Home

Tag Archives: Safety

Smoke Alarms, which one?

Fire, one of natures magnificent elements, used for cooking, heating and even entertainment purposes, but it can also be a deadly foe. Did you know it only takes minutes for an established fire to spread through your home, but its often not the fire that would ultimately kill you first… its the smoke, vapors, fumes and gases produced by the fire and the decomposition of its fuels that can take your life before the fire even has a chance to take hold…

Many toxins can be produced from an active fire, some of which include: carbon monoxide, hydrogen cyanide, heat, aldehydes and acrolein (from burning wood/cellulose) and in our current way of living with multi possessions, these items can contain Polyurethane(PU), and the many chemicals used to make synthetics which are also in our carpets, furniture coverings, curtains, cushions, floor lacquers, toys, tvs, etc… in a word DEADLY when exposed to fire/high heat.

All of the items in our homes and the homes themselves have different rates of heat tolerance till they start to produce vapors which can ignite, aka flash point, the point at which items can no longer sustain and then combust. Flash over is when all the items in the room have produced enough vapors which all ignite at once, including the smoke plume which by this point has accumulated in the ceiling head space, even carpets which also produce vapors from all the heat from the active fire will ignite. There are plenty of examples YouTube showing demonstrations of flash point and subsequent flash over, please check them out.

A burning vehicle can be deadly in its own right, synthetics and natural fibers decompose in heat to become a dangerous cocktail of gases strong enough to extinguish a persons life in minutes, even seconds. The danger can also be present for some time after the fire has long been extinguished.

So what can we do to protect ourselves in the event of an outbreak of a fire? Its something we’ve been told for years now, so why do so many people still perish in such preventable situations? Many factors need to be considered here, sadly the gases emitted from fires cannot be detected by the human nose while we are in deep sleep as our body shuts off certain systems so that we may rest, one of these is the sense of smell, and while we are sleeping is usually when most fires break out and get a foot hold, this is why we all should have smoke detectors.

Smoke detectors can save lives, but with so many different ones available, which ones are the best to have, and where should they be placed? Ionization or Photoelectric? in short, the DUAL which has both! and if you can only get one, the Photoelectric is the best! (I also recommend at least one CO-carbon monoxide detector, as CO is a silent scentless killer).

There are lots of “smoke detectors”, ones that will detect smoke at low rates and raise an alarm to alert you to the impeding fire, while these are good, they are not the best detectors to have, with all the gases being produced at the same time the smoke is entering your hallways, its the gases that can kill you so a DUAL Photoelectric/Ionization detector is the best choice, the Photoelectric sensor will “see” the smoke activity before the smoke is detected alarming earlier, eg, smoldering, and slow moving fires, and the ionization element of the alarm will detect fast moving fires and could save your life.

URGENT-To check which one you currently have, take the battery case back off and if you have a nuclear symbol and no “eye/camera” on the front, it is an ionization detector, get a Photoelectric or a dual Photoelectric/Ionization detector” instead!!! and if you cannot reach your alarm, and you do not have anyone you can ask for assistance, Im sure you can go to your local Fire Brigade and ask for help, prevention is key.

It is also imperative that you become familiar with the upkeep of the detectors, i change the batteries twice a year, and i find the best time to do this as its easy to remember is daylight saving changes, on the days that the clocks change, so do my detector batteries, i always use good long life alkaline, NOT Lithium! Lithium batteries can be unsafe in their own right, but that is a topic for another day (and oh boy, are you all in for a shock!) in short Lithium batteries, when they fail WILL vent with flames (and yes, you all have lithium batteries in your phones, ipods, ipads etc.. so look after them, even a hard thud can disrupt the inner workings and reactions in a lithium battery, and depending on what other elements are used to make the battery, eg. Li-Po [lithium polymer], can make this reaction worse, there are some lithium battery combinations that inherently safer, eg Li-Mn[lithium manganese] which vent with high heat not flames, and see, iv e gone off in that tangent, ok, back to topic, if you want more info on battery safety, please message and I will write a piece on those). And always replace your detectors by the stated expiry dates!

Also, that annoying “BEEP” you may hear could be your detector telling you the battery is need of a change, DO NOT IGNORE THIS, IT WILL GO AWAY and you WILL forget it needed doing!

