How can I keep my account safe from hackers, scammers and spammers?

Size: px
Start display at page:

Download "How can I keep my account safe from hackers, scammers and spammers?"

Transcription

1 How can I keep my account safe from hackers, scammers and spammers? The question is a good one and especially important if you've purchased shared hosting (such as HostDime offers) since what effects your account will end up affecting others, also. Keep in mind that the following tips are general in nature and don't discuss programming techniques if you are the sort to write your own code. So what can you do to help keep your data and your account safe? First you need to realize that it doesn't matter if you're only planning on hosting a small site with pictures of your dog to share with family and friends. Hackers, scammers and spammers do not care. Your account can be put to good use no matter how small it is once it has been found and exploited. Even if you keep your site off of search engines, your site can and will be found by nefarious individuals. General Tips: Don't place files or directories into your site's web root (public_html) if you aren't actively using them. Remove old files and directories as soon as you are finished with them. A lot of people make the mistake of leaving old scripts, files and directories in place after their site no longer needs those items. Hackers, scammers and spammers may be able to use this old or forgotten content to compromise your site. However, they cannot exploit these items if they aren't hosted on your site anymore. This is why it is critical that you regularly look through your site for old content that is no longer needed. This advice also applies to other content and features on your site. Have you stopped using a database? Remove it. Did you retire your e- mail account in favor of a new one? Delete it once you are sure you don't need it. Is there a subdomain you no longer need? Get rid of it (and be sure to remove the directory the subdomain's content was stored in, too). Scammers love to exploit scripts and other content to install mini phishing sites and then use those sites to collect people's sensitive data or use your account to send out spam. If you do nothing else, take this to heart, because we have to help people all the time who have had their sites exploited because of some old piece of content that they weren't even using any more. It is so much easier to spend a little time now to keep your account safe than it is to clean it up and secure it after it has been exploited. If you haven't really taken a look at the files on your site lately, please do so now. Don't ever leave files and directories with write and execute permissions (777 permissions) in your

2 web root. A lot of people don't really think about it too much, but leaving directories and files that are readable and writable by others or other scripts is dangerous. Many hackers, spammers and scammers exploit insecure scripts to place and run files from your web hosting account. Our web servers use something called suphp to improve security. suphp makes PHP scripts run as your cpanel account user. That means that PHP scripts do not need files to be set to 666 or 777 permissions in order to work. In fact, our servers will display a 500 (Internal Server) error for security reasons if you have files or directories in your web root that are set above 755 and someone or something tries to access them. If the installation directions for a script you want to use ask you to set files or directories to 666 or 777, then set those items to 755 instead. The script will work properly with the items set to 755. Of course many scripts require a place to write temporary or permanent data that won't be removed until the script is finished with it. For example if you have a script that allows people to upload pictures to a gallery or other files to share with members of your community, that script needs some place to put those files. The "lazy" and insecure way is to have a predictably named data, tmp or upload directory inside the script directory. Many scripts do this because it is the only reliable way to be sure the script will have some place to write those files. However, it makes it child's play for hackers, scammers and spammers to write their own files to that location or access data you don't want them to have. The best scripts will offer a variety of methods for storing data and binary files. A good script will at least permit you to move and rename the data directory (or directories) and files outside of the web root. Remember, anything in your site's web root (public_html) may be directly accessible from the web if someone knows the exact path and file. If you place a script's data directory in your home directory (on cpanel servers this is the one you start in when you first log into your main FTP account, the one "above" public_html) and can rename the directory and data so they are hard to guess you can cut down on hackers, spammers and scammers ability to exploit any weak scripts they may find. This is because they won't be able to easily guess the location of any files they manage to write to that location and, more importantly, the files cannot be directly accessed or run from a web browser. Of course it's not iron- clad security, but it will keep many of the commonly exploited issues at bay. Another method some scripts use is to store all data (including uploaded binary files) in a database. This has the advantage of not requiring the script to write to files hosted inside your account, however it does have some other drawbacks. Typically, data stored in a database table field can't be over a certain size and if your script can't break

3 the data into "chunks" automatically then your files and data won't be able to be any larger than the limit imposed by us (the host). Also, storing binary data in a database can increase the load your site places on our servers if the data is accessed frequently. Also, there are ways to use.htaccess files to help block these sorts of exploits, but they aren't foolproof so it is best to keep any data directories and files outside of web root if at all possible. Treat all scripts and files as if they are dangerous. You should treat all scripts as if they are exploitable, because they are. Even a script that has undergone extensive security testing by independent third parties and the developers can be exploited. New bugs and security flaws are found every day and your previously secure script may now be at risk. Files and other content uploaded by users should be treated as if they are dangerous until you've had a chance to verify that they aren't. Even well- known and respected members of the community may still accidentally provide you a file with a virus or other malware without realizing it. Keep an eye on all content on your site and be prepared to remove anything that you find to be unacceptable. Vigilance is key. Again, don't install anything you aren't 100% sure that you need and want on your site and make sure you keep a close eye on content being added to your site. If you loose users due to a security breach you may never get them back again. Regularly inspect directories and files looking for anything unusual and remove questionable content. Backup your data regularly! I cannot begin to stress how important this is for the safety and security of your site. How often you back up depends on your comfort level and with how often the content on your site changes. If you have forums that are visited regularly and you don't want to loose posts, backing up the changed data every day is important. However, if you don't have any dynamic content on your site or if you can live with losing a certain amount of data, perhaps weekly or even monthly backups will do. Regardless, be sure to always make a backup any time you install or remove any data, just to be safe. The backup you make can be used to get your site back up and running quickly if your site ever is hacked or data is accidentally lost. You've probably heard this many times, but it is probably the single most important thing you can do to keep your account and data safe. We do not recommend making large backups in the middle of the day. They can be quite time consuming and increase the load on your server. You can always go into cpanel to download the nightly backups we make. Downloading that won't place as much load on the server.

4 Keep up with security and bug fix releases for all scripts that you use. However, do not upgrade to major new versions right away. Just because the scripts you use are secure and working well now does not mean that everything will remain that way forever. You need to regularly monitor the web sites of the developers of any scripts you use. Watch for security and bug fix patches and smaller point (0.0.x) releases. You should not wait to install these. Do so as soon as you can. Hackers look for slightly outdated versions with a confirmed security flaw and try to exploit it, often on the same day a new release is out or sometimes even earlier than that. On the other hand, try to avoid major new releases (x.0.0 or 0.x.0) for a while. These new releases often have new, untested code and patches to fix security flaws and bugs will be forthcoming shortly. Wait for one or two minor point releases before upgrading if you can. Waiting can be difficult as the major new releases could have glitzy new features that you may really want. Avoid the temptation as long as you can. If you wait a bit, not only will you have a more secure script, but you'll give third party developers time to update their themes, modules or other add ons (if you use any). Try to keep the number of third- party modules and add ons to a minimum. The script you are using may not exactly meet your needs. Often there are third- party developers who release modifications, modules or add ons for popular scripts. These mods can add many new features. However, you should avoid the temptation to install tons of these mods because the mods may not go through the same rigorous security testing as the main script and having too many can make upgrading the script difficult. Try to find scripts that most closely meet your needs without modification and if you must add mods, pick just a few so you aren't discouraged from upgrading to the latest minor point release with security bug fixes. Use secure, hard to guess passwords at all times This is another sometimes painful, but important, step you should take to keep your data safe. Don't use the same password everywhere and make sure you don't use recognizable words or other data that can be guessed (like your birthday or dog's name). Make sure the passwords are long and include both letters and numbers (and where possible non- alphanumeric characters or upper and lowercase letters). Ideally, you should change your passwords periodically and not leave a written record around for someone to steal. Many hackers, scammers and spammers use brute force attacks trying to gain access to your scripts and account using combinations of obvious choices. Even passwords you might assume would be hard to

5 guess like "p4ss- w0rdz" are going to be tried by good brute force crackers. If you can't memorize every password, you may want to consider a password/data management program. Many home computer password managers can keep your data safe by encrypting it and generating random secure passwords for you. Just make sure the password manager you use encrypts data using a strong well- known encryption method and make sure the password to access that data is itself highly secure and unique. Also be sure to keep offline backups of the encrypted data files somewhere. Here are a few that you might want to look at: 1Password: Roboform: Keepass: Password Gorilla: Of course many online scripts have features that help make it more difficult for brute force password stealing attempts (using captcha and by locking an account for a certain amount of time if the correct password isn't entered in a certain number of tries). If your script offers it, be sure to turn on these brute force deterrence tools. Remember, though, your password is often the only thing between hackers and your very sensitive data, so treat passwords like the frontline defense they are! This goes for your moderators and any other admins or people with access to sensitive information on your site. Tips to avoid spam and spammers: There are a number of things you can do to help make it difficult for spammers to spam you and others. Don't put your unobscured e- mail address anywhere on the web. If you must post an e- mail address in a public place where others can see it, be sure to obscure it from spam bots. The best way to do this is to write your address in a way that humans can figure out, but that spam bots won't understand. For example: aric at hostdime dot com or aric*removethispart*@*removethispart*hostdime.*rem OVETHISPART*com Alternately, you can create a small graphic file of your e- mail address (but make sure users can see the e- mail address in ALT tags or click on the picture to send you e- mail). Many scripts allow users to contact other users via e- mail without directly exposing either user's e- mail

6 address. Note that some e- mail harvesters can detect basic obfuscation techniques, so these aren't foolproof. However, they will result in you getting less spam than you would if you simply posted your address normally. Avoid use of contact forms Although there are some contact form scripts that are reasonably secure, spammers and scammers often find ways to turn even small errors in the contact form code into a springboard to send thousands of spam and scam e- mails, perhaps without your knowledge (until it is too late). No matter what you decide to use be sure to completely avoid any contact forms that use Matt's Archive formmail as a base for the contact form code. Matt has acknowledged that the script is full of bugs that can be exploited. See the item above about obscuring your e- mail address if you post it on your site. This will let most people contact you if need be without making your site a haven for spammers and scammers. Avoid guestbooks and other scripts that allow people to publicly post content without first being approved by you. Guestbooks and even forums can be used by spammers and scammers to post links to nefarious sites. If you can avoid these scripts altogether, do so. If not, make sure you find a guestbook or forum script that makes it more difficult for spammers and scammers to post. Captcha images, e- mail validation and moderation of new member messages can all help. Keep in mind that many spammers and scammers often use a real, valid e- mail address and a real human to complete the registration process and then go dormant for a time before having a bot post hundreds of spam/scam messages. Avoid setting up and using "obvious" e- mail addresses. Your first instinct may be to set up an e- mail address like "sales@..." or "contact@..." but try to avoid this if you can. Spammers latch onto these e- mail addresses quickly once they realize the domain is active. If you need to have a sales e- mail address, try using the name of the employee who is responsible for sales or some variation on the "sales" theme. For example:

7 or This isn't going to stop spammers, but it will make it more difficult for them to find these e- mail addresses to spam them, especially if you follow the tips above about obscuring e- mail addresses. Set your catchall (default) e- mail address to :fail: HostDime has special anti- dictionary attack tools in place that will stop spammers from finding all the active e- mail addresses in your account, but only if you set your default e- mail address in cpanel to :fail: (this should not be confused with your contact address in cpanel (which we use to contact you in case of problems with your account). Dictionary spam attacks work by sending hundreds or thousands of e- mails to every possible permutation of addresses at a domain and monitoring the result. A bot notes all the bounce messages that come back and removes those addresses from its spam list. Any addresses that don't bounce are then added to a "good address" spam list. Our solution checks of several bounces in a row from a particular location and then temporarily bans all e- mail from that sender. This disrupts the spammer's attack since they can only check a few e- mail addresses before being banned for a time. However, it only works if you have mail sent to non- working addresses set to :fail: The items discussed in this post are not meant to be exhaustive, but if you follow them you will keep your account and data much safer than if you ignore these tips. We strongly encourage you to follow these practices regularly to help avoid data loss and account suspension. Of course if you think your account may have been hacked or used by a spammer or scammer it is important to open a ticket via your CORE account and let us know of the issue so we can investigate. Please feel free to comment on this doc on our blog post at: your- web- hosting- account- safe- from- hackers- and- spammers/

My Secure Backup: How to reduce your backup size

My Secure Backup: How to reduce your backup size My Secure Backup: How to reduce your backup size As time passes, we find our backups getting bigger and bigger, causing increased space charges. This paper takes a few Newsletter and other articles I've

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1

Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1 Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

1.2 Using the GPG Gen key Command

1.2 Using the GPG Gen key Command Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to

More information

Managing User Accounts and User Groups

Managing User Accounts and User Groups Managing User Accounts and User Groups Contents Managing User Accounts and User Groups...2 About User Accounts and User Groups... 2 Managing User Groups...3 Adding User Groups... 3 Managing Group Membership...

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Rensselaer Union Club Webhosting CPanel Guide

Rensselaer Union Club Webhosting CPanel Guide Rensselaer Union Club Webhosting CPanel Guide Introduction: One of the many services the Systems Administrators offer Union recognized clubs is website hosting with a union.rpi.edu subdomain. The service

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Using Google Docs in the classroom: Simple as ABC

Using Google Docs in the classroom: Simple as ABC What is Google Docs? Google Docs is a free, Web-based word processing, presentations and spreadsheets program. Unlike desktop software, Google Docs lets people create web-based documents, presentations

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Railo Installation on CentOS Linux 6 Best Practices

Railo Installation on CentOS Linux 6 Best Practices Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to

More information

31 Ways To Make Your Computer System More Secure

31 Ways To Make Your Computer System More Secure 31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

2011 ithemes Media LLC. All rights reserved in all media. May be shared with copyright and credit left intact.!

2011 ithemes Media LLC. All rights reserved in all media. May be shared with copyright and credit left intact.! Meet BackupBuddy. ithemes Media, LLC was founded in 2008 by Cory Miller, a former newspaper journalist and public relations/communication practitioner, turned freelance moonlighting web designer, turned

More information

VoipSwitch Security Audit

VoipSwitch Security Audit VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has

More information

SAFEGUARDING YOUR HOMEOWNERS ASSOCIATION AND COMMON AREAS

SAFEGUARDING YOUR HOMEOWNERS ASSOCIATION AND COMMON AREAS SAFEGUARDING YOUR HOMEOWNERS ASSOCIATION AND COMMON AREAS March 2011 www.cybersecurityguy.com 1 2 SAFEGUARDING YOUR HOMEOWNER'S ASSOCIATION AND COMMON AREAS Many Homeowner Associations provide security

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Google Groups: What is Google Groups? About Google Groups and Google Contacts. Using, joining, creating, and sharing content with groups

Google Groups: What is Google Groups? About Google Groups and Google Contacts. Using, joining, creating, and sharing content with groups DN:GA-GG_101.01 Google Groups: Using, joining, creating, and sharing content with groups What is Google Groups? Google Groups is a feature of Google Apps that makes it easy to communicate and collaborate

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails 2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

ultimo theme Update Guide Copyright 2012-2013 Infortis All rights reserved

ultimo theme Update Guide Copyright 2012-2013 Infortis All rights reserved ultimo theme Update Guide Copyright 2012-2013 Infortis All rights reserved 1 1. Update Before you start updating, please refer to 2. Important changes to check if there are any additional instructions

More information

Module 2 Cloud Computing

Module 2 Cloud Computing 1 of 9 07/07/2011 17:12 Module 2 Cloud Computing Module 2 Cloud Computing "Spending on IT cloud services will triple in the next 5 years, reaching $42 billion worlwide." In cloud computing, the word "cloud"

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Using Form Scripts in WEBPLUS

Using Form Scripts in WEBPLUS Using Form Scripts in WEBPLUS In WEBPLUS you have the built-in ability to create forms that can be sent to your email address via Serif Web Resources. This is a nice simple option that s easy to set up,

More information

By Joe White. Contents. Part 1 The ground rules. Part 2 Choosing your keywords. Part 3 Getting your site listed. Part 4 Optimising your Site

By Joe White. Contents. Part 1 The ground rules. Part 2 Choosing your keywords. Part 3 Getting your site listed. Part 4 Optimising your Site By Joe White Contents Part 1 The ground rules Part 2 Choosing your keywords Part 3 Getting your site listed Part 4 Optimising your Site Part 5 Summary and results Part 1 The ground rules Search Engine

More information

WP Tweets PRO User's Guide

WP Tweets PRO User's Guide WP Tweets PRO User's Guide Contents: 1. Installation 2. Configure WP to Twitter 3. Basic Settings 4. Advanced Settings 5. WP Tweets PRO Settings 6. Strategy Tips Installation WP Tweets PRO is an add-on

More information

Mail. Add or delete contacts. Chapter 3: Manage Contacts. Table of Contents

Mail. Add or delete contacts. Chapter 3: Manage Contacts. Table of Contents Table of Contents Add or delete contacts Find your contacts Create Contacts Automatic contacts Edit or change contacts Search for contacts Print your contacts Upload existing contacts and groups Import

More information

Joomla Security - Introduction

Joomla Security - Introduction Joomla Security - Introduction Joomla Security At The Webhost Modern web servers come in all shapes, sizes and hues, hence web server based security issues just cannot be resolved with simple, one-size-fits-all

More information

What you can do prevent virus infections on your computer

What you can do prevent virus infections on your computer What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.

5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next. Installing IIS on Windows XP 1. Start 2. Go to Control Panel 3. Go to Add or RemovePrograms 4. Go to Add/Remove Windows Components 5. At the Windows Component panel, select the Internet Information Services

More information

Customer Control Panel Manual

Customer Control Panel Manual Customer Control Panel Manual Contents Introduction... 2 Before you begin... 2 Logging in to the Control Panel... 2 Resetting your Control Panel password.... 3 Managing FTP... 4 FTP details for your website...

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

INTRODUCTION TO EMAIL: & BASICS

INTRODUCTION TO EMAIL: & BASICS University of North Carolina at Chapel Hill Libraries Chapel Hill Public Library Carrboro Branch Library Carrboro Cybrary Durham Public Library INTRODUCTION TO EMAIL: & BASICS Getting Started Page 02 Prerequisites

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING

More information

Data Security. So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc.

Data Security. So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc. Data Security So many businesses leave their data exposed, That doesn t mean you have to. 2014 Computerbilities, Inc. Table of Contents: 1. Introduction 3 2. Cybersecurity: The loopholes in the system

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

Content Management System User Guide

Content Management System User Guide Content Management System User Guide support@ 07 3102 3155 Logging in: Navigate to your website. Find Login or Admin on your site and enter your details. If there is no Login or Admin area visible select

More information

Purchase College Barracuda Anti-Spam Firewall User s Guide

Purchase College Barracuda Anti-Spam Firewall User s Guide Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4

General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4 Frequently Asked Questions to be posted at: /faqs/ Table of Contents General Product Questions... 3 Q. What is the Bell Personal Vault Vault?...4 Q. What is Bell Personal Vault Backup Manager?...4 Q. What

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Welcome to the Protecting Your Identity. Training Module

Welcome to the Protecting Your Identity. Training Module Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Lesson 7 - Website Administration

Lesson 7 - Website Administration Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their

More information

$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES

$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES e-commerce Website Hosting Service HOSTING:: WHAT YOU GET Where you host your website is an extremely important decision to make, if you choose simply on price, you may be making a huge mistake. We encourage

More information

Chapter 28: Expanding Web Studio

Chapter 28: Expanding Web Studio CHAPTER 25 - SAVING WEB SITES TO THE INTERNET Having successfully completed your Web site you are now ready to save (or post, or upload, or ftp) your Web site to the Internet. Web Studio has three ways

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Activation of your SeKA account

Activation of your SeKA account Activation of your SeKA account You need to do this, if you haven't set your password yet in the SeKA system. If you have already activated your SeKA account, but can't remember your password, use Forgotten

More information

imhosted Web Hosting Knowledge Base

imhosted Web Hosting Knowledge Base imhosted Web Hosting Knowledge Base Getting Started Category Contents Getting Started 1 My site loads slowly, what's wrong? 1 My pages aren't being updated when I upload... 2 Creating secure passwords...

More information

A briefing paper on the osconcert online ticketing system security issues, vulnerabilities and privacy concerns. OSCONCERT SECURITY AND PRIVACY.

A briefing paper on the osconcert online ticketing system security issues, vulnerabilities and privacy concerns. OSCONCERT SECURITY AND PRIVACY. osconcert Security and Privacy. A briefing paper on the osconcert online ticketing system security issues, vulnerabilities and privacy concerns. Contents. OSCONCERT SECURITY AND PRIVACY. 1 CONTENTS. 1

More information

imhosted Web Hosting Knowledge Base

imhosted Web Hosting Knowledge Base imhosted Web Hosting Knowledge Base CGI, Perl, Sendmail Category Contents CGI, Perl, Sendmail 1 What directory do I upload my CGI scripts to? 1 What is CGI? 1 What is Perl? 1 Do you allow CGI to run on

More information

Introduction to Open Atrium s workflow

Introduction to Open Atrium s workflow Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling

More information

MMLIST Listserv User's Guide for ICORS.ORG

MMLIST Listserv User's Guide for ICORS.ORG MMLIST Listserv User's Guide for ICORS.ORG 12/12/06 Version 1.1 To Send Mail to the Listserv: [email protected] Only Subscribed Users can send mail to the Listserv. Anyone can have a Subscription.

More information

Email Marketing Methods

Email Marketing Methods Email Marketing Methods Brought to You By PLR-MRR-Products.com Buy PLR, MRR or Resale Products through Membership or Direct Purchase Shopping Cart. You are also welcome to visit and download from our free

More information

ESA FAQ. E-mail Self Administration Frequently Asked Questions

ESA FAQ. E-mail Self Administration Frequently Asked Questions E-mail Self Administration Frequently Asked Questions Contents ESA FAQ...2 How do I... Log in?...2 How do I... Add a new e-mail address?...2 How do I... Add a new mailbox?...3 How do I... Add a new alias?...4

More information

Content Management System

Content Management System Content Management System XT-CMS INSTALL GUIDE Requirements The cms runs on PHP so the host/server it is intended to be run on should ideally be linux based with PHP 4.3 or above. A fresh install requires

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

User Guide Anti-Spam Filter

User Guide Anti-Spam Filter TABLE OF CONTENTS About the filter...2 Accessing your filter...2 SPAM...3 Held Messages...3 Release...3 Delete...3 Allow...3 Educate your filter with IsSpam NotSpam...3 Settings...4 Filtering...5 Friends...6

More information

You can attach email accounts to this domain name (eg. [email protected] or [email protected]) which also increases your corporate branding.

You can attach email accounts to this domain name (eg. sales@acme.com.au or mary@acme.com.au) which also increases your corporate branding. EMAIL SET UP 1 Your website is placed on the Internet using a domain name (eg. www.acme.com.au). This is your virtual address and it allows people to find your website amongst the millions of websites

More information

Single Sign-On (SSO) for Applications

Single Sign-On (SSO) for Applications Single Sign-On (SSO) for Applications User Guide October 2008 1 Contents Introduction... 3 Overview... 3 Extra Information... 3 1. Registering for an SSO Account... 4 SSO Registration... 4 2. Configuring

More information

Information Security. Louis Morgan, CISSP Information Security Officer

Information Security. Louis Morgan, CISSP Information Security Officer Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

Migrate Joomla 1.5 to 2.5 with SP Upgrade

Migrate Joomla 1.5 to 2.5 with SP Upgrade Migrate Joomla 1.5 to 2.5 with SP Upgrade The Migration Process We're going to use the following steps to move this site to Joomla 2.5: Install Joomla 2.5 in a subdirectory Make the migration from 1.5

More information

Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files

Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Access 2003 Macro Security Levels, Sandbox Mode, and Digitally Signed Files Tim Gordon [email protected] Programming Plus (816) 333-7357 About dangerous code Dangerous code can consist of powerful

More information

EFFECTIVE SPAM FILTERING WITH MDAEMON

EFFECTIVE SPAM FILTERING WITH MDAEMON EFFECTIVE SPAM FILTERING WITH MDAEMON Introduction The following guide provides a recommended method for increasing the overall effectiveness of MDaemon s spam filter to reduce the level of spam received

More information

Email Marketing Features

Email Marketing Features Email Marketing Features JPC s Email Marketer includes everything you need to create, send and track professional HTML emails. It is fullyfeatured email marketing software which has been developed by marketing

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Troubleshooting / FAQ

Troubleshooting / FAQ Troubleshooting / FAQ Routers / Firewalls I can't connect to my server from outside of my internal network. The server's IP is 10.0.1.23, but I can't use that IP from a friend's computer. How do I get

More information

Outlook Today. Microsoft Outlook a different way to look at E-MailE. By Microsoft.com

Outlook Today. Microsoft Outlook a different way to look at E-MailE. By Microsoft.com Outlook Today Microsoft Outlook a different way to look at E-MailE By Microsoft.com What to do, What to do How many times have you received a message from your system administrator telling you that you're

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

OET Cloud Services Getting Started Guide

OET Cloud Services Getting Started Guide OET Cloud Services Getting Started Guide Introduction OET Cloud Services uses Google Drive to let you store and access OET files anywhere -- on the web, and access them on your PC, or on any device connected

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause

More information