Continued from page 1
A Trojan horse is a program that Internet criminals use to interrupt and interfere with your security software and produce following results
·Terminates processes ·Removes registry entries ·Stops services ·Deletes files
Hackers, who have gained access to your computer, because of easily accessible programs and software as mentioned above, are enthusiastically incorporating this venomous little program into their arsenal of weapons.
As recently as March 4, 2005, a new Trojan horse was discovered that modified settings in Internet Explorer. Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, and Windows XP were reported systems that could be affected.
On January 28, 2005, a press Release issued by Department of Justice reported that a 19 year old was convicted for his criminal activity by “…creating and unleashing a variant of MS Blaster computer worm.” Christopher Wray, Attorney General – Criminal Division stated that,
"This … malicious attack on information superhighway caused an economic and technological disruption that was felt around world.”
By way, “malicious” is defined by Webster as “…intentionally mischievous or harmful”.
On February 11, 2005, in a Press Release issued by Department of Justice, reported that another criminal was sentenced for circulating a worm. This worm,
“…directed infected computers to launch a distributed denial of service (DOS) attack against Microsoft's main web site causing site to shutdown and thus became inaccessible to public for approximately four hours.” March 7, 2005, Symantec.com posted discovery of a worm named “W32.Serflog.B” that spread through file-sharing networks and MSN Messenger – networks that operate on publicly open and interpretable industry standards administered by P2P systems that host Instant Messaging clients—none of which are protected, regardless of anti virus software on your computer. The W32.Serflog.B worm also lowers security settings and appears as a blank message window on MSN Messenger. SOLUTION
Avoid at all costs, P2P file sharing networks as they operate on publicly open and interpretable industry standards. (Instant Messaging services run on P2P file sharing networks.)
If you like convenience of text chatting via Instant Messaging, then why not consider an optimally secure VoIP (voice over internet protocol), also known as a Computer Phone, that incorporates Instant Messaging feature. Make sure VoIP internet service provider does not operate on P2P file sharing networks that use industry standard codec or industry standard protocols that are publicly open and accessible. (Don’t forget, these standards create vulnerability which hackers are capitalizing on because of their easy accessibility.)
Optimally secure VoIP service providers that incorporate a secure Instant Messaging feature, operate from their own proprietary high end encryption codec on patented technology which is hosted in a professional facility. Simply put, when a VoIP internet service provider is optimally secure, Instant Messaging feature on VoIP softphone is also incorporated in their optimally secure technology.
Here’s bottom line.
If you are currently using Instant Messaging of any sort, you need to make a decision:
a.Continue enticing hacker mercenaries and remain as a user of an Instant Messaging service, or b.Take immediate corrective action.
If you decide to take immediate corrective action:
1.Find an optimally secure VoIP internet solution provider that includes Instant Messaging feature in their proprietary patented technology. 2.Find an optimally secure VoIP internet solution provider that has their own proprietary high end encryption codec. 3.Find an optimally secure VoIP internet solution provider that has their own proprietary patented technology. 4.Find an optimally secure VoIP internet solution provider that hosts their proprietary patented technology in a professional facility.
Here’s a place you can look over to see what an optimally secure VoIP internet solution provider looks like--one that operates on their own proprietary high end encryption codec with their own proprietary patented technology hosted in a professional facility, AND one that incorporates Instant Messaging feature. http://www.free-pc-phone.com
**Attn Ezine editors / Site owners ** Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify content and include resource box as listed above
Dee Scrip is a well known and respected published author of numerous articles on VoIP, VoIP Security, and other related VoIP issues. Other articles can be found at http://www.free-pc-phone.com