Back
to: Home Page
Back
to: SUPPORT Page
Experiencing high internet usage?
Games Apps and Online TV are currently the worst usage hoggers.
Do not install MacKeeper or iAnti-Virus: See this User Tip: https://discussions.apple.com/docs/DOC-3022
FAKE ANTI-VIRUS SOFTWARE and associated MALWARE (To repeat: the expression ‘malware’ is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software.)
Do not be tricked by 'scareware', such as pop-ups on your browser, that tempts computer users to download fake anti-virus software that may itself be malware.
Once installed, the software may steal data or force people to make a payment to register the fake product. Examples include MacKeeper and iAntivirus, but there are others. Also, beware of MacSweeper and MACDefender* (also goes under the name of MacProtector, MacGuard, MacSecurity or MacShield): These are malware that mislead users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases will also mess up your system.
*Malicious software dubbed MACDefender takes aim at users of the Mac OS X operating system by automatically downloading a file through JavaScript. But users must also agree to install the software, leaving the potential threat limited.
*(This malware is not to be confused with MacDefender, the maker of geocaching software including GCStatistic and DTmatrix. The company noted on its site it is not affiliated with the malware.)
Malware spreads through search engines like Google via a method known as "SEO poisoning." The sites are designed to game search engine algorithms and show up when users search for certain topics. It is always a good idea to Block Pop-ups in your browser preferences.
TROJANS and RE-DIRECTION TO FAKE WEBSITES
The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
Mac users should always obtain their copy of Adobe Flash Player directly from Adobe’s official website and to disable the "Open 'safe' files after downloading" option in Safari Preferences/General to avoid automatically running files downloaded from the Internet. Also, do not turn on Java in Safari Preferences/Security. Few websites use Java. Javascript is something entirely different and should be left active.
(Adobe is aware of malware posing as its Flash Player and warns users to ignore any updates that didn't originate on its own servers. "Do not download Flash Player from a site other than adobe.com," said David Lenoe, Adobe's product security program manager, in an entry on Adobe Product Security Incident Response Team's PSIRT blog. "This goes for any piece of software . If you get a notice to update, it's a good idea to go directly to the site of the software vendor and download the update directly from the source. If the download is from an unfamiliar URL or an IP address, you should be suspicious.")
GENERAL ADVICE ON HOW TO AVOID INFECTION IN THE FIRST PLACE:
1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites, i.e. the developers’ own web sites or the Apple App Store. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
4. Consider using Mac OS X's built-in Firewalls and other security features.
5. Avoid Peer-to-peer sharing applications. Download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks may apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking
Are there any other Wi-Fi capable devices on your network (e.g. cellphones)?
Reliability and security downloads are important. They prevent hackers from
damaging your operating sytem (e.g. OSX) and its programs.
PHISHING AND POTENTIAL IDENTITY THEFT:
"Phishing" (also known as "carding" or "spoofing") refers to email that attempts to fraudulently acquire personal information from you, such as your account password or credit card information. On the surface, the email may appear to be from a legitimate company or individual, but it's not.
As a general rule, never send credit card information, account passwords, or extensive personal information in an email unless you verify that the recipient is who they claim to be. Many companies have policies that state they will never solicit such information from customers by email, and that includes your bank, credit card company, and Apple.
I recommend installing an app which tells you how many Megs or Gigs you have used from the
internet on your device.
Click here for Bandwidth+
Experiencing high internet usage? Did your internet stop working?
Any issues or
topup requests, call the cellphone number or my landline telephone or
email me or Skype me.
Only contact
me after restarting
your modem & devices.
To
reduce usage: I recommend switching off your computer(s) when
you do not use them. Alternatively you may unplug the network cable
from the modem-router or switch off the wireless button of your
laptop.
Usage could be any of the following:
1.
Viewing online advertising: moving pictures or movies on websites.
2.
Server-side type websites, e.g. Facebook, Google, that use built-in
programs (apps) such as a built-in chat program, or a "preview".
3. Skype
only uses much bytes when one uses voice
or video
(webcam).
In text-chat mode usage is minimal.
To
switch of video receiving and sending open Skype, click Tools >
Options > Video Settings > Untick "Enable Skype Video".
4.
Online streaming
movies.
(for example Facebook or YouTube movies)
5. Talks
are
streaming videos.
that means that it is a live video&voice
which downloads as you view it.
7.
Compress and resize pictures before emailing/uploading them.
8.
Convert scanned TIF pictures to JPEGs.
9. Block Spam
emails by
blocking their email addresses.
10. Online games (e.g. Casino
games)
12. Change
Facebook Account settings
so that Facebook or Twitter stops sending automated email
messages.
14. Websites with
music
running in
the background.
15.
Uninstall unwanted program such as peer-to-peer
download-and-file-sharing
programs.
e.g. Limewire
16. Downloading
music or videos or programs.
17. Llistening to
internet-radio
music. Similar
to audio-streaming or voice-streaming.
18.
Do not leave your web browser open on a site with automatically
refreshing content.
20. Emails: Use "text-only" format
instead of HTML.
21. Do not register to unnecessary mailing lists.
22. Facebook,
chat, photos, music, slideshows, research, google, website editing, DropBox,
movies,
23.
Antivirus updates
24.
Free automatic OSX security patches
25.
Free automatic OSX service pack donwload
26.
Free automatic OSX reliability patches
27.
Online backup programs constantly backing up.
28.
please do a full advanced virus scan of all your computers.
How
to reduce your usage: (To save on Megs/Gigs:)
1. Check that
nobody else is using your internet account wirelessly:
Is
your wireless network secure? Does it have a password (/numbers)?
2.
Switch off computers & screens at night (Saves electricity as
well).
3. When on holiday, unplug both telephone cable and power
supply from your modem. Also unplug your devices and screens.
This
will also protect your devices from lightning or power surges coming
through the phone line or the power cables.
4. Email your friends to stop sending you boring messages or forwarded messages and boring
photos and slideshows.
5. For sending scanned faxes: Use JPG
compression instead of .TIF
There are many more things one can do!
Viruses,
Trojans, Worms, Downloader Viruses and Malware:
If
there is a virus on any of your computers which is either accessing
an illegal network or is sending out automatic emails, then I may
disconnect you after notifying you.
In
reading this, you acknowledge that Karl has no power to control
the content of the information passing over the Internet and its
applications, including e-mail; chatrooms; news groups etc, and that
Karl cannot be held responsible or liable, directly or
indirectly, for any of the abovementioned content, in any way for any
loss or damage of any kind incurred as a result of, or in connection
with your use of, or reliance on, any such content.
The
customer acknowledges and agrees that Karl shall without
limitation have no responsibility for, or liability in respect of any
data lost as a result of this system including the loss of emails.
Karl
urges customers not to reply to unsolicited mail or "spam",
not to click on any suggested links provided in the unsolicited mail.
Doing so remains the sole responsibility of the customer and Karl
cannot be held liable for the Customer being placed on any bulk
mailing lists as a result.
Where the customer has authorised a
minor to use any of the Karl's services or access its websites,
you accept that as the parent/legal guardian of that minor, you are
fully responsible for: the online conduct of such minor; controlling
the minor's access to and use of any services or websites; and the
consequences of any misuse by the minor, including but not limited to
transactions entered into by the minor using such access.
Karl
cannot be held liable for any business dealings you have with
any third parties on the Internet. Further, Karl assumes no
responsibility whatsoever for any charges you or any user of your
account incurs when making purchases or other transactions in this
manner. Further, the responsibility for ensuring compliance with all
applicable customs and exchange control laws in connection with any
such transactions shall be the customer's.
Terms and conditions
may change without prior notice.
Fake anti-virus programs,
unwanted programs, misleading applications:
A
fake (anti-virus or Registry cleaner) program is a type of misleading
application that pretends to be security software, but which actually
provides the user with little or no protection whatsoever and, in
some cases, can actually facilitate the installation of malicious
code that it purports to protect against. It lies that it can remove
unwanted applications such as spyware or adware. These scams cheat
users out of money by charging for their fraudulent product, but the
personal and credit card information that users provide to register
these fake products could also be used in additional fraudulent
activity. Ref: http://www.symantec.com
They
can even be disguised as needed video codecs or browser plug-ins to
view web content. They also get onto your mac through unpatched
software vulnerabilities. Ref: http://www.symantec.com
Online
backup programs: is somebody offering you to backup all your
confidentail data for you for free? I wonder how they cover their
costs.
In
the case of experiencing high usage:
You may have a virus or
peer-to-peer software installed on your machine.
Common
peer-2-peer software is limewire, e-mule, e-donkey, Kazaa and
Morpheus. Peer-2-peer software, if not configured correctly, will
allow users on the internet to download software from your computer
which can result in a large portion of your Gigs being used without
you knowing about it.
Scan
your system for viruses (Full Scan) with a quality antivirus program
such as Norton before changing any of your passwords.Do not
unsubscribe from an unwanted mailing list, this only confirms to them
that your email exists. Never contact your enemy.
Peer-2-peer
file-sharing programs:
- software to swap music, video and other
files over the Internet. Many free P2P file sharing programs exist.
The settings of these programs need to be checked: Disable file
sharing or the programs need to be removed:
e.g. BitTorrent, Ares,
BearShare, Kazaa, Morpheus, Limewire, eDonkey, Overnet, eMule,
Ref:
http://en.wikipedia.org/wiki/File_sharing
There
are a number of risks associated with P2P file-sharing. P2P client
software can easily infect personal computers with viruses and
spyware, creating a host of problems for the computer’s owner
such as the theft of financial information. Pornography, inflammatory
material, and malware can be disguised and then shared through P2P
networks unknowingly. Shared copyrighted material like copies of
software, music, or movies is illegal and possession of these files
has the potential to expose the computer owner to prosecution and
fines.
