Recent content by laarni080

  1. L

    Worms Turning Infested PCs Into Spam Zombies

    To avoid being detected and filtered, spammers seek to send their emails from a distributed network of computers. Ideally, these computers are not even their own but those of unsuspecting users. To build such a distributed network of spam zombies, spammers cooperate with virus authors who...
  2. L

    How Spammers Get Your Email Address

    [FONT="Verdana"][SIZE="2"]Spam is amazing. In an unprecedented and astonishing effort, junk email reaches almost everybody online. All it takes to get on the mailing lists used by spammers is an email address. There is no need to sign up for anything or ask for emails. The spam just starts...
  3. L

    How to block users from accessing your site based on their IP address

    Blocking users by IP address is pretty simple with .htaccess. So here it is the example: Order allow, deny Deny from 192.168.0.10 Deny from 212.155. Deny from 1.2.3.4 5.6.7.8 127.0.0.1 Allow from all Let?s take a look at the code line by line: The first line ?Order allow, deny? tells the web...
  4. L

    Attachments - Secure

    E-mail attachments from unknown sources are considered to be very dangerous since they have the potential to contain any type of script, virus and/or executable program that can cause severe damage to files and/or disks on the users' computer. In fact, even attachments from trusted sources may...
  5. L

    Information Theft

    E-mail was developed with convenience, rather than security in mind. The truth of the matter is that all of the information that users include in their e-mail is transparent, meaning that it can be read at any point in time between transmission and reception. If individuals are disclosing...
  6. L

    Filtering

    Most e-mail users are familiar with spam, unwanted, unsolicited advertisement e-mails. While spam is generally more an annoyance than a security concern, it can be used to overload a users' system. An e-mail filter can be employed to protect against spammers. The filtering capabilities in a...
  7. L

    Secure Online Behavior: Developing Good Security Habits

    The Internet has evolved to be a fundamental business innovation with a clearly demonstrated ability to positively affect organizations as well as individuals. Unfortunately, the Internet was not designed with security in mind - it is inherently insecure. Regardless of how many anti-virus...
  8. L

    Protect Always-On Connections with Firewalls

    Access to e-mail and other Internet resources is very much a necessity for conducting business and accessing information. However, along with the convenience that network connectivity brings, this also raises serious security concerns. With always-on connections such as cable modems and DSL...
  9. L

    Hi Everyone

    Hi Im Laarni from Philippines, hope to hear from all of you soon guys.
Top