How To Choose A Fire Wall Software ProgramWritten by Cavyl Stewart
Continued from page 1
Data encryption - Automatically scrambles any sensitive data that you do allow to be transmitted. Stealth mode - Hides that fact that your PC is even connected to Internet so that hackers can't see you. Pop-up ad blocking - Stops those annoying ads. Cookie blocking - prevents web sites from sending you cookies without your permission Spyware protection - Blocks dangerous spyware from operating on your PC There are many software-based firewall programs that can be downloaded from internet. Most of them come with free trials so you can test each one and choose what's best for you. Although you won't have to be King Geek to install and set up your firewall, there are some adjustments and settings that will have to be tweaked. All of better firewall programs come with decent instructions and many of products have help available at their web site. If you notice that some program that used to work stops working after you install a fire wall then you'll have to make a change in fire wall's configuration that will enable program to operate freely. If you find that there is no way to let your previously operating program pass through firewall then that might be a good indication that you need to try a different fire wall. Be sure to check with makers of both software program and firewall before you give up and change.

Copyright © 2004 Cavyl Stewart. Discover 52 Ways To Do More With Software by signing up for my exclusive Free ecourse. Get tutorials, tips, reviews and recommendations you can use right now to help you achieve more, easier, and cheaper! 100% Original content. Visit: http://www.find-small-business-software.com/52ways.html
| | How To Avoid Getting Hooked By PfishingWritten by Cavyl Stewart
Continued from page 1
4. Forward copies of any Pfishing email to actual company or bank that is being imitated by scammers. You can usually send any email to postmaster@ and then bank or company name. 5. If a Pfishing e-mail seems particularly threatening or worrisome to you, report it to Internet Crime Complaint Center (www.ifccfbi.gov), a partnership between FBI and National White Collar Crime Center. 6. If it's too late and you already provided any of your personal information, account numbers, or PINs then you should immediately contact your banks and credit card companies to make arrangements with them to protect your financial interests. These companies and institutions are familiar with these scams and they know what needs to be done. 7. If you receive evidence of identity theft, such as unauthorized charges on your credit card bills, or unexplained transactions in your bank account, contact police and file a report. Be sure to get a copy of report for your own records and to send to companies that are involved in transactions. You also need to contact all three major credit bureaus (Equifax at 800-525-6285, Experian at 888-397-3742 and TransUnion at 800-680-7289) and tell them that you need a fraud alert placed on your credit file. 8. You can get information on ID theft and Pfishing at Federal Trade Commission Web site at www.ftc.gov or calling toll-free 877-382-4357.

Copyright © 2004 Cavyl Stewart. Discover 52 Ways To Do More With Software by signing up for my exclusive Free ecourse. Get tutorials, tips, reviews and recommendations you can use right now to help you achieve more, easier, and cheaper! 100% Original content. Visit: http://www.find-small-business-software.com/52ways.html
|