Another eBookWholesaler Publication
Your Ezy-Internet Safety Guide
by John Williams
Proudly brought to you by
John Reese
Email
Recommended Resources
• Web Site Hosting Service
• Internet Marketing
• Affiliate Program
“Your Ezy-Internet Safety Guide” by John Williams
Page 2 of 58
Please Read This First
Terms of Use
This Electronic book is Copyright © 2007 John Williams. All rights reserved.
No part of this book may be reproduced, stored in a retrieval system, or
transmitted by any means, electronic, mechanical, photocopying, recording,
or otherwise, without written permission from the copyright holder(s).
You must not distribute any part of this ebook in any way at all. Members of
eBookwholesaler are the sole distributors and must abide by all the terms at
http://www.ebookwholesaler.net/terms.php
Disclaimer
The advice contained in this material might not be suitable for everyone. The
author obtained the information from sources believed to be reliable and
from his own personal experience, but he neither implies nor intends any
guarantee of accuracy.
The author, publisher and distributors never give legal, accounting, medical
or any other type of professional advice. The reader must always seek those
services from competent professionals that can review their own particular
circumstances.
The author, publisher and distributors particularly disclaim any liability, loss, or risk taken by individuals who directly or indirectly act on the information
contained herein. All readers must accept full responsibility for their use of
this material.
All the web addresses listed in this book were checked for accuracy shortly
before publication. But, their ownership and content may change at any time
without our knowledge.
We cannot accept any responsibility for anyone visiting any of the listed sites.
Copyright © 2007 John Williams
- 2 -
http://www.ezy-internet.com/
“Your Ezy-Internet Safety Guide” by John Williams
Page 3 of 58
Contents
Please Read This First........................................................................................2
Terms of Use ...........................................................................................................................2
Disclaimer................................................................................................................................2
Contents ..............................................................................................................3
About the Author ................................................................................................6
The Truth about Web Safety ..............................................................................7
The Biggest Problem ..........................................................................................8
Make Your Computer Safer!.............................................................................10
Keep Your Programs Up to Date............................................................................................ 11
It’s Best to Back-up ............................................................................................................. 12
Check EVERY File.................................................................................................................... 12
Passwords................................................................................................................................ 13
Tips for Better Passwords .................................................................................................. 14
No More Passwords Lists on Paper .................................................................................. 15
Safer Surfing .....................................................................................................17
Don’t Expose Your Friend’s Addresses to Other Friends................................................... 17
Identity Theft .....................................................................................................19
Quick Tips to Reduce the Risks............................................................................................. 19
Click Here for Your Private Information ............................................................................ 21
All Websites have Rules ......................................................................................................... 22
Your Information will not be Distributed. .......................................................................... 22
Using Other People’s Material on Your Web Site...........................................23
Security Software..............................................................................................24
Find Something Good and Stick to it! ............................................................................... 24
Updates and Scans.............................................................................................................. 25
Pep Up Your Computer ....................................................................................................... 25
Suppliers of Security Programs......................................................................................... 26
Web Browser Add-Ons........................................................................................................ 26
Anti-virus Programs ................................................................................................................ 27
Copyright © 2007 John Williams
- 3 -
http://www.ezy-internet.com/
“Your Ezy-Internet Safety Guide” by John Williams
Page 4 of 58
Firewall ..................................................................................................................................... 28
Anti-spyware Programs .......................................................................................................... 29
Anti-malware Programs .......................................................................................................... 29
Anti-spam programs................................................................................................................ 30
More Ways to Reduce Spam. ............................................................................................. 30
Your Email Program ................................................................................................................ 31
Email Programs ....................................................................................................................... 32
PocoMail ............................................................................................................................... 32
Pegasus Mail ........................................................................................................................ 32
Protecting the Family .......................................................................................33
Protecting Your Original Work on the Internet ..................................................................... 34
“Free” can be EXPENSIVE! ..............................................................................35
Seeking Just Friends and Fun .........................................................................37
“Save Money and Live Longer” .......................................................................39
The Enemy – Software......................................................................................40
Viruses ...................................................................................................................................... 40
Worms....................................................................................................................................... 40
Spyware .................................................................................................................................... 40
Trojans ...................................................................................................................................... 41
Email Hazards .......................................................................................................................... 41
Attachments ......................................................................................................................... 41
Links...................................................................................................................................... 41
Web Site Dangers .............................................................................................44
Please Verify Your Account Details....................................................................................... 45
Check Your Spelling................................................................................................................ 46
Check Their Spelling too! ....................................................................................................... 46
Phishing Sites .......................................................................................................................... 47
Under New Ownership ............................................................................................................ 48
Scams Exposed ................................................................................................49
Work at Home Offers ............................................................................................................... 49
Forward Packages – High Pay – Even Higher Risk! ........................................................ 49
Easy Money Straight into Your Account. .......................................................................... 50
Copyright © 2007 John Williams
- 4 -
http://www.ezy-internet.com/
“Your Ezy-Internet Safety Guide” by John Williams
Page 5 of 58
Training for a Guaranteed Job ........................................................................................... 50
Other Old Scams in New Clothes........................................................................................... 51
The Nigerian Scam: ............................................................................................................. 51
Lotteries or Inheritance Scams .......................................................................................... 51
Bargain Travel Scam ........................................................................................................... 52
Email Scams............................................................................................................................. 52
You can Help, but ….!.......................................................................................54
Resources .........................................................................................................55
Helpful Websites...................................................................................................................... 55
Castle Cops .......................................................................................................................... 55
Phishtank.............................................................................................................................. 56
Bank Safe Online (U.K.) ...................................................................................................... 56
Keep Safe – Keep Informed..............................................................................57
Copyright © 2007 John Williams
- 5 -
http://www.ezy-internet.com/
“Your Ezy-Internet Safety Guide” by John Williams
Page 6 of 58
About the Author
I have been using the Internet and writing about its benefits and perils for
about four years.
I try to explain how to use computers and the Internet as clearly and simply
as possible without special terms or too much detail..
I have concentrated on giving you, as far as possible the latest available
information about the threats which we must be aware of on the Internet.
I hope this book will help to guide you through the hype and sensationalism
which is written about this very important subject.
I will put new and updated information on the web site that I set up to help
readers of this book, http://www.ezy-internet.com/
I would also be grateful for your feedback and will try to help you if you
submit any questions related to Net safety through that website.
Copyright © 2007 John Williams
- 6 -
http://www.ezy-internet.com/
“Your Ezy-Internet Safety Guide” by John Williams
Page 7 of 58
The Truth about Web Safety
The Internet is not much different from any other part of our world.
We all face risks every day from the moment we get out of bed in the
morning.
We have to take what we consider reasonable precautions to protect
ourselves, our family and our work or business from possible dangers that
exist in every neighborhood.
But, most of us focus on the many positive aspects of our lives – alert but
not worrying about what we can’t foresee.
That’s also the best attitude to have about using the Internet. There’s too
much to gain from wise use of it for us to let our inexperience, or the often
sensational media coverage of Internet scams and other problems, keep us
away.
I’ve written this book to help you reduce the risks and improve your whole
Internet experience with minimum cost and no stress.
The book covers many areas and I give you the best information that I have.
But, new problems are unleashed almost every day. And, of course, the
products and services to combat these problems are improving too.
With this guide next to your computer, you’ll be better protected and able to
understand the actual degree of risk when new threats appear, and judge
which security products might be worth your time and money.
When you need more information, use the links to organizations in the book
or visit the web site, http://www.ezy-internet.com/ that I’ve set up to provide updates and new information for readers of this book.
Copyright © 2007 John Williams
- 7 -
http://www.ezy-internet.com/
“Your Ezy-Internet Safety Guide” by John Williams
Page 8 of 58
The Biggest Problem
All humans have a desire to improve their circumstances – that’s the drive
which has brought most of the benefits which many of us enjoy or hope to in
the future.
Many people are very interested in finding ways to do that with minimum
cost and effort.
That’s what makes people, including many otherwise upright citizens,
become victims of scams on and off the Internet.
The fact is that you can “cheat an honest man or woman”. Quite a few people
are only honest in proportion to the risk they think there is of being caught.
Some might not report finding fifty dollars in the street if they think no-one
saw them pick it up. Even more might find the offer of hundreds of
thousands of (apparently) untraceable dollars from some ex-Government
official in a foreign country, as a commission for a “simple” transfer of funds,
irresistible.
These people probably think that there is less chance of their involvement in
something shady on the Internet being traced, or that they are “small fish”
that will not attract the attention of law enforcement organizations.
Those can be very costly assumptions.
Of course, there are also many people who only grab these “offers” because
of the almost unbearable pressure they are under financially, often through
no fault of their own.
They feel so desperate that they risk everything when a minute of clear
thought would suggest that “If it seems too good to be true, it usually is just
that!”
That’s just one common human trait that the scammers prey on.
Another is probably the most powerful gimmick, on or off the Internet –
something for nothing! Most of us are going to read what the offer is, aren’t
we?
Copyright © 2007 John Williams
- 8 -
http://www.ezy-internet.com/
“Your Ezy-Internet Safety Guide” by John Williams
Page 9 of 58
Well, just opening an email or visiting a web site can cost you plenty! You
need to follow the steps I’ll outline here.
And, I’ll show you some of the other things you need to consider in the
“Free” can be EXPENSIVE! Chapter.
Copyright © 2007 John Williams
- 9 -
http://www.ezy-internet.com/
“Your Ezy-Internet Safety Guide” by John Williams
Page 10 of 58
Make Your Computer Safer!
My first tip is to consider turning off your computer if it is not going to be
used for, say, a couple of hours. It probably should always be turned off if
you will not be using it for a day or more. That will save power as well as
reducing the possibility of an attack while you are not nearby.
Every Internet user should have security software and a firewall.
Connecting your computer to the Internet without up-to-date security
software, is like walking blindfolded down the middle of a busy motorway and
hoping you won’t be hurt.
Your computer and, especially, the personal information on it, is a target for
destructive software like trojans and viruses, as well as scammers and other
villains, from the first moment you connect to the Internet.
There are several ways that you can protect your computer and your
information from being accessed or damaged.
But, please understand that no program can protect you from 100% of the
risks 100% of the time.
There is always a period of time