run at STARTUP / BOOT ? |
What is that Windows Program running in the BACKGROUND? |
White Listed Web Sites (Safe) | White Papers |
Wi-Fi SECURITY |
Windows free Security Updates from Microsoft |
Windows Media Players Problems |
WINDOWS (all recent versions) VULNERABILITIES |
WINDOWS TIPS |
WINDOWS UPDATING - How to |
Wireless (CORDLESS) Phones |
WIRELESS / Wi-Fi SECURITY |
WORD / .DOC files | WORMS |
WPA | WPA2 |
x64_AMD (EM64T) (64Bit) Protection |
Xen Vulnerabilities |
XML Vulnerabilities | XP Security |
Zero-Day Attacks (Microsoft Office - Excel, Power-Point, Word) |
ZOMBIES / BOTs |
Zone Alarm - Free software FIREWALL |
OTHER RESOURCES | OTHER INFORMATION |
Programming Language VulnerabilitiesAJAX Vulnerabilities | C# Vulnerabilities |
PYTHON Vulnerabilities |
RAILS Vulnerabilities | RUBY Vulnerabilities |
Beginner / Newbie Steps to Protect Your Computer DataAs long as you connect to the Internet (browse, eMail), your computer
is not safe. Running NON-Windows (MAC or Linux) increases your computer
safety, BUT gives your fewer choices to protect, clean-up your computer
(my opinion) and, more importantly, fewer choices in Applications.
1] How to protect your computer and it's data
1) Do not pick easily discovered passwords.
2) Set the Administrator password - DO NOT EVER FORGET THIS.
3) You may wish to add a Boot up (also called a hard drive or BIOS)
password - DO NOT EVER FORGET THIS - If you have a laptop (mobile
computer) or other unknown people could get at your computer.
You will have to look up this procedure in computer or motherboard
4) Do not pick simple passwords - combine upper case lower case and symbols.
5) Make passwords at least 10 characters in length
6) Do not use birthdates, names of relatives or pets as part of your password.
7) Do not use words found in a dictionary as passwords nor as part of passwords.
8) Submit your password here, to find out how strong is the password.
Generate Secure Passwords here
9) Consider using a free password (key) SAFE to protect your passwords.
(Symantec) Norton's 360 includes: Identity (password) Safe
B] Always keep your Operating System (usually Windows?) up-to-date.
NOTE: Microsoft generally releases updates on the SECOND TUESDAY of the MONTH.
C] Always run a good anti-virus and a good anti-malware program(s).
Norton 360 combines these and other needed protection.
ALWAYS keep these up-to-date.
Again for 2011, 2010, 2009 & 2008, PCWorld and I suggest
(Symantec's) NORTON 360. Note - it is very fast, these days.
D] Always keep your applications up-to-date (Word, Excel, PowerPoint,
Adobe Reader, JAVA...
E] You really should use a (they are cheap) Hardware Firewall.
You may already have one.
F] EMAIL - do not open emails from unknown persons.
Do not open any email attachments, UNLESS you are expected it,
from that person. For more EMAIL security information
I suggest using a keyword on YOUR outgoing
emails that contain attachments - this shows that you, not a
virus, actually sent the attachment. Let your correspondents
know what keyword you use.
For more EMAIL safety tips, click here
G] You should use a Software Firewall to prevent bad programs from sending
your data back to their home. I suggest the one included with NORTON 360.
I do prefer ZoneAlarm's software firewall, but I'd rather not have
Norton trying to nicely interact with an other software firewall.
H] I strongly advise using Firefox 27.0.1 (or later) WITH NoScript and
BetterPrivacy (to squash Flash Cookies) as a Browser.
If you want to use Internet Explorer, use IE 9 (or later).
I] I suggest using Mozilla's THUNDERBIRD as an email program rather
than any Microsoft email program - I believe it is much safer.
Thunderbird Version 24.2.0 has been released
J] I suggest setting your browser to remove Cookies after you
shutdown the browser. This is usually an option of the web browser.
