Showing posts with label Safety. Show all posts
Showing posts with label Safety. Show all posts

Wednesday, September 19, 2007

Ad-Aware 2007 - Tutorial

This video will briefly show you how to use Lavasoft Ad-Aware.

It’s very simple and straightforward to use, but don’t rely solely upon one such program to keep the nasties out of your PC.

I regularly use CCleaner, SpybotS&D, MRU-Blaster and Advanced Windows Care.

Click here for Video Tutorial

Thursday, September 13, 2007

Skype Targeted With Worm

Skype, the VoIP (Voice over Internet Protocol) is considerably less secure than traditional telephone lines. Many people have switched to using Skype because of the savings they can make, and many have abandoned their traditional telephone lines altogether.

Skype was founded in 2002 and was bought by ebay in 2005 for US$2.5 billion. It has seen a steady rise in the number of subscribers to its service.

However, it still has many pitfalls, including the latest Worm called ‘W32/Ramex.A’.

It spreads through the peer-to-peer instant chat utility and is activated when a user clicks on a link within an instant message asking recipients to download a file.

It is very cleverly disguised within a jpeg image of soap bubbles, one of Windows default built-in wallpapers which has been embedded with a malicious executable code.

This code installs Spyware that can easily steal passwords and other personal information. It may also block users from visiting certain websites and stop programs from running or responding. It also connects to a remote server to download additional malicious code.

It is often titled ‘really funny’ or ‘look at this crazy photo sent to me’ with a clickable link. Once clicked, users who continue to download the file then have the risk of their machine becoming infected, and it then uses Skype’s application program to access files on the infected machine. The worm then attempts to replicate itself and then send out messages to recipients on the users contact list.

Ensure your anti-virus is up-to-date, windows updates are downloaded and installed, especially The Windows Malicious Software Removal Tool, which was last updated September 11th 2007. To remove the worm and its variants go to the link below and Download the file, save it to your Desktop (or location where you store downloaded files) and once the download is complete, select Run and the program will install.

You then have the option of a Quick Scan, Full Scan or Customized Scan.

Select Quick Scan and if any Malicious Software is found you will be prompted to run a Full Scan which may take several hours depending on your machines hard drive capacity but it’s worth it for the safety and security of your PC.

Download Here

Friday, September 07, 2007

CoolWebSearch

This is a very nasty and insidious spyware/malware program. Spyware experts are now saying that the makers are borrowing code from other malicious programs to install rootkit like features on infected machines.

More recent versions of CWS spyware now have features similar to rootkits which allow the program writers to hide their files on Windows operating systems.

These new variants can hide their settings in the registry and also hide rootkit files in alternate data streams.

The software is usually installed on a machine by visits to malicious websites or emails using various ploys to get users to download and install the script.

Once installed, CoolWebSearch will hijack browsers and redirect users to some of the several bookmarks it imports. When you attempt to change your homepage back again it constantly overwrites it, it slows down general performance and causes Windows to freeze, crash or reboot, and can also make you victin to a Denial of Service (DOS) attack.

Getting rid of it is now much easier. TrendMicro have a free CoolWebSearch removal program

Use this utility to get rid of CoolWebSearch and it’s related programs.

Also download Spybot S&D and use its TeaTimer protection, which runs in the background and alerts you to any attempted registry changes.

If you are running Windows, also use Advanced Windows Care. Both of these programs will add a large number of changes to your Registry. This is nothing to be concerned about as the changes are necessary to stop any nasties from attching themselves to your pc and making changes you really don’t want.

Keep your anti-spyware up to date and if you click on any links that prompt you to download, read the EULA first.

Check for rootkits on your machine.

As with all programs, regular updates is essential to offer you greater protection.

Monday, September 03, 2007

eCards and Postcards from Friends

From: BlueMountain.Com ufp@btconnect.com

Subject: You’ve received a postcard from a School mate!

Hi. School mate has sent you a postcard.
See your card as often as you wish during the next 15 days.

SEEING YOUR CARD

If your email software creates links to Web pages, click on your
card’s direct www address below while you are connected to the Internet:

http://**.***.***.**/?e3ca036e47840d8e117868911e6c3

Or copy and paste it into your browser’s “Location” box (where Internet
addresses go).

We hope you enjoy your awesome card.

Wishing you the best,
Webmaster,

BlueMountain.Com

At present there are millions of these being mass mailed on a daily basis, from ’schoolmates’, ‘friends’, ‘family members’, ‘your mate’ and many more.

Ensure that your Anti-Virus is up to date, and all system security patches have been downloaded.

NO Greeting Card company will ever ask you to DOWNLOAD anything, ecards are viewed online through a link in an email, but the links contained in these ‘cards’ prompt you to download.

In this particular case, if you click the link you are PROMPTED to DOWNLOAD or informed that your DOWNLOAD will start shortly.

It is important that you just delete these mails, many contain a Trojan Script…..but they will not zero your drive or boot sector as the rumours are saying.

As with all emails, if you don’t know the sender DELETE it.

How to ruin your PC

Fighting off Viruses

AVG Anti-Rootkit Free

Grisoft has developed quite a following with its free (for personal, non-commercial use) security applications, and for good reason.

Now there’s an anti-rootkit utility in AVG’s free software stable, too, and for users seeking a minimum of interaction, AVG Anti-Rootkit Free may very well be the Right Tool for the Job.

Grisoft makes its free AVG Anti-Rootkit application available for download. Users download the avgarkt.exe setup file, which features simple installation.

You may download a free version of AVG Anti-Rootkit here.

In keeping with the goal to make AVG Anti-Rootkit a very simple tool, the file features a simple .exe install file that triggers a setup wizard.

Users can select between a normal interface (which Grisoft recommends and sets as the default) or a low graphics interface (which is optimized for visually impaired users who rely on screen-reading programs).

Users must accept the AVG Anti-Rootkit Free license agreement before they can use the program to check their Windows system for stealth rootkit programs.

Next, users must specify the location of the AVG Anti-Rootkit Free installation files.

As with most software programs, users must specify the name of the Start Menu Folder. This is the name the AVG Anti-Rootkit application receives on the user’s Start menu.

Once users have specified all setup information, the free anti-rootkit utility installs itself.

Due to the way most anti-rootkit applications operate, it’s necessary to reboot Windows to enable proper operation. AVG’s free anti-rootkit application is no different. AVG’s setup utility gives users the option of rebooting immediately automatically or manually rebooting later.

AVG purposefully keeps its anti-rootkit interface simple. There are very few options for users to choose, thereby helping simplify the already confusing and complex world of rootkits.

AVG includes concise educational information aimed at helping regular (non-IT professionals) better understand the threat stealth rootkit programs present.

The Learn More tab lists information on what rootkits are and how users can protect their PCs from the stealth threats. There’s also a link to Grisoft’s site where additional computer security information is made available.

Users can check for AVG Anti-Rootkit Free updates using the third tab (About & Update). Clicking the About & Update tab also reveals the current version users have installed.

An interesting note, Grisoft informs users on this third tab why the AVG Anti-Rootkit uses random window titles. The reason is that AVG’s programmers wanted intentionally to change the name of the window the free anti-rootkit application uses to help thwart detection efforts rootkit hackers might program into their malware.

If users click the Check For New Version button found on the third About & Update tab, they are directed to Grisoft’s Web site. Here users will see whether the version they are using is current or whether updates must be downloaded.

The Search For Rootkits tab is the meat of the program and the reason users will download it in the first place.

Clicking the Search For Rootkits button triggers a search of stealth rootkit programs. The free AVG application tracks its progress in the progress bar at the menu’s bottom.

By default, the Search For Rootkits button only searches critical Windows directories on the root drive.

When no rootkits are found, AVG presents a congratulations window.

When rootkits are found, AVG displays those that are found (with information on the rootkit path and type). Users can then highlight the rootkit items in question and click the Remove Selected Items button to eliminate the offending files from their Windows systems.

With the In-Depth Search, however, AVG Anti-Rootkit searches for stealth rootkit files on all the hard drives and partitions within a system.

Just as with the simple rootkit search, the AVG Anti-Rootkit Free application tracks its progress as it works. Should users wish, they can terminate the search using the provided Stop button.

These are all the options a user can select when working with AVG’s free anti-rootkit program. By purposefully keeping the application easy to use, AVG engineers have created a free malware detection utility that’s the Right Tool for regular (personal) users seeking to check their systems for unwanted stealth software.

Download your copy here

Friday, August 24, 2007

Social networking and safety

Social networking sites are taking the internet by storm, largely because of their popularity with kids and teens. However, they are also attracting “groomers” who pretend to be kids in order to stalk young people and abuse them.

What exactly are social networking sites?

It’s a rather long name but it means sites which allow people to put up information about themselves such as interests, favourite music, photo galleries and diaries. People make friends by adding new contacts to their list of friends, giving them access to personal information and then chatting via instant message or email. Some sites even allow users to chat via webcam.

Popular social networking sites include MySpace, Bebo, Faceparty, Friendster, Orkut and MSN Spaces.

What are the dangers?

Making a fool of yourself.
If people put up pictures of themselves, or write personal diaries then they need to remember that, apart from their friends, there are other people who may use this information in a nasty way.

Child abusers making friends with kids.
If youngsters put lots of information about themselves on the Internet this gives “groomers” lots of ways of making friends with them (pretending to be kids themselves) and contacting them. If they put their school name and where they hang out then it’s easier to do this.

Bullying.
If a bully gets hold of a kid’s private pictures or diary then they can use this to be cruel and send round to others with unpleasant messages and so on.

Keeping you and your kids safe:

Don’t let young kids use social networking sites.
Many sites say you should be over 14 or even 16. Most parental control programs block these sites.

Don’t add unknown people to your friends list.
Only add people who are your “real” friends (not people you meet on the Internet) to your friends list or provide access to your area.

Don’t meet up with people you meet on the Internet.
If kids must do it, make sure an adult comes along, at least for the first time.

Remember that people aren’t always who they say they are.
The worst is that they may be child abusers “grooming” and so pretending to be kids in order to meet up, or they may be people who are bullies wanting to be unkind or even criminals who want to defraud you. If people are unpleasant you should be able to block them from contacting you.

Don’t put your personal information on your site.
Don’t put your address, mobile number, school name and things like where you hang out - people may use this against you.

Tell people what you are doing.
Kids should tell their parents about what is going on and who they are chatting with. Likewise, parents should be open so that kids feel comfortable talking about what goes on, so they have someone to turn to who won’t over-react.

Report abuse.
Find out how you can report bad behaviour on the site you are using or if it’s more serious to the authorities. Kids should talk to an adult they trust about bullying.

Top tips for kids

1.Tell your parents what you are doing.
If they understand it, they’ll be happier with you using the internet. Don’t give anyone your password, except maybe your parents.
2. Be careful with your mobile
Don’t send pictures that might embarrass you, even to your best friend. Someone can get hold of your camera and be nasty to you.
3. Don’t give anyone your school name
Don’t give your school name, address or phone number to people you communicate with on the internet.
4. Don’t meet up with internet friends
If you must, then take an adult with you. People are not always who they pretend to be.
5. Tell someone
Tell someone if people are saying things you don’t like or bullying you. If you don’t get help, ask advice from another adult.
6. Report it
Report bad behaviour to the website you are using.
7. Don’t let bullies win
Print off and save any messages and show someone like a parent or teacher and ask them to help. If the first person doesn’t help, then ask someone else.
8. Don’t respond to nasty emails
Don’t respond to nasty emails or messages. Block or ignore the sender.
9. Could it embarrass you?
Don’t put photos or things that might embarrass you on the internet.
10. Be nice even if they’re angry
Be as nice online as you are offline. If someone makes you angry don’t be angry back. Tell someone else or report it, but don’t get into a fight online.

Top tips for parents

1. Get involved
Open the lines of communication between you and your kids about what they are doing.
2. Don’t go overboard
Know the risks but don’t ban the internet outright, it’s a great tool. If you are over-anxious your kids won’t tell you what they are doing.
3. Agree on the ground rules
These will depend on the age of your children and the type of websites you are happy for them to view.
4. Put the computer in a main room
With your PC in a main room such as the living room, you will be able to keep an eye on what’s going on.
5. The internet is part of school life
Schoolwork these days often includes internet research and used safely the web represents an important learning resource.
6. Parental control software
Install software which is designed to block websites that are not suitable for kids.
7. Chat and instant messaging
If you are in the dark as to what these things are, then ask your kids to teach you.
8. Be careful about plagiarism and homework
The internet makes it very easy for kids to search the net and copy other people’s work. They need educating about the difference between research and plain copying.
9. Bullying on the internet
Be aware that this is a growing problem for kids particularly when using email, chat rooms or messageboards. Make sure you are there to listen if they need to talk.
10. Report abuse when you see it
Forums aimed at children are generally well-moderated and should respond to complaints.

Child abuse
The Child Safety and Online Protection Centre handle all child related reports. If you are in the UK then this is the best place to make reports. If it’s international (for example on a US website) then you should go to the Virtual Global Taskforce (VGT). The VGT is a partnership of international law enforcement agencies, working together to make the Internet a safer place. The VGT aims to identify, locate and help children at risk, to hold perpetrators appropriately to account, and help prevent child abuse around the world.

