click to return

CLICK-THE IMAGE

if you DARE

OR

For in-depth information:

You can also try

Junkbusters | Security Space | WebWasher


For instant checks of your Mac or PC

how secure is your PC?

Macintosh Users:

"The list of Trojan horse ports is generated from the standard Unix Trojan list. To date, no Trojan horse applications that create TCP/IP connections have been detected on Macintosh computers but due to their popularity in the hacker community and that Mac OS X is derived from BSD Unix, it's only a matter of time.  If and when Macintosh specific Trojan horse applications are identified, this list will be replaced with a more specific list of Trojan horse ports." (Symantec)


Is your ##86 PC wide open?-- try Gibson Research's excellent prober

is your PC wide open?
or try



Mac OS X
Mojave & Intel iMac i5 27"

© I WISH I HAD NSW, Australia

hosted byin Australia
dragthing logo small
ten years of mac desktop tidy-up
Ten years of Mac Desktop tidy-up
Mojave compatible HERE

Steve
see what's coming next