Monday, May 28, 2007

I have found a way to blog on multiple blogs listed under one user name. Note that this blog entry is powered by Qumana.  What a great piece of software.  This sure beats having to pop in & out of different accounts.  Another great feature about Qumana is that you can set it to post more in the future so you can keep your content fresh even when you want to take a few days off.


Now there are more services out there on the Internet just waiting to be found.  Visit The Star Computer today and join our newsletter where we will be sharing these great services. Some of them are free and some cost a little bit of money each month for the premium value.


Ads by AdGenta.com


Powered by Qumana


Thursday, May 10, 2007

Computer Security: Are you Phishing?

Author: Barion Willis

Article:
You can say that the Internet is a short cut for international
networking. By just logging on, you can connect to people all
over the world. They may be people you personally know or people
you just know online. Whatever the case, there is always
somebody on the other end of your Internet connection.

As accessible and easy daily life is now thanks to the Internet,
there are disadvantages from this convenience. Criminal
activities such as eliciting sexual activities on the web are an
example of online problems society has to deal with.

Another online criminal activity is phishing. Phishing is
acquiring personal information like passwords and credit card
details by pretending to be a representative of a company.
Phishing is done through email or instant messaging.

It is called ®phishing because it is similar to the
recreational activity fishing. It for users
personal information such as passwords and financial data.

Phishers create accounts on AOL by using fake algorithmically
generated credit card numbers. These accounts are maintained for
a number of months. Due to the reports of phishing incidences,
AOL has brought in measures preventing this from happening by
securing the data of their users and confirming the information
of those signing up for AOL accounts. Scan your registry for
free at http://www.registry-cleaners-reviewed.info
On AOL, a phisher pretends that he is an AOL employee and sends
out instant messages to a random customer that asks for
passwords of their account. Luring the victim further, the
phisher includes in the message verify your account or
confirm billing information.

Thus, a number of clients get lured in and give off their
password. Once the phisher gains access of this sensitive
information, he can use the victims account for spamming.
Check your inbox and take a look at the spam messages you've
received. Yes, those are real names of people. These people's
accounts have been hacked and are now being used to relay spam
messages.

About the author:
Free Scan! See how many errors your computer has, at
http://www.registry-cleaners-reviewed.info

Computer Security: Scams via Phisher

Author: Hazel Mia

Article:
How this e-mail scam works is through this: usually, you will
receive an e- mail from a service online provider or through a
bank that ill ask you to go click a specific link or visit a
particular website and from there you will be elicited to
provide your personal info.

This type of scam is called phishing.

Basically, this scam is where victims are asked and tricked to
entering all their personal info like passwords, account numbers
to an organization or company that presents itself as
legitimate.

Ingenious scammers who create a site that looks a lot like the
authentic web site do this trick. E-mails are usually used to
invite and bait potential online victims to go to the fake
website.

As much as possible, always be cautious and wary of e-mails that
ask you to click a link and give out personal sensitive info
like bank details.

You should know that any info provided on these fake sites are
farmed and harvested by scammers which they in turn use to steal
the funds from the userЎЇs bank account or steal the identity of
the victim.

Be aware that companies that are legitimate would never ask for
any sensitive info through e-mail.

Never, ever click on these e-mail links. Never give out any info
about you. If there are doubts on the veracity of the e-mail, it
is always best to directly contact the legitimate company.

How to know a scam if you see one? Generally, a scam has the
following characteristics. It makes the promise to give you lots
of money, lots of prizes or a job. Free Scan! See how many
errors your computer has, at
http://www.registry-cleaners-reviewed.info

It also asks you for donations. It also proposes business deals
that are lucrative. It also asks that you provide personal and
very sensitive info. It also asks that you follow a specific
link to a particular website and log in to a particular account.

Educating yourself is an essential contribution against being
vulnerable to fraud as well as any virus or security threat.

About the author:
Scan your registry for free at
http://www.registry-cleaners-reviewed.info

Tips for selling on eBay

Author: John Case

Article:
Tips for Selling on eBay(R)

* The first thing you should do is sign up an account with
Paypal.com. Once your account is set up, follow Paypal's
instructions to verify your address and account. This will help
build buyers' trust in you as a seller. Paypal will help you
easily accept payment from buyers as well as pay wholesale
suppliers securely.

* NEVER respond to an e-mail from Paypal that asks you for your
login information, or asks you to follow a link to a login page.
This is a scam known as "phishing." A typical message might
include scare tactics such as "We have noted an illegal login
attempt to your account" or "You have added a new e-mail address
to your account." If you follow the link, you will be directed
to what LOOKS like a Paypal login page, but your login
information will actually be sent to crooks, who will promptly
use your info to clear out your account. Paypal will NEVER send
you an e-mail asking for your login info. If you receive a
suspicious e-mail, you should forward it to: spoof@paypal.com
and they will reply to let you know if it is authentic or not.

* Never respond to an e-mail from eBay that asks for your login
information. Some bogus messages appear to be from interested
buyers. For example: "Is your product still for sale? Let me
know!" or "I sent payment 2 weeks ago! Where is my product?"
Another common message is: "Update your eBay information within
48 hours, or your account will be suspended!" Again, your login
info will be forwarded to scammers who will use your eBay ID to
artificially drive up prices on their own auctions, or use your
eBay ID to run a fraudulant auction in which they collect
payment for an item that doesn't exist. If you receive a
suspicious e-mail, forward it to spoof@ebay.com and they will
let you know if it is authentic. If you want to respond to a
question from a buyer, it is safer to login to your eBay
account, and go to the "My Messages" section, and reply directly
through eBay.

