Debunking email hoaxes and exposing Internet scams since 2003!


Hoax-Slayer Logo Hoax-Slayer Logo

DividerDivider
Home    About    New Articles    RSS Feed    Subscriptions    Contact
DividerDivider
Bookmark and Share





Issue 83 - Hoax-Slayer Newsletter

Issue 83: June, 2008

This month in Hoax-Slayer:
  1. Photograph of Tornado Hitting Scout Camp Hoax
  2. Making Popcorn With Cell Phones
  3. Yahoo Account Phishing Scam Email
  4. Chinese Hair Bands Made From Used Condoms
  5. Horror in Singapore - Raffles Place Ghost Video
  6. Parrot Flower Photographs
  7. Airliner Ditching In Surf Video
  8. Live Ants In The Brain Hoax
  9. Yahoo International Lottery Programme Scam
  10. Fake Pothole Speed Control Device Photographs
  11. Compressed Air Cars
  12. Exploding Windmill Video
  13. Molly - Pony With A Prosthetic Leg
  14. Striped Iceberg Photographs
  15. Oil Rig Tornado Photo Hoax
  16. Forward To View Funny Clip Email Hoax
  17. Charlton Heston Gun Collection Photographs

Take Charge Of Your Computer Security

A great way to ensure that your computers, and your important files, are really safe and secure is to implement the knowledge found in "The Hacker's Nightmare", a terrific computer security eBook. I consider "The Hacker's Nightmare to be an extremely valuable computer security resource that is well worth the purchase price.

One of the great advantages of "The Hacker's Nightmare" is that it is presented in plain English and even inexperienced computer users should have no problems understanding and implementing the advice it contains. The book unfolds as a step-by-step tutorial that shows you how to secure your computer and practice safe and efficient computing. The book eloquently explains why a particular computer security or safety procedure is necessary. It then supplies detailed instructions about how to implement the procedure. For example, if the author, Bill Hely, recommends that readers install a particular program, he explains why the software is necessary as well as how to download, install and configure it. The book runs to almost 500 pages, so while it is easy to understand and does not drown the reader in jargon or unnecessary technical details, it does thoroughly cover a wide range of computer security and safety issues.

Bill Hely writes very well, and he has incorporated a great many screen shots and illustrations that make it quite simple to follow the instructions he provides. The book is in PDF, so that you can download and begin reading immediately after purchase.

Regardless of whether you are a new computer user running a single machine, you maintain a home network for your family or you are responsible for computers in a business environment, this book can help you implement a very high level of computer security. What's more, "The Hacker's Nightmare" gives you the knowledge to achieve this high level of computer security without the need to outlay large fees for professional security consultants or highly priced software.

Millions of computers around the world run virtually unprotected from hackers, worms, viruses, trojans, spyware, spammers, scammers and all manner of heinous cyber-scum. The good news is that even the most inexperienced computer user can very effectively take control of all the threats listed above by implementing the free or inexpensive computer security methods outlined in "The Hacker's Nightmare". Unfortunately, many people still think that they do not really need to secure their computers or that good computer security is "too hard" or "too expensive" for "ordinary" computer users. "The Hacker's Nightmare" very effectively lays all these dangerous myths to rest.

Many computer users who think they have adequate computer security in place might be shocked to find out how vulnerable their systems really are. If every Windows computer user read and implemented the knowledge contained in "The Hacker's Nightmare", the Internet would be a much safer and more productive environment in which to work and play. I am proud to be an affiliate for "The Hacker's Nightmare", and I unreservedly recommend this book for all those who want to ensure that their computers and their information remains safe and secure.

Visit the Hacker's Nightmare Website

As noted above, I am an affiliate for "The Hacker's Nightmare". For more information please refer to my Affiliate Marketing Policy