Ezy-Internet Safety Guide by John Williams - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

program in other circumstances.

It may also help to make you aware that there are some things going on

within your computer that you are glad to know about.

Anti-spyware Programs

Spyware is a term that covers a range of programs which may produce spam

or harvest your personal information including financial transactions,

passwords, sites that you visit and the type of files that you download or


Anti-spyware programs seem to be almost as numerous as the malware they

try to protect us against. Some are free but most of the others are low-cost

for the important job they do for us.

These programs also need to be kept up to date.

Anti-malware Programs

Of course, the different types of programs that I’ve already mentioned are

anti-malware programs too. But, I’ve seen some new programs which are

called by this specific title.

The main difference that I’ve noticed is that they don’t find and remove any

sort of malware that is already on your computer when you install them.

They monitor all new programs and files coming from the Internet which try

to install themselves on your computer.

Copyright © 2007 John Williams

- 29 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 30 of 58

There’s likely to be some cross-over in functions between some of these

programs and, say, anti-virus programs but they are worth checking out.

Anti-spam programs

I’ve been happy just using the spam-reducing features of my email program

but there are a number of programs that try to reduce it before it gets to


1. Only messages from “friends” (whose addresses you have already

approved) get through with some programs. They block all messages

and tell the sender that the message will be submitted for approval to

you. The sender may be given an opportunity to send a brief message

that you see before you decide whether to open the email.

Some of these programs advertise the service they provide to each

sender when they offer them the opportunity to send that short message

to you and also when they notify the senders of messages that you


2. Other programs have on-line databases of user-notified spam

messages which they will remove from your incoming emails.

3. There are also programs which have definitions which they test your

incoming messages against.

More Ways to Reduce Spam.

o Use the spam-reducing features of your email program.

o Don’t sign up to an email newsletter unless you are sure that it will be

useful to you and the supplier will not share your information.

Carefully read the forms you subscribe through.

o Review all subscriptions at least every month and unsubscribe from

any you don’t need or read.

o One way to check whether your information is being passed around is

to use different variation on your name in the subscription form;


Mr J Williams

Copyright © 2007 John Williams

- 30 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 31 of 58


J Williams


J (A to Z) Williams


John Williams


John WIlliams (yes, that upper-case “I” is deliberate)

If you start getting email from people or organizations that you never heard

of, to a particular version of your address, you can be fairly sure that the

person you gave that address either shared it with the spammers or that

their email account has been breached, possibly by a trojan or virus.

Your Email Program

Your email program is a vital part of your equipment but many people,

possibly because they get it for free, take it for granted unless there’s a

problem. And, they never try to use any protective or time-saving features

that the developers may have spent months building in to it.

Some email programs contain functions that feature in anti-spam programs

that you have to pay for but they’re often ignored by many users of the email


One thing your email program cannot do is stop you from subscribing from

lots of email lists. You may need to check your inbox every so often and

unsubscribe from those newsletters which you don’t need or read any more.

If it’s no longer important for your personal or business interests, or you just

can’t spare the time to read it, save some bandwidth and disk space –

unsubscribe today.

The less clutter in your email account, the easier it is to spot and remove the

spam and possibly malicious emails.

Fortunately, you can see enough information in the header of the message to

be confident that you can delete it without opening it.

In fact, many email programs will let you examine the headline of each

message before you even download it from your email service provider. So,

Copyright © 2007 John Williams

- 31 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 32 of 58

you can delete it right there and it never has a chance to clutter or infect

your computer!

That sort of feature is worth paying for.

If your anti-virus program is able to scan your emails, make sure that you

set up the link between the email program and anti-virus programs.

Email Programs


http://www.pocosystems.com/ A robust, self-contained, multi-featured email program.

Pegasus Mail

http://www.pmail.com/ One of the earliest email programs, regularly updated, with a huge, dedicated user base - and it’s completely free!

Copyright © 2007 John Williams

- 32 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 33 of 58

Protecting the Family

The Internet is a boundless and ever-growing resource of information and

entertainment for people of all ages.

Most parents who have the financial resources, give their children a computer

of their own, to make use of that information for their school-work and also

to provide high quality entertainment.

But, they also know, from press reports and government warnings, that

there are potentially serious risks in doing that.

It is unrealistic to think that you can isolate your children from the Internet

unless your whole community has no access. They will get online through

their school or other government facility, or with the help of friends whose

parents have allowed them access.

How do you protect them from harm or bad influences?

The first requirement is to set an example that they can follow. Children will

copy your actions more than your words. If you tell them what they should

do but show that you don’t abide by those standards yourself, you can

expect disappointment or worse as they follow your example.

You should try to ensure that there is mutual trust and respect but you also

should maintain a watching brief on your children’s Net activities.

Put the computer in a fairly public part of your home, with enough screening

that it does not interfere with other family members’ activities nearby and

that they don’t reduce your children’s Net experience.

Don’t intrude or supervise but be alert for any negative signs that seem to

arise from their computer activities.

You might want to install software that restricts access to sites that might be

inappropriate for young children. I believe that most of those software

packages are a waste of money – many children can beat the restrictions in

just a few minutes and the presence of the censorious software may act as a

goad for your child to do just that.

Copyright © 2007 John Williams

- 33 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 34 of 58

Discuss with your children media reports about the risks of Net surfing and

how you and they can protect yourselves from them as far as possible.

One rule is probably the only one that is absolutely essential – they should

never put any personal information on any website or in an email without

discussing that with you first.

Be ready to discuss any topic or incident that your child wants to talk about.

Just as you would if it had nothing to do with the Internet.

Protecting Your Original Work on the Internet

The best advice is, “Don’t put anything on the Internet that you can’t afford

to lose.”

Many people have a personal web site, and they may also have one which is

related to their business.

You should realize that anything you put on that web site may be mis-used,

often without your knowledge.

Some people will re-publish your words, pictures or even your whole web site

as their work.

Someone might publish some of your material in another country and not on

the Internet.

Your photos may be used for many purposes you never even thought of. If

you’re good-looking, someone may use your image as their own on social

web sites!

This is illegal but laws differ in various countries. It may not be possible to

get any action taken or penalties imposed. But, I’ve found that most hosting

providers, provided you approach them in a reasonable manner and supply

documentation, will act to have any suspect material removed. That could

take weeks, of course.

But, you may never even know the material has been mis-used.!

Even if you find out, getting the matter put right can cost money, time and

be very stressful.

Copyright © 2007 John Williams

- 34 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 35 of 58

“Free” can be EXPENSIVE!

There are many great bargains that you can get from the Internet but there’s

usually some sort of cost.

It might be money, or that you have to subscribe to the supplier’s email


Sometimes, as happens with many software programs, there is no charge

but a request to donate some amount to help with further development of

the program if you can.

Many things are really a gift, just like the sign says.

But, there are also many offers which don’t have a price tag but will cost you


An extreme example that was reported recently happened in the real world,

but demonstrated the perils of using equipment that you don’t know the

origin of.

Several employees of a large American corporation found small USB sticks, a

storage device which plugs into almost any computer and has enough Ram to

store, for example, hours of music.

Most of them did not report their lucky finds but rushed inside the building to

their desk where they plugged the devices into their work computers.

I don’t know what they found on their new storage devices but a hidden load

– a virus – was instantly injected directly into the highly protected corporate

computer system.

The company’s own employees had carried in the modern equivalent of

several Trojan horses and whoever planted the sticks in the area around the

building was probably downloading the confidential information he wanted

within an hour at a cost of a couple of hundred dollars for the almost

untraceable devices.

You may not have highly sensitive corporate information on your computer at

work or at home but please take this story with you and always check any

Copyright © 2007 John Williams

- 35 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 36 of 58

new disk or device, whatever its source, with the best security software that

you can.

If you do use a corporate network, never put any program or other file on

the system without explicit approval from your system administrator.

The consequences for your employer and your future employment could be


Copyright © 2007 John Williams

- 36 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 37 of 58

Seeking Just Friends and Fun

The current boom in online socializing sites, from chat rooms to the likes of

YouTube, MySpace and whatever new concept has burst on to the scene

since Saturday, is an extension of something that has been a very popular

part of the Internet from its first public incarnation.

