Computer & Internet security: Keep Hackers, Worms and other Germs out of your PC
.indent
{
margin-left: 115px;
text-align: justify;
}
.align-in
{
margin: 0px 50px 0px 50px;
text-align: justify;
}
.align-out
{
text-align: justify;
}
.USAtoday
{
font-family: Courier New, Courier, mono, serif;
font-size: 12px;
margin-left: 20px;
}
#version
{
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 12px;
font-weight: bold;
color: #990000;
}
#login
{
position: absolute;
top: 50px;
right: 70px;
}
#winlogo
{
position: absolute;
top: 0px;
right: 10px;
}
#menu-bottom
{
font-family: Verdana, Arial, Helvetica, sans-serif;
font-size: 9px;
}
#menu {display:block; top:10px; left:170px; width:130px; position:fixed; border:1px solid #888; padding:10px; text-align:center; font-weight:bold; color:#fff; background:url(grid2.gif);}
p {
font-family: Arial;
font-size: 15px;
}
p.quote
{
font-size: 14px;
font-style: italic;
margin-bottom: 0px;
color: #000000;
margin-left: 30px;
}
p.quote2
{
font-size: 12px;
font-style: italic;
margin-left: 50px;
margin-right: 65px;
text-align: justify;
}
p.deck
{
font-family: Tahoma;
font-size: 18px;
font-weight: bold;
color: #FF0000;
}
p.nopadding
{
margin-top: 0px;
padding-top: 0px;
margin-bottom: 0px;
padding-bottom: 0px;
}
p.testimonial
{
margin-bottom: 5px;
padding-bottom: 0px;
font-family: Courier New;
font-size: 13px;
text-align: left;
}
p.testimonial-sig
{
margin-top: 0px;
padding-top: 0px;
font-size: 10px;
text-align: right;
}
p#confirmed
{
margin-top: 0px;
padding-top: 0px;
font-size: 12px;
text-align: center;
}
H1 {
font-family: Impact, Arial;
font-size: 30px;
font-weight: normal;
color: #000080;
}
H2 {
font-family: Impact, Arial;
font-size: 22px;
font-weight: normal;
}
H2.bonus
{
color: white;
background-color: green;
}
H2.bonus-red
{
color: white;
background-color: #CC0000;
}
H3 {
font-family: Impact, Arial;
font-size: 19px;
font-weight: normal;
}
H3.bonus
{
color: white;
background-color: green;
}
H3.bonus-red
{
color: white;
background-color: #CC0000;
}
H4 {
font-family: Impact, Arial;
font-size: 18px;
font-weight: normal;
}
H5 {
font-family: Impact, Arial;
font-size: 17px;
font-weight: normal;
color: #000000;
}
H6 {
font-family: Impact, Arial;
font-size: 13px;
font-weight: normal;
color: #000000;
}
.minitype10
{
font-family: Arial, Helvetica, sans-serif;
font-size: 10px;
}
.minitype11
{
font-family: Arial, Helvetica, sans-serif;
font-size: 11px;
}
.minitype12
{
font-family: Arial, Helvetica, sans-serif;
font-size: 12px;
}
body
{
margin-top: 10px;
border: 0;
}
ul
{
list-style: none;
margin: 0;
padding: 0;
}
li#checkmark
{
background-image: url("/images/checkgreen.jpg");
background-repeat: no-repeat;
background-position: 0 50%;
padding: 3px 0 3px 40px;
margin: .4em 50px;
}
li#block-1
{
' background-image: url("/images/bullet_mid_black.gif");
' background-repeat: no-repeat;
' background-position: 0px 3px;
padding: 3px 0 3px 30px;
margin: .4em 50px;
background-color: #FFFFFF;
}
li#block-1a
{
' background-image: url("/images/bullet_mid_black.gif");
' background-repeat: no-repeat;
' background-position: 0px 3px;
padding: 3px 0 3px 30px;
margin: .5em 50px;
background-color: #FAF0C8;
}
li#triangle-2
{
background-image: url("/images/bullet_mid_red.gif");
background-repeat: no-repeat;
background-position: 0px 3px;
padding: 3px 0 3px 30px;
margin: .4em 50px;
}
li#triangle-3
{
background-image: url("/images/bullet_mid_green.gif");
background-repeat: no-repeat;
background-position: 0px 3px;
padding: 3px 0 3px 30px;
margin: .4em 50px;
}
li#triangle-4
{
background-image: url("/images/bullet_mid_blue.gif");
background-repeat: no-repeat;
background-position: 0px 3px;
padding: 3px 0 3px 30px;
margin: .4em 50px;
}
li#attacktime
{
background-image: url("/images/exclaim.gif");
background-repeat: no-repeat;
background-position: 40px 50%;
padding: 3px 0 3px 80px;
margin: .4em 0;
font-size: 13px;
text-align: left;
}
li#redcross
{
background-image: url("/images/LittleRedSphere.gif");
background-repeat: no-repeat;
background-position: 40px 50%;
padding: 3px 0 3px 80px;
margin: .4em 50px;
font-size: 13px;
text-align: left;
}
img {
border-style: none;
}
td.stillmore
{
border: 2px solid #000000;
border-top: 0;
}
Protect Your Computer, Boost its Speed, Multiply its Performance,
and Get Rid of Every Single Annoyance That Plagues You Every Day...
