3 Butterfield Trail
Suite 120
El Paso, TX 79906
ph: 915-591-8899
help
I have compiled a few links (tools) to help you secure your web experience.
For a good overall Anti-Virus Software I recommend Avira. For a comprehensive anti-virus product` with low overhead you can't beat it.
For a FREE & good Anti-Virus:
http://www.avira.com/en/avira-free-antivirus
A secure web browser is a must for anyone who uses unsecured web"hot spots." Ideal for the business traveler who needs to gain access to the web from hotels or coffee shops. I recommended LOCKFOX for just such a task.
For a FREE & good Secure Web Browser try:
http://www.lockfox.com/Download
Web shields are also a must for today's wireless environment. A must have tools for anyone who wants a secure connection on a wireless network. ANCHORFEE is a free shield that gives you an added security along with LOCKFOX.
For a FREE & good Web-shield try:
GLARY UTILITIES is a diagnostic utility for hard disk, software and registry problems for windows operating systems. Thirteen programs in one!
For a FREE & good system diagnostic tool try:
Click Here for a Full List of Useful Tools.
Simple Online Quck Scan for Viruses
Anti-virus software is simply not enough. An email worm can spread worldwide in just minutes, but it takes hours for antivirus vendors to analyze, create, and deploy signature updates. Fortunately, there are five easy steps you can take to help close that window of vulnerability and help keep email worms off your system.
Rule 1: Identification - Understanding the nature of the attachment is the first step towards email safety. Any executable type attachment has the potential to be infected. This covers a wide range of extensions. Complicating matters is that, by default, Windows suppresses file extensions. Make sure you have file extension viewing enabled. {i]Hint: If you aren't sure what file extensions are, sign up for the free Windows Basics online course.
Rule 2: Intent - An executable type attachment should not be opened unless it was specifically requested or expected. Since email worms are sent to addresses found on infected users' machines, just knowing the sender is no proof of intent - they may well be infected. In fact, odds are an email worm will arrive from someone you know and the sender is oblivious to the viral email being sent from their machine. Worse, today's worms spoof the From address, so it may well be that it's not even from the person you think it is. If there's any question as to the intent, see Rule 3 below.
Rule 3: Necessity - This is the simplest rule to follow, but one that many people ignore. If you do not need the attachment, don't open it. Delete the email instead.
Rule 4: Secure your client - To date, many email worms and viruses have taken advantage of security vulnerabilities found in Microsoft Outlook and Outlook Express. However, any mail client that supports HTML and scripting should be considered at risk.Rule
5: Patch your system - Microsoft routinely releases approximately 100 security patches per year. Keeping abreast of these and understanding which are applicable to your system can be a daunting task. To help ease the pain, Microsoft provides a Windows update site. The site will automatically scan your system and provide a list of recommended updates specific to your operating system. Install any updates marked as "Critical". And remember - security is never passive. It's an ongoing process and new vulnerabilities are constantly discovered. Visit the Windows update site monthly to ensure all necessary patches are installed.
Copyright 2010 Remote Virus Removal Service. All rights reserved.
3 Butterfield Trail
Suite 120
El Paso, TX 79906
ph: 915-591-8899
help