Keeping Your Computer Safe On The Internet

How the Internet Bad Guys Can Hurt You

1.) Theft, Fraud and Financial gain:

2.)  Spying on You -  

 Spyware - a type of malware (malicious software) installed on computers that collects information about you without your knowledge

 Keystroke Logging & Watching the user's screen - spying on you and your activities while you are using your computer.

3.) Using you and your PC for Committing Illegal and Immoral Actions:

  Anonymizing Internet viewing - using your PC to do things the hacker does not want to be caught doing.  Downloading Child Porn or other illegal actions.  Especially common if you have a wireless network connection.

  Use of the machine as part of a Botnet,  a network of "Zombie"  PCs used to perform automated spamming or to distribute Denial-of-service attacks. eg:  "Anonymous"

4.) Old fashion, done simply for mischief and malicious purposes:

  Crashing the computer

  Downloading or uploading of files on the user's computer

  Modification or deletion of files

Always Be Suspicious, Always Be Aware

As with life and business the most important thing to remember is, Always be suspicious, and always beware. And if it seems too good to be true, it probably is. There are always risks and strings attached to everything digital.



Partners In Profit is here to help protect you at work and at home from PC Viruses & Malicious Computer Threats. We can help you recover from them, prevent them, and set up programs to back up your important information before you are even exposed to them.  Learn More

716 - 759 - 4429


 Methods Computer Bad Guys Use to Hurt You

Social Engineering Attacks -  Protecting yourself from these threats is about simple common sense and education rather than programs or technical knowledge. It is just the newer electronic method of con men tricking gullible people. Always be careful & suspiscious.

 Phishing - a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies.  (phishing description from Wikipedia, the free encyclopedia).

 Rootkit -  a malicious infection designed to hide it's existence from normal detection tools or methods of detection. Rootkit detection is extremely difficult because a Rootkit's foremost design consideration is to be able to hide itself from the normal tools designed to find computer viruses and malicious software.

Virus - a computer program that can replicate itself and spread from computer to computer. Some viruses have symptoms that are noticeable when they infect your computer, but the most effective and dangerous ones are the ones that don't call attention to themselves. They can continue subjecting you to their malicious purposes without you even realizing that they are hurting you.

Trojan Horse - malicious program designed to give full control of infected PC to another PC, steal information, or harm your computer system or data. A Trojan gives a Hacker remote access to a targeted computer system. Once a Trojan has been installed on a targeted computer system, the hacker has remote access to the computer and can perform all kinds of operations. Their main purpose is to make your PC open to access through the internet.

Adware -  software which facilitates more advertisements. The object of the Adware is to generate revenue for its author. Even if it is not malicious, it makes your PC much more vulnerable to other malicious software, slows down your PC, fills it with more junk and you sacrifice your privacy and security.

We offer our Safe Computing Checkup Service for business & homes

 We run extensive checks on your system to make sure your system is not already infected with malicious software, and make sure you are better protected from any future infections.

Our Onsite Safe Computing Checkup Special only $ 79.00

Please allow at least 3 hours of computer downtime for us to properly check out your system

716 - 759 - 4429


Email Security  -  Using Web Based Email Safely

Do not reuse usernames and passwords. If one PC or account is compromised, all your accounts can be compromised.

Consider multiple email/chat usernames -

Have a main account where you connect with friends, social networking, politics etc. but never use it for purchases or financial transactions. You can give this out freely.

Do not mix business and pleasure. Keep them separate.

 Consider having one exclusive account where you ONLY perform financial transactions.

Always use an exclusive username and password here. Never link that account to social networking sites like Google+, Facebook, LinkedIn.

Consider throw away accounts, and use them when you are unsure of those you are dealing with.  Email accounts are generally available free from Microsoft, AOL, Yahoo, Google etc.

 Often your Internet Provider (Time Warner, Verizon, Etc.) gives you free accounts. (but remember, you loose these if you change Internet providers, so don't use them as your main account)

Create an exclusive account for on-line purchases. Unfortunately many security threats come from merchants who don't value security highly enough and your information can be stolen. Eg: The Sony Gaming Fiasco, LinkedIn, eHarmony, Heartbleed, Target,Ebay  all have  suffered data breaches.

Using Credit Cards for Online Purchases


Consider using a special service from your Bank or Credit Card Provider that creates a temporary virtual credit card alias linked to your account for online purchases, if they are available. Eg:" Safeshop" from Bank of America, Citibank's "Virtual Account Numbers", Discover Card's "Secure Online Account Numbers". Tell your bank you want such a service if they don't already provide it. Don't trust vendors, merchants and credit card possessors to keep your information secure.



Protect Yourself !

Our Onsite Safe Computing Checkup Special only $ 79.00


716 - 759 - 4429

It's not just PCs on the Internet that are at risk

Smartphone Risks

 Realize that your Smartphone that connects to the Internet is also a miniature PC, and is also vulnerable to Malware.

 App stores are now delivering applications with malware hidden in them. Hackers hide their malware code within an interesting game or app, hoping to entice users to download it. Once activated, the hidden app may generate calls to for-profit phone numbers or send text messages to premium sites without the user's knowledge, steal passwords and other account numbers, or track a user's whereabouts.

Mac Users                        

Mac users are not immune from infection either. There is less malware targeting Macs, those numbers increase daily as the number of Mac users increases. The Mac is not more immune or secure, it is just that Hackers go after the largest base of users in their efforts, and the more popular Macs become, the more attractive a target Macs become.

Install genuine antivirus software. Ironically, the Apple App Store is a bad place to look - any antivirus sold via the App Store is required by Apple's rules to exclude the kernel-based filtering component (known as a real-time or on-access scanner) needed for reliable virus prevention.

Dangers of Wireless Internet and Wireless Networks -

Always make sure you are using the latest wireless security protocols. Eg:  At least WPA2 security.


Choosing the Right Computer Security for Your Needs


All malware protection software requires frequent updates. If your software does not update automatically, you must do it. Software that is not up to date is useless software that provides you with a dangerous false sense of security.


There are two basic types of Anti-Virus /  Anti-Malware programs


1.)    Programs that seek out and eliminate existing infections


2.)    Programs that run in Real-time and attempt to prevent new infections


Unfortunately there is no simple, perfect low cost program that does both. And the debate over which program is the best is similar to the debate of which U.S. automaker makes the best trucks. There is no consensus answer, and price does not necessarily determine the answer. There is no foolproof security solution at ANY price. There is no such thing as guaranteed safety.


Keep Safe !

Our Onsite Safe Computing Checkup Special only $ 79.00



716 - 759 - 4429

Free  Basic Computer Security Software


IP Tracker - Email Security Software


Free software to determine the sender of email spoofing -  If you suspect email spoofing, copy the complete email header and paste it at this site:


Find Hidden adware or malware in Free & Bargain Software -


How often do you actually read the licensing agreement for new software? Adware and malware are unfortunately not necessarily illegal, but legally it must be mentioned in the software license agreement.

Often shareware and free software has adware and other hidden strings attached. Download this free software to pick out potential trouble warning signs without wading through all that legal mumbo jumbo.


 Spybot Search & Destroy - Great Anti -Adware Program- not real-time, must manually update and run. But among the best at catching existing infections.


Malwarebytes Anti-Malware - Great Anti-Malware Program - not real-time, must manually update and run. But among the best for catching existing infections.;1


Some free Real-time Anti-Virus / Anti-Malware programs which automatically update themselves -


Avast Free;1


AVG Free


Microsoft Free


Panda Cloud Antivirus Free Edition;1 

Protect Yourself !

Our Onsite Safe Computing Checkup Special only $ 79.00


716 - 759 - 4429