Wednesday, June 23, 2010

How to Find Out Someone's Email Address

How to find out someone's email address is a common question. Whether you have lost the email information or are trying to find an old family member or friend. Unfortunately most people don't use their real names in their email addresses, so you have to do some digging.

The first method is old emails, yes it sounds obvious but some people skip the fact that you could have someone's email in the archives. Check you're sent messages and old inbox messages and they might be in there.

Another method is social bookmarking sites; many people are on social bookmarking sites like Facebook, MySpace and Twitter. When you are searching these sites they can come back with thousands of results for names. The more common the name the harder it will be to track them down. Many older people are getting more and more into social bookmarking sites, but it's still not the majority of them. So it will be harder to find someone older on a social bookmarking site.

Search engines like Google, Bing, Yahoo, Alta Vista and more are great ways to find out someone's email address. This is a good option for finding emails, but a good tip is to be as specific as you can be. The more details you can put in about the person you are trying to find the better. If you know the full name, last known city they lived in or even schools they went to, that's a good place to start.

Email service is probably the easiest most accurate way to find someone. These services have multiple sources or references they pull from. They usually pull from all the social bookmarking sites, different directories and many more services. Looking up someone's email through this software is pretty advanced, some of them will even show you the person's parents or where they live.

So there are a ton of resources to pull from, you can go the free way which might take a lot more time, but still free.

Or there are the paid email services to find someone that are still pretty cheap and they give you good accurate results.

Whatever method you prefer there are a lot more ways to be your own private investigator and find out someone's email address.

Virus attacks your computer?

Does your computer lag or does it seem to have any unusual behavior, if it does chances are your computer is infected with a virus. To help you with solutions to computer viruses I have answered some questions people ask me about getting rid of viruses.
1.) Whats is a computer virus?
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files, this is why most viruses come from downloading movies, music, illegal programs and most of all from pornographic material.
2.)What are other names for a virus?
You may have heard of malware, spy ware, Trojans, trackers, hijackers, ad ware, etc... these are just subsections of viruses.
3.)Symptoms of a virus?
After you open and run an infected program or attachment on your computer, you might not realize that you have introduced a virus until you notice something is not quite right.
Here are a few primary indicators that your computer might be infected:
Your computer runs more slowly than normal,
Your computer stops responding or locks up often,
Your computer crashes and restarts every few minutes,
Your computer restarts on its own and then fails to run normally,
Applications on your computer do not work correctly,
Disks or disk drives are inaccessible,
You can not print correctly,
You see unusual error messages,
You see distorted menus and dialog boxes
You are BOMBARDED with pop ups,
4.)What are some solutions to computer viruses?
The perfect solutions to computer viruses are purchasing a quality virus program, and staying off unwanted sites. Then your computer and your privacy is secured.
5.) What is the best virus protection for me?
Even if you do not have a virus, or already have one, purchasing a quality virus program is the best solution to computer viruses. I have mentioned the best solutions/products for your computer virus problems below.
6.)How easy is it to use the software?
You can have the software downloaded and running within ten minutes. It's that easy! You can even set it to run regularly - you do not even have to know it's there. It will just run regularly to clear out new viruses that might have somehow crept in.
7.) Why should I pick any of these virus protection programs?
Well that is a good question. What is special about these programs is that they attack viruses before the virus attacks your computer. Compared to Norton Anti virus, which lets the virus attacks the computer and then kill the virus and go after its sources. The negative about this is, if u let the virus install it self, its almost impossible to kill its roots. Also the programs I have listed below have real time protection. Real time protection is denying the virus from entering your computer, therefore you can surf any website you want.
8.) Okay, but still, why should I pick these programs? (convince me more)
Alright, well Big brand name programs such as Norton or Mcafee, come out with new editions each year, which means that you need to buy the latest version in order to keep up with the virus world. In comparison the programs i mention, you do not need to but the new version every year, the programs virus definitions are auto updated. Also these programs are a lot more affordable than brand name programs. THE PROGRAMS GET THE JOB DONE!!
My computer had been attacked in the past, it deleted all my work from my computer, i could have lost my job!, So i took the extra step and purchased all of theses programs. If you are confused or not sure with program suits you best, all these programs offer free trials. Hope you found questionnaire about solutions to computer viruses helpful, you can learn more at:

Wednesday, June 16, 2010

What Can Hackers Do?

