{"id":2940,"date":"2011-10-08T07:37:59","date_gmt":"2011-10-08T11:37:59","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=2940"},"modified":"2011-10-08T07:38:00","modified_gmt":"2011-10-08T11:38:00","slug":"jean-worries-about-hackers-stealing-her-email-passwords","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/jean-worries-about-hackers-stealing-her-email-passwords\/","title":{"rendered":"Jean worries about hackers stealing her email passwords"},"content":{"rendered":"<p><strong>Jean is concerned about hackers stealing her Outlook Express  passwords<\/strong><br \/>\nI have Windows XP. I am wondering where email addresses are  stored other than in &#8216;stored user name &amp; passwords&#8217; via the control panel  and User Accounts? Mine shows it blank&#8230;no passwords saved, yet when I ran the  SIW program (System information for Windows by Topala Software Solutions) I ran  down each category which included &#8216;passwords&#8217;. I was shocked to find all my  email addresses and passwords there. Two of them were email addresses for  Windows Live, which I no longer have, but cannot find anywhere to delete those  two. My question is where else are system email addresses hidden? Is this  normal? If my computer were to be hijacked, I see how easy it is to get any of  my personal emails and private information. I always thought if there the stored  email passwords area in user accounts was blank, none were stored. Not the case.  Can you advise? Thanks!<\/p>\n<p><strong>Our answer<\/strong><br \/>\nHi  Jean. Outlook Express passwords, messages, and folders are stored in several  places &#8211; the main one is in your Outlook Message store. Passwords are also  stored in the registry. We&#8217;re not sure what you mean about your computer being  &#8220;hijacked&#8221;. For the sake of answering you we&#8217;re going to assume you mean a  hacker &#8211; someone outside your home accessing your email addresses and passwords  remotely. The chances of that happening are very remote &#8211; about one in one  billion. Hackers don&#8217;t sit in the shadows lurking nearby waiting to hijack your  computer. They may trick you into giving up passwords and other personal  information. They may trick you into installing a data-stealing bot or Trojan.  But the odds of a hacker targeting your personal computer are infinitely smaller  than you being struck by lightning, or struck on the head by a meteor, or you  winning the Mega Millions Lottery (about 1 in 95 million). So your odds of  winning &#8220;The Big One&#8221; in the lottery are about 10 times greater than you having  your data stole by a hacker targeting your computer directly.<\/p>\n<p>You can reduce your risks by not clicking on links in email that  ask you to click links to change your password or account information. You can  reduce your risks by keeping your computer protected with good antivirus and  antispyware programs and keeping them updated. You can reduce your risks by  thinking before you click. The horror stories you hear about hackers lying in  wait and stealing your information by &#8220;hacking&#8221; into your computer are very very  slim. Your PC or laptop is just of a billion computers and devices connected to  the Internet. If you have good security software, you don&#8217;t click on links in  suspicious emails, and you use your own good common sense, your risk is so small  that your time would be better spent worrying about something more probable.<\/p>\n<p>Now if you&#8217;re talking about someone with console access to your  computer &#8211; i.e. someone sitting at your computer and logged on as you, then  that&#8217;s another story. If you allow someone to login as you then they&#8217;ll see  whatever you can see. Don&#8217;t let anyone you do not trust use you computer. If you  have two or more people using your computer, password protect your Windows user  account (Control Panel\/User accounts). Then set up separate restricted user  accounts for each other person using your computer. Even if you trust the others  using your computer &#8211; always set up separate password protected accounts for  each person using your computer. The others can change their passwords after  you&#8217;ve set up their accounts.<\/p>\n<p>Also, if you are using a wireless router, make sure you are using  good security and password protection &#8211; <a href=\"http:\/\/thundercloud.net\/infoave\/new\/?p=2638\">it&#8217;s essential and it&#8217;s easy  to do<\/a>. There was a time when someone had to be in close proximity to your  wireless router to intercept and use your wireless connection. But now, your  wireless can be intercepted by someone a half-mile or more away. If someone  gains access to your wireless router they have access to any data that you  transmit via your wireless connection.<\/p>\n<p>And one more thing to remember &#8211; everything you&#8217;ve ever seen or  typed on your computer is still there somewhere. Don&#8217;t worry about the phantoms  created largely by those seeking financial gain by scaring you &#8211; i.e. firewall  vendors. They sell billions of dollars worth of software by scaring people &#8211; and  they way they like to scare people is by making it seem that your PC, my PC,  EB&#8217;s PC, all of our PCs are just moments away from being &#8220;hacked&#8221; and our  personal information stolen by phantoms lurking in the ether. It just ain&#8217;t so.<\/p>\n<p>Use common sense. Don&#8217;t click links in emails asking you to  &#8220;verify your account&#8221;, or &#8220;change your password&#8221;. Especially don&#8217;t click links  in emails which may look like they&#8217;re from your bank, credit card company, or  any financial institution which ask you to verify your information or change  your password &#8211; these are almost always phishing emails or may contain links  which will attempt to install password-stealing Trojans.<\/p>\n<p>Keep your antivirus and antispyware programs up to date. Most of  all, don&#8217;t worry about phantoms conjured up by money-driven security vendors who  want you to believe your personal information will be stolen by &#8220;criminals&#8221; or  &#8220;hackers&#8221; unless you install their great software. It just isn&#8217;t  true.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jean is concerned about hackers stealing her Outlook Express passwords I have Windows XP. I am wondering where email addresses are stored other than in &#8216;stored user name &amp; passwords&#8217; via the control panel and User Accounts? Mine shows it blank&#8230;no passwords saved, yet when I ran the SIW program (System information for Windows by Topala Software Solutions)\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/jean-worries-about-hackers-stealing-her-email-passwords\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[191,85,155,14],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2940"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=2940"}],"version-history":[{"count":2,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2940\/revisions"}],"predecessor-version":[{"id":2943,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/2940\/revisions\/2943"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=2940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=2940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=2940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}