People want to meet other people, many want to show off themselves, their

accomplishments or something outrageous that they do and many more

people enjoy watching them do that.

But, all these places harbor risks for the unwary or the over-excited.

When you first sign up and log in to the wildly popular site, you may be

flattered to get invitations from many other Members to join their lists of


It’s not because they like” you, it’s to increase the number of people that link

to their information pages. Some, of course, could be very helpful and great

fun to interact with on the site. Some may have darker motives.

Chat rooms have been the beginning of a lot of relationships. Many of them

have been extended to off-line meetings with a wider range of results, good

and especially, bad.

One reason for that is that people can assume any persona and almost any

form on the Net. It’s naturally highly attractive to social misfits and those

who have little success, for various reasons, in establishing successful offline


It’s common for people to use other people’s pictures and even false names

and other details when they meet new people on the social sites.

Some will even pretend to be younger, a different sex or whatever it takes to

attract the type of person that they desire.

This is one of the real dangers for young children venturing into the Net while

still forming their own values.

Copyright © 2007 John Williams

- 37 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 38 of 58

Experienced predators know what to say and they can, if necessary, change

the voice they use to say it with freely available software.

But, these same techniques are successful with more experienced and older

people too. The enticements might change but the tested tactics still work.

And, if the intended victim realizes something is going badly and backs away,

the predator may try to reach them off-line and get some revenge for being

“let down”.

Copyright © 2007 John Williams

- 38 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 39 of 58

“Save Money and Live Longer”

With the ever increasing costs of medicines, many people are tempted to try

the offers which flood into the e-mail box or can be found around the


But there are many risks when you take this path just to try saving a few


You may never receive any product. That can be better than some of the

rubbish which some people have received and even risked their lives by


Your use of the product will be entirely at your own risk. Do you know the

potential side effects?

Even if you're medicine is accompanied by some directions, the person that

wrote them has no idea at all of your physical state or medical history. Even

if the product supplied is legitimate, you may face significant risk of a

negative reaction between that product and whatever other medications that

you are taking.

Of course, there is no guarantee that the product you get will have the

correct strength of the active ingredients or, in fact, have any active or useful ingredients in it. That's another way that some producers increase their

profits at your expense.

The source of the product that you receive is not guaranteed. Some

producers have been discovered using sub-standard ingredients and very

unhygienic equipment to produce products that give them the highest

possible financial return.

If it's starting to sound like the cost of consulting your doctor is probably

good insurance, I'd have to agree.

Copyright © 2007 John Williams

- 39 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 40 of 58

The Enemy – Software


A computer virus is a program that arrives uninvited and unknown with

another file that you deliberately put on to your computer.

Some viruses are not destructive but there have been some which were only

intended to, for instance, put a message onto the screen, which were badly

written and caused damage as great as other intentionally damaging ones!

Computer viruses can destroy or damage files on your computer even ones

that are essential for your computer’s ability to operate.

They are called viruses because the reproduce themselves and spread to

other computers by attaching to files that you send from your computer;

emails, business documents and other files.


Worms can reproduce themselves and spread through a computer network

without piggy-backing onto other files. They may damage files like viruses or

just seriously reduce the efficiency of a network because the rapidly growing

number of copies absorbs most of the resources that are available to the


Even very large networks can be brought down in a short time.


These programs capture information that is on your computer and some may

record the actual keystrokes that you type, including passwords and other

sensitive information.

This is then sent through your Internet connection to the hacker that

released the malicious program. The effects, like theft from your bank

accounts, can be short-term or long term. Some operators will set up small,

regular withdrawals from your account, taking advantage of people who don’t

always check the details of their financial statements.

Other criminals will try to get everything that they can out of your account in

short order.

Copyright © 2007 John Williams

- 40 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 41 of 58

Sometimes, spyware is used to gather data about the types of sites which

you visit so that you can be targeted with appropriate advertising.


These programs come on to your computer when you get a file that has been

infected or produced with the trojan aboard.

They may do any of the things I listed for viruses and worms. Other trojans

are designed to:

× install or exploit access points on your computer

× send spam emails through your system for which you could be blamed

× make your computer act as a relay for a “denial of service attack”

where the hacker uses the resources of maybe thousands of infected

computers to flood a large network with the aim of making it crash

× gathering email addresses from your system for the hacker to send

infected emails to

…. The possibilities are endless and all bad!

Email Hazards


Email attachments are a classic way of introducing viruses and other nasties

to your computer.

Always scan all emails that you get and be very careful with ALL attachments

even if they appear to come from people you know well and trust.

One possible problem is that your friend’s computer may have been infected

with a virus or trojan that is sending emails with infected attachments to

everyone in your friend’s email address book without them knowing anything

about it!


Never click on any link in an email. Someone told me the other day that he’d

done that regularly for two years without any problems. I hope he never

does have a problem because I’ve heard from technicians about serious

Copyright © 2007 John Williams

- 41 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 42 of 58

consequences they’ve been asked to try, often unsuccessfully, to repair after

just one bad link was clicked.

If you get an email that seems to be genuine and urgent, grab the phone

book and contact the company or person by phone or by opening a new

browser window and typing in their website address (no surprise to me if that

is just slightly different to the address in that unexpected email!)

Emails may be in plain text or HTML (web page) format. The text format is

less likely to hold any dangers.

But, sometimes you get an email where the whole email is actually a picture.

That’s a technique that spammers use to avoid their words being detected by

anti-spam filters that would then trash the email.

I am told that those pictures may also carry malicious code.

Copyright © 2007 John Williams

- 42 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 43 of 58

Copyright © 2007 John Williams

- 43 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 44 of 58

Web Site Dangers

One of the security program producers reported that their figures indicated

that about 14% of all web sites on the Internet contained malicious software,

ready to infect or harm in some other way, the computer of anyone that

came there.

That’s astonishing - but possible, I suppose.

There’s not much chance that anybody will dispute the figure because the

growth of the Internet is so rapid that the number of websites has changed

dramatically since that figure was announced a few weeks ago.

And, of course, other companies will have no reason to dispute the figure – it

will probably help to increase the take-up of their security products as well!

But, even if the figure was wildly exaggerated, it is an acknowledgment of

the presence of a danger which few people were probably aware of – a

significant number of web sites that exist only to trap and steal from visitors.

Some bogus sites are much more basic. When someone lands on them, they

get a barrage of pop-up windows with advertising that can slow their

computer or even stop it.

I don’t know that anyone would ever buy anything that was advertised in

that way but, from my own experience of an incident like that a couple of

years ago, I know that there can be other reasons for the overwhelming


I went to a site that was listed in a book where I read a list of web sites that

offered free or very low-cost web hosting. In those days, web hosting was

much more expensive than it is now.

But the site offered nothing but garbage advertising banners. The only way I

could stop them was to turn off my modem.

After a few minutes, I turned everything back on. Among the icons on my

computer screen, I noticed one that had not been there before.

Copyright © 2007 John Williams

- 44 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 45 of 58

Most people would not have noticed it but I was a proof reader and the

change in that familiar desktop jumped out at me.

It was the icon for a search program of some kind and I was sure that I had

not seen it before. I deleted it through the Control Panel and ran my anti-

virus program though the whole system.

It didn’t find anything but, just to be sure, I reformatted the hard drive and

re-installed the operating system. Considering the potential of damage from

any hidden malicious software, I don’t think that was an over-reaction.

Some of the malicious software in use today is very sophisticated. Of course,

I am glad to report that the protective software that we now have is also

much more powerful.

If you are ever caught, be sure that you check everything with a clean copy

of your antivirus and other security software before doing anything else on

your computer.

Please Verify Your Account Details

eBay, like almost every other large cash-handling business, is popular with

scammers who send emails that ask you to go to a special, secure page and

confirm your account details because of a periodic review of random accounts

or some other lie.

The email is in HTML format, like a web page, and the logo and other pictures

may be copied from authentic eBay web pages. I’ve read that some

scammers may even include links to eBay’s actual Privacy Policy or other

relevant documents!

But, the link that they want you to use to visit the web page and confirm

your details only looks like an eBay address – the one you see conceals the

scammer’s website address.

You should never click through any link in any email. This one could cause

you to have your linked credit card maxed out very rapidly with false


Copyright © 2007 John Williams

- 45 -



“Your Ezy-Internet Safety Guide” by John Williams

Page 46 of 58

Your computer may be infected with a Trojan that could send details of

everything you type to the scammer.

Just by visiting the site, other malware could be planted on your computer

that the scammer could use to take complete control of your computer!

Check Your Spelling

After you’ve typed the Web address that you want to surf to in your Web

browser, and before you click the button, please check that you got the

address spelled correctly.

Scammers have been known to register web sites where the domain name is

almost identical to a well-known web site or company. When you visit the

“fake” web site, you might get spyware or worse planted on your computer,

directly or through something free that you download from the site!

Or, your computer might be blasted with dozens of pop-up advertisements. I

mentioned in another section that my computer was hit like this a couple of

years ago. When I rebooted the computer, there was a program there which

I had never installed!

Check Their Spelling too!

For the same reason, if someone provides you with a link, it could be

worthwhile to carefully check it before going to the site.

For instance, these two website names;

probably look the same?

If you entered your personal details on the second site, you would be on a

domain called PaypaI.com instead of the well-known credit card service

Paypal.com. The letter that you probably thought was an “l” in that address

is an uppercase “I”!

This shows how carefully you need to check web site addresses.

Copyright © 2007 John Williams

- 46 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 47 of 58

Phishing Sites

Phishing sites are designed to look like they are genuine commercial sites;

well-known banks and other institutions. Scammers use these sites to extract

personal financial information from unsuspecting victims that are lured to the

phishing site by bogus emails that also closely resemble those from the

genuine companies they imitate.

I’ve seen a few of the bogus emails and they are sometimes almost better

than the real emails. Some, however contain small errors which are a

complete give-away.

Of course, people that get these emails are usually upset or excited by the

content and probably don’t look closely at every small detail of the design or

the company information.

This type of scam is featured in the media lately but it is not new. The first

reference to the practice under that name was in about 1996!

The aim is to get people to visit a web site that closely resembles that of a

well-known and trusted company, and then enter sensitive personal

information such as Bank account, or credit card, details and passwords.

Sometimes, the victims’ accounts are cleaned out in a short time but some

scammers apparently on-sell the information and there is sometimes no

suspect activity for months.

The victim may not know anything about the often crippling loss until they

get an account from their bank or have a credit card transaction refused

because of insufficient funds.

Some sites have special code that prevents the visitor from using the back

button on their browser to leave the false site.

This technique was developed by scammers to stop people from closing a

browser window that was sending lots of pop-up advertisements to the

visitor’s computer.

Copyright © 2007 John Williams

- 47 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 48 of 58

Apparently, many phishing victims who encounter this trick eventually enter

their information. They’d probably be better off closing the web browser


Under New Ownership

When we register a web domain address, like http://www.mysite.com/ (not a

real link), we have to pay an annual fee to use it.

If we do not, for any reason, pay the fee when it is due, then the domain

name is available for anyone else to register and use.

Sometimes, that’s a scammer who refits the web site with some malware,

phishing software or maybe just lots of advertisements.

That’s why should always be careful when you visit a web site that you

haven’t been to for a long time or have never seen before.

The site may have new owners and other surprises.

Copyright © 2007 John Williams

- 48 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 49 of 58

Scams Exposed

This Chapter shows just a few of the scams which plague the Internet. Many

are very old but the scammers use them because they work very well.

Work at Home Offers

There are many variations on this particularly cruel scam which targets

desperate, unskilled people who may really need the work.

Many of the schemes involve payments of fees and payment for stock –

whatever the scammer thinks they can get away with.

Forward Packages – High Pay – Even Higher Risk!

This sort of offer may come by email, through a discussion group set up just

to recruit victims or on a respectable-looking business web site. They want

people to accept delivery of goods by post and forward them to overseas


They reasons vary. All are carefully rehearsed and scripted to sound

convincing. They may, for instance, say that the suppliers of the goods will

not post directly to their country.

You have to provide Bank account details and other personal information.

The pay probably seems generous. It needs to be large enough to hook

people so hard that they don’t even think, “Why are they willing to pay

anyone that much? Why me?”

One reason is that the goods are stolen, so their potential profit is very high.