A few years back I'm sure we all remember hearing or reading about what websites were defaced that given week. This in itself can be embarrassing for the website owner and was very prevalent. It's not that this sort of thing does not happen anymore but it is eclipsed but the more serious things that take place. Banks being defrauded by unscrupulous employees, Online Stores having their patrons credit card information ripped off, and a host of other more serious actions.

The reality is that as network systems become more complex and widespread, the opportunities for those who wish to compromise or HACK computers become much greater. Take a look at this Threat and Trend graphic. It will layout just a few entry points and opportunities for hackers!

As a home or small business computer user there are many ways you could be at risk. Many people store their financial information on their computers using a simple spreadsheet or document, or maybe something like Quicken / QuickBooks accounting. Many people store all their logins and passwords in plain text documents on their computers. How many people store information regarding their medical conditions on their computers. Computers are there to make our lives more simple and provide us with a means to store all of our most important information. What if this information were in the hands of someone else? What could happen;

* Is it possible for someone to assume my identity if they access the above information;
* Can someone find out what all of my logins and passwords are;
* As a business owner do I need to be concerned about corporate fraud;
* Is it possible for a hacker to steal my companies intellectual property;
* Can an unauthorized person access my company's sales information including clients and prospects;
* And, as a home user, or small business owner, could I be held liable for something someone else does with my computer?

The answer to all the above is, yes! If your computers are not properly configured, kept up-to-date with patches, or secured against the most common types of attacks you are at risk!

Take a look at the following Threat Spectrum to get an idea of the potential risks!
There are new vulnerabilities for computers found almost everyday. If you are not diligent in keeping your computers up to date and secured you can expect (it's just a matter of time), that in one way or another your system will be compromised.

Over the years, we have seen just about everything under the sun when performing small, medium, or large computer security assessments;

* Home computers being used to relay information and stolen software;
* Business computers being used to store stolen software as well as distributing it;
* Employees using their work computers to run businesses such as pornography sites;
* Ex-employees still accessing their work computers because of the lack of security;
* People trying to extort or intimidate others using information they gathered from unsecured computers;
* The potential for civil and criminal legal action against users for participating in malicious tasks;

and that's just to name a few of the things we have seen!

Don't underestimate what can happen to you. Human beings are very risk adverse however we are also very bad at determining the real risks. Many people are afraid to fly in planes but have no qualms about climbing up a 10 foot later to change old ceiling fan without cutting the electricity first. You have more of a chance climbing that ladder, getting shocked, falling and breaking your neck than going down on a plane. This seems to apply to many methods of analyzing risks.

Think about this. In testing where we placed out-of-the-box computers on the Internet it takes approximately 15 to 30 minutes before it's hacked or compromised in some way or another.

Are My Computers Safe From Hackers?

The meaning of the term "HACKER" has really changed over the years. Early on anyone who was considered a "HACKER" was someone who new the intricate workings of computers and various technology. Someone who was considered to be a guru at what they did whether it be a programmer who wrote software or someone who knew everything there was to know about a particular Operating System. These day's the moment someone hears the word "HACKER" it conjures up many thoughts and images. Some people imagine a teenager sitting home writing programs to break into business computers or their school. Others may imagine someone who attempts to access online computer systems such as Banks or Stores to commit fraud and make off with millions of dollars. The fact is, all the above are pretty much true images of a HACKER. It just depends on who it applies to!

Is A Hacker Is Using Your Computer

A good friend of mine called me one day and told me his computer was running particularly slow and the odd thing was it was worse in the evening. I took a look at his computer and found that someone had got into it and was storing large (I mean Large) amounts of Pornography, Stolen Software, Music and Videos, on it. Most "Hackers" are not looking to do something to your computer that you will immediately be aware of. They are looking for what is called "staging areas" where they can store things for distribution or later use. Can you imagine how my friend felt once I showed him what was on his computer! This happens all the time. There are organizations out there who are paid by the Entertainment Industry, the Government, and other institutions who are looking for this type of issue. If they locate these things on your computer, trying to prove that you had nothing to do with it could be a pretty difficult thing to do.