I find the best placement for detectors is this: Dual detectors in all bedrooms, lounge rooms/living rooms, laundry, basement, dining room etc, I would also recommend a Carbon Monoxide detector to be placed in your hallways and if you have a basement, one in there also. I do not use detectors within the space of a kitchen as they do like to applaud cooking at times, and then get pulled down and sometimes forgotten, so one outside the doorway is usually where i put mine. If you have ducted heating or AC in your home, the detectors in each room will earn their worth as fire can travel much faster due to the ducts connecting the rooms, especially roof space ducts.

Fire safety is not something to be ignored, it can and does happen to anyone, one small fire coal displaced from a fireplace can sit and smolder for hours on end till it produces enough heat to produce vapors around itself to ignite the surrounding surfaces, wiring can be corrupt and smolder within walls, even large piles of leaves and or garden mulch can decompose deep within the pile and smolder till it ignites, and if its beside your home or garage can lead to disaster!

One important thing to note, fuel does not burn, VAPORS do… so please, be safe, make a check list and follow it, make sure all is turned off at night, if you have an open fireplace, make sure its out or well guarded, and please, please, do not put items too close to a heat source, no matter how safe you think you are by being close to “keep” an eye on Aunt Mildred’s washing as it dries quicker, her lovely polyester pants may heat enough to help you fall asleep and then OOOPS up she goes… DO practice fire drills, have a plan, always have a plan, a fire will cause chaos on a grand scale, so a plan will bring order and a clear mind.
“Get down Low and Go Go Go”!

If you have any questions, please feel free to ask and ill answer to the best of my abilities.
Angel ❤

Published: December 2, 2017

Snoop Help

Snoop

Snooping is an art form. It is truly what the public calls “Hacking” in the raw.
So lets bring out a little Hacker in you.
This should not need to be said BUT……
Do not give your kids administrator accounts on the PC. User accounts are all they need and should have. This will give you control over what is viewed as well as installed, un-installed etc.
Ok I will hush. Now back to the snooping stuff lol.

First I suggest ImageCacheViewer. It’s free and a great way to snoop.
(Keep in mind your settings determine the size of the cache. If you have your cache set to clear on closing the browser you kill a snoop method.) Every time your browser loads a site, the images on the site are stored in the “cache” so they load faster on the next visit. Most cache folders contain at least a few weeks’ worth of images. The software looks for the cache files of EVERY browser installed on your computer and loads them into a list. Click on a address in the list to see the pictures they saw.



BUSTED !!! Someone viewed “Sally falls out of her bikini”! 65 times!
Find out more Here or download the software Here
Sweet now you have another tool to snoop.

Now let’s learn to block websites without buying silly software

On Windows
Right-click on Notepad and select Run as administrator.
This option will open Notepad using your administrator privileges.
If you don’t open Notepad in administrator mode, you won’t be able to edit the file.
click file/open and paste " C:\Windows\System32\drivers\etc\hosts " in the open dialog.
You should now see something like this in notepad.



Scroll down to the bottom of the “hosts” file. You’ll see two “localhost” lines of text here.
Click below the very last line of text.
Be careful not to delete anything that is already in the hosts file.
Type in 127.0.0.1 and press Tab then Type the address of the site you want to block.
For example, if you wanted to block Yahoo, you would type 127.0.0.1   yahoo.com.
Hit enter.
Add a new line with www prefix like this 127.0.0.1   www.yahoo.com.
(Computers are literal so yahoo.com is different than www.yahoo.com)
Be certain there are no spaces at the end of each new line or it will stop reading the file at the space.
When done Click file then save.
Voila! You just blocked that site from all browsers on the PC.
You can add as many sites as you want to block, one per line, using the same as before.
To unblock a site, simply open the hosts file again as above and delete the line you wish.

On Mac
Open Spotlight  . To do so, click the magnifying glass icon in the top-right side of your Mac’s screen.
Type terminal into Spotlight. This will prompt Terminal to appear at the top of the search results.
Double-click the Terminal icon.
Type the following code into Terminal:
sudo nano /etc/hosts
Edit the file as in windows above.

If you need or want anymore snooping help just give me a shout I will help if I can.
Hope this helps
Mongo

Published: July 18, 2017

Be a Parent (The Internet is not a babysitter)

Be A Parent

Straight talk about the internet and kids.
(It is a vicious/unsafe place for kids)

Internet predators are out there in droves. It’s ruff being a parent the Internet adding to the stress and worries.
Teaching kids to be safe and learning how yourself is a must nowadays. Remember the net is a place extremely easy to hide, cheat, steal and manipulate ANYONE leaps and bounds more than in the physical world! We set rules for our kids. The rules for the net are and always should be NON negotiable!

I Myself insist on meeting friends, boyfriends, and girlfriends in person. know where a kid is going, what they’re doing etc., Before they even leave the house. I ground or take away privileges for rule breaking. You may or may not enforce similar rules in your home, but as far as online “Strict” should be your middle name.

The Basics

Talk To Your Kids 
It’s important that your kid knows what your expectations and rules are, also that they are well versed in Internet safety, plus you should be prepared for problems and concerns.

Set Guidelines
Create a set of rules about when and how long they can use the computer. Be clear about what they can and cannot do online. Online is a privilege not a right so complete chores, homework, etc. first, basic rule #1. Things like instant messaging, chat rooms, blogs, and social networking sites (Instagram, Facebook), virtual worlds (Club Penguin, Webkinz). Strick consequences for breaking the rules is a must.

OMG Follow Through Dammit!
Stick with your rules. It’s true that kids need boundaries and, as much as they fight you on it, get a backbone they are KIDS. Do not let them “slide” with infractions. Be very strict. It may save their life.

Pay Attention
Putting your computer in the living room does ZERO if you’re not paying attention to what your kids are doing. Make a habit of pulling up a chair and talking to your kid about what they’re doing. You ask who/where when they go out of the house, this is no different.

Learn! Research!
If you ask your kid what they’re doing and you don’t understand the answer, it’s time to LEARN.(You don’t give monkeys a gun!) Visit the website in question, search more info about it. Maybe your “iffy” about it then it’s a “Off Limits Site”. You need to understand what your kids are doing when they’re online.
Research! If this seems like a lot of work…. IT IS. YOU have KIDS!!!

Join In When Possible (don’t invade)
This is being part of. (like a attentive normal parent). If your kid has an interest online such as Webkinz, Neopets, Facebook, etc., research it and ask them what they like about it.

Sign up for your own account and add your kid as a “friend.”
(This is BS advice i read somewhere. But guaranteed your kid wont go to that site anymore after they give you a “you don’t trust me” guilt trip speech) LMAO Sorry had to for the “whiners”, “excuse makers” etc.

Get Techie!
There is no shortage of Internet Safety tools available to help you control, track and/or limit what your kids can say and do online. Take the time to learn about Internet filters, firewalls, monitoring software, browsers for kids and other tools. While they are not a replacement for real parenting, they can help make your task easier.Also many of these can be defeated with a bit of knowledge.

Snoop!!!
Use your browser history, cache and cookies to find out what sites your kids have been up to. This is not to suggest that you should spy on your kid, it’s telling you to do so. Enter their names (including nicknames) into popular search engines to see if they have public profiles on social networking sites. Do the same with your address and phone number. You might be surprised by how much of your and their information is online!

Do Not Ignore Red Flags
A kid who is reluctant to talk to you about what they’re doing online or seems to be withdrawing from family and/or friends may have a problem. It can be easy to chalk up certain things to normal behavior, but that doesn’t mean you should ignore changes in your kid’s personality. Cyberbullying is just one of many “Net” issues that may cause your kid to withdraw.

Dam It Say “NO”
If your kid continually spends too much time online or ignores rules about what they can and cannot do, it is time to pull the plug literally. Although your kid will whine, they won’t die and can survive without it. Make sure you’re clear about why and how long they will hate you for the unplugging. They may have a homework project that requires access. Sit with them while they do it.Remember that they may be able to use computers at school, the library, and a friend’s house. also they can browse the web on their cell phone. So cut those cords if possible also.

Here’s a sample rule list and some tips on how to enforce your rules.

Basic Rules
1# 1 hour online per day. (adjust for school projects ONLY prior to access)
2# Chores, homework etc. done BEFORE any access allowed
3# Only sites approved by parents allowed.
4# No arguing or backtalk when told to get off the computer. Or whos turn it is etc.
5# Always Ask before you logon no exceptions.