There is real danger here – the operations I’ve read about were believed to

be linked to criminal organizations.

But, there is also a strong possibility that you will be arrested on multiple

serious charges – you may be the only part of the racket that can be located

easily and, of course, the parcels can be traced, within your country at least.

The addresses and any other information about your overseas contacts will

probably be useless. They’ll quickly move and set up somewhere else at the

first indication of trouble.

Copyright © 2007 John Williams

- 49 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 50 of 58

That’s likely to be when you are arrested or interviewed by the police.

You would find it difficult to convince anyone that you thought the whole deal

was legitimate.

As if the charges about stolen property and mis-using the mail service

weren’t serious enough, you will probably also attract attention from the Tax

Department if you don’t declare the payments.

Easy Money Straight into Your Account.

A variation of this scam is to get people to receive cash payments into their

own bank account and then send the funds, minus a generous commission,

to the scammers overseas.

It’s called money laundering.

People that do this high-risk activity are called “money mules”.

That’s not actually fair. Real mules are fairly smart.

You don’t really think that someone who has a legitimate need to frequently

send large sums of money overseas cannot do it except by contacting

someone like you after stumbling on to your name on a Forum or elsewhere

on the Internet?

Of course not! Neither will the police.

Training for a Guaranteed Job

They want you to pay for a course of training with work guaranteed after you

complete your course.

You may never get a pass mark in your course or they may just disappear

after you pay them for the course.

No-one can guarantee work on this basis and the amount that they say you

can earn is probably much above the rate which is being paid in your area for

the type of work.

Check with local sources what people doing similar work are paid, what

training they need to do and, especially, whether the course you are

pressured to buy is a recognized form of training by employers.

Copyright © 2007 John Williams

- 50 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 51 of 58

You may also have to buy equipment or materials for use with the course.

The price that they will charge you will be much higher than you can

probably get the materials locally.

2] Assemble craft or other items and the supplier will guarantee to buy them back so you make a generous profit. However well you make the items, they

won’t pass the supplier’s “quality inspection” or any other excuse they want.

They’re in the business of selling kits to people like you.

You can probably find similar items, professionally finished, on sale in local

stores for less than you pay for each of the items in your kit!

Other Old Scams in New Clothes

Many of the classic confidence tricks have been transported on to the

Internet where they work just as well.

The scammers may run less risk operating through the Internet. The

different laws in various countries and the failure of some countries to adapt

their laws to deal with Internet crime in any meaningful way may make

successful prosecution much more difficult and costly.

The scammers are also able to attack a rapidly-growing number of potential

victims, already numbering in the millions, at very low cost.

The most common on-line scams would all be familiar to law enforcement

people of-line. They include;

The Nigerian Scam:

Somebody you’ve never heard of wants you to help them transfer a very

large sum of money from their country to yours. They are willing to pay you

a small fortune for your generous help and the details of your bank account.

Lotteries or Inheritance Scams

You are notified that a relative you never heard of before or a lottery that

you never entered has produced a significant financial windfall for you. You

need only to provide either a few hundred dollars “search fee” or details of

your bank account, or both, and you’ll be in line for a great surprise!

Copyright © 2007 John Williams

- 51 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 52 of 58

Bargain Travel Scam

The scammer offers a highly sought after trip at a bargain rate.

You are charged add-on fees for almost everything that would make the trip

worthwhile and may be subject to conditions in the fine print that means you

decide not to take the trip.

However, if you have signed up and any Government enforced “cooling-off”

period is over, then you’ll still have to pay and that’s all profit for the

operator who doesn’t even have to provide the basic trip!

Email Scams.

All the old mail scams are still used, but on-line scammers don’t pay anything

like the cost of posting a letter, if they pay anything at all, for each message

they send.

Many scammers send thousands of spam emails each week and only need a

very small percentage to respond for them to be in profit.

Some people think that spam is a nuisance but not a problem.

The truth is that spam is a major problem. The amount of spam circulating

now is choking the Internet and reducing the resources available to

legitimate users. And legitimate users pay for ALL of it through our hosting

and Internet access fees.

It also re-enforces the negative impression that many people have about

almost all Internet businesses.

