Library Section A

   Security and Safety Reports


Security and Safety

Are you searching for a particular topic? Enter it in the search box and we'll help you locate it

Our Reports and
Getting Started Tools are updated regularly. Enter your  eMail address and
Name and we'll keep you posted with timely ALERTS [156]
We Value Your Privacy




These were among the many hundreds of Articles and Reports we read and reviewed as we worked on our website


A Hacker in your computer?  Jim Edwards


A Personal Virus Attack!  by the RP Staff


 - Bulletproof your email address from Spammers
by Markus Allen
(No longer available)


Of Firewalls and Trojans, a Special report by the RP Staff


Keep the work you create Secure. Here's how to copyright anything you write and avoid theft of your Copyright. by Jim Edwards


'Double Whammy' Virus Attack (How many times have you been infected?) 9 points to consider when working to maintain your  internet security. by
the RP Staff.



Identity Thieves Find Treasure In Your Trash
When disposing of your old computer, make sure you don't give away all of you secret personal files ...
another great article by Jim Edwards
  8.  How to add an email address  to your 'WhiteList"  so that your Internet Service Provider's filters don't delete an email that you might want to receive. by the RP Staff


Spam -- How Much Will it Cost Your Business? The Spam problem continues to get progressively worse. Although there isn't a simple solution to the problem, the information provided in this article should assist you in not only avoiding Spam, but also avoiding the filters for your legitimate mailings. by Shelly Lowrey


A Practical (and Easy) 10 Step Guide About How To Protect Yourself From Identity Thieves reported by a person who recently had their identity compromised.
11.  Is "Spyware" Watching You? by Jim Edwards. Generally, Virus detection and removal programs DO NOT find and remove SpyWare. So Beware, just as Jim Edwards found out, it's probably already in your computer, too.
12. Is Your Email Address Blacklisted? by Jim Edwards.   This problem of non-delivery of email has dramatically    affected the way businesses use email for about the      last year, but it's now about to reach epidemic proportions for consumers using email, too.
13. What's the cost of regaining use of your computer after a serious virus infection? It cost one of our friends a lot of money and it could happen to anyone. This article can help you avoid this hassle and expense. the RP Staff
14.  Helping your children practice safe surfing habits. Did you know that young people between the ages of 2 and 11 are increasing their use of the Internet at a faster rate than the overall internet user population?
.by the RP Staff
CLICK HERE to Check out our newest website about Security Issues with more help and tips for avoiding, coping with, and cleaning up after a virus attack, avoiding identity theft, and much, much more.

Get the Security Tips eBook  and Free bonus PC Security Guide, plus resale rights with dozens of Tips and Tools to guide you to Safe and Fun Filled Surfing.
  Make your own Tiny URL's. Shorten those mile long addresses to tiny ones. Use them in your emails; on your website to cloak affiliate links, where ever you wish. Try it now. Enter you own email address...WOW!
Enter a long URL to make tiny:

                Return to Main Library
AddThis Social Bookmark Button