![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Virus Nightmare..Lessons Learned
I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info. The most important thing for me to save are my Outlook Express emails and my Roboform passwords. That way I can at least access all the places I need, to download and re-install all the software I use. Thankfully I was able to still access my Laptop and very, very slowly(the system was painfully slow because of the damge done by the virus) start a process of trying to save my system without having to reformat the whole disk. I say thankfully because after a virus attack not everyone is able to even access the system. I tried anti-virus software, I attempted to fix things using the various "malicious advertising" expulsion applications(Ad-aware, Spybot etc.). All to no avail. After almost three days I resigned myself to the fact that it would have to be a re-format which means restoring my Laptop to factory settings. What a nightmare! First of all I made a backup of my Outlook express email software, emails, account settings etc. For this I downloaded a great little free trial software application called Outlook Express Back Up Wizard, a free trial can be downloaded here:http://www.outlook-express-backup.com/ This software met by needs better than others I tried. If you don't use Outlook Express then you can download others by searching here:http://www.google.com/search?sourceid=navclient&ie=UTF-8&rls=RNWE,RNWE:2004-35,RNWE:en&q=email+backup+free+downloads The I did a search for some backup software to back up the files that I could and also to use for future occasions. After trying a few that either wouldn't work on my system, or didn't back up to the medium that I wanted(CD Rom Discs) I found a great tool that just did the trick and in fact I plan to buy as soon as the free trial is up. The software is called "NTI Backup Now 4 Deluxe Suite" and it is so straightforward that even a tech dummy like me found it simple. Again you can use the full version for 30 days free:http://www.ntius.com/ I added my Roboform(www.roboform.com) passwords, my Internet Explorer favourites, my Outlook Express backup, my Microsoft Money backup files(For accounting purposes), as many software installation files as I had and most of the files and folders that I have used recently. Of course what I also ralised is that I have not kept the Install files of loads of the software that I have on my Laptop. Bad mistake! This means that I will have to go search for these again to download to my reformatted system. What I will do in future is save every Install file in it's own folder with passwords, serial numbers and any other useful info in a notepad file alongside them. The hard lesson I have learned is to make sure in future I do frequent backups of my system. I have been online since 1998 and never had any major problems. This is the first and I foolishly underestimated the damage a virus could do. My next step is to get an external drive to use as a backup and as I mentioned to use it frequently. I hope this has given you some food for thought. As I sign off here I am going to insert my Toshiba Product Recovery CD-Rom. If I had taken the necessary precautions I wouldn't have just lost three days of my time. Three days I could have been putting to better use. Ah well, there is positive in every bad situation. Or at least that's what I keep telling myself:-). Mal Keenan is editor and publisher of Home Business Tips Newsletter:http://www.home-business-tips-newsletter.com/For more help and support from Mal Keenan visit his online training site:http://www.pluginprofitstraining.com
MORE RESOURCES: School where boy shot teacher reopens with added security The Denver Post Should iPhone users use security keys and Advanced Data Protection? The Washington Post Former top security official: If Abbas’s PA won’t fight terror, why should it exist? The Times of Israel Democrat says booting Schiff, Swalwell from Intel committee ‘hurts our national security’ - The Hill School where boy shot teacher reopens with added security Raleigh News & Observer Cyber security, foreign policy, and more; 2023 Speaker series kick-off kuna noticias y kuna radio Blockchain and the Future of IT Security: A Quick Primer Solutions Review Security Heightened at Chinatown's Lunar New Year Parade in Wake of Monterey Park Mass Shooting NBC Chicago Tetra Tech (TTEK) Wins Extra $42M to Boost Energy Security Zacks Investment Research By Ending Security Coordination with Israel, the Palestinian ... Jerusalem Center for Public Affairs Multi-Cloud Security Market Worth $10.5 Billion By 2027 - Exclusive Report by MarketsandMarkets™ Yahoo Finance Security guards foil attempt to smuggle ‘Islamic State drug’ from West Bank to Gaza The Times of Israel Arizona CISO Tim Roemer named ThriveDX President & General ... Security Magazine Breakers hotel wins initial approval for new security fencing and gates Palm Beach Daily News Early Edition: January 30, 2023 Just Security Israel: security agency head warns against measures demanded by ... Middle East Monitor Expanding Arkansas's National Security Role Mountain Home Observer Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security Biden Administration Announces Additional Security Assistance for ... Department of Defense UN General Assembly Head Says Security Council Is 'Paralyzed ... The Epoch Times Security forces seal home of terrorist who carried out deadly Jerusalem attack - The Times of Israel Security forces seal home of terrorist who carried out deadly Jerusalem attack The Times of Israel Penn State has not reimbursed PSP for security at Proud Boys event Lock Haven Express Daily Briefing Jan. 29: Friday night terror attack tests national security minister The Times of Israel Galaxy A12 Nacho, Galaxy A03s get January 2023 security update SamMobile - Samsung news ASIS International, SIA Launch Security LeadHER Event Security Sales & Integration DHS Announces Process Enhancements for Supporting Labor ... Homeland Security DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security The Definitive Browser Security Checklist The Hacker News More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense PA announces halt to security coordination with Israel; US cautions against move The Times of Israel At Marine Raiders' homicide trial, questions center on security video Marine Corps Times Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post How Schools Have Boosted Security as Shootings Become More Common The New York Times Remarks by President Biden on Border Security and Enforcement The White House |
![]() |
![]() |
![]() |
RELATED ARTICLES
Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.I founded CPAsites. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. Phishing - A High Tech Identity Theft With A Low Tech Solution Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief. Virus and Adware - Fix them Both! We all get the odd virus now and then, but sometimes that one virus could cause so many problems. In this article I shall be going though just some of the problems that these virus software programs can do, and how to fix them. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Everything You Need To Know About Spyware and Malware You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT. Computer-Virus Writers: A Few Bats In The Belfry? "Male. Obsessed with computers. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. ![]() |
home | site map |
© 2006 |