Guaranteed.
"The
Greatest Gold Mine of Tips, Tricks, Tools and 'Naked Truth' Advice
On Computer & Internet Security Ever Crammed Into One Very Readable*
Publication."
*Written
for ordinary computer users, not just for tech-types
Everyone who owns a computer — at
home or in the office — is exposed to more security risks than
they can possibly imagine. Deadbeats prey on unsuspecting victims
every second of every day. Discover now how to keep your sensitive
files away from prying eyes, protect your PC from malicious attacks,
and watch it miraculously perform like the day you brought it home.
Thugs, crims and swindlers aren't just lurking in dark alleys any
more. Now they're online, and they've become a LOT more sophisticated.
They hire clever but unprincipled technologists to fashion their
underhand schemes and weapons for them.
There is a
small, inexpensive, readily available and quite legal device
that can be secretly attached to any computer in under 10 seconds,
without opening the case. It will record every keystroke that
is entered at that computer from then on?
- Could a visitor set such a trap on your home PC?
- How safe is that public terminal you sometimes use?
- How at-risk is the PC at your reception desk or front counter
And that's just one way. There are many others which require no
physical access to your computer at all!
Your address book, customer database, price-list, Telebanking details,
credit card numbers, passwords — everything is open to theft,
abuse and prying eyes?
How confident are you that someone, somewhere doesn't already have
access to your most sensitive documents? Anything the crims can
steal from you they will sell to the highest bidder if they can't
use it themselves.
Couldn't happen to you? Get Real!
These thugs don't go looking for specific individuals. You
don't have to be famous, successful or some sort of "known
target". They use automated software that constantly scans
huge chunks of the Internet looking for ANY unprotected computer
that happens to be on-line.
"There
is now a 50% chance of being infected by an Internet worm
within just 12 minutes of being online using an unprotected,
unpatched Windows PC."
- Sophos Inc. - Threat Management Solutions
"Average
time-to-exploitation ... for an unprotected computer is measured
in minutes."
-
United States Computer Emergency Readiness Team (US-CERT)
One indicator of the extent of the problem is the massive amount
of spam pervading the Internet. While you may think spam is a different
problem to security, they're closely related. Here's how…
Most spam is distributed through hundreds of millions of PCs owned
by unsuspecting people just like you. Their computers have been
"enslaved" by a rogue program — completely unknown
to the owner/operators of the computer. This method of spam dissemination
conceals the true spam originator from the eyes of any authorities.
The hundreds of millions of owners of those hundreds of millions
of compromised PCs have no clue that they are accomplices in one
of the great scourges of the modern era.
It's no exaggeration to talk in terms of millions,
tens of millions or even hundreds of millions of computers. Nobody
knows exactly how many Internet users there are worldwide, but certainly
in excess of a billion (a thousand million) and probably closer
to two billion.
But being an unwitting spammer is not the worst of it for the user
of an infected PC. You see, bots can steal from a PC just as easily
as they can use it for spamming.
The modern cyber-crim doesn't break into a PC so he can wreak havoc
with mindless destruction—deleting files, leaving disgusting
messages, sending your browser to pornographic websites, inundating
you with "adult" pop-ups, etc.
Sure, all of that happens too, and vindictive "script-kiddies"
are as active as ever, but today's real cyber-crim is much smarter
than that. His goal is to make money.
Data that is stolen without the owner's knowledge is much more
valuable, because it can be monetized before the rightful owner
can take preventative measures, such as changing passwords or canceling
credit cards.
Another indicator of malicious intrusion is degraded performance.
There can be several reasons why a computer appears to be running
much slower than it used to, or is prone to lockups and crashes.
Very high on the list of reasons is that it has been compromised
in some way.
We've seen PC owners almost speechless at how
their computers have become "like new again" after
a thorough housekeeping and clean-out of malware.
OK, so the dangers are real and very, very prevalent. And if you
are running an unprotected PC connected to the Internet, you probably
already have at least some problems.
So what's the answer?
My
name is Bill Hely and I assembled my
first computer in a plywood case almost 30 years ago, long before
there was any such thing as a "PC".
That was a long time ago, but it was the beginning of my fascination
with information technology. A fascination that I turned into a
long and successful career.
For over two decades I have been an in-demand freelance IT consultant
to the small business community. Today I restrict my 1-on-1 consulting
work to security and the Internet, and to a small, select group
of long-term clients.
My main interest is in creating, maintaining and supporting educational
materials for the people who need help the most. They are the individuals
and small business operators who don't have the luxury of "on
tap" IT support staff, or the budgets to call in high-priced
consultants whenever something goes awry.
In recent years I have translated my knowledge and experience into
several very special eBooks. Some would classify them as "technical"
books, but in fact they are quite the opposite.
My goal is to make important technical topics understandable to
the non-technical reader.
In that context I guess you could call them "non-technical
books" but, however you classify them, I'm proud to say they
have been praised by all types from beginners to experts and IT
professionals. You'll find comments from some of them below.
My best known book, The Hacker's Nightmare™, is unchallenged
as the #1 plain-language guide to computer and Internet security.
It has been repeatedly enhanced and updated since mid 2003.
When I was researching and writing The Hacker's Nightmare™
I was determined that there would be many individual chapters that
alone would be worth the cost of the whole book. Different chapters
to different people of course, depending on individual needs and
interests.
Based on feedback from my readers I'm confident that I have achieved
that aim. Read some of the testimonials
for yourself. Real people just like you, solving very real problems
and protecting themselves with relative ease.
In your own best interests you must know how to...
root out malware that has already taken up residence
in your PC
securely block the pathways hackers can
use to gain access to your data
protect against future attacks and infestations
recognize the tricks of the spammers,
scammers and eavesdroppers
keep prying eyes away from your sensitive
documents
Since its first edition in 2003, people from all over the planet—beginners
& experts alike—have turned to The Hacker's Nightmare™
to accomplish those goals.
Clean up and secure your own PC according to the clear instructions
in The Hacker's Nightmare™, then watch your computer
miraculously perform once again like the day you first turned
it on.
What you learn here could save your personal life or your business
from embarrassment, crippling losses, possibly prosecution, even
loss of your identity or your business.
In recent years, as the Internet became an integral part of business
operations, I have been called upon more and more often to rescue
what could be saved from the wreckage of disastrous events—disastrous
to precious data and equally precious time.
My involvement with many different businesses, in numerous locations
& over a long period of time, has led me to an inescapable conclusion:
Small business management and staff—from the boss through
middle management to the employees at the coal-face—are woefully
uneducated in even the basics of computer and Internet security.
And that goes double for the average home computer user.
Please don't take offense—I'm not laying blame on you personally.
For years the media and the self-styled experts have been telling
you how "hard" and "complex" it all is. Or you
may be operating under the disastrous delusion that installing an
anti-virus program is "protection".
Take just 5 minutes...
... to read the rest of this page, while I explain some important
facts of life about data security, the Internet, your home/office
computers—maybe even the continued existence of your business,
or the integrity of your identity.
Once you learn the true facts, I look forward to helping you guard
against the hackers, worms and other 'germs' that threaten your
time, your computers, your profitability, your data—even your
very livelihood.
Taking at least some preventative action in an unplanned, piecemeal
fashion is better than taking no action at all. But you will soon
discover such an approach is a case of two steps forward and one
backwards (or worse). The attacks will never cease and, with an
unplanned "plug 'n pray" approach, the holes will always
be there.
Contrary to popular belief, PC and Internet security
is not all that difficult. It just needs to be done right.
Join the ranks of those who have proved to themselves that following
my strategies will certainly achieve those goals.
But The Hacker's Nightmare™ is much more than an instruction
manual.
It is also an education in developing a safety mindset ... and
it is about giving YOU the power to take back control of your own
welfare, security and peace-of-mind, without any significant expense.
It is about effectively addressing your delusions and correcting
your ignorance of the real facts, without the need for technical
expertise, consultants or expensive products and services.
Some inexpensive security software is necessary—that's just
common sense. But I give you all of the what, when, where, why and
how to make the right decisions at minimum cost.
The Hacker's Nightmare™ distills everything
of importance that I have learned over many years about how to
PREVENT disasters, instead of just how to clean up after the damage
is done.
These strategies have been proven to work time and again and have
become a valuable resource for computer users all over the world.
It is so thorough and so broad in scope that even many IT professionals
find something new to interest them, but my main focus has been
to offer practical help to the people who need it most—the
small business operator, the entrepreneur and the home user.
This is the stuff your expensive consultant won't teach you.
But I'll show you—in simple, non-jargon terms—how to
take all necessary preventative actions without resorting to outside
experts or expensive suites of software.
In case you've been living in a cave for a while, here's a brief
summary of just some of the threats that are hammering computer
users—both businesses and private—every hour of every
day:
Viruses, worms and trojans waste hours of your
time protecting against them and cleaning up after them. And how
good a "cleanup" job are you really doing anyway?
Spyware gathers information about your browsing
& online shopping habits, or even personal information about
you, and sends it off to "interested parties".
"Script kiddies" steal anything of
value and trash the rest.
Identity thieves can empty your bank accounts,
max out your credit cards, and grab sensitive information from
your eMails. Identity theft is one of the fastest growing crimes,
both online and off.
Spam is a massive annoyance and time waster
and often conceals more insidious threats.
Keyloggers can record every keystroke you type
at a keyboard, and pass that mother-lode of information on to
anyone, from a malevolent "script kiddie" to professional
criminals.
"Dumpster divers" can rat through
your rubbish bins for clues to passwords, account numbers, identity
information, etc. You'd be amazed how an extensive profile can
be built up—bit by bit—from seemingly innocuous bits
of rubbish found in almost everyone's trash.
Hackers/Crackers seek commercially sensitive
information they can sell to your competitors or otherwise use
against you.
And that's just a few of the more common threats
Attacks, both crude and sophisticated, some damaging, others just
invasive, striking without warning and from many different directions,
both online and off.
It is the small business owner and the average home computer user
who suffers most from these malicious attacks.
The authorities and bureaucratic watchdogs can't protect you
against a menace that crosses national boundaries. There are no
effective cyber-police to call on. Your antivirus protection is
simply not enough any more.
It's a tough, complex, unforgiving, even malicious world out there
in Internet-land.
But there's no need to despair. You can now discover, step-by-simple-step,
how to keep the hackers, worms and other "germs" out of
your PC and out of your life . . . once and for all!
You are NOT helpless!
Even if you aren't a "techie" you now have a way to arm
yourself against threats to your computer and the personal information
it contains. You can do it without learning a lot of technical detail
and without spending a lot of your hard-earned money.
In fact, some of the best defense tools can be had completely free
of charge. You just need to know what they are, where to get them,
the strengths and limitations of each, and how to apply them. In
other words, you just need the right information and some informed
guidance.
You need to know...
What the threats are (there are many more than
you might think).
Why each threat or vulnerability is a danger
to you and how each can be used against you
What specialist measures are suitable to block
each one and which is the best to use.
Where to get the necessary protection.
How to apply that protection for the best results.
How to keep your security up-to-date without
spending a lot of time on it.
The Hacker's Nightmare™ will transform
YOU
from an easy mark into a hard target.
It will turn YOU into a hacker's and virus writer's worst nightmare!
You will learn the cyber-grub's favorite spoiler tricks and how
to protect yourself against them. Here is just a partial list of
what is covered:
Almost 500 "easy reading" pages,
broken up into logical sections and digestible chapters.
Clear and explicit explanations, recommendations
and instructions, always presented in a logical, step-by-step
sequence and in understandable terms, that leave nothing to guesswork.
Hundreds of images, diagrams and screen shots
to graphically illustrate important steps and concepts.
You'll learn the What, Where, Why and How you
need to protect your home and office computers, without the need
for any advanced technical expertise.
Exclusive and perpetual access to the Private
Members Pages of The Hacker's Nightmare™ website,
where new features, special bonuses, discounts and updates are
made available to members only.
How to substantially reduce—even eliminate—the
chance of intrusion, data theft or damage.
And much, much more.
Knowledge is power, and it's always what you don't know that can
hurt you the most. Unfortunately very few business owners and managers
have any real "security awareness" of the extent of their
exposure to danger.
You wouldn't leave the final decisions to a consultant or employee
in any other critical area of your business; yet you think you have
no choice when it comes to computer technology.
"But I'm a manager. Isn't this book
more for the technical people?"
Definitely not!
Many managers have used The Hacker's Nightmare™ as
an executive overview—they absorb the discussion sections and
skip the practical instructions. They learn the questions they should
be asking of their consultant or in-house "computer person",
and the instructions to give them, then leave it to the tech-types
to implement the actual blocks, patches, fixes and preventative
measures.
You can be back in full control without becoming a "computer
expert". But if you want or need to be hands-on yourself, everything
you need is right there in The Hacker's Nightmare™,
and you'll be surprised at how little technical expertise you'll
need to secure your systems.
Slash expenditure on external consultants...
A computer user educated in the ways of the cyber-grubs makes fewer
mistakes and is far less likely to be responsible for an accidental
security breach.
The fewer mistakes made, the less often you have to call on the
services of an expensive consultant to clean up. The cost of professional
services is a big imposition on the small business. And unfortunately,
not even all IT professionals are "security competent".
You won't be damaging your relationship with existing IT service
people either.
From my many years as a consultant I can assure you that most
genuine IT contractors would much rather be helping you improve
your procedures and systems than just "mopping up" all
the time.
Some of our business clients purchase a copy of The Hacker's
Nightmare™ for every employee who uses a computer. Some
even make "signing off" that they have read the book a
condition of employment for all staff that use computers. This
policy has practically eliminated security issues due to "user
error" and has saved those companies many thousands of dollars.
Substantially reduce or eliminate system crashes and slowdowns...
One of the major reasons for frequent crashes and slowing down
of computers is the presence of software of an undesirable nature—i.e.
malware. Most often it takes the form of spyware which has been
loaded into your computer via eMail or web browsing.
The purpose of most spyware is to watch and record your online
activities and report back to its "master" about your
browsing habits. This information is used to hone their marketing
strategies.
That type of spyware is intrusive but relatively benign.
There is also a much more dangerous type of spyware, designed to
mine all manner of sensitive information from your PC and transmit
it to cyber-crims with no scruples or regard for your privacy. They
will use any information available to profit from you by theft,
impersonation, blackmail, identity impersonation, etc.
Far too many people take no action until their computer is infected,
then waste time searching for information on how to recover from
a particular threat. The Hacker's Nightmare™ provides
you with effective techniques to prevent all such intrusions in
the first place.
Stop worrying about the safety of your data and concentrate on
building your business...
If you have ever lost critical data files in the past, you may
already be a little paranoid about backing up, taking copies, etc.
That's fine. Many businesses that suffer a major data loss never
recover.
But have you ever taken a moment to calculate how much time is
spent just on backing up, restoring, copying, archiving, etc.?
Yes, it's important—very important—but most small businesses
that do implement such safeguards also spend far more time than
they really have to on these necessary but unproductive tasks.
There are better ways to safeguard against loss in the first place,
and faster ways to recover when an accident does happen.
Here's just a sample of what you'll learn from The Hacker's
Nightmare™:
What a Firewall is and why you must have not
one, but two of them. Very specific advice on selecting a firewall/router.
Effective firewall protection is critically important, yet inexpensive
and a lot easier than you think.
NEW! Complete chapter on wireless
security; this important information supplements the firewall/router
material.
How improperly disposed of documents embarrassed
a major government, even though the documents had been shredded.
You'll be amazed at what technology can recover from shredded
paper. You'll learn the importance of document shredding, its
weaknesses and what you should know before buying a shredder.
The inexpensive, no-tapes, stored-off-site, data
backup service that's such a no-brainer you'll wonder how you
ever got along without it. No extra hardware needed. The only
sane way to handle a back-up regimen.
How, in just a few minutes, you can have the
ability to use your home or work computer from remote locations
anywhere in the world—in complete safety. There are many
traps and dangers in remote PC operation, but you'll learn exactly
what they are and how to compensate.
How multiple PCs can share one Internet account
and gain a significant security advantage into the bargain.
Important configuration information that is unique
to each individual PC and where to find it.
How to safely, securely and easily manage and
recall any number of passwords—from a handful to hundreds—without
having an amazing memory or keeping notes.
Why a virus hoax can be as damaging as a real
virus.
How to find out who's trying to access your computer
from the Internet
The difference between a Worm, a Virus and a
Trojan—and why an anti virus program alone just isn't good
enough.
Three essential levels of protection against Trojans
and Spyware.
How to use "event scheduling" to enhance
your security, free up your time and supplement your fallible
human memory.
How to remove an apparently "unremovable"
virus in Windows XP.
Why patches, updates and upgrades are critical
to your computer's security; where to get them and how to stay
up-to-date with minimum effort.
Why "delete" and "format"
don't completely erase sensitive data, and how to do the job properly.
What spoofing is and how to be alert for it.
Potentially dangerous standard Windows components
you neither need nor want, and how to get rid of them.
Reliable sources of threat warnings that you
must know about, and how to automate their delivery to you.
The concept of Good and Bad Cookies and how to
manage both with ease.
Warning signs that you, your family or staff
may be the targets of a "social engineering" scam.
Secure passwords and personal computer privacy
go hand-in-hand. You'll not only discover simple ways to create
secure passwords but also how to recall the right password
at the right time, without having a super memory.
The dangers of the popular peer-to-peer file sharing services
and how to protect yourself.
How to recognize and handle Phishing exploits.
The truth about the Outlook Preview Pane. Is
it really a security risk?
The right way to install and remove software.
And much, much more.
How many more reasons could you want to start taking action immediately?
Frankly, if you're not already convinced that The Hacker's Nightmare™
is a must-have, must-read resource for EVERY computer user, you
really need to reexamine your priorities. However, no one has ever
accused me of being stingy, so...
Just to add even more value to an already indispensable package...
BONUS #1:
One-on-one Professional Support
No one else would DARE make this offer! Personal one-on-one
support from the author via eMail. Your expensive consultant will
hate me for this!
Any owner of The Hacker's Nightmare™ is eligible
for personal 1-on-1 support from the author via eMail. If you've
got a "help me" query related to any topic addressed
in The Hacker's Nightmare™ I'll do my best to help
you solve it or point you in the direction of a suitable resource.
This bonus alone is worth many times the cost of the book!!!
Only available so long as I'm not
overloaded, so don't delay. This valuable bonus WILL disappear!
BONUS #2: Free
CD—airmailed to you at our cost
The Hacker's Nightmare™ was originally sold as a downloadable
eBook, with a CD available as an extra-cost option on request.
The CD was important to people with very poor Internet connections
who have trouble downloading large files.
But ... if you place your order immediately you will not only
receive instant access to download the book, but you'll also receive
the CD version at no extra charge.
I'll bear the cost of the CD and the mailing to anywhere in the
world, but you must act now. This is not a cheap option and I
reserve the right to discontinue it without notice.
Act NOW and I guarantee you'll receive a CD by follow-up airmail.
BONUS #3:
Lifetime Access to Members-only Website
What this really means is free access to all future editions of
The Hacker's Nightmare™ and all other utilities, associated
publications, software, tips, tricks, discounts, etc.
You'll never have to buy an update. Just join my exclusive free
VIP Notifications Service (you'll receive an invitation after
your purchase) and you'll be automatically notified of the availability
of new material.
ADDITIONAL FAST-ACTION BONUS
"Seven
Steps to a Clean PC"
This 49-page, step-by-step, solution-filled manual is a popular
product in its own right, and something you would willingly pay
a fortune for when the "bad stuff" starts happening.
The Hacker's Nightmare™ has no equal when it comes
to protecting your PC from every conceivable threat. But what
if your computer is already compromised? The surefire answer
is "Seven Steps To A Clean PC".
Written in plain-language and extensively illustrated, "Seven
Steps To A Clean PC" holds your hand through a carefully
thought-out series of remedial steps guaranteed to bring your
PC back from the brink of disaster.
This bonus alone could save you hundreds of dollars!!!
But you must act NOW to qualify
for this bonus! It's a popular seller in its own right
and we won't be giving it away for long.
There's no way to know
just how much the bonuses alone are worth, but each and every
time you have to call on the services of an expert, that call
will cost you well in excess of the cost of The Hacker's Nightmare™.
Competent consultants charge from $100 per hour, up into the many
hundreds per hour, and invariably there will be a one-our minimum
call-out. Technicians may be a little cheaper, but a minimum charge
will still apply.
It's a foregone conclusion that you will not get out of calling
on a technician or consultant for even twice the cost of The
Hacker's Nightmare™—and you'll have to return to the
expert each and every time you have a problem.
For readers of The Hacker's Nightmare™ the likelihood
of ever needing the services of a professional to recover your PC
from malware attack is reduced immeasurably.
I absolutely guarantee you that The Hacker's Nightmare™
will save you many, many hours of lost productivity—not to
mention frustration, anger, data loss, identity theft and so on.
But that's not all...
Look, I won't deceive you. Depending on the nature of the problem
it may eventually be necessary to call on a pro, because there are
some things that just can't be rectified from afar.
But if something in The Hackers Nightmare™ does stump
you, your first port of call need not be a costly professional.
Your first contact can be to a FREE consultant. Yep, that's yours
truly ... me ... the guy who wrote the book! Run your problem past
me first and let's see if we can't leave the costly professional
right out of the equation.
So how much is that service alone worth to you? I can tell you
that I normally charge considerably more than $100 per hour, with
a one hour minimum!
Decision time!
You
risk absolutely nothing to discover that every single claim on this
page is gospel-truth, so why not give yourself the advantages that
people worldwide, like those quoted at the
bottom of this page, have experienced for themselves.
The vermin of the Internet aren't going to disappear any time soon.
In fact their conduct is becoming more dangerous and more disgraceful
all the time. The Hacker's Nightmare™ can show you exactly
how to guard against them, but you must take the first step by clicking
the link below.
Enlist The Hacker's Nightmare™ into your ranks and
watch the threats beat uselessly against your defenses.
No Guessing. No Study. Nothing to 'figure out'. Just follow the
clear explanations and dozens of illustrations to a threat-free
online experience.
If this isn't the best $67 you ever spent on your computer ...
on your privacy and safety ... on your peace of mind ... then I
don't want your money!
I'll give you TWO FULL MONTHS to use The Hacker's Nightmare™
risk-free.
If you're not completely happy with what you discover in that time,
I don't want your money. I'd be too embarrassed to keep it.
The next step is yours.
You know what you'll receive. You know there's a 60-day money-back
guarantee, you know that many people like you have already benefited,
and you know there is no risk at all.
Today, tomorrow, any time at all, YOU could be the
next victim of some lowlife hacker or crim, the vermin responsible
for flooding the Internet with viruses, trojans, spyware, scams,
entrapment websites, phishing eMails — the list of threats
is depressingly long.
REMOVE YOURSELF FROM THE LINE OF FIRE!
Immediate
download any time of the day or night.
Need still more to think about?
Professional Responsibility
Did you know that a business
owner is legally liable for the safety of personal information
held about others—employees, customers, patients, suppliers,
subscribers, anyone at all.
We expect doctors, accountants,
lawyers and the like to be bound by stringent privacy safeguards.
But in most jurisdictions those same laws apply to the business
owner as well.
Further, in many cases
the business operator is also legally responsible for the actions
of employees.
The harsh reality is
that, in the event of unauthorized access to information stored
on your computers, if it can be shown that you didn't take all reasonable
steps to safeguard that information, you could find yourself facing
civil litigation or criminal charges or both.
And be warned: the installation
of an anti-virus program doesn't even come close to "all
reasonable steps" by any definition.
-oOOo-
Popular, everyday gadget
items like an iPod/MP3 player or a digital camera can "walk"
your precious data and records off your premises, right under your
unsuspecting nose?
But there is an inexpensive, easily-implemented solution.
-oOOo-
Every Microsoft Word document you produce contains hidden information
called "metadata"; information that can contain a lot
of identifying material?
British
Prime Minister Tony Blair and US Senator Rod Grams were both severely
embarrassed by metadata from Word files.
Are you and your staff sending out information you would rather
not have made public?
-oOOo-
Erase, delete, format, even fdisk, cannot be relied on to permanently
remove data from your hard disk drives?
Ex-Beatle
Paul McCartney's bank exposed hundreds of his financial files when
they sold off an old computer which had not been properly cleansed.
But utterly obliterating
all existing data is cheap and easy if you know how.
-oOOo-
Your home trash can
and your office dumpster are gold mines of information to the hacker
and the identity thief?
In The Hacker's
Nightmare™ a retired FBI Special Agent will tell you exactly
what anyone who knows the tricks can do with your refuse.
-oOOo-
Media giant USA
Today and tech marketing and design firm Avantgarde commissioned
a series of vulnerability tests of Internet-connected computers.
Here are some of the findings:
"Simply
connecting to the Internet — and doing nothing else —
exposes your PC to nonstop, automated break-in attempts by intruders
looking to take control of your machine surreptitiously."
"...an
unprotected PC can get hijacked within minutes of accessing
the Internet. Once hijacked, it is likely to get grouped with
other compromised PCs to dispense spam, conduct denial-of-service
attacks or carry out identity-theft scams."
"Break-in
attempts began immediately and continued at a constant and
high level: an average of 341 per hour against the Windows
XP machine with no firewall or recent security patches..."
