Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Fake Alerts

Probably one of the easiest ways bad guys hack your computer is by not hacking it at all! Did you ever think about just how much you're trusting someone when you install a program or application?

Programmers can hide secret code that steals your passwords, remotely controls your computer or worse. If you want to be safe on your computer, the most important thing of all is to not get tricked into installing the bad code because if you do, no amount of security software will be able to help you.

Install Alerts

Do you want to install this? Suuuurrre you do....

You might see an alert about "content being blocked" or "install warning" usually preceded by a webpage explaining how the game you want to play or the content you want to access will trigger an alert, but you shouldn't worry and just click "OK".

Instead, when you see these, realize this is your last chance to prevent bad stuff from being installed on your computer! If you don't know exactly what page you're on, who owns it, what they're trying to install and why, stay away.

A Java install alert. Tread carefully

Fake Alerts

Another common problem is a website that you visit that uses pop-ups or another trick to show you a window that seems like a virus or system alert but isn't.

Some are sophisticated animations that make it seem like it's scanning your computer and warns you to go and download a different antivirus to fix it.

While it may look very authentic if you click it or follow its instructions, you'll do the hacker's job for them by downloading or installing their bad code or them.

Defeating fakes

Weird... My video worked a minute ago. Why wouldn't it now? Hmm....

Here's the simplest trick I know for dealing with fakes. It's easy enough that kids or adults who are new to the net (or just less experienced) can easily handle fakes.

Whenever there's an alert, the first thing you should do is close all your Internet windows. If the alert is fake, it will disappear when the browser windows are closed.

The key is that you have to close the browser windows from the taskbar. Just right-click each window one at a time and click "Close" from the menu that appears. Once they're all closed, if the alert disappears, it was fake and you can move on with your life as if nothing happened!

One after another until they're all gone.

Of course, there's the matter of why the fake appeared in the first place! It was probably the websites you visited so avoid them in the future. Otherwise, you might have spyware on your computer. Here's how you can tell:

Defeating non-browser fakes

Either snuck in on other software or by using other clever tricks, a bad guy might be able to pop up a REAL alert, but one that contains bogus data. For example, this one:

You're in trouble! Just go to this website and all will be well... sure.

For the most part, you need to recognize that they're fakes. Anything that asks you to go and download something is probably fake. Anything that tells a website you need to go to fix something is probably fake.

In these cases, it's best to ignore the alert, but run your anit-spyware and anti-virus to search for any bad code that might have snuck in.

In Conclusion

It's easier to trick people into visiting a bad website, downloading, or installing bad code than to break into a well-defended computer. The best defense is to learn to recognize the fake information from the real and don't fall for it!

If they could have hacked you without your help, they'd have done it already. Don't do their job for them and fall for these tricks!

Share This

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]