Basic Consequences.
1# Access time shortened
2# No access to certain site. (block it)
3# No internet.
4# No computer period.
5# Take a hammer to the computer!! (LOL Use a junk one they will not think your kidding anymore!)

How to enforce rules/consequences

1# PAY ATTENTION
2# Be strict
3# Parental controls (timers/block sites etc.)
4# Bios Password (Cannot be bypassed by most kids)
5# My favorite… Unplug the modem/router. Take power supply’s from the computer(s).
(You and take them to work in your trunk if you need LOL)

For Non-Novice:
Most modems and routers allow you to block mac address for each machine connected. Use this method if your familiar.

Obviously, you should have safeguards in place, but a lot of kids are too smart for their own good. There isn’t much they can’t find a way around. Make sure your parental controls are setup and password protected.

In the near Future I will post an article’s of how to block websites WITHOUT software on your pc.
Also how to block websites using your modem/router. And snooping methods.

Hope this helps …
Mongo

Published: July 11, 2017

What? Phishing?

Phishing

Phishing attacks are more rampant than ever before, rising by more than 162% + over 4 years.
The cost worldwide is $4.5 billion every year and over half of internet users get one phishing E-mail per day minimum.
The best defense against phishing attacks is to block malicious E-mails before they reach you is using DMARC
(Domain-based Message Authentication Reporting and Conformance) standard.
Also users (business etc.) that offer E-mail data revealing attacks beyond DMARC (e.g., attacks that fake a brand using domains outside of the brand’s control).
Unfortunately, some phishing E-mails will always make it to the inbox.
And those messages are extremely effective 97% of people cannot
identify a sophisticated phishing E-mail.
That’s where this article comes in.

How to identify a phishing or spoofing E-mail. Share this freely with your friends and co-workers etc (maybe the boss will reward you ;P ).

Don’t trust the displayed name
A very common tactic among thives is to spoof (fake) the display name of an E-mail.
More than 760,000 E-mail threats targeting 40 of the world’s largest brands and found that nearly half of all E-mail threats spoofed the brand in the display name.
Here’s how it works: This asshole phisher wanted to spoof the brand “Bank Of America,” so the E-mail looked like this:

Below is a actual phish email I received.
Notice it’s not from bankofamerica.com but from “urgentaile.com”.
See the general non-personal greeting, then the spelling and grammar. LMAO Nice try moron!
(I forwarded it to abuse@bankofamerica.com so they can deal with the lame ass phisher.)



Since Bank Of America doesn’t own the domain “Urgentaile.com,” DMARC will not block this E-mail on Bank Of America’s behalf, even if Bank Of America has set their DMARC policy for bankofamerica.com to reject messages that fail to authenticate. This fraudulent E-mail, once delivered, appears legitimate because most user inboxes only show the display name. Don’t trust the display name. Check the E-mail address in the header from if looks suspicious, DO NOT open the E-mail.

Look but don’t click

Hover your mouse over any links embedded in the body of the E-mail. If the link address looks weird, DO NOT click on it.
If you want to test the link, open a new window and type in website address directly ratherthan clicking on the link from unsolicited E-mails.

Check for spelling mistakes

Brands are pretty serious about E-mail. Legitimate messages usually do not have major spelling mistakes or poor grammar. Read your E-mails carefully and report anything that seems suspicious.

Beware the greeting
Is the E-mail addressed to a vague “Valued Customer?” or “Your Account” If so, be careful legitimate businesses will mostly use a personal greeting with your first and last name.

DO NOT give up personal information
Legitimate banks and most other companies will never ask for personal credentials via E-mail. DO NOT EVER give them.

Beware of urgent or threatening language in the subject line
Invoking a sense of urgency or fear is a common phishing tactic. Beware of subject lines that claim your “Account Has Been Suspended” or “Unauthorized Login Attempt.”

Review the signature
Lack of details about the signer or how you can contact a company strongly suggests a phishing E-mail. Legitimate businesses ALWAYS provide contact details.

DO NOT click on attachments
Malicious attachments contain viruses and malware are a common phishing tactic. Malware can damage files on your computer, steal your passwords or spy on you without your knowledge. DO NOT open any E-mail attachments you weren’t expecting.

DO NOT trust the header from E-mail address
Phishers not only spoof brands in the display name, but also spoof brands in the header from E-mail address.
Return Path found that nearly 30% of more than 760,000 E-mail threats spoofed brands somewhere in the header from E-mail address with more than two thirds spoofing the brand in the E-mail domain alone.

DO NOT believe what you see
Phishers are extremely good at what they do. Just because an E-mail has convincing brand logos, language, and a seemingly valid E-mail address, does not mean that it’s legitimate.
Be skeptical when it comes to your E-mail messages if it looks even remotely suspicious, DO NOT open it.
Now for the what can you do part!

How and where to report phishing emails and texts.
Forward phishing emails to spam@uce.gov also to the organization impersonated in the email. Your report is more effective when you include the full email header, but most email programs hide this information. To include or possibly copy and paste the raw message in the forward. You can Go to Options, then General Preferences, scroll down to Messages, and select “Show All Headers” or right click on message title and select “View raw message”. These are two common methods. Find out your email servers if neither of these apply.
This is what typical spam titled “Enjoy 90 Days of Proactiv+ & FREE Shipping!” header looks like.

X-Apparently-To: me@yahoo.com; Wed, 19 Jun 2017 00:13:12 +0000
Return-Path: 
X-YahooFilteredBulk: 131.127.182.229
Received-SPF: pass (domain of cagcom.com designates 131.127.182.229 as permitted sender)
X-YMailISG: slxzLYUWLDvxrlNh9bEjUJwuD87aCVjWz1UgEy5wKJemEjhS
 rrS4TfHEPRuF2SiYg6vbTWHrswN8GxHCdahXfiCA.9LBmBVB21knvyz0EBr3
 uPkVrull45KLxUEgMVwxV8zhB0pp72L0A93UqVNiQiiv7dA7ApHqukdpOqE3
 gSaLA3gprbBAdMdb2ZI7aP662JyrxZ39Y5RSxzE9C1JYCwvNOTCry0XW6aA3
 m8rWhFpt0Fb7gz8hDjr4MuIO66LZkAtPCa2y2vDnwaYJRj_bD6qRq0bAXySi
 v9jY2MNn1VV3TNiFMLPwvI8_6F.L_cG1.2W.9iAaX.zxtzLEsky8AqF3BIxF
 777p32ABSLRZxypU.LcMtY717qSg_xRZYKve0c.Y7gAS1f7GR64AHIFMEbcU
 p_7JHr8ChMea7Mt5kRHBDg2c0NFeOzlxYyKRqsGkHl5xP3is2Rxcw.p6vKQm
 O7GgW_zHVAsEVpqfLKp4uId.diam6DOHGsrpMB6C87S0q_ehngqRxCOr9H8E
 GxIMrEG6qMqi730.45nzB07oZHfOf5t1LxCGPf39xmAS.gkoAEQt8o8X.PYi
 Z4ytyu_95pRhTlufY_p870mbQ3SjQVM2LQaTDLlArQBJlgPjnnxJ69vNviQv
 WxsutXjlEBK9Z6lI4S8kzWF1B5dJ3wFymtY0238wJ4RrLrFQ.iFVV6TS08KK
 0tzq.deKpleMVsBQBsLWRcrZNbSM_Yv2kmYNyeCscvS6CFPb27ZgE6IX7bXv
 lVMsgeKCiQ5MstM2gK7LPGru_vaqTqIF6P_DFNAaHX4I7hg4EyagzLMGCl4z
 rBIYQdOxvg4qpmK8zrbKokOTwSe6NlU76QOqcSWC8gVwzaElDKev5qMa2Ydf
 DCa9Qead0lqvpkMsZUDEVqUXrsyIpiEd8F.rM25o7r7xfBPEEpB7lySG_2ik
 bqJPHU_uB5HFe5DhA5a4QGv5A4ev4BmOjB7R00iEYXLhwfM87jmyiyEaHhkL
 4iHvDBJEwhcfa18jyQJ.gS9HhLBp7zgmMlgUnFFyG93sXCtuE5LujUuay_lg
 dwvS_.LRXC5ublnRDWjROf4ID.GEk5AOBcpFRIof4R8LfgIDYYwqefTClQCu
 bHeRxJbPwxzsmzGg7iU..rcNJT3.AIE0RZtfk33cQBWYWnQbiaUUFqDrylsJ
 0IP0VWGvg0bmmmJhx4I28DNjxsghSkF3eoeiJdxXbNARwAFHCaox2zTV940Z
 mm7kenEpz5LM1hDeFnXs8KYWqMv6TcbM8xqAv6tr9XOYj0JWai8fCOcKTWVs
 WPuth2Xg3UQ8gDaalXmOHQHxF5AlsQ--n
X-Originating-IP: [131.127.182.229]
Authentication-Results: mta1312.mail.gq1.yahoo.com  from=cagcom.com; domainkeys=pass (ok);
from=cagcom.com; dkim=pass (ok)
Received: from 127.0.0.1  (EHLO updates-182-229.cagcom.com) (131.127.182.229)
  by mta1312.mail.gq1.yahoo.com with SMTP; Wed, 19 Jul 2017 00:13:12 +0000
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=dkim; d=cagcom.com;
 h=Date:To:From:Reply-To:Subject:Message-ID:MIME-Version:Content-Type; 
i=explore@cagcom.com;
 bh=tc92wij1mQSFhJrbEe/J9S3rwmU= ;
 b=GsU1Q7nHDXDUCeJcv0tHOMKT6ieBGgyY2qCPFBG4ZjLURCE9xXS2d9GX8dRi3JIBBHllfAa19vSl
   s9U0SPGwGasVY9a/CvbEKHLOejEjL0T6m2aZ5u5XYTs0nQo04xRkgi+xvoXIYI3G3DpTyKQNe+hT
   zuvQuZOzTrL4hjYvLf8=
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=dkim; d=cagcom.com;
 b=gU9LGbqx1dAc/MEz0gdd4u5kOjjzj//kFSIOertAiDD7VCvQn3dlfzK5ZPCNj+ulIgsXx34q7437
   MQHdveHJWij0R3pX3KpCOwwBKEemxO7TwtRkkxJj4phJoczjlrA06BcSgqB2rectvzm1X+U0ULjh
   jVXhN8RJVyH9kZzUxE0= ;
Date: Tue, 18 Jun 2017 23:42:46 +0000
Return-Path: bounce@cagcom.com
To: me@yahoo.com
From: Proactiv+ 
Reply-To: explore@cagcom.com
Subject: Enjoy 90 Days of Proactiv+ & FREE Shipping!
Message-ID: 
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="b1_cd5cb8765bbd53816f1497f44d793a66"
Content-Length: 1329

--b1_cd5cb8765bbd53816f1497f44d793a66
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Enjoy 90 Days of Proactiv+ & FREE Shipping!

--b1_cd5cb8765bbd53816f1497f44d793a66
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html>
<?xml encoding=3D"UTF-8"><!html><!head><!/head><!body>
<center>
<div style=3D"text-align: center;">
<div style=3D"border: 0px solid #eee; width: 600px; height: 881px; max-heig=ht: 803px; min-height: 803; margin: auto; overflow: hidden;"><img src=3D"ht=tp://cagcom.com/uploaded_images/1/1_face.jpg" usemap=3D"#face"><map name=3D="face"><area target=3D"" alt=3D"" title=3D"" href=3D"http://amaog.com/?nc2u==3DbtJ%2flSnfWXQNT379mLX6BT4tUhOhPMOu&s1=3D" coords=3D"7,3,574,664" sha=pe=3D"rect"><area target=3D"" alt=3D"" title=3D"" href=3D"http://amaog.com/=?nc2u=3DbtJ%2flSnfWXQNT379mLX6BT4tUhOhPMOu&s1=3D" coords=3D"323,704,462= ,728" shape=3D"rect">3D""</map><center>
<blockquote>Safe to view your Message.</blockquote>
</center>
<div style=3D"display: inline-block;"></div>
</div>
</div>
</center>
</body></html>

--b1_cd5cb8765bbd53816f1497f44d793a66--

 
File a report with the U.S. Federal Trade Commission at FTC.gov/complaint.
Visit Identitytheft.gov. Victims of phishing could become victims of identity theft; there are steps you can take to minimize your risk.

