Note: The Rootsweb Mailing Lists will be shut down on April 6, 2023. (More info)
RootsWeb.com Mailing Lists
Total: 2/2
    1. Re: [ARGREENE] (no subject)
    2. razorback via
    3. Hi! http://q7associates.com/_Christmas.is.coming#okjmif61641

    12/26/2014 06:08:42
    1. Re: [ARGREENE] (no subject)
    2. Dale Foresythe via
    3. Hello... This is to advise that "[email protected]" computer is sending out emails with a virus infected website included in the body of the email. The sender is not even aware that an email is being sent from their computer. It is know as the "Botnet" virus (see more information down below). Never open websites that appear as below with code letters at the beginning an end, and no real message included with the email. You can't just go by their email address being safe... just because it is someone you know. Please read about "Botnet" down below. ~ Dale Foresythe -----Original Message----- From: razorback via Sent: Friday, December 26, 2014 7:08 AM To: [email protected] ; [email protected] ; [email protected] ; [email protected] ; [email protected] Subject: Re: [ARGREENE] (no subject) Hi! http://q7associates.com/_Christmas.is.coming#okjmif61641 ------------------------------- To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message ***************************************************************** Botnet Virus turning your PC into a Zombie? Your Computer is infected with a Botnet virus, becoming what is known as a Zombie PC and it is sending out Emails without you knowing it. There has been little warning about a Botnet virus that turns your PC into what is called a "Zombie." Not the kind of zombie on late night TV movies, but a type of computer virus that infects your PC and causes it to send out spam emails, by the millions, for a spammer. The spammer controls and uses your pc or IPhone, without you knowing it. How do Botnet virus' work? Spammers may be using your computer to send unsolicited — and possibly offensive — email offers for products and services. Spammers are using home computers to send bulk emails by the millions. Indeed, computer security experts estimate that as much as 30 percent of all spam is relayed by infected computers actually located in home offices and living rooms, but controlled from spammers from afar. According to the Federal Trade Commission (FTC), the nation’s consumer protection agency, spammers can get into your computer in several ways, depending on what kind of Internet connection you have. All computers connected to the Internet are potential targets, but those with broadband (DSL, cable modem) connections are especially attractive to spammers because they are “always on.” Spammers scan the Internet, searching for points of entry and then install hidden software that allows remote access to your data and programs. That, in turn, allows the spammer to send relay their spam and send the spam messages out from your computer. How does your computer become infected with a Botnet Virus? Remote access software also can be installed by a virus: A spammer sends email with a virus in the attachment. If you open the infected attachment, a virus is released that installs the hidden software. The person who sent the virus now can access the data and programs on your computer, or take over many computers and use them to send spam. How would you now if your PC is a Zombie? It can be very difficult to tell if a spammer has installed hidden software on your computer, but there are some warning signs. For example, you may receive emails accusing you of sending spam; you may find email messages in your “outbox” that you didn’t send; or your computer is using more power than it has in the past to run the programs you use (typically, the computer becomes slower to respond). If your computer has been taken over by a spammer, you could face serious problems. Your Internet Service Provider (ISP) would see the huge number of emails coming out from your account and may prevent you from sending any email at all until the virus is treated, and treatment could be a complicated, time-consuming process. How do I prevent my computer becoming a zombie? Anti-virus software: Use anti-virus software and keep it up to date. You can download anti-virus software from the Web sites of software companies or buy it in retail stores. that can effectively reverse the damage; and that updates automatically. CFR recommends McAfee, Norton (Symantec), Zone Alarm and Kapersky. And a freeoption, AGV is pretty good. * Don't open unknown emails: Be cautious about opening any attachment or downloading any files from emails you receive. Don’t open an email attachment — even if it looks like it’s from a friend or coworker — unless you are expecting it or know what it contains. If you send an email with an attached file, include a text message explaining what it is. * Use a firewall: To protect your computer from hacking attacks while it is connected to the Internet. A firewall is software or hardware designed to block hackers from accessing your computer. A properly configured firewall makes it tougher for hackers to locate your computer and get into your programs and files. A firewall is different from anti-virus protection: Anti-virus software scans incoming communications and files for trouble- some files; a firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It’s especially important to run a firewall if you have a broadband connection. *Software firewalls: MS Windows (XP and Vista) has a software firewall built-in, but you must turn it on. Because it may be shipped in the “off” mode, check your online “Help” feature for specifics on turning it on and setting it up properly. If your operating system doesn’t include a firewall, you can install separate firewall software that runs in the background while you use your computer and surf the Internet. Several free firewall software programs are available on the Internet. (You can find one by typing “free firewall” into your favorite search engine.) *Hardware firewalls: They are considered to be stronger. Most routers (like Dlink, Linksys, Netgear) have hardware firewalls built-in. A hardware firewall is an external device that includes firewall software? Like anti-virus software, a firewall needs to be updated regularly to stay effective. *Check your “sent items” file or “outgoing” mailbox: You need to see if there Are messages that you did not intend to send. Many spammers have learned to delete or hide their unauthorized access, so even if there are no illegitimate messages in your outbox, you can’t be sure that your computer hasn't been used to send spam. What do I do if my PC becomes a zombie? If your computer is infected, take action immediately. If your computer has been hacked or infected by a virus, you should: *Disconnect from the Internet right away. (Unplug the cable connecting you to the DSL router, cable modem - the box typically made by Dlink, LinkSys, Netgear or Airlink). Usually, the cable is blue or yellow. *Next scan your entire computer with fully updated anti-virus software. The anti-virus program called "Malwarebytes" is one of the most reliable programs that can scan your system and detect if you have any current viruses, as well as older ones. *Report any unauthorized accesses that the anti-virus software finds to your ISP. Also, if you suspect that any of your passwords have been compromised, call that site’s company immediately and change your password. Phishing and Social Engineering: While you may be taking steps to protect your computer from becoming infected by a virus, you may very well run into another, more insidious type of attack. Phishing and other social engineering attacks have been on the rise. Social engineering is a fancy term for someone trying to get you to give up your personal information -- online or in person -- so Phishers can use it to steal from you. Anti-spam traps may catch e-mail messages coming from Phishers, but the U.S. Computer Emergency Readiness Team says the best way for you to beat them at their own game is to be wary. And never give out your personal or financial information online. ~ Dale Foresythe

    12/26/2014 03:01:18