Welcome to our security page.
mission is to keep you safe while your online by giving
you a basic understanding of the threats you face and
the importance of using common sense before you click a
link or open an attachment in email.
can a wonderfully rewarding place - full of information,
entertainment, and fun; it can also be a nightmare if a
criminal element takes control of your computer, someone
steals your identity, or your computer becomes bogged
down with free software that turned out to be spyware or
biggest dangers you face on the Web are:
give you a brief plain English description of each
and our recommendations. We hope you find this page
informative and useful.
Viruses: What is a computer virus?
Virus (n.) Code
written with the express intention of replicating
itself. A virus attempts to spread from computer to
computer by attaching itself to a host program. It may
damage hardware, software, or information.
Protect Yourself: Never
allow your computer to be connected to the Internet
without a good anti-virus installed. Always keep your
anti-virus program updated with the latest virus
definitions. We recommend checking for updates every
day. Set your antivirus for automatic updates. If your
antivirus program doesn't have automatic updates - get
one that does. Whatever solution you choose, you should
NEVER be connected to the Internet without an updated
anti-virus program installed.
Microsoft Security Essentials -
Free for home use- Top-rated by many independent test
laboratories, Microsoft Security Essentials provides excellent
protection from viruses, Trojans, worms, botnets, and other
malicious infections. MSE is our #1 choice for free antivirus
AVAST Anti-Virus -Free
for home use-Another good choice for a free personal anti-virus
solution (free version available for home use).
and Botnets: What are computer worms and botnets?
Worm (n.) A
subclass of virus. A worm generally spreads without user action and
distributes complete copies (possibly modified) of itself across
networks. A worm can consume memory or network bandwidth, thus
causing a computer to stop responding. Because worms don't need to
travel via a "host" program or file, they can also tunnel into your
system and allow somebody else to take control of your computer
Botnet (n.) A botnet is a collection of infected
computers or bots that have been taken over by hackers (also known
as bot herders) and are used to perform malicious tasks or
functions. A computer becomes a bot when it downloads a file (e.g.,
an email attachment) that has bot software embedded in it. A botnet
is considered a botnet if it is taking action on the client itself
via IRC channels without the hackers having to log in to the
client's computer. A botnet consists of many threats contained in
one. The typical botnet consists of a bot server (usually an IRC
server) and one or more botclients. (courtesy of Wikipedia)
Because worms and botnets are generally spread through email
it is very important you NEVER open an attachment directly from your
email program. Rather, if you must open it, save it to a folder on
your hard drive and scan with a good anti-virus program BEFORE you
open it. Just following this one simple rule would stop the spread
of worms drastically. If you click on an infected attachment, worms
will tunnel into your system and spread themselves by sending email to all the
email addresses it can find you our hard drive, without you
All good update
anti-virus programs will detect worms. But, still, the best offense
is a good defense. Don't take a chance on getting infected in the
first place. Don't expose yourself to worms. DO
NOT OPEN ATTACHMENTS DIRECTLY FROM EMAIL unless
you were expecting it and you know for certain what is in the
attachment. Never judge an email with an attachment by who sent it.
Many viruses spoof the "From" address so it may appear a friend or
family member sent it. NEVER TRUST THE FROM ADDRESS of an email with
an attachment. Unpatched versions of Windows are especially
vulnerable to worms so it is imperative you keep your Windows
up-to-date by visiting Microsoft's Windows Update Web site
frequently or turn on Windows Automatic Update found in your Control
Use good antivirus
protection and antispyware protection and keep each updated with the
very latest virus and spyware definitions. And never open
attachments that come in email unless you're positive of the source
and you know what the file is.
Trojan Horse: What is a Trojan Horse?
Trojan Horse (n.) A
computer program that appears to be useful but that actually does
damage. Trojan Horses spread when people are lured into opening a
program because they think it comes from a legitimate source. Trojan
Horses can also be included in software that you download for free.
Never download software from a source that you don't trust. Always
keep your computer updated with the latest Microsoft updates and patches.
Just like the
historical events at Troy where Greek soldiers appeared to come
bearing gifts, computer Trojan Horse may appear to be a gift too.
But these Trojan Horses have a big surprise inside and it's not a
surprise you're going to like. Trojan Horses can allow others to
take control of your computer, steal personal information including
credit card information and passwords, and even cause your computer
to stop working.
Trojan Horses present a
different problem than computer viruses or worms because some
anti-virus software may not recognize them. Make sure you use a good
anti-virus program and keep it updated. Also, install and use a good
Internet firewall and keep your Windows operating system updated
with the latest Windows critical updates from Microsoft's
Windows Update Web site.
for Windows XP, Windows
Vista, Windows 7, and Windows 8 users:
Leave your Windows firewall
turned on at all times. Don't waste your money on third-party
software firewalls despite what some experts may tell you. If you
keep your computer protected with excellent, always up-to-date
antivirus and antispyware programs and leave your Windows firewall
turned on, use common sense when visiting and downloading from
Websites you're unsure of, and never click links in email that
purports to come from financial institutions, online payment
services or credit card companies which ask you to change your
password or "verify" your account - you don't need any other
programs and you certainly don't need to waste your money on a
third-party firewall or an expensive security suite with a firewall
included. Save your money.
Cloudeight Home - Information
Avenue - InfoAve
All content is
copyright ©2011 by Cloudeight Internet, LLC. All logos,
trademarks, and product names and descriptions, belong to their
respective owners and do not represent that such companies have an
affiliation with or any connection to Cloudeight Internet LLC. This
page is presented only to help individuals protect their computers
as well as to assist Internet users with adopting good Internet
safety habits; to provide them with basic security knowledge and
general information. Cloudeight is not responsible for any errors or
omissions on this page. Cloudeight will not be responsible for the
efficacy or suitability of any application recommended on this site
for any particular purpose. All software downloaded from the links
on our Web pages are downloaded at your own risk. By downloading
from links on on this Web site, you are agreeing that you have read
this disclaimer notice and understand that Cloudeight cannot be
responsible for any software program that we recommend and that
sites not under our direct control my change content at any time