Click
Here To Claim Your Copy
of The Hackers Nightmare Now
Here's what just a few of our readers from
around the world have had to say about The Hacker’s Nightmare™
"... loved it, it's the first computer
related thing I've read that makes sense to me as an IT illiterate"
- Lucy Fisher
- Executive Director
- Private Hospitals' Association
- Brisbane, Australia
-oOOo-
"...if
you care about your data, security and privacy check out our recommended
eBook on the subject of vital protection — The Hacker's Nightmare
— before it's too late."
- David Bradley - Science Writer
- http://www.sciencebase.com
- Cambridge, England, UK
-oOOo-
"I'm
an Information Security Analyst and a computer scientist with a
Fortune 500 company...and I still bought The Hacker's Nightmare.
"...I wish I could have written this book.
The problem is that I don't have the patience to track down all
of the details author Bill Hely provides, nor do I have the ability
to explain things quite as well as he does. Bill breaks down the
technology into terms that almost anyone can understand, without
omitting anything you need."
- Tom Brownsword
- Security Analyst
- http://www.TomBrownsword.com
-oOOo-
"Bill I can't tell you how much time and money I've wasted
trying to clean up and protect my computer. Most solutions people
sell have been a complete waste.
"Your course, your assistance, YOU Bill, have been the complete
opposite. You offer a solution that's simple to understand, enlightening
to know, and unbelievably effective."
- Alan Saltz - President
- YellowPagesProfit.com
- New York City NY USA
-oOOo-
"Bill, there is no way I can thank you
enough for creating this wonderful book. I have done little else
since I downloaded it other than print, read, experiment and learn.
You are truly a genius and a very kind person.
"...it is far more than a book on how to protect a computer.
It also gives all the basic information on different concepts from
Computer 101 to Advanced."
- Barbara Dingman
- Manzanita OR USA
-oOOo-
"What an astounding achievement your Hacker's
Nightmare eBook is. I haven't seen anything remotely like it anywhere!
"I cannot stress enough how important I found your book to
be. You cut through the techno-babble and made it plain as daylight.
You even answered questions I'd never think of asking!
"The Hacker's Nightmare helped me to tighten up my own security
by at least 200%. It also offered me valuable information about
many privacy issues and provided me with literally dozens of incisive
instructions & tips involving online safety."
- Andrew Oscianko - CEO
- www.MotivationVault.com
- Geelong, Australia
-oOOo-
"My
heartfelt thanks to you for finally writing a book about Internet
security in a language that us 'non-techies' can understand...
"The Hacker's Nightmare actually made me physically
cringe as I realized just how easily [intruders] could access my
system despite the fact I have installed expensive software to prevent
just that."
- Eric Hart - Proprietor
- Hints-Tips-Newstuff.com
- Christchurch, New Zealand
-oOOo-
"Online attacks have become so bad, so
prevalent, if the Internet was in the real world you'd want to be
armed every time you went out. Surfing the web I was forever on
edge. Then I heard about The Hacker's Nightmare. Have no doubts
about it, this book is a weapon, crafted by a master armourer."
- Alaistair N Clegg
- Property Investor
- London, UK
-oOOo-
"...anybody
interested at all in protecting their system, The Hacker's Nightmare
is certainly a purchase they should consider making."
- Bob Parsons
- Founder & President
- Go Daddy Domains
- Scottsdale Arizona USA
-oOOo-
"Thank you for offering the best help
I have experienced in the 25 years I have used a computer."
- Patrick Chong
- Castle Hill, NSW
- Australia
REMOVE YOURSELF FROM THE LINE OF FIRE!
Prime Contact:
Bill Hely
Mailing Address:
Bill Hely Consulting
PO Box 164
Clayfield QLD 4011 Australia
eMail:
Please use
this form
Telephone:
(61) 7 3262 6679
An answering system operates outside normal
office hours, when staff are busy and when the office is unattended.
Secure order form.
Immediate download - day or night.
Bill Hely is a Charter Member of the
International Council of Online Professionals
Click the logo for verification and Code of Practice.
Support | Privacy Policy | Integrity | Contact
us | Spam Complaints |
FAQ | Safety Tips | Tips & tricks
| Articles | Affiliates | Sites Library |
The latest Version of The Hacker's
Nightmare™ is: Edition 2.4
The Hacker's Nightmare™ is a publication of Bill Hely Consulting
Serving the small business community since 1988
The entire content of this website is protected under Copyright,
all rights reserved. If not explicitly permitted by the owner, the
use of any material (including distribution, reproduction, modification
or republication) is strictly prohibited.