ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How To Protect Your Computer

Updated on November 30, 2014

What Happened To My Computer?

As you work happily away on your computer completely unaware of it a malicious virus or damaging spyware, trojans or malware, may have invaded your system. The information and videos below will explain what that means and of the danger you place yourself in if you are unprotected.

Cyber crime is on the increase and cyber crooks are getting more sophisticated and knowledgeable so it takes a lot to beat them. Don't take chances.

FREE e-book on Norma's Reincarnation Experience

Hijacking Your Computer

It does not take much to get your information

Your information can be hijacked or you may be targeted by criminals operating globally who, it would seem, are unstoppable Your personal details might be gathered by a hacker who sells them on to others. The buyer can steal your identity, your money and, in some cases, even your home. It is so simple that even a monkey brain can do it.

It is happening globally every day of the week and most people are completely unaware of the massive problems faced if and when this happens. Simply by surfing the Internet or downloading a file or information from a website you could be letting in a thief. You don't know with whom you have shared your personal information until it is too late. You probably don't allow strangers to use your computer so why would you let criminals use it.

The crimes listed below are very real and happening to anyone online. So how do you protect yourself?

Its Not Highway Robbery - Its Cyber Crime

And its far more deadly

A recent police report on Australian television demonstrated the ease with which crooks take your wealth without even holding a gun to your head.

In a case study a youth of 19 in Perth, Western Australia, had over 25,000 credit card numbers in his possession that was obtained by hacking into computers. He offered them for sale at $2.00 each. The court handed him a $Au300 fine and a good behavior bond for 6 months. It shows that this type of crime is just not taken seriously although people can have their lives devastated by the activity.

A man in Queensland lost everything, even his house, to hackers. Using his passwords they closed down his ISP, disconnected his phone and accessed his bank account. The bank suggested inappropriate activity may have taken place but that his money was safe because he had $7,000 in the account. He almost fainted because he should have had over $80,000 in it.

With his phone also disconnected he was devastated. The next bit of bad news advised him that his house had been sold and he should vacate the premises within days.

There was nothing he could do! The house was sold, the crooks got the money and the fraud squad are still investigating it. Of course by the time he woke up to what had happened the money was already in an overseas country and the criminals were laughing all the way to their bank. All because he was unprotected. So where does the blame lie?

In the same television report the police demonstrated how information is easily obtainable from unprotected computers. Driving around they tapped into radio operated laptop computers and could see everything on them. That's how crooks work and why a 19 year old had 25,000 credit card numbers to sell.

They identified where some activity took place and some were arrested. One of them was the 19 year old in WA.

This consumer electronics wholesaler serves global customers worldwide. It carries a huge range of Consumer Electronics, such as mobile phones, mobile phone accessories, MP3 Players, MP4 Players, MP5 Players, Bluetooth Devices, Mini Spy Cameras and Electronic Gadgets.

How It Is Done

Is your computer a life line for your business or a trap that will end it? You don't know when such people will strike or what they are already planning. Robbery has never been this easy to carry out.

Can You Beat the Criminals?

How well informed are you?

The first thing you must do if you are using the Internet is to find out all you can about the way crooks get in to steal your information. These days it would seem to be almost impossible to use the computer for business or pleasure without inserting personal information into a system operated by strangers.

Everything bought online along with membership sites, and so on, requires some type of personal details and usually credit card information. But you can use a date that is not your real birthday but close to it and a post office box so as to never give out your home address to anyone. Use a fake phone number for those who insist on requesting it. Unless it is someone who needs to call you what do they need that information for?

Phone numbers supply your real address. If they have your birth date, address and phone number they can wipe you out. That's all it takes!

An innocent looking email may have spy wear or malware attached. You do not open them, therefore, unless you know who sent them and why? You must also learn how to protect yourself in other areas. Emails with attachments from strangers are a definite no no because this is how many viruses spread around.

Once on your computer you can be sending them to everyone who receives an email from you. They may also be spread through websites that you might be sent to on some pretext or other. Phishing emails will pretend to come from banks, security companies, or other, and will attempt to get you to enter passwords, etc. into bogus web sites. They do this by copying the genuine web site and sending all their contact to the fake one. Once the passwords and details are entered they can be straight in and empty out the accounts. By the time you find out its too late.

This piece of software will give you long coded passwords which are locked to hackers. You only use one password to enter and submit one for any site you want to open. The security is claimed by the manufacturer to be the best to stop criminals. There may be other similar products on the market and it pays to shop around.

If you browse the web then do it with Firefox, it is available from This free to download software s a superior browser to Internet Explorer because it is not targeted by the crooks and it has better protection. Because IE is used by most surfers it tends to be the one criminals target.

You have probably heard of viruses that can close down your computer but do you know much about them? Here is some more information that may help you.

What is a Trojan?

Spyware Profile for Hosfre

This backdoor Trojan opens your computer up to be exploited. Hackers can access and even control your machine through the Internet. You need to get rid of it asap.

Another Malicious Virus

Spyware Profile for Feardoor

Feardoor is also a backdoor Trojan for hackers to remotely control your computer. It is written in the Microsoft Visual Basic version 6 programming language. It infiltrates through an e-mail or chat-room initially. It presents as a legitimate helpful file. It is, however, malware which gathers personal information and passes it to the criminals.

To protect vital data and critical information you must remove it with the right spyware removal program. The Company represented by the banner guarantees complete success. It won't hurt to check them out.

The Truth About Malware

Held To Ransom and Brought To Their Knees

Would you hand your computer to a stranger to use

That's what you do if you are infected with a bot. Organized criminals in Russia, Eastern Europe, Spain, China and elsewhere are looking for computers to hook to their systems to send information when required. In other words they control them like robots, thus the name 'bots' for programs that infect prey computers.

This is how they work!

Recently a multi million dollar company that was established in the heart of Australia was told to send so many thousands of dollars to a contact. The CEO's ignored it and were then warned that something terrible would happen if they did not comply. The price rose to $100,000 and again they ignored the request. They neither knew who sent the email or how genuine it was because it could not be traced.

Without warning their computer system and business was shut down for 24 hours while they frantically searched for a reason. Unable to access the computers, the ISP or their phone company they were in a complete cyber blackout. When back on air they were contacted again by email for even more money. They ignored it.

Again without warning their site went off the net but this time their business closed and they lost everything. The ISP involved is Big Pond, a major supplier of internet access to many businesses in Australia so the crash affected many others as well.

The Internet subsequently failed in Sydney, Melbourne, and regions in between, including Canberra. Very few computers were spared. Even mine went down for some time as my ISP failed as well. Fortunately a backup ISP, not linked to Telstra, covers me in just such a circumstance.

The way it was done was through bots. Hackers get into computers and insert a small code into them to enslave them to a master computer. When called upon a series of emails or instructions is sent through the bots, which could include your computer, and so cause a crash of a business. This happened to Yahoo not so long ago when it was targeted by millions of hits at the same time, By sending these hits a site will crash. The Company involved could not get another ISP to take them on after this.

These bots, once set up are advertised for sale on the web. Criminals will also advertise to buy them and the trade is constant. So how do you stop it? Are you being used in this way?

Have You Learned Enough? - Watch this Video to find out more

Everyone using a computer knows that it can slow down and even stop if it is not maintained. But few know how to correct the situation and that is why other software was invented to do the job.

Some programs, such as XP, need repairing in order to continue operating. This Company stands by its software to do just that type of thing.

How Well Do You Protect Yourself and Your Family

Your Staff may be stealing from you?

Crooks are not only coming in via the computer! Many walk in the door and you think they are great people. But what do you know about their past, their background, or their intentions?

We might think that someone who works for us has a clean record and is Ok but unless you check them out you could be putting yourself at risk. Recent television footage shows that even a cleaner employed in a home for some 15 years was stealing all he could get from his employers. But not everyone can wire up their home to check out the people who come and go so what do you do?

Embezzlement is probably the biggest crime in commerce. In Australia a woman was recently jailed for stealing over a million dollars from the bank for whom she worked. Another stole more than that from a charity and a man gambled away $3,000,000 from a trust account for which he was the caretaker.

Gambling, drugs, pornography are only some of the incentives to steal. With an increasing number of CEO's going to jail for embezzlement or insider trading we know that criminals are in all walks of life and in many and varied occupations. The lust for money drives people beyond where they might normally go. So how prepared are you to protect yourself.

The Company recommended here will do checks on people for you and put your mind at rest. In today's world it is sad that we cannot trust them nor can we make judgments on their characters.

Protect Your Computer from Other Forms of Invasion

Even when you think you are safe are you putting your family at risk?

If you don't know who your child is chatting to on the Internet you can safeguard them. This program is designed to filter out undesirable web sites and give you control over what they do online.It was voted the best parental time control software for 4 years in a row and is worth checking out.

KidsWatch lays claims to being the best-rated time management solution. Loaded and preloaded with many optional benefits and features it guarantees to improve the security and the quality of the Internet your children see. Installing this program on your computer means you customize the Internet to the way you want your kids to experience it. You also protect them from predators, hackers and so on. Check out this program for your children's sake.

You Could Need More Memory to Run Anti-virus Programs

Give it a booster shot.

My computer slows right down even with 4gb of memory on it so what must computers do that have less?

If you are struggling in a time lapse situation and waiting for ages for things to load or even for the machine to open and close chances are you need to boost the memory. This company opts to exist for just this purpose. It won't hurt to take a look at what they offer and with their money back guarantee you can't really go wrong.

If you need a new laptop or any accessories you should look at this Company. It offers huge discounts on normal items that are direct from the factory with no middle men. .

Still images from Dreamstime - click here

© 2009 norma-holt

. . . Please scribe a little comment about this lens and say if it has helped you

    0 of 8192 characters used
    Post Comment

    • favored profile image

      Fay Favored 

      5 years ago from USA

      This is such an issue that it makes it hard to know what and who to trust on the Internet. I appreciate the info you provided and watched the videos (2 are the same BTW). Going to share this. Thanks.

    • oliverz330 profile image


      5 years ago

      Nice lens. Everybody should be informed on this topic and protect as much as possible.

    • whats4dinner profile image


      6 years ago

      Great, informative lens. Thank you for sharing.

    • profile image


      6 years ago

      That's why i usually go for those virus removal service online, i'm really aware of it and me and my family's safeness, in this new world that we live in, with those violent people, you can really never tell whom to trust on. And also, thank you for this, i'll add this up to my awareness.

    • profile image


      7 years ago

      Hijacking computers & passwords become very normal these days. Security is a must thing while the situation is worst. Thanks for sharing this typo alert for us. I too like to share awareness posts & articles on Small Business IT Support.

    • profile image


      7 years ago

      Thanks for the info.

    • profile image


      7 years ago

      Thanks for the info.

    • blue22d profile image


      7 years ago

      Yes, very helpful. I need to investigate getting some protection. Thanks for the helpful hints.

    • sheriangell profile image


      7 years ago

      Great info Norma - I just paid a bunch of $$ getting my kids computer de-virused. Even though I had it protected with Spyware, and Virus Protection, some nasty bug just slipped right through. Who knows what they downloaded on there, they had so much junk!

    • Hairdresser007 profile image

      James Jordan 

      7 years ago from Burbank, CA

      Great information. Thank you! I would laugh if someone stole my identity. They will not get far! I have super bad credit!!!

    • Jack2205 profile image


      7 years ago

      Very important information. Blessed.

    • photofk3 profile image


      7 years ago

      Thank you very much for sharing this useful content.

    • profile image


      8 years ago

      There is so much of virus, bacteria and malwares that protecting our computers seem like nightmares. I wonder if these minds could invest them in something creative, the world would have been different.

    • MargoPArrowsmith profile image


      8 years ago

      My Apple isn't as vulnerable, but I did get a gmail account broken into. I had to tell everyone that I didn't send that stupid solicitation AND get a better password!

    • profile image


      8 years ago

      I think it is urgent to re-read this information in stride. It is very important. Thanks.

    • Asinka profile image

      Asinka Fields 

      8 years ago from Los Angeles, CA

      Thanks for writing this detailed article and raising our awareness about virus and hijacking ...

    • profile image


      8 years ago

      @SusannaDuffy: Gosh, I had no idea! - This is a lot of information to take in all at once. I've been having computer problems for sometime, and am going through it with a fine tooth comb. Its running much, much better after disabling GreaseMonky that SquidUtils recommends.

    • profile image

      HappySeasons LM 

      9 years ago

      Everyone should have a virus program and a software firewall plus a hardware firewall as well. Depending on the kindness of strangers not to enter into your computer to steal your private info or use your computer as a bot is a very bad idea. I use a usb pocket drive to store my passwords in case the computer gets stolen... Matt :)

    • profile image


      9 years ago

      Great info. I am always amazed at people (including my husband) who think that they are completely safe without taking extra precautions.

      I use Roboform to generate and protect my passwords, never click on anything in an email that relates to banking or eBay or Paypal, run NoScript and WoT (Firefox add ons). I am firewalled and virus protected up to my eyebrows!

    • partyjulie profile image


      9 years ago

      Nice lens! So much good information here! 5*

    • SusannaDuffy profile image

      Susanna Duffy 

      9 years ago from Melbourne Australia

      I'm ashamed of how backward the law is in Australia. A lousy $300 fine for theft of credit card numbers. These gray-headed, ignorant magistrates and judges should be forcibly retired. Reminds me of the former PM J.H. who admitted he didn't understand "the internets".

    • profile image


      9 years ago

      Good Lens. Helpful information!

    • hayleylou lm profile image

      hayleylou lm 

      9 years ago

      Lots of great info here, just spent this last week cleaning up my PC to defrag etc, finally it can work quicker!

    • profile image


      9 years ago

      this is very helpful information...

    • profile image


      9 years ago

      Wonderful infos! Great lens! ^_^ I think spyware are commonly found in "cookies" so everyday I delete those unimportant cookies on my PC.

      I give it a 5*

    • Commandrix profile image


      9 years ago from Benson, IL

      Awesome lens...I've also heard of people getting viruses, spyware and stuff, just by visiting certain websites. If it looks suspicious and/or doesn't give you any more information than "You Are The Hourly Winner," don't click on it!

    • Ramkitten2000 profile image

      Deb Kingsbury 

      9 years ago from Flagstaff, Arizona

      I guess I've been lucky--no computer viruses so far. Knock on wood! You've got very good information here, though. Well done.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)