Software firewalls are widely recommended for single computers.
The software is prepackaged on some operating systems or can be purchased for individual computers.
If you receive unsolicited e-mail offers or spam, you can forward the messages to the Federal Trade Commission at [email protected]
For the the latest e-scams and warnings, visit the FBI’s Internet Crime Complaint Center.
Peer-to-Peer networks allow users connected to the Internet to link their computers with other computers around the world.
These networks are established for the purpose of sharing files.Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes.Be sure to install the updates to ensure your computer has the latest protection.The FBI cautions parents and guardians that, because there is no age restriction for the use of Peer-to-Peer services, pornography of all types is easily accessible by the many young children whose parents mistakenly believe they are only accessing music or movies.In fact, children may be exposed to pornography—and subsequently lured by sexual predators—even though they were not searching for pornography, as some network users deliberately mislabel the names of files for this purpose.To report potential e-scams, please go the Internet Crime Complaint Center and file a report.Note: The FBI does not send mass e-mails to private citizens about cyber scams, so if you received an e-mail that claims to be from the FBI Director or other top official, it is most likely a scam.The FBI is educating and warning citizens about certain risks and dangers associated with the use of Peer-to-Peer systems on the Internet.While the FBI supports and encourages the development of new technologies, we also recognize that technology can be misused for illicit and, in some cases, criminal purposes.In fact, some worms have been specifically written to spread by popular Peer-to-Peer networks.Also, if Peer-to-Peer software is not properly configured, you may be unknowingly opening up the contents of your entire hard drive for others to see and download your private information.