Adware
Annoying
pop-up and banner ads? System slowdowns? Your computer may be
infected with Adware
Bots
& Botnets
Hackers
use bot programs for theft, fraud, and denial-of-service attacks on
Web sites
Browser
Highjacking
Malware
used by hackers to direct your computer to their websites, regardless
of the address you entered.
Cookies
A
Web page that welcomes you by name uses cookies
Counterfeit
Products
Extortionware
A
software program that encrypts essential personal files - taking them
hostage and demanding money for their safe return
Keylogger
Hackers
illegally use software keyloggers to identify their victims’
computer passwords, login names, bank account and credit card numbers
Malware
Any
software program developed for the purpose of doing harm to a
computer system or to create mischief
Man-in-the-Middle
Attack
Cyber
criminals eavesdrop on electronic communication between a consumer
and a legitimate organization
Nigerian
Scam
Unsolicited
email messages from a stranger who promises great wealth — a
get-rich-quick scheme
P2P
File Sharing
Peer-to-peer
file sharing is very popular on the Internet, but it can also lead to
virus infections and a host of other problems
Pharming
A
technically sophisticated scam designed to trick individuals into
disclosing sensitive information such as bank account, credit card,
and Social Security numbers
Phishing
Official
looking and sounding messages that urge immediate action to update
sensitive financial and identity information
SMishing
Designed
to trick you into divulging identity information, SMishing is
Phishing over cell phones and other mobile devices.
Social
Engineering Scams
A
scam that preys upon our acceptance of authority and willingness to
cooperate with others
Social
Networking Sites
Never
under any circumstances should your child or young teenager agree to
meet in person someone from one of these sites
Software
Piracy
The
illegal use and/or distribution of software protected under
intellectual property laws
Spam
The
cyber equivalent to junk mail – spammers have developed many
ways of obtaining email addresses
Spim
Unsolicited
product or service advertisements that appear as instant messages
Sping
Spam
from a fake blog tricking the unwary into visiting
Spit
A
spam campaign against VOIP voicemail
Splog
A
spam campaign directed against blogs
Spoofing
A
criminal pretends to be a business or organization in order to gain
access to a computer user’s sensitive information such as bank
account, credit card, or Social Security numbers
Spy-Phishing
In
a successful Spy-Phishing attack, a Trojan and/or Spyware is
downloaded onto your computer from a Phishing message.
Stealth,
Polymorphic, and Armored viruses
These
viruses hide, copy, or “armor” themselves in an attempt
to avoid detection and removal from a computer.
Bots
& Botnets
Hackers
use bot programs for theft, fraud, and denial-of-service attacks on
Web sites
Trojan
Horses
Files
or software programs that appear to be legitimate, but once installed
can cause havoc
Viruses
Malicious
programs or codes inserted into computer systems without the user’s
permission
Warez
Sites
Any
site that hosts pirated software
Worms
These
malicious software programs spread automatically from computer to
computer
Zombie
Drones
Personal
computers secretly under the control of hackers
Ref:
http://www.bsacybersafety.com/threat/p2p.cfm
The
internet, in the most simplest of terms, is a group of millions of
computers connected by networks. These connections within the
internet can be large or small depending upon the cabling and
equipment that is used at a particular internet location.
A
very simple analogy to use to understand bandwidth and traffic is to
think of highways and cars. Bandwidth is the number of lanes on the
highway and traffic is the number of cars on the highway. If you are
the only car on a highway, you can travel very quickly. If you are
stuck in the middle of rush hour, you may travel very slowly since
all of the lanes are being used up.
Traffic
is simply the number of bits that are transferred on network
connections.
A web page may be very small or large
depending upon the amount of text and the number and quality of
images integrated within the web page. For example, the home page for
CNN.com is about 1.5mB (1.5megabyte = 1500 Kilobytes = 1500,000
bytes). This is typically large for a web page. In comparison,
Yahoo's home page is about 887KB.
http://googleenterprise.blogspot.com/2009/01/2008-year-in-spam.html
How
much internet does a company use??
1GB
= 1000MB
1MB = 1000KB
1KB = 1Byte
Basic emails are 3kb
to 15kB big
Big Emails with attachments are 100kb to 2000kB (2MB)
big
1GB = 500 very big emails or 100000 small emails.
40
emails per person per day is about 20MB per day
(20 emails sent
and 20 emails received)
which is 620MB per person per month for
emails alone
Let's say we have 7 users
7 x 620 = 4340MB
= 4.3Gigs.
now we add the internet: Facebook, chat, photos,
music, slideshows, research, google, website editing, movies,
antivirus, OSX or Mac security patches etc.
50MB per person
per day (upload and download)
1550 per month
7x 1550MB = 11
Gigs
Add internet with emails: 15.3Gigs
For comments
and ideas please contact Karl.
Back
to: Home Page
You can check your macbook:
macbook has a free way of checking your usage
Activity monitor:
Open >Finder<
Open Applications
Open Utilities
Open Activity monitor
click Network
https://support.apple.com/en-us/HT201464
You may also upgrade your internet to any of the following accounts:
50 Gigs, 100 Gigs, 150 Gigs, 200 Gigs or Uncapped