Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

Are You Safe From Hackers?




By Charles & Susan Truett

We don't use E-gold very often since most of our online business and customer sales are conducted through our online merchant account. However, we occasionally have someone who will request paying by E-gold so we keep an account there for this reason. Once a month or so we withdraw the funds and decided to do so yesterday. Imagine our dismay when we logged into our E-gold account yesterday and found our balance to be a big fat ZERO! We had checked the balance just a few days ago so we knew this was not correct. After investigating the history of the account, we found that a spend had been made to another e-gold account user WITHOUT our knowledge or authorization. We had been hacked!

Since we have up to date anti-virus and firewall software on our computer, we assumed we were safe. Not so! It seems this is not enough to keep away the hackers as the software does not prevent "Spyware" from being installed on your computer.

"Spyware" is software that gets onto your computer and literally "spies" on your activities. The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer.

Spyware gets on your computer in one of several different ways.

First, it rides along with software you download from the 'Net and install on your system.

Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message.

Third, hackers find an open port on your computer and use the "back door" to install basically anything they want.

And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing.

So how do you protect yourself against these malicious hackers? You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily.

Below are two programs which specifically check for and remove spyware from your system:

"Spybot Search & Destroy" - http://www.safer-networking.org
"Ad Aware" - http://www.lavasoft.de/software/adaware/

You may have spyware lurking on your computer right now so protect yourself today by downloading one of the above programs!

As a point of reference, we contacted E-gold and informed them that we had been hacked. We provided them with the account number of the person who received the funds and asked for a contact e-mail address on the person. E-gold informed us that they could not provide that information without a "court order" and that basically there was no way of getting the money back!

Take action today to protect yourself from this growing threat! The bottom line is: - Keep your anti-virus program current

- Install a firewall
- Carefully screen software before installing it
- Scan specifically for spyware weekly
- Stay current on this growing threat.
 
 
About the Author
Charles & Susan Truett are experienced internet marketers
who have built a successful online business and are now
teaching others how to achieve the same success.  For more
more info on how to make money at home visit:
http://www.partnersinsuccess.net



Article Source: http://www.simplysearch4it.com/article/20511.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/20511.html" as shown above and make it hyperlinked.



  Some other articles by Charles & Susan Truett
Desk Clocks For Your Home Or Office
Desk clocks are a statement of authority and professionalism. No desk is complete without a desk clock that reflects the personality of the person who uses the desk. In your home, a desk clock will be ...

Reverse Mortgage Lenders
You've made the decision that you need some extra assistance in meeting your monthly financial obligations. One of the best options for those over sixty-two years of age who own their own home is ...

Reverse Mortgage Information - Who Qualifies For Reverse Mortgages
Reverse mortgages can be a great solution for seniors who wish to remain in their home but are having difficulty making their monthly payments ...

Unique Wall Clocks - Elegance And Style For Every Room
A unique wall clock is a timeless statement of your style and superior taste. There are a variety of wall clocks from which to ...

Clocks For Your Home And Your Lifestyle
Clocks are an important part of our culture and history. For centuries the quest to keep accurate time has resulted ...

Setting Your Online Business Up for Success
There is a common misconception that an "online business" requires no investment...that you can make money online without spending any. When we hear this from people who are desparately trying to build a successful online business ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Can't connect to database