Governments sometimes try to deal with the spam by placing restrictions on

our use of the Internet and some have even suggested that every email

should have to be paid for.

A lot of spam is sent through security holes on computers that belong to

innocent people. They may have their accounts closed. Their reputations will

suffer too. Proving to the satisfaction of their Internet Service Provider that

they are innocent of any deliberate wrong-doing will be time-consuming and

possibly expensive.

Copyright © 2007 John Williams

- 52 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 53 of 58

That’s why I recommend that you get good security software, keep it up to

date and make sure that you set it to scan your system regularly. It might be

inconvenient but it’s much better than having to explain a flood of spam that

appears to have originated from your computer and email account.

Spammers would probably close their email accounts when the bills were due

to be paid.

Copyright © 2007 John Williams

- 53 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 54 of 58

You can Help, but ….!

…. this is no job for Don Quixote!

When we hear of someone that has had their identity or their life savings

stolen through Internet fraud, many of us feel a surge of rage and, perhaps,


If you have any idea of righting wrongs on the Internet through direct action,

think twice and then think again, please.

The danger, and also the costs in time and disruption of your business

activities and personal life that could happen, make it a high-risk route with

little chance of success.

Leave it to the professionals, many of whom are also under-resourced and

heavily pressured - but at least they get paid.

By all means provide financial or whatever other assistance you can to the

organizations I mention in this book, send any information about online fraud

or other illegal activity to your local or federal authorities and perhaps try to vote for politicians that know and care about those of us who work and play

in the Internet beyond YouTube!

If you have verifiable evidence of scamming or are concerned that you or a

close family member may be a potential victim, contact your local law

enforcement, your Bank or other financial institution or consider asking for

information from the Helpful web sites that I’ve listed in this book.

Copyright © 2007 John Williams

- 54 -




“Your Ezy-Internet Safety Guide” by John Williams

Page 55 of 58


Virus Bulletin: (From

their web site) “Virus

Bulletin online

magazine and website

provides users with all

the information they

need to stay current

with the latest

developments in the anti-malware and anti-spam field.”

It provides annual reviews and ratings for security software and a newsletter,

which could be useful for the casual visitor and also much that would be

valuable to people involved with their company’s computer system.

You need to register and subscribe to the free newsletter if you want to

access a lot of the material which is, I think, fair enough.

Helpful Websites

Castle Cops


(From their website) CastleCops® is a volunteer security community focused

on making the Internet a safer place. All services to the public are free,

including malware and rootkit cleanup of infected computers, malware and

phish investigations and terminations, and searchable database lists of

malware and file hashes.

Education and collaborative information sharing are among CastleCops

highest priorities. They are achieved by training our volunteer staff in our

Copyright © 2007 John Williams

- 55 -





“Your Ezy-Internet Safety Guide” by John Williams

Page 56 of 58

anti-malware, phishing, and rootkit academies and through additional

services including CastleCops forums, news, reviews, and continuing


CastleCops consistently works with industry experts and law enforcement to

reach our ultimate goal in securing a safe and smart computing experience

for everyone online.



This USA Government

site has reliable and

timely information about

recent security alerts and

tips for protecting your


Among the newsletters

which anyone can subscribe to for free is one specially focused on non-

technical users.



This site was launched in 2006 so that people could

report phishing web sites, set up by scammers to

look like the official sites of companies such as eBay,

PayPal or various banks.

Bank Safe Online (U.K.)

http://www.banksafeonline.org.uk/ was

set up by Banks in the UK as a web site

where customers could get and submit

reliable information about Internet scams

that might affect them.

Copyright © 2007 John Williams

- 56 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 57 of 58

Keep Safe – Keep Informed.

Almost every day, a new virus is unleashed on the Internet and several new

or revamped scams are exposed.

I hope this book helps you and your family to be aware of the types of risks

that are around you when you use the Internet.

The benefits are so great for education, business and increasing

understanding between people around the World that we can’t let the

scammers ruin it for us or, especially, our children.

John Williams


Copyright © 2007 John Williams

- 57 -


“Your Ezy-Internet Safety Guide” by John Williams

Page 58 of 58

Another eBookWholesaler Publication

Copyright © 2007 John Williams

- 58 -