You can also report phishing email to reportphishing@apwg.org. The Anti-Phishing Working Group, which includes ISPs, security vendors, financial institutions and law enforcement agencies, which report here to fight phishing.

Hope this helps keep some of you safe!
mongo

Published: July 2, 2017

Family Internet Safety

FamilyInternetSafety

Some things I think all of us should know.

 Don’t rush your children into social media. Obey the guideline of keeping children under 13 off social media. Once your children have an online profile, they can be tagged in photos, which magnifies their online presence. If you’re going to upload photos of them, don’t identify them and don’t tag them. This way the photo can’t be traced back to them.

 Myth: Parental controls are the best way to monitor my childs online activities.
Truth: Focusing on only one Internet safety method lulls you into a false sense of security. Keep your child safe online and to raise them to be responsible, respectful digital citizens. But it takes more than installing parental controls.

For starters, parental controls can be defeated by determined even PC novice child. Plus they also often catch too much in their filters, rendering any Internet reasonable search useless. To top all this off they often set up a “parent vs. child” dynamic that could and probably will backfire.

 But by all means, use parental controls to help prevent exposure to age-inappropriate material and to manage time limits.
But don’t think parental controls get you off the hook and your done any any means. Continue to discuss responsible, respectful online behavior, set rules and consequences for misbehavior, and teach your child to manage his or her own usage without overdoing it.
This will in the long run be best and safest for you and you child.
Other things you can teach you child and do for yourself for safety on your PC are.

  • Use privacy settings. Make sure your privacy settings are set so only the closest people in your network can view your posts.
  • Limit your audience. Only share posts with close family and friends. Or use photo-sharing sites such as Picasa and Flickr that require a log-in to see pics.
  • Avoid installing unnecessary applications for your current desktop tasks, such as: background servers, file sharing software or remote control applications (especially as most users forget they have these applications started in the background). These programs are potential hazards and should not be installed unless absolutely necessary.
  • Use a reliable firewall solution. Use a firewall that can control the Internet traffic in both directions (what comes and goes from your computer).
  • Update your applications as often as possible. Operating systems may become vulnerable to threats for which the vendor has already found the solution.
  • Do not open e-mails coming from unknown senders, many viruses spread via e-mail, so ask for a confirmation from the sender if you are in doubt.
  • Avoid opening email attachment files with the extension .bat, .pif, .com, .vbs, .vba, .scr, .hlp, .hta, .lnk, .url, .cmd, because these types of files are usually 100% malware.
  • Do not open attachments of messages with a suspicious or unexpected subject, but if you want to open them, first save them to your hard disk and scan them with an updated antivirus program.Do not forward unknown emails and do not reply to their sender. These types of messages are considered spam, because they are not desired and asked for.
  • Banks and serious institutions will not require personal information by email. Do not pay attention to such messages, are counterfeit and fraudulent. Any message related to earnings, cash request and donations are 100% phishing attacks.
  • When you click a link, make a habit to look at the addressbar, see if the domain name has the same name as the institution which you expect or know, eg for Microsoft page you can find the domain microsoft.com or http://www…….microsoft.com/…… but NOT www.microsoft…….com, etc. Any domain name which looks like the example above, it is 100% a pharming attack.
  • Credit card sites, banking sites and online stores should have a lock on their websites that shows they are encrypted, this is shown in the address bar after the page loads.
  • Do not post personal email addresses on the Internet, most of email addresses posted on websites are used by spammers to send unsolicited emails.
  • Do not copy any file unless you know the source.
  • Protect yourself from logic bombs by creating backup files of important personal documents, like MSOffice or Adobe documents, pictures, correspondence etc. Do this regularly. Store these backups on removable media such as CDs, DVDs because they are Read-Only.
  • Most times, malware like viruses, trojans, rootkits or hidden remote admin programs, are injected through exploits from websites containing illegal material, such as pirated software which mimics real commercial applications, or websites containing pornographic materials.
  • Stick with software recommended by legitimate download sites.
  • Don’t assume that files from people you know are safe!
  • Total Security Antivirus software is must-have protection. Keep it enabled and updated at all times.
  • I will post more rantings about the net later on thanks,

    mongo

Published: February 22, 2017