Computer Security Glossary and Index       logo

Computer Security

Pecunix wants you to become knowledgeable regarding the security of your computer. Outlined below are a number of points that when implemented correctly will assist you to work and shop online with confidence.

Pecunix has started by implementing great security features. To enjoy the benefits of these features, here are a few simple things you can do.

Password: Write your Password down. DO NOT store it in the same place as your PIK. Unwanted users cannot access your account without both the Password and PIK.

Your PIK (Private Identification Key) is the combination lock to your account

Full Access PIK: Write down or print out your Full Access PIK and conceal it in a secure place.

Do not use your Full Access PIK unless you need to change the settings on your account, get merchant information or update your personal details.

By setting a daily payment limit, and logging in using your Limited Access PIK, you will considerably increase your account security.

Limited Access PIK: Write down or print out your Limited Access PIK and use this for the day-to-day access of your account.

Note: Pecunix will never ask you to provide more than four randomly selected characters from your 16-character PIK when logging in to your Pecunix account.

PGP: Download and use PGP (Pretty Good Privacy).

Your PGP settings allow you to receive encrypted e-mail, recover your Full Access PIK instantly, and use extra security when logging into your account. Pecunix is secure by default. If you want to greatly enhance your security, use PGP.

Place different PGP keys in each of your PGP security forms. It´s a good idea to keep a copy of your Full Access PGP key on a floppy and in a secure place to use if ever you lose your PIK.

IP Address Settings: If you know for sure that you are on a static IP address you may set your IP Address Settings to your known IP address. If you know an IP address is trying to enter your account fraudulently you may block the offending IP address.

Note: IP address settings are extremely high security settings and should only be utilised by those who have a working knowledge of IP address settings.

Do not open e-mail attachments: Pecunix recommends that you do not open e-mail attachments where the sender has not verified with you that they are sending you an attachment.

Update your anti-virus definitions regularly: New viruses are released on a daily basis. An anti-virus program is as good as useless unless the definitions are downloaded at least weekly.

Copycat websites are identical-looking websites designed to entice
you into logging in and giving away your login details

Secure website: The secure Pecunix website will always display a lock in the status bar of your browser and start with the following URL:

Only provide information to a web page where the preceding conditions exist. When asked to submit any information, take a quick look at the URL first.

Login Display: The number displayed on the login panel will not change in that browser until you successfully login. If the login numbers do change, be careful and check the URL starts with:

It's 3 a.m. Do you know what your PC is doing?

How do Internet criminals find you?

Malicious or criminal users (as opposed to hackers) usually either use programs to scan thousands of computers looking for any computer that is online and can be readily accessed or send out thousands of e-mails containing viruses or worms that infect your computer and are programmed to send your password files back to the perpetrator.

What do they want?
Malicious or criminal users are usually after either one of two things. More often than not they are malicious users who want to use your home computer for nefarious purposes. The remaining criminal element is typically after private information such as credit card numbers, passwords, and banking information to perpetrate fraudulent activity against an unwary victim.

If your computer is a fast, modern machine, a malicious user could use some of its processing power without you even noticing a performance difference. When someone sets many computers to the same task, those machines can simulate the processing power of a single large computer.

Yes, your computer can catch viruses and creepy-crawly worms from the Internet as well as via e-mail.

A virus is a piece of computer code that attacks a specific application. Conversely, Worms are not specific to one program but carry their infected code from computer to computer.

Viruses can install code that captures your credit card and other private information or open hidden back doors that allow others to gain access to your computer without your knowledge. Viruses are becoming more widespread as the number of Internet users increases.

Fortunately, there are many anti-virus options available used to combat this growing problem. Current technology favours pattern matching. Pattern matching means that your anti-virus program stops viruses by matching them to known definitions in its database. For this reason you should update your anti-virus application regularly. Some anti-virus programs automatically download the latest versions of the pattern files while you are online.

Please note again: An anti-virus program is as good as useless unless the definitions are downloaded at least weekly.

Here are the names of some anti-virus programs:

AVG 6.0 Free Edition
Norton anti-virus 2002
Central Command Vexira
Computer Associates EZ anti-virus
F-Secure Anti-Virus
Kaspersky Anti-Virus Personal Pro
McAfee VirusScan
Norman Virus Control
Panda anti-virus Platinum

Firewall protection
The most comprehensive way to secure a computer used on the Internet is to install a good firewall. Spend some time installing and configuring good firewall software in conjunction with a good anti virus program and it will pay off in the end. Whether you use a dial-up modem or have a dedicated DSL or cable modem, it is important to make sure that no information gets into or off of your computer without your permission.

Here are the names of some Firewall protection programs:

ZoneAlarm Pro 3.0
Norton Internet Security 2002
BlackIce PC Protection 3.5

   © 2002 Pecunix Inc. All rights reserved.