Understanding the potential risks of Internet use and taking pro-active measures can go a long way toward keeping you safe from hackers. Here are some helpful tips you can use.

Before you get started, you can find out if what you think is a scam is real or a hoax.

Chances are you have received a virus hoax—a false warning about a computer virus. Typically, the warning arrives in an email or is distributed through a company's internal network. If you get such a message, you can check it out on one of the web sites that tracks hoaxes. Visit  Snopes.com or  Vmyths.com.

Note: Frontier will never send you an email message requesting that you confirm your email address or password. If you ever receive such a message, it is not from Frontier and should be deleted.

Spammers often use bulk email programs to send out their unsolicited messages to lists of email addresses that are often collected without the recipient's knowledge. There are several ways spammers obtain these email addresses.

  • Mailing Lists — Many people sign up for mailing lists for newsletters, news alerts, coupons, special offers, and other interests. However, spammers can also sign up for these mailing lists and obtain the email addresses.
  • Usenet Posting —Spammers can also use bots to cruise newsgroups on Usenet in order to collect email addresses.
  • Coincidental — Your email address may be unique to your Internet Service Provider (ISP), but it may also be used by several other people using different ISPs. Spammers use the front part of email addresses and change the ISP name to create a list of several email addresses.
  • Dictionary Attacks — Spammers make educated guesses on email addresses by stringing together common names and words.

Spyware and adware (and the more general term for bad-intentioned software, malware) can lead to anything from PC crashes, to increased spam, to identity theft. These threats are rapidly proliferating and represent a major security and privacy risk, therefore requiring a solution. These programs can enter a system in several different ways, such as through everyday web browsing, unauthorized software downloads, peer-to-peer file swapping, email attachments, instant messaging, chat sessions, bundles with legitimate software, hacker web site downloads, and "drive-by" installs from web sites.

Here are some signs that you may have spyware on your computer:

  • New toolbars, links or favorites appear in your Internet browser
  • Your home page or browser has been changed
  • You enter a web address but wind up at a completely different web site
  • You see pop-up ads even when you're not online
  • Your computer is suddenly running much slower

Here are some things you can do to avoid and respond to spam, spyware, adware and malware.

Prevent Spam and Phishing

There are actions that you can take against spam or junk mail:

  1. If the message that you're receiving contains text along the lines of "click here to be removed from this list"— it is up to you to decide whether or not you unsubscribe or remove yourself from the mailing list.

    There are two schools of thought on sending an unsubscribe email. One thought is that by sending the unsubscribe email, you've merely validated your email address in the eyes of the bulk mailer. This can, in turn, allow the bulk mailer to add your email address to other bulk mailing lists. The other thought on sending an unsubscribe email is that it actually does help to reduce the amount of spam messages that you receive.
  2. Log into your Frontier, FrontierNet, Citlink/CTAZ, Newnorth, Epix, or GVNI email account and take advantage of Frontier Anti-Spam.
     security.frontier.com/acctedit*
  3. If you are a Frontier High-Speed Internet subscriber, consider installing Frontier Internet Security, our security suite that contains an anti-spam component, along with anti-virus and anti-spyware.

    Frontier Internet Security software is:
    • Available at a rate of $2.99/month for High-Speed Internet customers on a Month to Month billing plan.
    • An optional add-on at a rate of $2.99/month for High-Speed Internet customers in a Price Protection Plan.
    • Free to High-Speed Internet Max customers with a Digital Phone package in a Price Protection Plan.
    Security software must be downloaded using your Frontier High-Speed Internet service and requires XP Home/Professional (32-bit only, SP2 or later), Vista (32 or 64-bit), or Windows 7 (32 or 64-bit).
  4. You can mark an email message in your inbox as Junk or Spam, and even prevent future spam from arriving. See the Handle Spam in My Email section at the bottom of this article.

* You must be on the Frontier network in order to access the Frontier Account Editor. If you are in a hotel or at the office, you may not be able to access the Frontier Account Editor.

Prevent Malware and Spyware

Believe it or not, there are some anti-spyware programs out there that you should definitely avoid. You can find out which ones at  www.spywarewarrior.com.

One of the most important things you can do to protect your computer and the data on it from hackers, viruses, worms, and other malware is to keep your system software up to date by running Microsoft's Windows Update feature. Windows Update is the mechanism by which Microsoft provides updates to its operating systems, distributing service packs and critical updates that either fix problems in Windows, or protect against known vulnerabilities in Windows or Internet Explorer.

You should run Windows Update and download all available critical updates at least once a week, or configure Windows Update to run automatically. Another easy way you can update your software is to click the Start button, All Programs, and then click Windows Update.

Important Note: Frontier is not responsible for installing Windows Update on your computer, or any issues your computer may encounter after running a Windows Update.

Prevent Viruses

Anti-virus protection is important—it detects and removes viral threats. However, your computer can be infected with other dangers such as spyware. Anti-spyware software is designed to stop these threats, which have unique properties that can remain hidden on your computer and cause havoc. Frontier Secure® Computer Security combines anti-virus and anti-spyware forces, while detecting and removing a wide range of viruses and spyware threats.

Download Clean-up Tools

One way viruses can make it onto your computer is through an open proxy. A proxy server is a go-between computer that operates between your computer and a main computer. It can store information and filter transmissions from the Internet or a network you are linked to.

An Open Proxy is another matter—it's a proxy that allows your computer to connect with virtually anybody. This can result in a malware attack on your computer in the form of a virus or worm that can damage or destroy your computer or spyware that can access your personal information. If you don't know whether proxy software is installed on your PC, be sure to perform updates to your PC's anti-virus and anti-spyware software on a regular basis.

Frontier Secure® Computer Security is composed of anti-virus and anti-spyware products.

With regard to Computer Security, anti-virus, and anti-spyware, we will assist you in…

  • investigating the presence of a virus, worm, or Trojans on your computer
  • insuring that your computer is protected with anti-virus and anti-spyware software
  • installing anti-virus and anti-virus software
  • running live updates or updating virus definition files
  • the removal of viruses, worms, or Trojans

…from infected computers that are under your control and have Computer Security, anti-virus, and anti-spyware installed. (Please note: If you are not using or are unable to use Computer Security, anti-virus, and anti-spyware, Frontier is not responsible for the foregoing assistance unless you have purchased a service through ;Frontier Secure. We strongly recommend that you install and maintain virus protection software and run and install all critical Windows updates).

If you are not a Frontier High-Speed Internet customer or, if for any reason you are not using or are unable to use Computer Security, anti-virus, and anti-spyware, your best defense against viruses is to make sure you have a current version of anti-virus and anti-spyware software installed and enabled. If your computer becomes infected and must be cleaned, there are several anti-virus and anti-spyware companies and their web sites (listed below) offer instructions on how to remove viruses from your system.

Handle Spam in My Email

To properly handle spam when it is downloaded through a computer-based email program (such as Outlook, Windows Live Mail, Mac Mail, etc.) as opposed to viewing your email in a web browser (such as you may do with your Frontier Webmail or Gmail):

  1. Go to  webmail.frontier.com and log in with your email address and password.

    Frontier Mail Login

  2. Once logged in select Options from the upper left hand corner.
  3. Select Mail Options from the drop-down menu.

    How to Handle Spam

  4. Select POP & Forwarding on the Mail Options screen.

    How to Handle Spam

  5. Select the option that works best for you. We recommend the "Don't download spam email" option. Should you ever suspect you are "missing" any email, check your spam folder within Frontier Webmail.

    Don't download spam email

There is an anti-spam law in place, but Frontier offers solutions to you directly.

Frontier Anti-Spam

All our customers have Frontier Anti-Spam at no extra cost. Anti-Spam gives you the opportunity to determine the level of spam detection you wish to apply to your Frontier, FrontierNet, Citlink/CTAZ, Newnorth, Epix, or GVNI email account.

Your can use the  Frontier Account Editor* to adjust your Anti-Spam option.

For Frontier High-Speed Internet customers, we offer Frontier Internet Security, a security suite that features anti-spam and anti-spyware. Security software must be downloaded using your Frontier High-Speed Internet service and requires XP Home/Professional (32-bit only, SP2 or later), Vista (32 or 64-bit), or Windows 7 (32 or 64-bit).

Note: If someone you know can't get an email through to you because the Frontier Anti-Spam system thinks that the message is spam:

  1. Be sure that your friend has his or her own email address entered correctly within the properties of their mail program. Our mail servers will automatically reject incomplete or bad email addresses.
  2. Have the sender of the email check with their Mail Administrator or Technical Support group to see if they can determine why the email is being rejected. Many times, the sender's mail system can be the source of the problem.
  3. If your Frontier Anti-Spam option is set to Aggressive, change it to Moderate.

If none of the solutions mentioned above solve your problem, please  contact us and provide:

  • The date of occurrence
  • The sending and receiving email addresses

* You must be on the Frontier network in order to access the Frontier Account Editor. If you are in a hotel or at the office, you may not be able to access the Frontier Account Editor.

Email Virus Scanning

Frontier automatically scans your email for viruses using the latest software. There is no charge for this service.

If you receive an email containing a virus, the email will be returned to the sender along with a "bounce" message containing the following information:

  1. The fact that a virus has been found.
  2. The name of the virus.
  3. Advice on what to do about the virus.
  4. That the message in question will not be delivered to the intended recipient.

If the message contains a virus that is known to fake or forge the return email address, the message will not be returned to the sender; it will be deleted from our servers.

