Serving the LORD on the World Wide Web
THE RING OF CONSERVATIVE CHRISTIAN SITES
Since December 31, 1996
PLEASE MIGRATE YOUR YAHOO! ID BEFORE YAHOO! DELETES IT!
Yahoo! to New WebRing user ID migration instructions are available right now if you will click on Install the NAV BAR in the left sidebar under HOW TO:
Yahoo! is going to purge all WebRing data from their servers on about January 2, 2002. That includes your user data that relates to ROCCS if you haven't moved (migrated) it to New WebRing. Please migrate your Yahoo!WebRing user ID and password to New WebRing before January 2.
The only alternative after that date will be for you to sign-up with New WebRing and have me manually assign your New WebRing user ID to your site in the ROCCS ring hub. Otherwise you won't have access to your site's ROCCS data, including Nav Bar updates, URL changes, and personal information, just to name a few member options. You will save me a lot of work by migrating now, especially if something goes wrong in this last part of the planned 90 day transition from Yahoo! to New WebRing.
IF YOU DON'T MIGRATE YOUR
YAHOO! USER ID OR CREATE A
NEW WEBRING ID,
and your Email address
survives the January
Yahoo! server purge as I
hope it will, I can only do
to help you if you have
problems with your ROCCS
(2) Change your Site URL page.
IF YOU DIDN'T JOIN YAHOO! LAST YEAR you will need to join WebRing so that you can edit your site's data on New WebRing, including your Email address. I can't guarantee that your Email address will work when Yahoo! purges their servers unless you create a New WebRing ID now. If it doesn't, please remember that I will temporarily suspend your site from active participation in ROCCS if you bounce more than three Ring Emails. If that happens, you will still have to join New WebRing before I can return your site to the ring. Unfortunately, absent unavoidable circumstances, there is a 30-day limit on temporary suspensions before a site is deleted from the ROCCS member list. If the time limit expires and a site is deleted, I encourage the former member to reapply for ROCCS membership.
Thanks for cooperating!
PROTECTING YOUR SYSTEM FROM VIRUSES
Don't let some malicious "Santa" send you a nasty Christmas Gift! YOU, are your system's first defense against viruses. Your best backup is a top quality commercial antivirus program, but the program will only work IF you regularly update the virus signature (.dat) files. If you don't take minimal precautions, your system WILL be infected.
I've developed the following list of ten precautions based on my almost 30 years of computing experience which brackets the first virus theories and the introduction of viruses into the computing world. If you use these precautions in conjunction with a top-quality virus scanning product, the odds against your system's being infected are heavily in your favor.
(1) Never open any executable (.exe) Email attachments, even if you know who sent them UNLESS you scan the attachment for viruses first (also see #8, below).
(2) Never open any attachment that doesn't follow DOS filename conventions (e.g. the recent NIMDA virus that affected several ROCCS members didn't have a file extension like .exe, .jpg, .doc, etc.)
(3) Never give permission for any outside source, be it a file or a site, to have access to your system unless YOU make the request.
(4) Keep an eye on the hard drive for suspicious accesses, and be ready to shut your system down with the reset button if your computer has one. Going through a scan disk check is a lot easier than losing all of your data.
(5) Never accept any non-image file that doesn't come from a known commercial source;
(6) Be CERTAIN that your antivirus program is correctly installed and working (the Eicar pseudo-virus test is a good, basic way to check your antivirus program).
(7) Make certain if a file attempts to install itself without your permission, that you scan, quarantine, or delete it.
(8) Use Windows Explorer and your antivirus program to find and scan any file that looks suspicious. Outlook Express Emails are held in your system's C:\WINDOWS\Application Data\Identities directory. Eudora stores its files in the Eudora directory under C:\Program Files.
(9) Delete any attachment that can't be found using Windows Explorer unless you are 100% certain that you have received it from a trustworthy source. If you have some doubts, ask the person who sent it to you if they scanned it for viruses.
(10) Although they're not exactly viruses, I almost never accept cookies. If you must accept them, delete them from your C:\Windows\Cookies directory, C:\Windows\TEMP folder, and C:\Windows\Temporary Internet Files folder as soon as you log off the WWW.
You can also accept only cookies that you need, and then reset your Internet Explorer browser's Tools>Internet Options>Securities>Custom>Cookies "Allow cookies that are stored on your computer" option to DISABLE as soon as you have downloaded the necessary cookie(s). Be sure to check the directories above to be certain that unnecessary cookies are not loaded into those file folders and delete those you don't need. If you make a mistake, you can always log onto the site and get another cookie later.
Yep, cookies seem innocent enough. They're "only text files," and despite two decades of rumors beginning in the CP/M era, text files do not harbor viruses. On the other hand, cookies are hardly "innocent." Cookies are pseudo-virus spy ware files that track your Internet and WWW activity and violate of your privacy. No one has a right or a justifiable excuse to know where you are surfing except YOU.
Finally, to protect your system from commercial snoopers and hackers, ALWAYS run a firewall (ZoneAlarm is free and is as good as it gets), a strong pop-up killer (Pop-Up Stopper is good freeware), and a spy ware detector (Ad Aware is a good freebie). Scan your system regularly for spy ware.
You can download ZoneAlarm, Pop-Up Stopper, and Ad Aware for free from: