Web Hosting Security

  Home arrow Web Hosting Security arrow Page 4 - Protecting Yourself Online
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
  >>> SIGN UP!  
  Lost Password? 

Protecting Yourself Online
By: Barzan 'Tony' Antal
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 8

    Table of Contents:
  • Protecting Yourself Online
  • Dangers Lurking
  • Protecting Yourself
  • Don't Freak Out!

  • Rate this Article: Poor Best 
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article




    Protecting Yourself Online - Don't Freak Out!

    (Page 4 of 4 )

    Always being online is akin to always cruising through dangerous districts. Chances are you've already discovered that the online world is not as safe and secure as it seems at first. Don't be an innocent victim; be safe by taking preventive measures and stay online 24/7 safely and responsible.

    Hopefully reading this article has helped you to understand the possible dangers lurking everywhere. Following the basic guidelines within this article will make you less of a potential target. As always, know what kinds of files you download and run, check their source, and if you have doubts, run them within a testing environment (sandbox). This is more of a professional technique, but if in doubt, ask for help rather than run a risk.

    There are lots of forums with experienced communities where people are willing to help out and check whether or not the file that you downloaded contains a  backdoor. They either reverse engineer the code to locate malicious lines (if there are any) or simply execute the application within a well-monitored sandbox environment. Generally, these are virtual machines, where the application cannot do any harm.

    Furthermore, there are dedicated websites that offer free antivirus and malware scanning with a multitude of antivirus engines. You can opt for VirusTotal and NoVirusThanks (often abbreviated as NVT) services. The beauty of these tools is that scanning a file with 24+ antivirus and anti-malware engines is much more secure than having only one antivirus program on your computer. So whenever in doubt-check the file!

    Check out the screen shot below; it shows the result of a scan on Skype's setup file.

    The engines that were used to scan the file are the following: a-squared, AhnLab-V3, Anti-Vir, Antiy-AVL, Authentium, Avast, AVG, BitDefender, CAT-QuickHeal, ClamAV, Comodo, DrWeb, eSafee, eTrust-Vet, F-Prot, F-Secure, Fortinet, GData, Ikarus, K7AntiVirus, Kaspersky, McAfee, McAfee+Artemis, McAfee-GW-Edition, Microsoft, NOD32, Norman, nProtect, Panda, PCTools, Prevx1, Rising, Sophos, Sunbelt, Symantec, TheHacker, TrendMicro, VBA32, ViRobot, VirusBuster.

    In closing, I'd like to invite you to join our community of technology professionals experienced in all areas of IT&C starting from software and hardware up to consumer electronics at Dev Hardware Forums. Also, be sure to check out the community of our sister site at Dev Shed Forums. We are friendly and we'll do our best to help you.

    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.


    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates


    © 2003-2019 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap