Skip to content

Cyber Security Preparedness is a responsibility of everyone that uses the Internet.


Why are home computers popular targets for intruders? Because they are easy to break into and intruders want to access information that is stored on hard drives, such as credit card numbers and other financial account information. It’s not solely money-related information they’re after. Intruders also want your computer resources, meaning hard disk space, fast processors, and Internet connections. Why are intruders paying attention to home computers? because home computers are typically not very secure.

Get the very basic help here in PDF form Click here if, you have Acrobat reader, ok but I suggest you get this program and leave the other behind….Get The *NEW* foxit reader 2.2 HERE CLICK ON THE WORD “DOWNLOAD” IN THAT PAGE NOT FREE. Yet yours will be still free 🙂

February 16, 2007 – “Drive−by” Web attack could hit home routers.
If you haven’t changed the default password on your home router, do so now. That’s what researchers at Symantec and Indiana University are saying, after publishing the results of tests that show how attackers could take over your home router using malicious JavaScript code.


Cyber Security Awareness

Securing your personal computer plays a crucial role in protecting our nation’s Internet infrastructure.

You’ll find simple steps, practices and resources to learn the basics on how to better secure your home computer from cyber threats.

This website gives you the information needed to secure your computer.

What is Cyber Security Awareness?

The Oxford English Dictionary defines awareness as “The quality or state of being aware; consciousness.” Aware is defined as “Informed; cognizant; conscious; sensible.”

The purpose of cyber security awareness presentations is simply to focus attention on cyber security. Awareness presentations are intended to allow individuals to recognize information technology security concerns and respond accordingly.

Cyber Security: Make it a Habit

Cyber Security Preparedness is a responsibility of everyone that uses the Internet. To remind us of this important issue, October has been designated as National Cyber Security Awareness Month.

The National Cyber Security Division of Homeland Security is responsible for helping the protection of the cyber infrastructure.

It is your turn, no ISP or Internet provider can solely keep it all up to date. It really relies on you. Are your ready?

Good 🙂 🙂 🙂

A recent post by the team at the Chinese Internet Security Response Team to their English-language site indicates that some of the site visitors are experiencing an attack from the site as a result of an injected IFRAME tag.

Injected IFRAME tags are not a new means of using legitimate sites to launch attacks on unsuspecting users, with a recent notable case being the Bank of India hack. What is different in this case is that the hack is only being served to seemingly random site visitors.

Exactly what my Provider let through their Mail Severs and my AV caught it and it was from a friend on the otherside of the world who I thought was doing her best to keep her computer upto date, well I found out a few more new developments that should have been tweaked. 😩 OH well guess it is for the better 🙂



  • Please Read: STOP ? THINK ? CLICK7 Practices for Safer Computing, here:



    These signs are created and served by’s webserver in real-time for each person that views them. Your IP address and other information are only visible to YOU, not to others, but because people see their own IP address and computer information displayed on a blog or in a public forum, they think that their information can be seen by everyone!

    Read the privacy policy for more details.

    THE NEXT PAGE…………………….. *OR Below*

    Blockierung selbst definierter Websites mit “HOSTS”

    Schau mal die Siete wo steht;

    Personal Security for your computer, Da steht es wie Hosts file sind auf Spybot, und auch MVP Hosts ist da oben von Spybot.

    No comments yet

    Leave a Reply

    Fill in your details below or click an icon to log in: Logo

    You are commenting using your account. Log Out /  Change )

    Google+ photo

    You are commenting using your Google+ account. Log Out /  Change )

    Twitter picture

    You are commenting using your Twitter account. Log Out /  Change )

    Facebook photo

    You are commenting using your Facebook account. Log Out /  Change )


    Connecting to %s

    %d bloggers like this: