Pecunix wants you to become knowledgeable regarding
the security of your computer. Outlined below are a
number of points that when implemented correctly will
assist you to work and shop online with confidence.
Pecunix has started by implementing great security
features. To enjoy the benefits of these features, here
are a few simple things you can do.
Password: Write your Password down. DO NOT
store it in the same place as your PIK. Unwanted users
cannot access your account without both the Password
Your PIK (Private Identification Key) is the combination
lock to your account
Full Access PIK: Write down or print out
your Full Access PIK and conceal it in a secure
Do not use your Full Access PIK unless you need
to change the settings on your account, get merchant
information or update your personal details.
By setting a daily payment limit, and logging in using
your Limited Access PIK, you will considerably increase
your account security.
Limited Access PIK: Write down or print out your
Limited Access PIK and use this for the day-to-day access
of your account.
Note: Pecunix will never ask you to provide more than
four randomly selected characters from your
16-character PIK when logging in to your Pecunix account.
PGP: Download and use PGP (Pretty Good Privacy).
Your PGP settings allow you to receive encrypted e-mail,
recover your Full Access PIK instantly, and use
extra security when logging into your account. Pecunix
is secure by default. If you want to greatly enhance
your security, use PGP.
Place different PGP keys in each of your PGP security
forms. It´s a good idea to keep a copy of your
Full Access PGP key on a floppy and in a secure
place to use if ever you lose your PIK.
IP Address Settings: If you know for sure that
you are on a static IP address you may set your IP Address
Settings to your known IP address. If you know an IP
address is trying to enter your account fraudulently
you may block the offending IP address.
Note: IP address settings are extremely high
security settings and should only be utilised by those
who have a working knowledge of IP address settings.
Do not open e-mail attachments: Pecunix recommends
that you do not open e-mail attachments where the sender
has not verified with you that they are sending you
Update your anti-virus definitions regularly:
New viruses are released on a daily basis. An anti-virus
program is as good as useless unless the definitions
are downloaded at least weekly.
Copycat websites are identical-looking websites designed
you into logging in and giving away your login details
Secure website: The secure Pecunix website will always
display a lock in the status bar of your browser and
start with the following URL: https://secure.pecunix.com/money.cfm.
Only provide information to a web page where the preceding
conditions exist. When asked to submit any information,
take a quick look at the URL first.
Login Display: The number displayed on the login panel
will not change in that browser until you successfully
login. If the login numbers do change, be careful and
check the URL starts with: https://secure.pecunix.com/money.cfm.
It's 3 a.m. Do you know what your PC is doing?
How do Internet criminals find you?
Malicious or criminal users (as opposed to hackers)
usually either use programs to scan thousands of computers
looking for any computer that is online and can be readily
accessed or send out thousands of e-mails containing
viruses or worms that infect your computer and are programmed
to send your password files back to the perpetrator.
What do they want?
Malicious or criminal users are usually after either
one of two things. More often than not they are malicious
users who want to use your home computer for nefarious
purposes. The remaining criminal element is typically
after private information such as credit card numbers,
passwords, and banking information to perpetrate fraudulent
activity against an unwary victim.
If your computer is a fast, modern machine, a malicious
user could use some of its processing power without
you even noticing a performance difference. When someone
sets many computers to the same task, those machines
can simulate the processing power of a single large
Yes, your computer can catch viruses and creepy-crawly
worms from the Internet as well as via e-mail.
A virus is a piece of computer code that attacks a specific
application. Conversely, Worms are not specific to one
program but carry their infected code from computer
Viruses can install code that captures your credit card
and other private information or open hidden back doors
that allow others to gain access to your computer without
your knowledge. Viruses are becoming more widespread
as the number of Internet users increases.
Fortunately, there are many anti-virus options available
used to combat this growing problem. Current technology
favours pattern matching. Pattern matching means that
your anti-virus program stops viruses by matching them
to known definitions in its database. For this reason
you should update your anti-virus application regularly.
Some anti-virus programs automatically download the latest
versions of the pattern files while you are online.
Please note again: An anti-virus program is as good as useless
unless the definitions are downloaded at least weekly.
Here are the names of some anti-virus programs:
6.0 Free Edition
Associates EZ anti-virus
Anti-Virus Personal Pro
The most comprehensive way to secure a computer used
on the Internet is to install a good firewall. Spend
some time installing and configuring good firewall software
in conjunction with a good anti virus program and
it will pay off in the end. Whether you use a dial-up
modem or have a dedicated DSL or cable modem, it is
important to make sure that no information gets into
or off of your computer without your permission.
Here are the names of some Firewall protection programs:
Internet Security 2002
PC Protection 3.5