Port Blocking

Frontier restricts and blocks known ports that in the past have allowed for the transfer of spam, viruses, and other malware. The ports are:

25, 135, 137, 138, 139, 445, and 1025

Port 25 restriction will take place on all dynamically assigned blocks, which would include Business Class High-Speed Internet customers when they are using dial-up access.

Blocking on TCP/UDP ports 135, 137, 138, 139, 445, and 1025 has been implemented for Residential and Business Dial-up customers, and Residential High-Speed Internet customers. Business Class High-Speed Internet customers will not be affected by TCP/UDP blocking unless they are using dial-up access.

No blocks will be placed on Business Class High-Speed Internet, Symmetric High-Speed Internet and FrontierNet Direct (T1 or larger) customers.

Below is an explanation of TCP and UDP ports.

TCP and UDP ports allow specific communications between computers, applications and programs.

A port is how a program, computer, application communicates with each other using TCP or UDP.

The ports are broken down into three categories:

  1. Well Known Ports: Range from 0 through 1023 and are assigned by the  IANA (Internet Assigned Number Authority). These are the most commonly used ports.
  2. Registered Ports: Range from 1024 through 49151 and are listed by the IANA. These ports can be used through normal user processes or executable programs on most computers.
  3. Dynamic and/or Private Ports: Range from 49152 through 65535.

For a complete list of all the TCP/UDP ports please visit  Iana Port numbers.

Why do we do this?

  • To protect our customers: We can protect against certain common worms and from dangerous services on our customers' computers that could allow intruders to gain access.
  • To protect our upstream bandwidth: If customers overuse their upstream bandwidth by running high-traffic servers or becoming infected with a worm or virus, it can degrade the service of other customers on that node.
  • To protect the rest of the Internet: Some blocks prevent our customers from attacking other computers on the Internet. In addition to being in our best interest for protecting our bandwidth, it is our responsibility to prevent abuse of our network.

Below is a table showing common applications that use the ports that will be restricted or blocked.

Port, Name, Protocol Description
25 (only restricted, not blocked)
smtp (Simple Mail Transfer Protocol)
TCP
SMTP shuttles email from one mail server to another. It has evolved significantly to become much more capable, and much less "simple" than it was.
135 (blocked)
dcom-scm (DCOM Service Control Manager)
TCP/UDP
Microsoft's DCOM (Distributed, i.e. networked, COM) Service Control Manager (also known as the RPC Endpoint Mapper) runs on your computer, opens port 135 and listens for incoming requests from clients wishing to locate the ports where DCOM services can be found on your machine.
137 (blocked)
netbios-ns (NetBIOS Name Service)
TCP/UDP
UDP NetBIOS name query packets are sent to this port, usually on Windows machines but also on any other system running Samba (SMB), to ask the receiving machine to disclose and return its current set of NetBIOS names.
138 (blocked)
netbios-dgm (NETBIOS Datagram Service
UDP
UDP NetBIOS datagrams packets are exchanged over this port, usually on Windows machines but also on any other system running Samba (SMB). These UDP NetBIOS datagrams support non-connection oriented file sharing activities.
139 (blocked)
netbios-ssn (NETBIOS Session Service)
TCP
TCP NetBIOS connections are made over this port, usually on Windows machines but also on any other system running Samba (SMB). These TCP connections form "NetBIOS sessions" to support connection oriented file sharing activities.
445 (blocked)
microsoft-ds (Microsoft Directory Services)
TCP/UDP
This port replaces the notorious Windows NetBIOS trio (ports 137–139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and many other services.
1025 (blocked)
blackjack (network blackjack)
TCP
Microsoft operating systems tend to allocate one or more unsuspected, publicly exposed services among the first handful of ports immediately above the end of the service port range (1024+).

As for the anti-spam law, the "Controlling the Assault of Non-Solicited Pornography and Marketing" (CAN-SPAM) Act took effect in the United States in January 2004. It does not make spam illegal, but places restrictions on what bulk mail senders can do. If spammers comply, they can send their unsolicited emails. The CAN-SPAM Act does not apply to email sent from outside of the U.S., even though other countries around the world have some measures in place.

Still need help? Call 1.800.239.4430 or Live Chat

Recommended Articles

Pay My Bill

You have the options to pay online, by mail, in person, by phone, and to set up Auto Pay. Set Up Auto Pay Edit your Auto Pay settings to use your ...

Read More
Troubleshoot Internet Issues

If you're experiencing issues while trying to connect to the internet, we have troubleshooting tools for you. Automated Troubleshooting Tool Automated Troubleshooting can resolve many ...

Read More
Troubleshoot Email Issues

Find answers here to some of the most commonly asked questions about your Frontier email. Here’s help for a forgotten username or password, how to create additional email addresses, ...

Read More