Tech Tips Home
The Best Tech Tips And Daily Deals
Newsletter On The Internet!

Shop online 24hrs a day or call us Mon-Fri
8:30AM-4:30PM EST - 1-800-915-2088
WorldStart Tech Tip And Store Search
Email: Password: Login Remember Me
Buy Worldstarts Internet security survial guide

Archive for the ‘Security Help’ Category

3 August 2005

I can’t speak for others but I personally could go the rest of my life without hearing how much more “secure” Apple’s OS X operating system is compared to Window’s XP. It doesn’t help when it seems like you’re constantly hearing of all the horrible malware attacks on XP machines.

To me it’s always been a numbers game more than about the operating systems themselves. I believe… Continue reading

Control Internet Access

Thursday, August 25th, 2005

I don’t want my kids using the internet while I’m gone. Is there a way to stop them?

In my opinion, if you can’t be there to monitor activity, then prevent activity. Call me a mean dad if you want, but online mischief is very tempting when there’s no supervision.

First off, you should create a seperate, limited user account for your children. In XP you… Continue reading


Thursday, August 25th, 2005

27 July 2005

Rootkits have been around for over 10 years, and known by other names before that. They are suites of small programs that exploit your system in a way that can be next to impossible to detect and even harder to remove if one finds its way on to your system. The name comes from what it does—it gives the attack administrator access to the

Don’t Block Yourself

Saturday, August 20th, 2005

Do you occasionally send email to yourself? Has it started going to your Deleted items folder? You may have accidentally added your own address to your spam filter’s enemy list or reported yourself as spam.

“Huh? I’m not that dumb!” you reply.

Neither am I, but the other day I was going through my Inbox and deleting spam when I noticed that it forged my email address as the sender… Continue reading

How Spyware Effects Internet Usage

Saturday, August 6th, 2005

13 July 2005

Once bitten, twice shy. Well, at least that’s what a study conducted by Pew Internet & American Life Project is suggesting.

Their study concludes that the threat of unwanted software programs is changing the way people use the internet. It ended on July 6th, 2005 so the info is quite fresh. In this study are some hard numbers supporting the theory that the majority of adult internet… Continue reading

Stop the “Spim”

Saturday, August 6th, 2005

What is SPIM? If you use an instant messaging service like AIM, MSN Messenger, or Yahoo Messenger then you probably know. It is unwanted commercial messages that pop up, enticing you to click a link for some product or service.

Another IM annoyance is a message from someone you don’t know (or don’t know well). Anyone with your AOL or Yahoo address can use it to send you an IM… Continue reading

Counterfeit BBB Scam

Saturday, July 16th, 2005

6 July 2005

Looking for a jet-ski or maybe searching for a new car online? Visited any online auctions or personals looking for a big-ticket item lately? If this sounds like you then you want to listen up.

There’s a new scam out there preying on those looking for more expensive items online. The scam that I am speaking of uses the Better Business Bureau logo and name to give… Continue reading

We all know that simple passwords are dangerous. If you’re using any of the following for passwords (or forms thereof), you probably aren’t as secure as you think:

  • Names Of Pets
  • Birth date
  • Last 4 digits of your SS#
  • Kid’s Names
  • Grandkid’s Names
  • Parent’s Names
  • Addresses
  • Phone Numbers

Did I catch you? Well, it gets even worse!

Even if you’re not using any of the above, but are… Continue reading

Email Security Scan

Saturday, June 18th, 2005

Well troops, surprise inspection! Let’s see how secure your defenses are against mail-born threats. Think you’re up to the test? Then read on.

The problem with all the security holes that arise from day to day, is that it’s hard to keep up. “Am I protected?” you wonder, “I update constantly, I scrutinize all my

Google Security

Saturday, June 18th, 2005

15 June 2005

Google is always adding new products and features. One of these is the Personalized Google Homepage.You can customize it with news, movies, weather, stock market reports and more. How convenient. But there is a dark side.

Google saves your search history. Every person, place, thing, or word you look up is stored in your history (BTW-same goes for the Google Toolbar). This can be cleared or paused… Continue reading

Three-pronged Attack

Saturday, June 18th, 2005

8 June 2005

We’ve seen some serious virus activity lately, sheesh, but in the opinion of many, myself included, the worst threat has got to be the combined attack of the “Mitglieder” and other Bagel variants. This coordinated joint attack on Internet users is something new to a lot of Security experts and the potential numbers of those infected is something to behold. Watching the blended attack play out is… Continue reading

Close all Browser Windows and Tabs

Saturday, June 18th, 2005

A vulnerability in Firefox led to personal information being stolen.

The best way to avoid the flaw is to close out all tabs and windows before doing any online shopping, banking, or entering personal info.

Not that Internet Explorer has this flaw, but it’s a good practice in any browser just to be safe.

~ David

David Samuel Thomas… Continue reading

Phishing Buddies

Thursday, June 2nd, 2005

1 June 2005

Phishing scams have been casting their nets in two of the biggest Instant Messaging (IM) programs since the end of May. Though the scams are different, the underlying message is clear. The message I’m referring to is that phishing attacks have a new, less secure avenue in which to deceive end-users into coughing up personal information.

