StatCounter - Free Web Tracker and Counter

ResourcesForLife.com Security Policies and Best Practices

Technology Summary. We research and implement best practices regarding website security and stability. In addition to preventative measures, our site is scanned and monitored regularly by multiple redundant internal and external automated systems for any unauthorized content changes that may indicate the presence of malware on our site. We also scan our site manually multiple times… Continue reading ResourcesForLife.com Security Policies and Best Practices

The Impact of Anonymity on Internet Safety, Security, and Content Integrity

Summary This document addresses the safety, security, and authenticity problems arising from anonymity on the Internet. Benefits of Anonymity Anonymity has some benefits to the individual and the community, such as: Drawbacks of Anonymity. Although there are some apparent benefits to anonymity, the benefits are outweighed and are nullified by the drawbacks of anonymity. These are… Continue reading The Impact of Anonymity on Internet Safety, Security, and Content Integrity

Solution for Symantec Endpoint Internet Security or Norton AntiVirus Slowing Down Apple or Windows Computer

Technology Summary. Users of Symantec (or Norton) antivirus software, such as Endpoint Security or Internet Security suite, on Apple or Windows computers may notice a slowness when trying to perform data intensive tasks, such as system backups. This can also be an issue with McAfee, Trend Micro, and Computer Associates software. Solutions are provided below… Continue reading Solution for Symantec Endpoint Internet Security or Norton AntiVirus Slowing Down Apple or Windows Computer

Hackers Launch Biggest Data Heist in History With a Global Kneber Botnet Virus Hacking Campaign to Hack the Planet

Technology Summary. The world’s largest data heist and hacking campaign was recently discovered and it is still underway. There are a surprisingly small number of news reports about this story so far. According to a report by PC World, the Kneber botnet virus “puts the potential threat of last year’s Conficker worm to shame.” According… Continue reading Hackers Launch Biggest Data Heist in History With a Global Kneber Botnet Virus Hacking Campaign to Hack the Planet

Security and Privacy Precautions When Forwarding Email

Technology Summary. When forwarding email newsletters and similar items, it is important to remove links from messages that may automatically give the recipient inadvertent access to your personal account with the original sender. For example, if someone who receives the email from you clicks on the one click unsubscribe button, you’ll be removed from the list.… Continue reading Security and Privacy Precautions When Forwarding Email

Adobe Acrobat Reader Virus Security Threat Vulnerability

Technology Summary. At the time of this report, there is currently a 0-day (zero day) vulnerability with Adobe Reader 9.2 and previous versions. A zero day vulnerability means that the virus has been discovered spreading through the Internet today, yet most anti-virus software doesn’t yet have defense against it. This virus has been reported and… Continue reading Adobe Acrobat Reader Virus Security Threat Vulnerability

AVG or Symantec Endpoint Protection – 139 Point Software Removal Procedure Steps

Technology Summary. Symantec Endpoint Security can sometimes become corrupted to the point that it produces error messages yet can’t be uninstalled automatically by Windows. Symantec is aware of this issue. Removal Instructions. A four page fine-print manual removal procedure document is available on the Symantec website. The instructions include about 139 steps or points that… Continue reading AVG or Symantec Endpoint Protection – 139 Point Software Removal Procedure Steps