K] I suggest (automatically) deleting ALL temporary files when you
shut windows down. CCleaner is both good and free -
I've used it for many years. Latest version 3/03/2013 = Version 3.28.1913
I have used this for Windows XP, Windows 7, Windows 8, Windows 2008, Windows 2003 32 and 64-bit versions.
I have never had a problem with CCleaner.
GET THE FREE, UNSUPPORTED VERSION OF CCLEANER
I also HIGHLY recommend the free CCleaner for fixing REGISTRY problems.
If CCleaner finds any Registry Problems, it will ask if you want to
backup the Registry prior to making the fixes - YES - ALWAYS BACKUP
PRIOR TO MAKING CHANGEES TO THE REGISTRY.
USING CCLEANER TO FIX REGISTRY PROBLEMS - Use the Free, unsupported version
This is NOT the same technique for ccleaner to remove unneeded files.
This simple procedure will make your Windows computer run faster & more reliably
1) Run CCleaner (download the FREE version)
2) Click on REGISTRY (an icon on the left side of the CCleaner window)
3) Ensure that ALL little Registry Boxes have check marks in them
4) SCAN FOR ISSUES (click on this "button" - bottom of window, left of center)
5) If it finds any issues, Click on FIX SELECTED ISSUES (ALL issues)
6) DO You want to backup changes to the registry - YES <<<< always back it up
7) You can optionally change the name of the backup file
8) FIX ALL SELECTED ISSUES
9) when done, click on CLOSE
10) REBOOT your computer (so the fixes can take effect)
CCLeaner also allows you to:
1) List all programs that run at system startup and allows you to
prevent un-needed applications from running at Startup.
2} Allows you to restore earlier System Saves (Checkpoints).
Five tips for using Ccleaner to degunk your system - techrepublic
Putting Registry-/system-cleanup apps to the test
ccleaner - DOCUMENTATION
ccleaner - FORUM
You may also wish to peruse my WINDOWS TIPS and SYSTEM STARTUP INFORMATION.
You may also wish to peruse my REGISTRY INFORMATION.
L] personally. I don't use any form of IM (Instant Messenger), as I
believe that they pose a security risk - it's up to you.
M] Make your file extensions visible - this helps prevent
accidentally executing a piece of Malware.
Open Windows Explorer or any folder window and click:
Ensure that the option Hide file extensions for known file types is
UNchecked. Disable hidden filename extensions
Files that are executable (such as .com, .cmd .exe,...) are more dangerous
Click here for more information
N] Turn of the Windows Messenger Service - this is NOT the same thing
as an Instant Message, and has nothing to do with Instant Messages.
If this is on, Malware can take control of your computer.
O] Turn off JAVA (I use NoScript to do this task) in your web browser.
Even Microsoft recommends DIS-allowing unknown sites to use JAVA.
This may cause some websites to not run correctly.
NoScript lets you allow specified sites to run JAVA
OR other scrpting languages.
This may cause some websites to not run correctly.
and other scripting languages.
Q] Click here for more BEGINNER's / NOVICE / Impoving computer seccurity guides
R] DISCONNECT FROM THE INTERNET WHEN NOT USING IT
If your cable modem has a switch that disconnects the modem from
the Internet (your ISP), consider disconnecting from the Internet
when you are not actually using the Internet (I do this).
This prevents attacks on your computer when you are not using it.
Newer Motorola cable modems have this disconnect switch.
DO NOT TURN OFF YOUR INTERNET MODEM IF YOU USE VoIP for a phone
connection - such as Vonage, or Time-Warner's Digital Phone, or
SKYPE - as this will disconnect your phone(s).
S] Backup your computer - this is not very expensive these days.
2] What to do if you think you have a virus or Malware on your computer.
3] Identity Theft preventiuon and information
ActiveX (Microsoft's)Microsoft FINALLY fixing ActiveX bug - Tuesday 7/14/2009
Symantec confirms ActiveX bugs in its own consumer software - 4/4/2008
CLICK HERE for more information about ActiveX
NoScript - a free Mozilla Firefox Extension, blocks Cross-site Scripting (XSS)
ADOBE Security IssuesAdobe Flash Player 12 was released
Adobe Reader XL 184.108.40.206 was released
More information about PDF vulnerabilities may be found HERE
Adobe warns of critical Flash and Air vulnerabilities - Patches due Tuesday 8 December
Vulnerability: Adobe Reader and Adobe Acrobat remote execution vulnerability CVE-2009-4324 - 12/15/2009
Adobe Reader Under Zero-Day Attack - NO fix yet (1217/2009)
Current Adobe attack installs Trojan.Pidief.H
Trojan.Pidief.H (from attack on Adobe software)- Removal - Symantec
Security updates available for Adobe Flash Player - Vulnerability identifier: APSB09-19 - 12/10/2009
For the fourth time this year, Adobe has admitted that hackers were using malicious PDF documents to break into Windows PCs
Security Updates Available for Adobe Reader and Acrobat - Release date: October 13, 2009
I would UNcheck the INSTALL McAfee Security Check:
Adobe has released Flash Player 220.127.116.11 - 4/03/2012
The latest versions of FLASH PLAYER are 11.7.700.169 (Win and Mac), 11.3.378.5 ?? (Windows 8)
and 18.104.22.1681 (Linux). All users are encouraged to update to these latest versions. - 1/22/2013
Essential security updates for Adobe and FoxIt PDF readers
Adobe PDF Exploit Signatures - 26 February 2009
It May Be Time to Abandon Adobe
Hackers exploit unpatched Adobe Reader bug
September 15, 2008 - infected PDF file got through a User's up-to-date
Adobe Acrobat Writer.
Security updates available for Adobe Reader and Acrobat - February 7, 2008
Neosploit Updated to Include an Acrobat Exploit - 05-05-2008
as arguments to Acrobat.
Bugs Menace Adobe Photoshop
TOP of this Complete Computer Security Web Page
INDEX of this Complete Computer Security Web Page
Search Engine Submission - AddMe
Increase Page Rank
- Acronyms / Glossary
- Woodsmall's Recommended Technical Books
- BUGS / RECALLS / SCAMS,... Page
- Buses & Networks, other
- Connectors, Pinouts & Wiring Info
- DATABASE Info
- Digital - DVD, Music, Recording, Video
- Embedded / Firmware / Real-Time / Driver Info
- Encryption, Compression, RFID, Smart Cards, AI, & Fuzzy Logic
- Ethernet, 802.11x, Fast Ethernet, Gigabit Ethernet, isoEthernet
- Fibre Channel
- GRAPHICS INFO
- Complete Home Security and Home Maintenance
- HOTEL/MOTEL INFO
- HOUSE & TAX INFO
- IP, IPsec, IPv4, IPv6, FCIP, iFCP, PPP, SoIP, TCP, TCP/IP, TOE, VoIP
- LEGACY computer LANGUAGES/Architectures
- Master Boot Record (MBR)
- Network, Buses, USB & Communications Info
- NEWS LINKS
- NEWS - Current Technical
- NORTH CAROLINA INFO
- PERSONAL: airlines, airports, cars, discount, tires, Financial, Fix-it, Movies, ETC **
- Pharma / Bioinformatics
- Programming, Agile, C, C++, Design, Algorithms, Patterns, OO, Refactoring, ADO
- Recommended Computer Security Steps
- References - Other, Postage, Converters, Dictionaries, Languages
- SAN / NAS / SATA / Storage / CIM / Device Discovery
- SCSI / iSCSI / RAID / SAS / SMI-S
- Secure Connections
- Technical Info
- Virus Info
- VISTA Info
- WEB Development **
- Windows 2003
- Windows 2008
- WINDOWS TIPS
- Wireless / PDA / Handhelds
- XP Info