This is significant due to the fact that many… Continue reading

Personalized Phishing

Thursday, June 2nd, 2005

25 May 2005

If you want to catch bigger fish use better bait. Most of you by now have heard of or witnessed phishing scams. I have personally written two articles in the past couple of months describing what phishing scams are and how to avoid or spot them.

Just to get everyone up to speed on this subject I’ll go over the basics of phishing. Phishing is… Continue reading

Firefox Security Update 1.0.4

Thursday, June 2nd, 2005

18 May 2005

Firefox came out with another update in May 2005 shortly after one in April. Just after Secuna security found two exploits in the FireFox browser that affected version 1.0.3 and below they discovered more flaws the weekend of May the 9th and Mozilla patched the following Monday. Good job, guys.

The two nastier vulnerabilities are the Cross Site Scripting which can be used to steal… Continue reading

Cross Site Scripting

Tuesday, May 17th, 2005

CSS or XSS is a method where a hacker will watch for a vulnerable site, one that uses user information, but does not validate the user when they revisit the site.

The hacker will then recreate this link using malicious code that takes advantage of the of the website’s security hole and basically steals user’s information.

This attack can take place through email, message boards—any place really that you can… Continue reading

W32/Sober Strikes Again

Saturday, May 14th, 2005

W32/Sober Strikes Again


Since October of 2003 the W32/Sober and its variants have been have really done all they could to establish themselves as a constant threat to the unfortunate and under-secure. Well they’re at it again, with some new variants out there and they are doing such a good job that McAfee elevated its threat level to “Medium” and Symantec to “Wild”.

The W32/Sober and all its variants… Continue reading

Secure Website Problems

Saturday, May 14th, 2005

When try to go to secure websites I get a message saying that the page cannot be displayed. Is it something wrong with my browser?

Could be. You may not have the correct security settings for you to connect to secure web pages. For instance, let’s say you want to get in on one of our great software specials and when you click “Checkout” you can’t… Continue reading

We’re familiar with Viruses, Worms, and Trojan Horses, but there are other threats out there in the dark corners of the internet that you should be aware of…

Downloader—A program that retrieves and installs additional files when run. Most are set up to retrieve from a designated web or FTP site.

Proxy—An infected computer can become a front for a hacker’s, allowing the… Continue reading

Scan Individual Files for Viruses

Saturday, May 7th, 2005

We often recommend that when you download files you should scan for viruses. The same is true for attachments sent via email (although, if you have decent antivirus software this should be taken care of).

But do you need to scan your whole computer? No, you can scan just one file with most AntiVirus software.


Fake Windows Update Email

Saturday, May 7th, 2005

27 April 2005

Well Microsoft believes that the grace period is over and wants everyone to jump on board and get Service Pack 2 (SP2) installed. I know everyone has an opinion on the Service Pack—some good some not so good—but it really is only a matter of time. Do you know anyone without SP1 on his or her XP machine? I hope not.

As you may also know, Microsoft… Continue reading

Dialer Malware

Saturday, April 23rd, 2005

A dialer is a program that dials your modem access number, you will find this component in certain software suites for various reasons, but you also see it in malware or viruses. If you have broadband then this is something you may not have to worry about but if you recently jumped on to the broadband wagon you may have your modem still hooked up. My advice on this situation… Continue reading

Viruses that Won’t Go Away

Saturday, April 16th, 2005

Some viruses just won’t go away. You try everything from running your anti-virus software to digging through the registry just to have it come back. Well, if you have Windows ME or XP the infected file might be stored as a backup file that your virus scan can’t touch.

So, what to do? Try disabling System Restore and running a virus scan.

With Windows XP:

Right-click “My Computer”… Continue reading

Firewall Hits

Wednesday, April 6th, 2005

I know I promised to send you this tip last week but I felt it important to tell you about the Firefox problem (which, by the way, has been fixed so download and install the latest version).

OK, so two week’s ago we took a look at how to not only see, but to decipher your router logs. To review this info, check out the webpage…

Router Logs & Firewall Hits

Tuesday, March 22nd, 2005

So you got broadband—congratulations. Now there are three PCs all online in your house, and guess who the Network Administrator is? Everyone’s enjoying the connection, but now you have three people online at once and you want to make sure that you network remains securely sound. I’m going to discuss how to view your router log which, in case you’re not familiar, is a list of what’s going on out… Continue reading

Keep Files Anonymous

Tuesday, March 22nd, 2005

Did you know that your name and other personal information may be included in files that you send to others? That’s right. Word processors especially put in the author’s name and more automatically. If you plan on sending a file to someone else, then you should remove this info.

Right click a file and choose “Properties” (or Alt+double click). If there is

Free Newsletter Signup

Tech Tips Daily

Become a tech pro! Get the very best tech and computer help sent directly to your email every weekday!

Tech Tips Weekly

The week's best in tech and computer help. Get your issue sent to your email every Friday!

WorldStart's Daily Deals

The very best deals on the Internet! Get a new set of incredible sales every day of the week!

Just For Grins

Clean jokes, funny quotes, and hilarious comics. Sent 5 times a week straight to your email.


Love Worldstart? Refer A Friend!

Buy Worldstarts Internet security survial guide
WorldStart's Premium Membership

Tip Archive