* When buying from a wholesale supplier, ALWAYS pay through a
credit card, or Paypal. NEVER pay for products through Western
Union. Many Western Union clerks do not require ID for the
seller to pick up the money. It is too easy for a wholesaler to
collect the money and not send your order. If a wholesaler
insists on Western Union, simply look for another supplier.

* If you pay a wholesaler through an escrow service, use only
escrow.com. If a wholesaler insists on another escrow service,
simply look for another supplier.

* Before buying from a wholesale supplier, be sure to check
eBay for similar items and calculate if you can sell for a
competitive price and also get a profit. Each and every day, an
average of $86 million changes hands through eBay(R) auctions.
Every day, an estimated 2 million people use eBay(R) to buy
things they can not find in stores, or to get rid of things they
do not use any more in order to make room in their house. But
did you know that 430,000 eBay(R) run a full or part-time
business from their homes? Of course, there are the big product
sellers, who auction off things like new cars, real estate, or
computers. However, there are also normal people running eBay(R)
business from their homes, not only selling things that are no
longer needed around the house, but selling everyday consumer
goods, and making a full-time income from it.

The secret of eBay(R) success is finding products to sell that
match your interests and lifestyle, locating a reliable
wholesale supplier, and mastering the system of putting up
auction pages on eBay(R) in order to keep your seller fees to a
minimum while maximizing your profits.

Here are some tips for selling on eBay:

* Remember that eBay users will buy based on cost as well as
reliability of the seller. If you have a relatively low feedback
score, and you are selling the exact same item at the exact same
cost as a seller with feedback of 3000 or more, you are not
going to make many sales.

* Create e-mail template message to communicate with buyers.
You should make at least three messages: one for when you
receive payment, one for when you send the order, and one to
send approximately two weeks later, to check if everything is
OK. Good communications are essential in building good feedback
ratings.

* Feedback is very important. Always leave positive feedback
for buyers as soon as payment clears. If a buyer has not left
positive feedback by two weeks after the close of the auction,
send a follow up e-mail. Be very careful about leaving neutral
or negative feedback. Even if you have a valid reason for
leaving negative feedback,once you leave negative feedback, the
buyer is likely to retaliate with negative feedback, harming
your reputation. Instead, use eBay's "Send an invoice to buyer"
or "Report an unpaid item" functions.

About the author:
John Case operates http://www.easy-learn-to-earn.com, which
provides free information on making money online.

Psychological Internet Security: Drawing a Spider to the Web

Author: Josh George

Article:

Even if everyone knew exactly what they wanted and where to get
it on the internet, they would not be safe from this.
While antivirus solutions and computer protection software are evolving to identify these scams, many are still evading internet security solutions. These scams can affect everyone and can be summed up in one word: Pharming.

While you have probably heard about pharming as well as the dangers that come from surfing to sites containing pornography, warez (illegal downloads) and other underground-related sites, pharming can virtually affect any topic of any industry. As long as sensitive information
can be extracted from you, pharming scams will be developed. After all, people can act like lemmings on the internet; one by one, they will stumble into the pharming scam
and do exactly what the scam artists want them to do.

So you’re probably wondering what pharming is and how it can compromise your computer
protection
and internet security. Simply put, it is like an evolved form of phishing.&nb
sp; Instead of the scam artists trying to convince you to visit a fraudulent site, they just build tons of fraudulent sites and let you visit them through redirection tactics. While the
details of these redirection tactics are beyond the scope of this article, it is important to know that financially-related websites are the primary targets of pharming scams.

As you can understand, it is extremely difficult to identify pharming scams because you have no idea when you visit one. But is this really the case? For many, the warnings literally pop
up in front of their eyes, but they have simply trained themselves to ignore the computer
protection
and internet security signs. The question is, are you one of these people?

Answer this: have you ever browsed to a place where you are greeted with an internet security warning stating you just entered a site with an unsigned certificate? If you have, did you simply agree to view the site and not even bother to wonder why there was an unsigned
certificate internet security warning? Well, that warning box could mean the loss of your identity if you are not careful enough. For scammers to set up these pharming websites, they try to duplicate every aspect of the real site as possible, including the certificates. If you ignore these unsigned certificate warnings and enter your personal information, you literally send it all to the scammers.

To help
identify these scams, click File > Properties in your browser and make sure the website is
an actual domain name instead of an IP address. Simply looking at the address bar of a pharming site is not enough, for scammers have ways to cloak it. Also, make sure that
yellow lock is in the bottom right-hand corner of your browser window. That lock signifies SSL, which means your information is being transferred over a securely encrypted channel.

When it comes to additional computer protection and internet security, grab a free legitimate anti-phishing toolbar. Also make sure to install the most current updates for your
antivirus software.

In the end, remember internet security and computer protection means using common sense and judgment when surfing the web. For any sites that require you to enter personal
information, make sure you analyze the website like discussed above. In spending the additional time it takes to do this, you will dramatically increase your computer protection
and online security, all without spending a penny.


About the author:
Josh George has been an active member in the computer and
internet security community since 1998. Writing on the topic and
making presentations to FBI, DoD, and NSA members, his site
provides time-tested best practices and recommended tools for
everyone: http://www.essentialcomputersecurity.com