Internet Watch Foundation
The Internet Watch Foundation (IWF) works with Internet Service Providers, Police and Government to try to reduce the availability of illegal Internet content, particularly child abuse images. If you wish report the content of a particular site to the IWF, you can do so on their website at iwf.org.uk

AddThis Social Bookmark Button

Thursday, June 07, 2007

Virus Protection from AVG - Tutorial included

Protecting your computer from a virus is getting harder and harder each day. While it may border on the paranoid, it goes without saying that you can’t leave your guard down for one second. Even corporate giant Microsoft has found its own systems compromised on more than one occasion.

Because new viruses erupt daily, it is important that you regularly update your antivirus software. Become familiar with the software’s real-time scan feature.

Make it a habit to always scan all new programs or files no matter from where they originate.
Perform regular backups in case your system is corrupted. It may be the only way to recover your data if infected.

I suspect a lot of people get virus infections because they download random files off the internet. Kazaa/eMule and other peer-to-peer are great places to download infected items. It is important that if you use such programs that you have one dedicated folder to download too, and before opening or running anything scan it first with an anti-virus program. I recommend that people who want to exchange files over the internet (including entire folders of files) do so using encrypted solutions (and only with friends or people they know). A great new application is GigaTribe, it encrypts all exchanges, no files size limits, and is free from any spyware/adware.
Their website is http://www.gigatribe.com

AVG Anti-Virus Free Edition is a free downloadable antivirus program that has received high marks for its reliability. In the past, free downloadable antivirus programs have been viewed skeptically because of issues relating to its reliability.

However, AVG from Grisoft, remains one of the best-known free anti-virus programs available. While AVG cannot be installed on a server operating system and there is no technical support, it still makes a good choice for many home computer users.The best part is that it is free for both Windows and Linux and it checks for updates on a regular basis.

I have been using AVG free Anti-Virus for many years and install it as first choice on other peoples machines.

Get yours here:http://free.grisoft.com/doc/avg-anti-virus-free/lng/us/tpl/v5

Save the program to a folder which is easily accessible, I created one on my desktop and renamed it Downloads, this is where I download all of my utilities etc. so I have them in one easily accessible location.

Once installed AVG loads at startup and sits in your system tray.It will carry out a complete scan on a daily basis, but you can schedule it to do this at a time convenient to you. When it has completed its scan a small window will pop up with the results.

You also have the added benefit of real-time scanning as it runs in the backgound and will warn you if something you are downloading is infected.

You can also left click any folder or an item within a folder and scan it with AVG.

Important: Do NOT use more than one Anti-Virus programas it will give you false readings.

http://free.grisoft.com/doc/avg-anti-virus-free/lng/us/tpl/v5

Windows Media Player Tutorial - Click Here

Monday, June 04, 2007

CCleaner - clear your browsing history safely

I have covered this previously, but have added some new
information to this.

CCleaner is a freeware system optimization and privacy
tool. It removes unused files from your system - allowing
Windows to run faster and freeing up valuable hard disk
space by automatically cleaning the cache when run. It also
cleans traces of your online activities such as your
Internet history. It also only takes a few seconds to run
and remove these unwanted files from your pc.

There have been over 55 million downloads of this program

http://www.filehippo.com/download_ccleaner/

Internet Explorer
Temporary files, URL history, cookies, Autocomplete form
history, index.dat.

Firefox
Temporary files, URL history, cookies, download history.

Opera
Temporary files, URL history, cookies.

Windows
Recycle Bin, Recent Documents, Temporary files and Log
files.

Registry cleaner
Advanced features to remove unused and old entries,
including File Extensions, ActiveX Controls, ClassIDs,
ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files,
Application Paths, Icons, Invalid Shortcuts and more…
also comes with a comprehensive backup feature

Third-party applications
Removes temp files and recent file lists (MRUs) from many
apps including Media Player, eMule, Kazaa, Google Toolbar,
Netscape, MS Office, Nero, Adobe Acrobat, WinRAR, WinAce,
WinZip and many more…

This software does NOT contain any Spyware, Adware or
Viruses.

I set mine up as follows:
Click on the Cleaner Tab on the left and under Windows I
tick all boxes in Internet Explorer, Windows Explorer and
System. Under Advanced tick only the first 2 boxes. Then
click on the Applications tab and tick all.

Issues tab:
Unless you are competent at dealing with the registry then
leave this one alone and DO NOT run it.

If you wish to run the Issues to clean the Registry, carry
out the following first:

Backup your Registry. Go to Start, Run and type in regedit
click on OK and the Registry Editor will then open. Go to
the top Tabs and click on File, scroll down until you see
Export, left click it and this will open Export Registry File
window. Save this file to your desktop and in the File Name
box enter Registry Backup File.
Click on Save and it should now be on your desktop.
Verify the file is a good copy, in the Registry Editor
window click on File, select Import, in new panel where it
says ‘Look in’ select desktop and then click on your saved
file then click ‘Open’. Once it says it has been read in
successfully, you have a good backup.
Now if you find that some programs are no longer running
in the way that they should, restore your Registry as detailed
above. CCleaner will also create backup copies of your Registry
and I suggest that if you do choose to run the Registry Issues
untick all of the boxes and tick one box at a time and run each
one separately.

Tools tab:
Here you will find a list of Uninstall options to remove
programs from your pc, use with caution. I prefer to use
the Add/Remove function or the programs own uninstaller.

Startup:
Lists all programs that are set to run when you boot up,
if you are unsure about deleting any of these then leave it
as it is.

Options tab:
Settings - Choose your language, untick Run CCleaner when
the computer starts, tick the next 3 boxes, then look at
the Secure Deletion, tick the radio button ‘Secure file
deletion (Slower) and set it to NSA (7 passes)

Cookies - entirely up to the individual, but I don’t save
any cookies.

Custom - You can drag and drop files or folders into the
window or browse for them and on the next run they will be
securely deleted.

Advanced - Untick boxes 1-3 tick all others.

Finally click on the Cleaner tab on the left and you have
the option to Analyze or Run Cleaner. When you are
comfortable using this program you won’t use Analyze, but
initially do use it to see what can be deleted and the
approximate size of files to be deleted.

Important
This will remove any saved passwords and usernames that
you have, so make sure that you have a copy of them all
before proceeding to clean.

http://www.filehippo.com/download_ccleaner/

Windows Media Player tutorial:

http://www.a1-ebooks.co.uk/tutorials/CCleanerSetup.wmv

Open a text document, enter the URL, username and
password, save this to floppy, external drive or print it
off. Do NOT save this text file to your hard drive.

There is an excellent program for saving your passwords
etc available from http://www.roboform.com/
I will cover this in more detail another time.

As always, back-up your system or create a restore point
before making any changes.

To your safety and security online
cotojo

Wednesday, May 23, 2007

Using Spybot S&D - Tutorial included

Spybot - Search and Destroy is an adware and Spyware detection and removal tool.
It includes removal of certain advertising components,which may gather statistics as well as detecting various keylogging and other spy utilities.

It securely removes PC and Internet usage tracks, including your browser history, temporary pages, cookies (giving you the option to keep selected cookies) and more.The program interface is easy to use and multi-lingual.

SpyBot-S&D allows you to exclude selected cookies, programs or extensions from being reported, allowing you to prevent false positive messages for items that you dont want to be alerted of every time.

It can even scan your download directory for files that have been downloaded, but not yet installed, allowing you to detect unwanted programs before you even install them.

SpyBot produces a detailed and easy to understand report before it deletes any files and allows you to deselect any item that you do not want to be processed.

It also incorporates a recovery feature allows you to restore your settings if you need to which can be very useful.

The site is multi-lingual and I recommend that you look at:
http://www.safer-networking.org/en/tutorial/index.html

Spybot S&D can be downloaded from:
http://www.safer-networking.org/en/mirrors/index.html
Simply select your language and download from one of thesites provided.


Media Player Tutorial:
http://www.a1-ebooks.co.uk/tutorials/Spybot.wmv

Saturday, May 12, 2007

MRU-Blaster Guide

MRU-Blaster is a program that does one large task - detect and clean the MRU (most recently used) lists on your computer.

This program is Freeware, although donations are accepted

goto: http://www.javacoolsoftware.com/mrublaster.html

Download this program, I suggest that you place a NewFolder on your Desktop and rename it 'Downloads'. You can then download the various programs that I pass on to you in one central location, and always make back up copies.

The additional plug-ins are described below and allow you to clean out your Temporary Internet Files and Cookies. MRU-Blaster enhances the protection of your privacy!

MRU-Blaster setup: Take care setting this up.

When installed go to Settings and tick boxes1,3,4,6,7,8,9, & 10 on the left hand side.
Tick boxes 3,5,6, 7 & 8 on right hand side, then Save Setting.

Click on 'Go To Plugins' then click cookie blaster. Do not save any cookies as they are used to monitor your internet activity.

Click on 'IE Temporary Internet File Cleaner', tick EnableSecure Deletion of Files and click radio button 'Specify a custom number of passes and set to 7. Then save Settings & Run Now.
Using this program frequently only takes a few seconds and removes traces of the Most Recently Used (MRU) lists on your PC. These lists contain details of the name/locations of the files you have accessed. Traces of these are left scattered through your registry and unless removed are there for all to find.

One very important thing - do NOT save your passwords on your hard drive and do NOT tick the boxes asking to remember your login details.
Open any text document and type in the URL, Username and Password for each site that you have a password for, save this to either a floppy disc, flash drive, or other removable media, Do NOT save this text file on your hard drive।

I will cover another program for using secure passwords in the near future.

goto: http://www.javacoolsoftware.com/mrublaster.html

Safe surfing everyone
cotojo

Thursday, May 10, 2007

Zone Alarm Free Firewall

Get Into the Zone

Malware. An odd sounding word created to lump all
malicious software programs, including viruses, worms,
trojans, spyware, adware, and other malevolent codes into
one cause-your-computer-serious-hurt category.

In 2005, Computer Economics released a report on malware.
The good news was that for the first time since 2002, the
total worldwide financial losses from malware actually
declined to a mere $14.2 billion. The bad news was that the
nature of malware was changing from overt threats to more
focused, covert attacks. This definitely is not great news
for the average computer user just trying to keep up with
the hundreds of malware programs that bombard us daily.

It’s not an easy task keeping malware out of your computer
system. In order to accomplish this, you need a strong
antivirus program. I have covered that with AVG Anti-Virus.

Now you need a good firewall to complement it.
One such program that can deliver the
goods is ZoneAlarm Internet Security Suite 7 from Zone
Labs. Zone Labs is one of the most trusted brands in
Internet Security for good reason. Their product, simply
put, kicks serious malware gluteus maximus.

ZoneAlarm has received more review recommendations that
any other Internet-security software suite because of its
superb firewallprotection. It blocks pop-up
ads, protects against identify theft and provides adequate
spam filters that are flexible. It even beats the market
leader, Norton Internet Security, which is often criticized
for excessive system drag.

The bonus for the average user who cringes at the idea of
setting-up one of these systems is that the interface is
easier to understand and use in comparison to most if its
competitors. If you choose to venture beyond the out-of-the-
box default settings, and install a more elaborate
filtering, know that this will require some additional time
to set up on your part.

Overall, ZoneAlarm is a user-friendly, solution that will
have your computer safe from Internet hazards and cyber
criminals within minutes of installation and it also has
an auto-update feature, very useful.

ZoneAlarm makes it easy. Unlike other personal firewalls,
ZoneAlarm protects automatically from the moment it’s
installed - no programming required. ZoneAlarm barricades
your PC with immediate and complete port blocking. And
then runs in Stealth Mode to make your PC invisible on the
Internet - if you can’t be seen, you can’t be attacked.
ZoneAlarm is a simple to use Firewall without compromising
your security. A getting started tutorial explains controls
and alerts to get you up and running quickly. And, to keep
you confident that you’re always protected, intuitive color-
coded alerts rate security risks - in real time. For basic,
“no frills” firewall protection, ZoneAlarm® is the popular
first step for many home PC users. And it’s still FREE for
individual & non-profit use.

Install it and forget it. ZoneAlarm comes configured to
deliver “out-of the-box” safety and security. As you use
your computer and applications that access the Internet, a
bubble will open on the lower left of your screen and
ZoneAlarm asks you whether you want applications to access
the Internet. It quietly protects you while logging
unauthorized repelled attempts to access your computer.
Security Levels make ZoneAlarm easy to use. In just a few
seconds you can decide how secure you want your system to
be. In contrast to other security solutions, ZoneAlarm does
not require you to learn about ports, protocols and
firewall programming. Security Levels automatically
configure the Firewall and eliminate the risk of improper
use that comes with other products. With ZoneAlarm’s
Security Levels, you get peace of mind, not confusion.
ZoneAlarm makes Internet safety and security hassle-free.

Remember……either back-up your system or create a
Restore Point BEFORE making any changes.

So what are you waiting for? Click the link below, click on
‘I only want basic ZoneAlarm Protection’ and
download and install it.


http://www.zonealarm.com/store/content/company/products/znalm/freeDownload.jsp