<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Email Archives - CritchCorp Computers Ltd</title>
	<atom:link href="https://www.cc-computers.com/tag/email/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cc-computers.com</link>
	<description>Complete Computer Support</description>
	<lastBuildDate>Thu, 10 Sep 2020 22:05:39 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.cc-computers.com/wp-content/uploads/2020/07/favicon.ico</url>
	<title>Email Archives - CritchCorp Computers Ltd</title>
	<link>https://www.cc-computers.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why do Yahoo give your eMail account to cybercriminals, no questions asked?</title>
		<link>https://www.cc-computers.com/why-do-yahoo-give-your-email-account-to-cybercriminals-no-questions-asked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-do-yahoo-give-your-email-account-to-cybercriminals-no-questions-asked</link>
		
		<dc:creator><![CDATA[CritchCorp]]></dc:creator>
		<pubDate>Thu, 29 Nov 2018 14:56:07 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[free email]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[secure email]]></category>
		<category><![CDATA[Terms and Conditions]]></category>
		<category><![CDATA[yahoo]]></category>
		<category><![CDATA[yahoomail]]></category>
		<guid isPermaLink="false">https://cc-computers.com/?p=1318</guid>

					<description><![CDATA[<p>YahooMail, which has now merged with AOL to form OATH, part of Verizon, can allow others, including and most likely, cyber criminals who are out to hack your digital life, to permanently have your yahoo email address; and there is nothing you can do about it. Except get off their service as quickly as possible [&#8230;]</p>
The post <a href="https://www.cc-computers.com/why-do-yahoo-give-your-email-account-to-cybercriminals-no-questions-asked/">Why do Yahoo give your eMail account to cybercriminals, no questions asked?</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-995" src="https://cc-computers.com/wp-content/uploads/2018/09/background-code-coder-177598.jpg" alt="" width="5760" height="3840" /></p>
<p>YahooMail, which has now merged with AOL to form OATH, part of Verizon, can allow others, including and most likely, cyber criminals who are out to hack your digital life, to permanently have your yahoo email address; and there is nothing you can do about it. Except get off their service as quickly as possible or don&#8217;t start to use them in the first place</p>
<p>Even though Yahoo has now been merged they have kept the terms and conditions, which some on the internet have called a privacy nightmare, largely the same.</p>
<p>The first part is the same as all other FREE email and social media companies, and that is that everything you put, send or receive belongs to you, BUT, you grant them a sublicense to do with your data whatever they please.</p>
<p>The second part is more worrying and that is the fact that, if, for any reason, your account is terminated; including because you didn&#8217;t have enough activity on it for a given length of time, which remains unspecified in the terms and conditions, so as they determine it, then they can and will make your username (email address) available for anyone else to register.<span id="more-1318"></span></p>
<p>If you don&#8217;t have enough activity on your account, like those who just use email occasionally or those who just use it for recovery purposes, e.g., you set it as the backup email account if you can&#8217;t get in to your Facebook, Twitter, Amazon account, etc.; then you risk having your account terminated and someone else registering it. A cybercriminal, who is sitting watching you and notices that your account has been terminated, can register that account and then reset all your passwords. Then you will lose access to your Twitter or Facebook account and in some cases your PayPal, Bank or Amazon account where your credit card numbers are stored. Now in some countries you may have some protection if this happens but in many you will not and even if you do they typically take around 3 to 6 months to give you any money back, not to mention the hassle of having to change your bank account and credit cards and re-setup your accounts. Avoid all of this and get yourself a proper email account. If you are paying for your email to a reputable company then there is little chance that they are going to use your information to make money (even free services are not free, you pay one way or another) and they are more likely to want to look after you as a client.</p>
<p>Below is the link to the OATH YahooMail Terms and Conditions in full. It has been said that they are the same ones for all their services, and that may be true, although they state there may be other policies, these are the ones that you agree to when you sign up for YahooMail, which is the subject of this article.</p>
<pre><a href="https://policies.oath.com/us/en/oath/terms/otos/index.html">https://policies.oath.com/us/en/oath/terms/otos/index.html</a></pre>
<p>And here are the bits we were talking about above:</p>
<h2>Look at section 6b &#8211; What you give them:</h2>
<blockquote><p><em>IP Ownership and License Grant</em>. Except as otherwise provided in the specific Oath product terms or guidelines for a Service, when you upload, share with or submit content to the Services you retain ownership of any intellectual property rights that you hold in that content and <strong>you grant Oath a worldwide, royalty-free, non-exclusive, perpetual, irrevocable, transferable, sublicensable license to (a) use, host, store, reproduce, modify, prepare derivative works (such as translations, adaptations, summaries or other changes), communicate, publish, publicly perform, publicly display, and distribute this content in any manner, mode of delivery or media now known or developed in the future; and (b) permit other users to access, reproduce, distribute, publicly display, prepare derivative works of, and publicly perform your content via the Services, as may be permitted by the functionality of those Services (e.g., for users to re-blog, re-post or download your content). In some of the Services, there may be specific terms or settings allowing a different scope of use of the content submitted in those Services.</strong> You must have the necessary rights to grant us the license described in this Section 6(b) for any content that you upload, share with <strong>or submit to the Services</strong>.</p></blockquote>
<h2></h2>
<h2>And Section 7d &#8211; What happens when your account is terminated:</h2>
<blockquote><p>Subject to any statutory rights you might have, if your account is terminated, access to your username, password and all related information, files and content associated with your account may be terminated and<strong> your username may be recycled for use by others</strong>. If the Service is a paid service, please consult Oath’s payment terms which can be found <a href="https://policies.oath.com/ie/en/oath/terms/otos/index.html#11">here</a>.</p></blockquote>
<p>One last important note; if you are reading this thinking well, luckily I use Gmail or Hotmail (LiveMail) or some other free email provider then remember this. They own the server, they own the domain name, and they can charge whatever they like, which may well be nothing at the moment. ALL of the social media and free email companies that we have looked at have similar terms and conditions as far as you Intellectual Property (IP) goes. They can always add the section that says they can reuse your email address if they choose to. They owe you nothing.</p>
<p>Stay Safe</p>
<p>CritchCorp Computers Ltd</p>
<p>[ink-ad-creator ad=&#8221;1327&#8243;][/ink-ad-creator]</p>The post <a href="https://www.cc-computers.com/why-do-yahoo-give-your-email-account-to-cybercriminals-no-questions-asked/">Why do Yahoo give your eMail account to cybercriminals, no questions asked?</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A New Domain Name Scam</title>
		<link>https://www.cc-computers.com/domain-name-scam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=domain-name-scam</link>
		
		<dc:creator><![CDATA[CritchCorp]]></dc:creator>
		<pubDate>Sat, 10 Aug 2013 09:00:20 +0000</pubDate>
				<category><![CDATA[Informational]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Urgent Attention]]></category>
		<category><![CDATA[Domain names]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[postal letter]]></category>
		<category><![CDATA[Registrant]]></category>
		<category><![CDATA[Registrar]]></category>
		<category><![CDATA[Registry]]></category>
		<category><![CDATA[Scams]]></category>
		<category><![CDATA[seo]]></category>
		<category><![CDATA[steal domain]]></category>
		<guid isPermaLink="false">http://www.cc-computers.biz/Blog/?p=233</guid>

					<description><![CDATA[<p>Domain names are big business, well if you hold a lot of them or the right ones they can be. We charge £2.99/year (plus VAT) for a co.uk domain name. I have seen people or companies that charge over £50/year for these same domain names. Unscrupulous or just business? I would say that it is [&#8230;]</p>
The post <a href="https://www.cc-computers.com/domain-name-scam/">A New Domain Name Scam</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></description>
										<content:encoded><![CDATA[<p>Domain names are big business, well if you hold a lot of them or the right ones they can be. We charge £2.99/year (plus VAT) for a co.uk domain name. I have seen people or companies that charge over £50/year for these same domain names. Unscrupulous or just business? I would say that it is just business. A company can charge what they like for a domain name, there is no real limit on it and the customer is free to choose where they purchase them from. We love domain names but we do not charge the Earth for them. People are able to choose whether or not they want to pay prices as high as that or pay our prices. I have not really looked in to many of these companies that charge a high premium beyond the information on their website and it appears to me that they do not really want more customers, they are happy with what they have and that&#8217;s that.</p>
<p>There of course, have been some domain name companies that try to scam people either out of their domain name or just to win the business. Whichever it is I do not agree with underhand tactics to get business. People come to us because we are honest and open and we do an excellent job, not because we conned them in to moving to us.</p>
<p>The one that most people have probably seen the most is a company, that I will not name but they have been conning people for years now and more recently have been trying to clean up their act to appear more professional. They send out postal letter and emails to the registrant (owner of the domain name) and in the beginning they said that if they did not pay this extortionate rate their domain name would be lost forever. Anyone dumb enough to fall for it could have fallen in to many problems, as they were effectively transferring their domain name to another company and their website, emails and everything else could easily have stopped working and been lost. On top of the fact that they have paid a lot more for the domain name renewal than was necessary.</p>
<p>Always know who you have registered your domain name with and check with them first before renewing anything with a third party. This particular company have been forced by trading standards, I believe, to clean up their act. They still send out ridiculous emails and letters to try to steal customers from other companies, in my opinion, by deception. Their latest one stating that if you do not take their offer of SEO and domain name then no-one will be able to find your website. I will not go in to the technically details of this but to anyone with any technical ability they know this is not true, but it must be fooling some unwitting domain name holders or they would stop.</p>
<p>Another long running scam is the Asia domain name company that tells you that someone is trying to register a domain name that is similar to yours and they are going to give you first refusal of the domain name. A scam as well that has forced thousands of people to buy domain names that they do not need or want.</p>
<p>The latest email to go to domain name owners is one that is intended to scare you though showing you a whole lot of technical information about your domain name. All of it is probably true but means nothing in the context. From what I can see their whole point of sending you a large font email telling you that your whois information has been updated (which is a lie) is to get you to purchase other domains from them. I have not been any further and I have only just seen this one going round so I am sure that we will see what devastation it causes in the coming weeks and months.</p>
<p>If you own a domain name make sure you know the basic information of who it is registered with and when it is due for renewal. Even if you have technical people to look after things like that for you, make sure you have basic information (read: http://www.cc-computers.biz/Blog/?p=228 to make sure you don&#8217;t lose your domain name)</p>
<p>Be vigilant with emails and letters that come in the post telling you that you need to do something, check with the right people first.</p>
<p>Support Team</p>
<p>CritchCorp Computers Ltd.</p>
<p>Prices correct at date of publish.</p>The post <a href="https://www.cc-computers.com/domain-name-scam/">A New Domain Name Scam</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Update to Outbound email policy</title>
		<link>https://www.cc-computers.com/update-to-outbound-email-policy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=update-to-outbound-email-policy</link>
		
		<dc:creator><![CDATA[CritchCorp]]></dc:creator>
		<pubDate>Wed, 23 May 2012 21:04:52 +0000</pubDate>
				<category><![CDATA[Informational]]></category>
		<category><![CDATA[Updates]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[email policy]]></category>
		<category><![CDATA[outbound email]]></category>
		<category><![CDATA[secure email]]></category>
		<category><![CDATA[sending email]]></category>
		<guid isPermaLink="false">http://www.cc-computers.biz/Blog/?p=148</guid>

					<description><![CDATA[<p>Due to the recent increase in spam being sent out from customer PCs by viruses and the problems with our servers being blacklisted by some of the more well know blacklists because of these spam-bot, we have taken steps try to prevent this type of problem from occurring. With immediate effect all outbound email (which [&#8230;]</p>
The post <a href="https://www.cc-computers.com/update-to-outbound-email-policy/">Update to Outbound email policy</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></description>
										<content:encoded><![CDATA[<p>Due to the recent increase in spam being sent out from customer PCs by viruses and the problems with our servers being blacklisted by some of the more well know blacklists because of these spam-bot, we have taken steps try to prevent this type of problem from occurring.</p>
<p>With immediate effect all outbound email (which is already authenticated), will also be subject to blacklist checking. If you have a virus on your network that is sending out spam it is likely that you will now not be able to send email yourself. We need to implement this because of the problems caused by being blacklisted for the majority of clients who are not infected. So, to protect everyone else we need to stop email from those who are infected from sending email (most probably spam) and causing disruption and problems for everyone else.</p>
<p>There is now also a limit of 50 emails per hour from the same IP address.</p>
<p>If you do find that you are unable to send email, and nothing has changed on our network, then after you have been through the usual checks (restarting the computer, restarting router, etc) then it is possible you have been blacklisted. You will need to start by trying to fin the virus by scanning <em><strong>all</strong></em> computers (Macs, PCs, Linux, Etc.)</p>
<p>If you need help with any of this then please get in contact with us.</p>
<p>We also have a paid outbound SMTP service. This service rarely gets blocked by spam filters due to it nature. Accounts start at £50/year. Please contact us if you need more information.</p>
<p>CritchCorp Support Team</p>
<p>&nbsp;</p>The post <a href="https://www.cc-computers.com/update-to-outbound-email-policy/">Update to Outbound email policy</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New PayPal Phishing Emails</title>
		<link>https://www.cc-computers.com/new-paypal-scam/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-paypal-scam</link>
		
		<dc:creator><![CDATA[CritchCorp]]></dc:creator>
		<pubDate>Sat, 24 Mar 2012 12:06:36 +0000</pubDate>
				<category><![CDATA[Informational]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Urgent Attention]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[fraud]]></category>
		<category><![CDATA[paypal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing email]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[Scams]]></category>
		<guid isPermaLink="false">http://www.cc-computers.biz/Blog/?p=130</guid>

					<description><![CDATA[<p>I recently received an email from PayPal that said that I had just completed a payment to someone I had never heard of for an amount that gave me the shivers (some 2 or 3 hundred dollars). I did not want to pay someone I had not heard of any amount of money for something [&#8230;]</p>
The post <a href="https://www.cc-computers.com/new-paypal-scam/">New PayPal Phishing Emails</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></description>
										<content:encoded><![CDATA[<p>I recently received an email from PayPal that said that I had just completed a payment to someone I had never heard of for an amount that gave me the shivers (some 2 or 3 hundred dollars). I did not want to pay someone I had not heard of any amount of money for something I had not ordered. Whats more this had completed from my bank account. My first reaction, in the panic of the moment, was to click on the link that invited me to check out the transaction in my account, so that I could see if I could get this revesed.</p>
<p>Before I clicked it I took a moment to calm down and think logically. I have a suitably strong password on my account so it is unlikely someone would have been able to guess it. You can&#8217;t make a payment unless you have the password. Is it possible someone could have got it from my PC with a keystroke logger and then used it; possible but not likley. I then took a moment to read the email more carefully and noted a couple of things that I should have picked up on straight away.</p>
<p>Firstly the email was addressed to me, but not in the normal way. Secondly it came to an address that was not the one I used for PayPal. These two facts alone were proof enough that this was a phishing email. I check out the links that I was about to click and sure enough they were not to the PayPal website but something that was meant to look like the PayPal website as it had www.paypal.com in the address but was not their site. (I will write another posting about what to look out for in the URL to make sure you are going to the right place).</p>
<p>What struck me about this one was the fact that it was very well written, not like most of them that give themselves away instantly with the bad grammar or spelling mistakes.</p>
<p>What you need to learn form this is to be extra vigilant when it comes to any message in email. NEVER EVER click the link in an email, go to the website by typing in the address yourself. Read the content of the email over again before jumping to conclusion. PayPal in particular use the correct greeting in their email which makes it harder (although not impossible) for people to pretend to be PayPal. The same goes for some banks and other financial institutions.</p>
<p>Phishing emails have been around for a long time and are clearly very successful so be extra vigilant on emails that you expect and ones you are not!</p>
<p>Be on the look out for the latest batch of PayPal phishing emails as they have clearly copied the contents of real PayPal emails and just changed a few details.</p>
<p>I have had several more since the first one of these.</p>
<p>CritchCorp Support Team.</p>The post <a href="https://www.cc-computers.com/new-paypal-scam/">New PayPal Phishing Emails</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Viruses and you</title>
		<link>https://www.cc-computers.com/email-virus/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=email-virus</link>
		
		<dc:creator><![CDATA[CritchCorp]]></dc:creator>
		<pubDate>Sun, 29 Jan 2012 10:30:09 +0000</pubDate>
				<category><![CDATA[Informational]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[trodjan horse]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[worm]]></category>
		<guid isPermaLink="false">http://www.cc-computers.biz/Blog/?p=65</guid>

					<description><![CDATA[<p>Viruses. This tends to be incorrectly used for all types of malicious software. There are in-fact several categories of this evil software: Virus, Mal-ware, Ad-ware, Spy-ware, Root-kit and Trojan Horses. I am not going to explain what all of these do or what makes them different to each other in any great detail, there is [&#8230;]</p>
The post <a href="https://www.cc-computers.com/email-virus/">Viruses and you</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></description>
										<content:encoded><![CDATA[<p>Viruses. This tends to be incorrectly used for all types of malicious software. There are in-fact several categories of this evil software: Virus, Mal-ware, Ad-ware, Spy-ware, Root-kit and Trojan Horses. I am not going to explain what all of these do or what makes them different to each other in any great detail, there is a great article in Wikipedia that has a very detailed and technical explanation of all this: <a href="http://en.wikipedia.org/wiki/Computer_virus" target="_blank">http://en.wikipedia.org/wiki/Computer_virus</a> &#8211; Read it for more information and some great trivia on early viruses. Some of the first viruses from 1971, before the Internet we know today! I will just explain some real life facts about viruses today and what they are used for and some ways they get in. With some basic knowledge of what they are after you can be more prepared when online or looking at email.</p>
<p>Beware the email virus. Someone you know sends you a link or attachment, or it comes form someone you consider reputable. When you open or click the link, it doesn&#8217;t always show you anything, sometimes you open the attachment and it just says there was an error accessing the file and sometimes there is nothing, just a blank page, or there is a document that just doesn&#8217;t make any sense or appears to not be for you. In all these cases the virus may well have been delivered silently in the background and you are now infected with one of thousands of different virus&#8217;. Many more of them will come in through web sites that do not know they are infected yet. (Some statistics suggest that 1000 website get infected every day!) In all cases the goal tends to be the same: Take control of your computer to extort money from you or someone else.</p>
<p>There are many different types of virus and they will all have a different part to play in the overall scheme. A few of the worst and their general purpose are noted here.</p>
<p>Trojan Horses (Trojans) &#8211; they will get in to your system and not necessarily do any damage except for disabling antivirus software, hiding itself and opening your computer up for other nasty things to come in. Often selling space on your computer to other virus manufactures (or programmers). They are often included with a root-kit. (See below).</p>
<p>Root-kits &#8211; These are a particularly cleaver type of virus. They hide themselves from Windows and everything else. The will usually get in to your system and load before Windows loads. They will then be sitting there behind Windows so that, for instance, if you view all the files in a folder you will not see the virus files there. This is because when Windows is enumerating (making the list) of files in the folder the Root-kit is watching and when Windows reaches one of its files the Root-kit will block Windows from seeing it. The Root-kit can also do this with system services so that when you look in Task Manager it&#8217;s services do not appear there either, making it very difficult to detect. This will be the same if your antivirus software is looking for it, because it has a position in the root it can hide itself from anything. The only way to detect their presence is in the very small added delay between file names when enumerating a folder (or directory). By looking at the time between each item to be enumerated any added delay of millionths of a second can be detected and then you can presume the existence. To actually find them and remove them requires very special techniques.</p>
<p>Self hiding/restoring viruses &#8211; These types of virus are often confused and also labeled by antivirus companies as root-kits but they tend to lack the hiding effects in the same way and use other methods to hid themselves. They will, as many do, also replace themselves when discovered. Firstly, they will often tell Windows that their files are part of the system and should be protected by the system. This has the effect of hiding them from normal users and can get Windows to replace any files that are removed. They sometimes also mark themselves as needed for Safe Mode, the special start-up mode to help remove virus&#8217; and fix other issues with Windows. When Windows starts up in this mode it only start those programs which are essential to the system starting up. There is usually more than one part to this type of virus as well. It is the job of each to look after the other parts, so when you find one of them and remove it one of the other parts will put it back again, sometimes with a different name!</p>
<p>Bot-Nets. These are little viruses that are controlled by someone else and use your system resources like your computer processor, memory, Internet connection. They tend to be quiet, just sitting there not doing much until they are told to attack. Most commonly they are used to take down Internet sites for some kind of monetary gain. They can be hired to take down a competitors site at a critical time or by the organised crime syndicates to extort money out of companies in the old fashioned &#8220;protection racket&#8221;.</p>
<p>For Example, someone says to a betting site, &#8220;wouldn&#8217;t it be a shame if your website was not available for the big match coming up? If you pay a fee of £50,000 we can make sure you will be online at that time, otherwise we can not guarantee it!&#8221; If the site doesn&#8217;t pay first time round they will next time because at the time of the big game your computer and tens of thousands of others received instructions to attempt to connect to the betting site servers at the same time and to continue trying until the stop time, typically after the match/race has finished. With all this additional traffic going to the site and not doing anything the legitimate traffic cannot get through so the site then appears &#8220;offline&#8221; with a &#8220;404 page cannot be displayed&#8221; error or an error saying that the site cannot be reached. The site will not want the bad publicity; allowing people to find out that they have been compromised is very bad for business, so they end up paying. Your computer was used to help criminals extort money from someone else!</p>
<p>Another type of virus, actually mal-ware or increasingly know in the industry as ransom-ware, that comes in, often through a PDF or Adobe Flash exploit, is the current and very common one that will hold you to ransom. There are several different variants to this one depending on who is controlling it but they all do essentially the same thing and that is try to take your money off you with a type of protection racket or threat of some bad thing happening.</p>
<p>You will first notice a pop-up box that says you have hundreds or even thousands of viruses on your system (in some cases it is a corrupt hard drive/memory, porn or some other thing is very wrong with your computer) it will state that you need something in order to fix this. You are usually presented with a dialog box to confirm you want it or not. which ever button you press the answer is yes, go ahead and install the virus. The only way to get round this is to cancel the box (best done by using Task Manager to kill the program and everything to do with it). Another common one is a page that says that the FBI are stopping you from using your computer due to inappropriate content on your computer. You are then instructed to pay a fine or risk jail if it goes to court. Once you have install the virus you will be held to ransom, not able to use your computer at all in some cases, until you pay or remove the virus.</p>
<p>Worms. These are more commonly used as a method of transport. They are used to get their payload to your computer in any number of ways. They self replicate, usually to many different forms of media and methods. IE Across the Internet directly to your computer, through floppy disks, USB pen drives, external drives, emails, through the network to other computers on your local network. Once in they will begin to look for the next computer to infect, some also phone home to pickup instructions, such as what payload to deliver to the computers at the moment.</p>
<p>Viruses are a very very big money these days, both for the virus manufacturers and the antivirus manufacturers and on all forms of operating systems.  Although Windows is still the majority platform, Apple Macs are gaining market share and so now present a nice target with people who are not so use to viruses so are more susceptible to being infected. So which ever platform you are on, be careful, even phones, which are small computers, can be infected with things that cost you money!</p>
<p>Beware the antivirus that is a virus! Know which antivirus you use on your system and what it looks like to help reduce the chance of getting stung by a fake one, which will then hold you to ransom as above.</p>
<p>When surfing the Internet remember this: If you didn&#8217;t ask for it, don&#8217;t install it! many viruses will come packaged as something nice and appealing but, if you were not looking for that exact thing then do not be tempted to install it!</p>
<p>A good computer maintenance regime is to not install something unless you absolutely need it. If you think you need it, make sure you check it our fully before installing it, and make sure you download it from a known good source. Where possible go to the manufacturer&#8217;s website to get it, not from someone else offering it, unless directed there by the manufacture. If it turns out that you do not need or want it, then remove it. Although removing something is not as good as not installing it in the first place, it is better than leaving it there.</p>
<p>Watch out for viruses, they will come and get you any way they can. It is up to you to be careful, not your antivirus, after all you can override your antivirus if the virus is cleaver enough to trick you in to believing it is good for you.</p>
<p>Chris.</p>The post <a href="https://www.cc-computers.com/email-virus/">Viruses and you</a> appeared first on <a href="https://www.cc-computers.com">CritchCorp Computers Ltd</a>.]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
