วันอาทิตย์ที่ 31 สิงหาคม พ.ศ. 2551

Securing Your Email In An Insecure World

Computers have simplified millions of people's lives. With the advent of online technology we can be more productive in the office, organize household matters, and communicate with others around the globe. Do you ever think it's all too good to be true? Well, you'd be smart to question the overall ease and efficiency of the web. The sad truth is, along with these perks there are a few major pitfalls. And if you aren't aware of them now, you may be in for a rude awakening.

So many people get excited about the wide-reaching possibilities of an email system. Indeed, it is staggering to think about how you can connect with someone on the other side of the world with just a click of a button. Unfortunately, however, sometimes by clicking the mouse you are doing more than reaching out to a faraway friend. You may also be inviting email viruses and scams into your mailbox.

What is spam anyway?

Email spam is also called unsolicited bulk email - like junk mail in your computer system. In other words, it is email that you have not asked to receive. When we say "bulk email," we are usually referring to one message that is sent to more than 200 email recipients at a time.

How is spam targeted?

Basically, if you participate in any newsgroups, forums, or post your email address on a personal or professional website, you can be targeted for spam. A spam mailing list will be created by combing electronic newsgroups and mailing lists, or by conducting a broad address search online via "spambots" that roam the net collecting email addresses.

What is phishing?

Phishing is a relatively new form of email scam and it's a serious one. What it refers to is an email that claims to be from a legit corporation (like Citibank, PayPal, eBay etc.), but it is really a spoof. Phishing can be tough to spot because it can look pretty slick. The email will come with a return address, a logo or a brand that seems on the up-and-up, links to other sites etc. But whoever is behind the scam is trying to get your financial info and rip off your identity. Studies show that 5% of the people who receive these fake emails respond to the "phisher."

Now that you know what these terms mean, how can you avoid dealing with them?

Clearly, the answer is with an expert email security system. No doubt, new scams will be popping up before you know it. We haven't even discussed the horrors of email "worms" and "viruses."

What can be done?

  • Use a web host with a secure email system that will control spam, maintain your privacy, and protect you from email viruses. A good web host believes that all individuals have the right to send and receive secure emails around the clock.
  • The first step is to monitor the spam that comes into your email mailbox and then report any scams to the Anti-Spam League or the Anti-Phishing Working Group.
  • Be wary of any emails that ask you for your personal information, especially financial details. Do not give out your credit card or bank account info unless you are on a secure server.
  • Be wary of email attachments. When in doubt, don't open them!
  • Make a point of checking your account balances online to see if there are any sudden withdrawals that you did not authorize.
  • Use anti-virus software and be sure to update it regularly (such as Microsoft patches).
  • Think about installing a web browser tool bar that will alert you if a known spammer or phisher is trying to reach you (such as Earthlink ScamBlocker or eBay's tool bar).

Madison Lockwood is a customer relations associate for ApolloHosting.com. She brings years of experience as a small business consultant to helping prospective clients understand the ways in which a website may benefit them both personally and professionally. Apollo Hosting provides website hosting, ecommerce hosting, vps hosting, and web design services to a wide range of customers. Established in 1999, Apollo prides itself on the highest levels of customer support.

[tags]website hosting, email security, spam, phishing, viruses, worms, tips[/tags]

Frequently Asked Computer Security Questions

Working on the Internet provides Internet marketers with the opportunity to make a living in the comfort of their own home. However, as your business is completely reliant upon your computer, you must take the necessary steps to ensure your computer is safe.

Over the years, I have received many questions in regard to computer security. Below, are some of the most frequently asked questions:

Question: I'm new to the Internet and have been hearing a lot about viruses. I'm not exactly sure what they are. Can you help?

Answer: A virus is a small piece of software that attaches itself to 'real' software programs (executable code). Each time you launch the real program, the virus is also launched. The virus may then spread and attach itself to other programs and wreak havoc on your system.

The most widespread virus is an email virus. An email virus spreads through email attachments. It usually spreads by mailing itself to everyone within the email program's address book. It tricks the email recipient into believing the message was sent from someone they know.

Although this type of virus rapidly spreads, you can't get it simply by reading a plain text email. However, you can execute the virus by clicking on an encoded message that contains embedded executable code such as JavaScript within an HTML email message, or an executable file attachment.

Another type of program that is often thought of as a virus is a 'Trojan horse' program. However, it is not a virus. It is simply a computer program that acts like it's something it's not. For example, you may download a program that you think is a computer game. However, when you run the program, it may delete files on your hard drive. Trojan horses cannot automatically replicate themselves.

Another widespread program is known as a worm. A worm is actually a small piece of software that travels through vulnerable computer networks with security holes. The worm scans the network in search of other computers with security holes. It copies itself to each system it finds.

Although viruses can infect any type of executable code such as EXE files or DOC files, most media files such as GIF, JPG, BMP, MP3, WAV, AVI, MOV and TXT files are generally safe.

Although viruses can wreak havoc, computer virus hoaxes can also be damaging. Virus hoaxes may cause Internet users to begin to ignore all virus warnings. This can be harmful, as they are then left vulnerable to 'real' virus warnings.

In addition, many virus hoaxes also include a 'fix' that instructs the user to delete a certain file from their system. However, the file the hoax says is a virus is actually an important file needed by your computer.

Never follow the advice within an email 'virus alert' instructing you to remove a virus from your system without first verifying its validity.

Visit Symantec to search their virus encyclopedia:
http://securityresponse.symantec.com/avcenter/vinfodb.html/

You can also search McAfee's virus database here:
http://www.mcafee.com/anti-virus/default.asp

You can protect your computer by taking a few precautionary steps:

1) Purchase a quality virus protection software and keep it updated.

McAfee http://www.mcafee.com

Norton http://www.symantec.com

Please note, the above programs (especially Norton) have been known to cause problems with some operating systems. Although there isn't any particular pattern, caution should be exercised. I use McAfee online virus scan and haven't had any problems.

2) If you're using Microsoft programs, make sure that the "Macro Virus Protection" is enabled. Never run a macro within a document unless you know exactly what it does.

3) Never open an email attachment unless you're absolutely sure where it came from and what it is.

4) Avoid downloading software programs from sources you're not familiar with. If you do download a program, make sure you scan the file with your anti-virus software prior to installing.

Question: I've been hearing a lot about firewalls, but I'm not sure what it is or if I need it. Can you help?

Answer: A firewall is basically a software program that allows you full access to the Internet and/or your network, while restricting access to your computer system from outside intrusions.

Internet users are extremely vulnerable to hackers, especially if you have cable or ADSL access to the Internet. You definitely need to protect your computer system. I recommend using a great program called Zone Alarm Pro http://www.zonealarm.com

Once you install a firewall, you'll be amazed at how many attempts to access your computer are blocked by your firewall.

Hackers can directly access your computer system by installing programs such as a key logger that can read every keystroke you make. This information is recorded and sent back to the hacker. Private information such as passwords and credit card numbers can easily be stolen.

A key logger is a small software program that quietly runs in the background. As these programs quite often run in DOS, you will most-likely never realize it's running. However, you can see if a key logger is running by pressing 'control' - 'alt' - 'delete' on your keyboard. This will launch a window that contains a list of all the programs currently running on your system. Review the list and watch for programs you don't recognize.

As there are many small programs such as adware (pop-windows) and spyware cookies that can bypass your anti-virus and firewall software, I recommend using a program called Pest Patrol http://www.pestpatrol.com/ This program will detect and remove non-viral malicious software.

Although you can purchase Pest Patrol at the above site, you can receive a discount if you purchase it with Zone Alarm Pro http://www.zonealarm.com . I can't guarantee how long this special offer will be available, so if you want it, now is a good time to get it.

If you really want to keep your computer safe, I recommend the following:

1) Purchase a good virus program and keep it updated
2) Purchase a good firewall program and keep it updated
3) Purchase a program like Pest Patrol and keep it updated

Taking the time to protect your computer is one of the best business decisions you'll ever make. If you don't protect it now, you'll definitely regret it later. It's just a matter of time.

Copyright © Shelley Lowery

About the Author:

Shelley Lowery is the author of the acclaimed web design course, "Web Design Mastery" (www.webdesignmastery.com) and "eBook Starter - Give Your eBooks the look and feel of a REAL book" (www.ebookstarter.com)

Visit www.Web-Source.net to sign up for a complimentary subscription to eTips and receive a copy of Shelley's acclaimed ebook, "Killer Internet Marketing Strategies."

You have permission to publish this article electronically, in print, in your ebook, or on your web site, free of charge, as long as the author bylines are included.

[tags]internet security,firewall,virus,trojan horse,virus script,hacking,website scraping,anti virus softw[/tags]

วันเสาร์ที่ 30 สิงหาคม พ.ศ. 2551

Let's Talk About Antivirus Software!

Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. At the same time the number of Internet surfers increased. This is a good thing because people are realizing the advantages offered by the world of technology. As soon as they discover this, they start using computers and the Internet more and more, but at the same time not considering the threats that are coming in from all sides. They should know that if you don't protect yourself, nobody will. These threats are now coming from everywhere and they are growing in number and complexity. First threats of this kind were the viruses. At first, viruses were not that harmful. They were designed to perform a simple task, like flashing a single message onto the user's computer screen. Also the spread rate was slow, because not many people were connected to the Internet. But now the majority of viruses are programs intentionally written to obstruct with, or harm other programs or computer systems. And they are spreading very fast.

Many companies and people have had a lot of troubles because of these viruses. And so the need for antivirus software was born. At first one very simple antivirus appeared and this was enough. Now, as the threat is growing antivirus software are becoming a lot more complex. Some of them have also included a firewall so to better protect the users. In order to increase the competition, other antivirus software producers have also come up with a wonderful idea: to offer free scan online. This was a big help for people that are frequently using a computer mostly for their personal use, meaning it is not attached to a network and uses the Internet only from time to time. Now, they don't have to spend a lot of money to buy antivirus software that will be used very rarely.

Most of these antivirus programs have to be bought in order for you to use them at their full capacity. Also you have the option to test a so called "free trial version". These trial versions include all or most of the software's features, and are available to be checked out by the user for a short period of time, usually 30 days. After these 30 days, the program can no longer be used. Other antivirus software producers use another method; they offer a free trial version that you can keep forever. But it is not fully operational, meaning some of the options of the program cannot be used as they are not activated. After you have tried a program and you consider it is fit for your need, then you'll have to buy it to protect your computer at its full capacity.

Lately, viruses are mostly spread through e-mails because this is the most common use of the Internet. Also, e-mail viruses are easier to develop. E-mail viruses make use of the ability of having macros or scripts implanted in word documents, spreadsheets, HTML pages, and are programmed to run when the document is opened. But how does an e-mail virus works? When an e-mail with an infected document or program is received, the user unknowingly opens a document/program, which in turn executes a code to open the e-mail directory and to send a copy of itself as an e-mail attachment to a certain number of addresses. Some of the recipients of the e-mail open its attachment and the process repeats itself.

This is where the antivirus program comes in. This program is set to check all incoming and outgoing messages and their attachments. If an e-mail is detected to have a document or program infected with a virus the program offers several possibilities to deal with the threat: delete the e-mail, put it in quarantine or try to disinfect it. Most of the times, these choices are left to the user's decision. It is up to the user to set the program in such manner to best fit his needs. But not all viruses are coming by e-mail. A few of them use security errors in the operating system or your Internet browser to be launched automatically. But if you keep your antivirus and all the other programs updated, there will be a small chance of being infected via this route.

Nowadays, most viruses are spread in the form of e-mail attachments. This is because some of the worst recent viruses relay on recipients that throw away common sense and launch a deadly e-mail attachment. Commonly the attachments are with extensions that include .bat, .com, .exe, .pif, .scr, and .vbs. Sometimes to avoid the filters of antivirus software, virus creators enclose their malicious code in a .zip or .rar archive file. The file might even have a password to full antivirus programs that scan inside archives. And obviously, the password is included in the message as an image for the convenience of the naive user. As a simple but reliable rule, you should never open an attachment that you didn't expect to receive, even if it came from someone you know. Also, make sure your e-mail software is configured so it will not automatically open attachments.

Another common way of spreading viruses is file sharing. Many viruses spread themselves throughout open network shares. You can protect your computer not sharing files or directories over the network. But if you don't have a choice and you have to share your files, you are still able to reduce the risk of being infected by installing antivirus software and keeping it updated. Other ways to become infected with viruses are downloading files or software from the Internet, instant messaging or even web pages.

If the file you are downloading or the computer you are downloading it from is infected with a virus, there is a big chance that your computer will also become infected with the virus. As for the instant messaging, the major risk comes from accepting files from other users on the network. This risk can be minimized by configuring your antivirus software to scan all incoming files and also configure your other programs not to automatically accept files, and not to automatically execute the files you accept. Certain viruses are known to infect web servers. If you visit a website from an infected server, your computer could be infected with the same virus, but this is a very rare method of infection.

There are many different threats that are targeting the computers. Although they are very different, all of them are popularly called viruses. A virus by definition is a self-replicating file, not considering whether it is malicious or not. Another type of the so called viruses are worms; they circulate mainly through e-mail but also spread through a network. A worm is aware he is located in a network and uses it for replicating itself. Trojan horses (or trojans) are mostly used to insert some remote tools into a system in order to give the attacker free access to that system, without the user's knowledge. Most Trojan horses cannot replicate automatically.

With the increased number of Internet users, the existing threats are also raising as now there are many more computers to attack and more people that don't know to stay away from these threats. But the antivirus software producers are making it easier for us. There is a lot of antivirus software which cover a lot of threats. All we have to do is install one.

Mike Ber is the owner of the Canadian Domain Name Portal called http://www.Every.ca He is also a contributing author to Canadian Computer Magazine and http://www.Developer.ca website.

[tags]antivirus, software, security, anti virus, firewall, personal security, spyware[/tags]

Your Computer Is Corrupted By A Virus

Is your computer corrupted by a virus? Do you have the proper security plan in place for your PC? You should, have anti-virus software on your computer and if not you are a potential time bomb and risking your data. Recently a friend sent this email message to a business associate;

"What I am saying is that the attachment you sent me had a virus in it and I trusted you, so I opened it. Then it caused havoc with my MS Word Program screwing up the drivers to open it and corrupting the data. It seems unfair that I should be subjected to this. And therefore I would not subject others to this. Because sending out malicious viruses whether intentionally or unintentionally from a compromised system is unacceptable. If you put that information into an email, then perhaps, I can send it like that. I can forward that information, but as it stands your system is corrupted and you are sending out corrupted files? So I will not be opening any more files from you as the risk-reward scenarios would not be worthy of possible potential."

Can you imagine getting an email like that from a business associate who no longer trusts your correspondence? Do your self a favor and get some anti-virus protection on your computer before it is too late! Consider this in 2006.

Lance Winslow

[tags]Computer Corrupted by Virus[/tags]

วันศุกร์ที่ 29 สิงหาคม พ.ศ. 2551

Free Ways To Tackle Threats To Your Computer

Protect Your PC

Having problems with your pc? Do your kids, family or friends fill it with all the stuff they find on the internet?

Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either.

Any pc connected to the internet is a target for viruses, spyware, adware and trojan horses.

You need to protect and clean your pc of these nasties which slow down your costly computer. We will show you how to do at little or no cost in this free report.

Before we start here is our disclaimer:- we take no responsibility for any harm YOU may do to your computer with this information. Use it at your own risk and be sure you are confident of what you are doing before you start. It's a good idea to make a restore point before installing/uninstalling or changing anything (see below for details)

Firstly Viruses, these are the most newsworthy of the baddies, and because of this most people have heard of them. They are the pc version of the Flu, or in a worse case scenario, Sars, and can kill your computer. There are new viruses released almost daily, and you need to keep up to date with Antivirus software to stop them. Fortunately there is a free program which can help you protect your pc. This is called AVG and is available at http://www.grisoft.com just follow links through the site to AVG Free Edition. Register your email address, download and install it to your pc.

The program is pretty straightforward to use but make sure you keep it updated at least weekly by double clicking the AVG icon (four coloured square) in the taskbar and then clicking on update in the window, tick internet as the source and you are good to go. It will automatically update and restart the main Antivirus program. Remember prevention is better than cure though and don't open attachments in emails or even sent to you over instant messengers unless you are sure of the person sending them, even then if you have AVG installed right click the file and use the "scan with AVG" menu item to double check.

Trojan Horses come next on our hitlist, mostly these are small programs which record either keystrokes or other information and try to send it back to someone to steal your details. But they can be used to take over your pc completely or partially to use your resources to send spam emails, or launch attacks on other computers on the internet, often for denail of service (DOS) attacks. Most Trojan Horses are removed by the AVG antivirus software, or if not it will alert you to its presence, and you can google http://www.google.com to find how to remove it.

A good prevention measure to stop Trojans accessing the net to send their payload is to use a software firewall, again there is at least one free program you can download, called zonealarm. It will ask you wether to allow programs to access the internet or not, meaning if you get something you know you didn't install accessing the net you can tell zonealarm not to allow it. To download zonealarm, go to http://www.zonelabs.com and follow links to the download section, and then to zonealarm (they are not so prominent as the ones for the Pro version which you pay for). It is a good idea to run a firewall to stop attacks coming in from outside as well your details going out. Windows XP with Service Pack 2 installed has a built in firewall, but zonealarm is much more configurable and does a better job overall.

Spyware and Adware can also be responsible for a lot of pc problems. These are often programs piggybacked onto a free download offered to help you with some other task like form filling on websites (Gator is a well known example but they are open about it). Spyware is used by less scrupulous companies and individuals to report back your surfing habits so they can send ads you're more likely to respond to. These slow down your surfing and also run in the background using your pc's power to do their dirty work. Sometimes the information sent back is even more sinister than just your browsing habits, so beware of software you download and check first. Adware is very similar although is usually contained in tracking cookies (small text files downloaded by your browser containing information to track you through a website).

Often these 2 terms are used interchangably. Another nasty which falls in with these is Scumware, which is a term used to describe software which hijacks another program (usually your browser or modem dialler) and displays only content which it's maker wants you to see and often prevents you seeing anything else. The diallers reset your modems settings to dial another (usually very expensive) number rather than your ISP's one. Thankfully some thoughtful individuals have kindly donated their time to give us free programs which will release you from the grip of these fiendish programmers.

Download firstly Adaware from http://www.lavasoft.de and install and run that (if it finds nothing on your pc I would be extremely surprised) secondly download Spybot Search and Destroy from http://www.safer-networking.org/en/download/index.html and install and run that too, it will pop up a dialog to say it has found adaware also on your machine, but it doesn't really mind so close it and continue. As with virus software you should use these and update them both regularly, as you can be sure the people on the darkside of the internet are updating their stuff to keep you hooked into it. Both programs have a button for downloading and installing updates automatically so there is no excuse not to do it before every scan, which we would recommend doing at least monthly and more frequently if possible.

So now you are protected from viruses, trojan horses, and other pc illnesses so that's it right?

Not quite, I have to say one of the most important things on your pc is your personal data, you can re-install Windows, Office and all the other programs on your computer from the cd's, but your prized pictures, your kids half written essay for that all important exam or your wifes recipes handed down from generation to generation carefully typed out and saved can't be. Back it up. NOW. Onto cd's if you have a cd writer or if not get one installed or use floppy discs. But for the sake of your sanity BACK IT UP.

And finally some tips to keep your pc running at its optimum.

Before making any changes to your pc or programs, it's a good idea to make a restore point by going to Start, then accessories on the start menu, then clicking System tools and finally the system restore icon. Follow the prompts and create a restore point to return to if it all goes wrong. Sometimes a slow pc is just the result of too many programs running, close down those you're not using, obvious but often overlooked. If you're anything like most pc users you have a bundle of programs start when your computer does, and sitting in the task tray at the right of the start menu. You can close these down manually but if you don't use them at all then why not remove them?

If you may want them but not everytime you start up you can go to start, then click RUN and in the text box type "msconfig" without the quotes. Don't worry now this looks daunting but all you need to do is click the tab at the right marked "Startup" and there is a list of all those programs which run as soon windows starts, now apply a little caution and lookup (http://www.google.com again comes to your aid) any you don't recognise. Now those you're sure you don't need running at startup untick the box.

Next time you start windows will put up a box to tell you you've disabled some things, as long as your pc works ok now, tick the box to not show it again. If you took of something you need or want back run msconfig again, and retick the box in the startup tab again, next time you restart it will return. My last tip is to run defrag monthly, go to start, accessories, system tools and run defrag, this can often speed up a slowing pc as it makes all the files on your hard drive quicker to access.

Douglas Titchmarsh runs several websites, and blogs including http://www.cashinonline.info

[tags]computer,pc,virus,spyware[/tags]

How Viruses Contaminate Your Computer

Viruses are little bits of software that normally have a negative impact on our computers when they are activated. Usually viruses are attached onto other software programs (games, disk utilities, office documents/Macros, screen-savers), and are activated when these normally harmless programs are started.

A virus is inactive until the infected program is run or an infected boot record on a floppy/CD is read. When the virus is activated it loads into your computer's memory where it can perform its nasty job or spread itself to other programs on your system or computers in your network.

Floppy disks used in an infected system (or CD-Roms/DVDs burned on an infected system) can then carry the virus to another machine. Programs downloaded from USENET, or file-sharing programs (Kazaa, Morpheus, Limewire etc.) can also spread a virus. More frequently now, email is also becoming a favourite way to spread viruses, Trojan horses and especially internet worms.

It should be made clear, that USENET and file-sharing programs do not create viruses or infected files in any way. It is certain anti-social people who create viruses, and then use these services to spread the infected files to other users on the system.

This is very similar to cars and highways in that Ford, Toyota or the highway makers do not cause traffic accidents, it is the idiot who got drunk and then drove who causes a 14 car pileup. Of course if there weren't cars or highways there wouldn't be an accident... then again, the idiot would still be getting smashed and driving his horse-carriage into the store window.

When you get a virus on your computer, it can erase everything that you have on your hard drive. Each virus is different - some of them come up as strange messages on your screen, while others just work at eroding the files on the computer. A virus just doesn't appear in your computer - you have to put them there, usually by running program from the Internet that contain viruses. They sometimes come from attachments in emails. It is possible that an email from a friend could contain a virus if that person's computer is infected. With anti-virus software installed on your computer, this will tell you whether or not it is safe to open the email with a message such as "No virus detected in incoming mail:

When you do get a virus through programs or mail, it hides in your computer and when you save data in the computer, you also save the virus. Then it starts to infect all the other files in your computer. When you send files to a friend or co-worker, you also send the virus to his/her computer. After a while the virus starts to crowd the data in your files and causes major problems with the system, such that you may not even be able to open important documents or you may not be able to open any of the programs on the computer. The virus won't affect the memory of your computer, but it will affect any disks that you use to save your work.

Learn how to remove blackworm virus and how to easily block trojan horses, spyware, computer viruses, and other malicious software in the future. Growing library of Computer Security Articles

[tags]blackworm virus, black worm, computer virus[/tags]

วันพฤหัสบดีที่ 28 สิงหาคม พ.ศ. 2551

Spyware, Adware And Your Computer

Virus is a harmful program which when gets executed on a computer may manipulate the information stored in the computer or replicate the files stored in the computer. All computer viruses are not lethal. The lethal nature of the computer virus depends on the programming of it. Some computer viruses like I-ray, just replicate the winfile.exe and other folder files. They create the copy of the folder inside the same folder, thus increase the hard disk covered space. But if nothing done at a proper time it can create severe problems even crash the system.

These days Spyware and Adware is becoming more nuisance for the computer than the usual viruses. Now you must be thinking how Spyware and Adware is different from normal virus. So let me explain you the difference between all of them (according to me based on my 10 years experience.).

Spyware and Adware are two forms of viruses which spread through internet. These are comparatively less lethal than other viruses, but still it creates a lot of havoc as it prevent the proper functioning of internet on any computer and as we all know today that internet is a vital component in our life.

It creates unusual internet traffic in your computer, which in turns slow downs the internet speed of your computer and also increases the consumption of bandwidth on it. Thus you have to pay hefty bandwidth charges to your ISP.

Adware creates problem by pop up windows and changing internet explorer homepage to some other websites (like some kind of search portal). It creates lot of problem while surfing the internet.

Now, you must be very clear about the problems created by these kind of viruses. If your computer get infected with it then you must try to remove it with any good anti- spyware program, some of them can be freely downloaded from the internet. Also increase the security settings of the internet explorer and also disable java on the browser, it will help in checking the problem to an extent.

Take Care,
Cyber Force is always with YOU.

Website: http://www.cyberforce.info

[tags]Spyware, Adware, Virus[/tags]

วันพุธที่ 27 สิงหาคม พ.ศ. 2551

Its Halloween! Spooks, Specters And Spyware!

It was late, I had put off going to the Software Convention till the last minute. I just had to watch my favorite show on TV, "S-Files". Its that episode where the Computer Salespeople all turn into Pod People and ,,,,well never mind. Its really scary! So I'm driving down the lonely one lane road from my house to the Convention. Its dark and the shadows are creepy, I'll never watch S-Files again, I swear!

I pull into the parking lot, the convention is being held in the old YMCA. Geez, its dark, only 1 parking lot light and its flickering on and off. As I walk up to the entrance, I remember the old story about how, back in the Dot.Com days, when they tanked, the building was used as a makeshift morgue, to hold all the bodies of the CEO's who committed suicide.

I get this really creepy feeling on the back of my neck as I go in,,,,oh, its just a Linux software salesman at the first booth. Is it my imagination or are his eyes glowing?

I head to the registration desk to get a program. I see the place is kinda empty, guess cause its so late. Well, I'm here to see who is offering the latest demos and what kind of freebies I can score. The front booths are usually the big sellers and they never give away freebies or demos. So I head to the back, hmmm, the lights back here are terrible! Here's a booth, Anti-Spyware 4 U.

The salesman shuffles up to me and says "Please take a demo of our new product". I look at it, it says this is the latest greatest software to combat Spyware. I take the CD out of the plain paper cover and look at the Logo. Its just a plain shiny cd? Wow I can see myself in it I remark. "We spared no expense" a voice says behind me, making me jump. I didn't even know he was behind me. Wait, I should have seen him behind me in the reflection off the CD.

I gotta be imagining things I say to myself. I ask the salesman for a brochure about their other products and as he hands it to me, our fingers brush each others. Jeez! His fingers are as cold as ice! Well, he is a salesman after all.

I thank him and head off to the other booths, seeing that I've gotten here too late after all, everybody is leaving. I decide to swing by the refreshments table to see if I can at least get a drink and some cookies. It sure is dark in here I think again as I come up to the table. As I scan the table, a little old lady comes up and asks me if Id like any milk and cookies. Yes Mam I reply. She hands me a little plate with cookies and paper cup of something white. I assume its milk, but its so dark in here! And there seems to be a fog or steam on the surface of the milk. Well beggars cant be choosers I think to myself as I thank her. She gives me a freaky cackling laugh as I turn away, stunned I turn back around and to my Horror, there is no-one there! Where in blazes did she go ?

I'm outta here my mind screams to me as I head for the door at a ever faster walk. In a minute I'm in my car with the doors locked and the engine warming up. Whew, That was the strangest Convention I've ever seen.

All the way home I've got a death grip on the wheel, just waiting for something to jump out of the shadows. Like a IBM salesman, now that would be scary!

If only I had known the other horrors that awaited me!

I breathe a sigh of relief as I close and lock the living room door behind me. Still shaking my head I head over to my Puter to try out this latest and greatest Anti-Spyware Software. As it boots, I get a message to disable my own Anti-Spyware program. I thing this odd, but I remember reading somewhere online that some programs can conflict with others so I comply. After a few seconds I get a message that the new Program is installed and it needs to connect to get possible updates.

So I get online and let it do its thing. A reboot is needed it says, OK so I reboot. The Puter comes up and I get online to check out the latest results of the Mullet contest. what's this ? This isn't my Homepage, it's a site where you can ,,,Holy Hand Grenades! Its Porn! I close the Browser and man alive, I'm beset by about a dozen popups offering me things that, well, no decent person would want. I'm figuring now that I've been had by this Anti-Spyware CD. I do a Restore and get back to my Online Mullet competition site. Then I remember that I need to transfer some money in my savings to my checking account. So I head to the Bank site and take care of it. I must be tired, the puter seems slow to me. I check my mail and the wait to login is frustrating. I decide to call it a night. I'll take care of it tomorrow.

After a tossing and turning night and dreams of my Puter melting, the new day dawns. With a cup of coffee I head to the Puter to see who won the Mullet Contest. The boot takes forever and the login freezes the first time so I have to power off and back on again. I'm really mad by now. I've been had by some sleazy software company! I finally get online but the Mullet competition site wont load. I cant tell if it's the Puter or maybe the online connection. As it dawns on me that I'm gonna have to take it in for service, I hope I've got some extra in my savings to cover it. I head to the Bank site but it wont load either. Then I notice the Hard Disk light blinking away. I'm not doing anything at the time so it shouldn't be accessing anything. Cursing, I turn the Puter off and pick up the phone to call the bank. I get a live person after waiting only 5 minutes so I figure the day may be improving. I give her my account info and she comes back saying "I show that account being closed last night after all money was withdrawn"! . There must be a mistake I say, she checks it again and says its true. The money in the account was transferred to a Bank she has never heard of in ,,,,Transylvania of all places. As I hang up in shock, I could have sworn I heard her laughing just like the old lady at the convention did last night.

I figure I better head to the Police Station to get some help. In a Panic I head for town. As I make the last turn into town, I glance towards the location of the YMCA, where all this started, only to see its not there! Its burned to the ground! Stunned, I stop in the street and get out. Nothing but ashes. The Man in the car behind me gets out and asks me if I'm ok. I mumble I'm lucky to be alive, I could have died in there last night. Puzzled the man says, but the YMCA burned down 2 nights ago! As I get back into the car, I glance at the spot on the seat where I put the CD and the Pamphlet. Gone. Just a little pile of dust. At the Police station, a sergeant takes down my story and informs me I've been the victim of online Identity theft. As I'm leaving, A couple of kids run by, in costumes, yelling "Happy Halloween"

Are you scared ? You should be!

About the Author: Doug Woodall has a web site at http://www.spywarebiz.com There he provides free information and recommended products to combat Spyware. His Website is recognized by Learning Fountain and ISafe Doug's Articles have earned him Trusted Author Status at ImpactArticles.com He is a member of the IWA (International Webmasters Association) Article edited for proper content by Wendy McCallum Permission to copy ok as long as about author info remains with article.

[tags]spyware, adware, malware, identity theft, antivirus, anti-virus, antispyware, anti-spyware[/tags]

Top 10 Ways To Protect Yourself From Computer Viruses

As more and more people are becoming comfortable using their computers at school, home or in the office it's only a matter of time before they encounter a computer virus. Here are our top 10 steps to protect you from computer viruses.

Use a high quality anti-virus program. There are many different anti-virus computers programs on the market some of them are better than others. Look to reputable computer magazines or websites for ratings to help you find the one that matches your needs.

Always use your anti-virus software. Make sure your anti-virus software is always turned on and scanning, incoming and outgoing email messages, and any software programs you run.

Keep your antivirus programs up to date. Most programs come with a yearly subscription make sure you take advantage of the updates. More advanced programs allow you to schedule updates or full system scans for "off hours" like 2AM when you aren't likely to be using your computer.

Keep your computer up to date. From time to time operating systems fall victim to security holes or issue updates. Make sure you check periodically to make sure you are running stable up to date versions of your software.

Backup your data regularly. Most windows computer users keep their documents in the "My documents" folder. This makes it easy to back up all of your important documents. Make weekly or monthly copies to CD or USB drives.

If you use floppy disks or USB drives on public computers like your school computer lab, Kinko's, or even digital photo printing store make sure you scan them for viruses. Public computers are notorious for not being up to date and properly protected.

Be wary of email attachments. Treat any email attachment as potentially dangerous. Never open attachments from people you weren't expecting. Also be careful of attachments from people you know but weren't expecting. Many computer viruses replicate themselves by reading the contacts from an infected computer.

Use text email if possible. While HTML email is prettier and allows you more control over formatting it also can carry computer viruses. If you use text based email the only way to get a virus is by opening an attachment.

Use downloaded freeware and shareware files or software with caution. Try to download them from popular reputable sources that scan the programs before they are uploaded. To make sure you are safe scan the program before you install it on your computer.

Be wary of links in IM or instant messaging software. Don't accept invitations from people you don't know and never click a link from someone you don't trust, they can easily redirect you to another website that will try to install a virus on your computer system.

© Computers.6ln.com, All Rights Reserved.

This article was written by Jim Faller of http://computers.6ln.com a website with information about viruses, spyware, adware, backups, data recovery and computer security.

[tags]computers, virus, computer virus, computer security[/tags]

วันอังคารที่ 26 สิงหาคม พ.ศ. 2551

Free Antivirus Security Software Download Now To Eliminate Spyware, Pop Up Ads, Etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions of every kind. Obviously, you're infected!

Regardless of the brand name anti-virus software(s), ninety percent of all personal computers have to deal with computer problems. Unfortunately,most of the effective software(s) cost $20 to $250.

Folks, there's no need to be scammed any longer. Don't ever make the mistake of paying big dollars!

On second thought, just continue to pay me your undivided attention, and together, we can eliminate these problems.

Step 1: Go ahead and uninstall all of your current anti-virus security options (except for your current firewall). Don't be afraid. Remember, you can always reinstall them at a later date if you so choose. Next: go online and type Tudogs into your local search engine. Afterwards, run the engine by simply pressing the Search button.

Step 2: Enter your email address into the Tudogs email address prompt. Then press the submit button. Now you are ready to enter the Tudogs website.

Step 3: Type Avast into the Tudogs search engine. Then press the Search engine button. Once you are on the next page: Click onto the icon that says: avast! 4 Home.

Step 4: Scroll down to the very bottom of the next page where it says in bold blue letters: avast! 4 Home Edition Download. Click onto this icon. This will promptly take you to the next page. Once you are on the next page: scroll down to the very bottom of the page and then press the download icon that says: Avast! 4 Home English version (or whatever your language of preference might be.). Disregard the file download that says: This file can potentially damage your computer. The reason they issue this warning is because Avast is not one of the brand name software(s), such as: Windows XP, Google Tool Bar, Norton Anti-Virus, McAfee, et...). Press the Run button. Now all you have to do is to follow all of the ensuing set up prompts.

Installation will take a few short minutes. It is really that simple. Once you have completed the installation process, I strongly recommend that you immediately log off and run your first Avast scan. You might be shocked at the number of hidden worms, viruses, and trojans that Avast is able to detect.

HOW TO RUN AN AVAST SCAN

You have three areas of choice in order to run an Avast scan: the removable media scan (CD's and floppies), the hard disk scan (the C drive), and the user defined folder scan. First, you need to make sure that you are not online. You only want to scan what is on your personal computer, not the infinite black holes of cyberspace. The C drive is the main drive that contains all of the necessary components that govern and run your personal computer. Therefore, this is always, by far, the most important drive to scan.

Step 1: In order to initiate an Avast C scan, you first need to double click onto the Avast icon that is now installed on your personal computer. When the Avast scanner appears notice that in the top right hand corner of the Avast scanner, there are three very distinctive icons: (+) (?) (x). Look to the far right hand side of the Avast scanner. Just below the minus sign (-) and the (x) is a square button. Press this button.

Step 2: Immediately out of the top of the Avast scanner should appear an icon that says: Standard Scan/Scan archive files. Once this icon appears look to the far left hand side of the Avast scanner. There you will see a large triangular button. By pressing this button you will initiate the Avast C drive scanner.

Step 3: Once an Avast scan has been completed, if Avast finds any questionable files, it will automatically ask you what you want to do with the file(s) in question. For example: you may opt to have a particular file moved to the Avast virus chest; there, it can no longer harm your computer; OR, you can rename and have any particular file moved into another location on your computer; OR, you can attempt to have an infected file repaired; OR, you can simply have it deleted. I always opt for deletion.

ALLEVIATING POP UP ADS

Step 1: Using your mouse, go down to the bottom left hand corner of your computer and press the start button.

Step 2: When the program options appear go directly to the control panel.

Step 3: Next: click onto internet options.

(Note: These directions might very slightly from computer to computer.).

Step 4: After you have clicked onto internet options you are going to see an icon. At the very top of this icon it is going to say something to this effect: internet properties: general, security, content, privacy, et...

Step 5: Next: Look for the phrase that says: Temporary Internet Files. This is what you want to delete. This is a major source of those pesky pop up ads. In my opinion, you don't need a temporary internet file in order to get back to a website that you just visited. Unfortunately, this is where a lot of junk is stored, such as: dangerous cookies, adware, spyware, and various tools for hackers to hijack your personal information. Also, the more of this junk that you allow to build up over a period of time, the slower your computer is going to run.

Step 6: Next: within this same icon you should see another icon that says: History. We are now going to delete your computers history for the exact same reasons as mentioned in step five.

Step 7: Go ahead and delete the cookies option within this same icon for the exact same reasons as mentioned in step five. (Note: If you are not a regular cookie deleter the chances are very good that you now have multiple thousands of cookies that are congesting your computer.).

Step 8: While you are within this same icon you will see a phrase that says something to this effect: Days To Keep History. Most computers are already preset at 20 to 30 days. This is very bad because this means that your computer will wait 20 to 30 days before it automatically deletes your recent history. Remember: every time you go online you are going to acquire five to ten cookies. These cookies will then replicate themselves many times over. Some of these cookies are extremely dangerous. If it takes 20 to 30 days to delete all of the hidden junk that you are going to acquire online, is it any wonder that you are now experiencing difficulties?

Step 9: You guessed it! Change the number of Days To Keep Your History to 7 or less. This will alleviate an awful lot of internet congestion.

YOU ARE NOW IN FOR A REAL TREAT. ZONE ALARM IS THE MOST AWESOME FIRE WALL IN THE WORLD!

Step 1. Go to the Download.com website.

Step 2. Type Zone Alarm into the Download.com search engine. Then press Go.

Step 3. Once on the next page proceed to scroll downward until you find three versions of Zone Alarm that are currently being offered. Two of these versions offer free trial periods with an option to buy after the duration of these trial periods. The third version has a free licence. That means that this version is totally free. I strongly recommend that you start off with this version.

Step 2: Click onto the blue letterings of whichever version of Zone Alarm you so choose to install.

Step 3: On the next page you will see a caption in blue letters that says: Download Now. Click onto this icon.

Step 4: Disregard the Security Warning that says: This file can potentially damage your computer. The reason they issue this warning is because Zone Alarm is not one of the brand name software(s). Now go ahead and press Run button. Now all you have to do is to follow all of the ensuing set up prompts. Installation will take a few short minutes.

My name is Eric J. Nelson. I am on a personal mission to eliminate computer problems. I hate to see others get scammed. There is more software/protection available. Please check out my website at: Computer Problem Solutions

[tags]adware, spyware, computer, problems, eliminate, get, rid, of, internet, congestion, pop, up, ads[/tags]

Spyware Protection- Backup Software Is The Best Defense Against Spyware And Computer Viruses

The Worst Case Scenario

Your subscriptions to your favorite anti-virus and spyware software expired 28 days ago. You have been meaning to pull out your credit card and renew. However, you just haven't gotten to it.

Yesterday an e-mail, SPAM really, hit your inbox with an interesting by-line on the latest natural disaster. You click on the innocuous looking link. The next thing you know, Internet Explorer doesn't quite work correctly, followed by a failure of Windows Explorer, followed by your PC running really slow. You have just been hit with spyware! Next thing you know, your PC will not boot and you are dead in the water.

This Whole Scenario is Preventable

In this example (which is played out dozens of times every day) the user did not keep his/her software counter measures up to date. There are some extremely top shelf software products available which do a simply wonderful job of keeping up with the latest spyware and virus threats. In fact, by employing several similar products you can often catch threats with one product which was not neutralized by another.

However, there are no guarantees here! A variety of circumstances may result in a threat to your PC. Depending solely on software counter measures (e.g. anti-spyware, anti-virus software) is only part of the story. You can actually take your destiny and digital protection in your own hands and add another layer of protection.

Software Backup- Your Own Version of Digital Time Travel

The two approaches available are:

  • Data Backup
  • Image Backup

    Data Backup refers to making a copy of your valuable files, personal and business information on some other media that is physically separate from your computer. A myriad of products and services exist for storing this information including USB drives, DVDs, CDs, external disk drives, network drives, archiving services and even the humble diskette.

    However, you must really think through all of the information contained on your computer that you want to save if your PC became unusable including:

  • Files from software applications like Word, PowerPoint, etc
  • e-Mail files
  • e-Mail rules and SPAM filter settings
  • Web browser favorites
  • Customizations of installed software products
  • Product installation keys
  • Password files
  • Software installation files
  • Desktop background images

    Image Backup refers to a process where your computer environment is saved. The difference is that in the case of a data backup you may have saved ALL of your valuable information. This is the good news. The bad news is that you have now have to rebuild your personal computer's software:

  • The operating system, complete with maintenance
  • Customizations that might include your Internet Service Provider settings, preferences, etc
  • Shortcuts
  • Registry customizations

    An image backup makes a snapshot of your entire personal computer. The ideal scenario is that you tweak and install all of your software. At the point where things are working just right, you take your snapshot which you store away in a safe place. At this point you also start to regularly make regular backups of your valuable data that has changed since the snapshot has changed.

    If you have the misfortune to get nailed by malicious software that cripples your computer, you now have the ability to

  • Restore your computing environment
  • Restore the most recent copy of your data

    You now can keep on trucking with a minimum of disruption. This approach does take a bit of discipline. However, it really does not take a whole lot of time. These backups can be started when you go to bed, and will be completed by the time that you wake in the morning.

    The alternative is spending time trying to rebuild your system (if you can find all of the software) and IF you can get your valuable data off of your crippled PC. It's a simple matter of time, money and aggravation. It's your choice...

    Eric Penfield is a 20 year veteran of the Information Systems industry. He has worked for several Fortune 10 companies and currently publishes the Naughty Software Blog.

    [tags]anti virus software,internet security,anti virus,anti spyware,spyware removal[/tags]
  • วันจันทร์ที่ 25 สิงหาคม พ.ศ. 2551

    Personal Firewalls For Home Users

    What is a Firewall?

    The term "firewall" illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network.

    The primary goal of a firewall is to implement a desired security policy; controlling access in both directions through the firewall, and to protect the firewall itself from compromise. It wards off intrusion attempts, Trojans and other malicious attacks.

    Personal Firewalls:

    They are meant for the home user in a networked environment. They aim to block simple attacks, unlike the enterprise level firewalls that the corporate world uses at the server or router end. There are many ways to implement a firewall, each with specific advantages and disadvantages.

    Are they really needed?

    Nowadays organizations and professionals use Internet technology to establish their online presence and showcase their products and services globally. Their endeavor is to leverage digital technology to make their business work for them.

    All the organizations and professionals are shifting from Dialup to broadband and getting a fixed IP. It has led to an increase in security attacks, bugs in everyday working. This does not mean that Dialup being anonymous dynamic link or the firewall of the ISP network make you pretty safe.

    Now if your machine was under attack, you must have wondered what went wrong making your system crash suddenly. So I would rather like to say, it's not necessary for anyone to actually know about you or your IP address to gain access to your system.

    If you system is infected or prone to intrusions, then beyond the anonymity of your Dialup connection or a dynamic IP, your system can be hacked.

    Types of Attacks

    Intrusion:

    There are many ways to gain unauthorized access to a system. Operating system vulnerabilities, cracked or guessed passwords are some of the more common. Once access is attained, the intruder can send email, tamper with data, or use the system privileges to attack another system.

    Information Theft and Tampering:

    Data theft and tampering do not always require that the system be compromised. There have been many bugs with FTP servers that allow attackers to download password files or upload Trojan horses.

    Service Attacks:

    Any attack that keeps the intended user from being able to use the services provided by their servers is considered a denial of service attack. There are many types of denial of service attacks, and unfortunately are very difficult to defend against. "Mail bombs" are one example in which an attacker repeatedly sends large mail files in the attempt at filling the server's disk filesystem thus preventing legitimate mail from being received.

    Types of Attackers

    Joyrider:

    Not all attacks on computer systems are malicious. Joyriders are just looking for fun. Your system may be broken into just because it was easy, or to use the machine as a platform to attack others. It may be difficult to detect intrusion on a system that is used for this purpose. If the log files are modified, and if everything appears to be working, you may never know.

    Vandals:

    A vandal is malicious. They break in to delete files or crash computer systems either because they don't like you, or because they enjoy destroying things. If a vandal breaks into your computer, you will know about it right away. Vandals may also steal secrets and target your privacy.

    "In an incident a Trojan was being used to operate the web cam. All the activities being done in the house were being telecasted on the websites."

    Spies:

    Spies are out to get secret information. It may be difficult to detect break-ins by spies since they will probably leave no trace if they get what they are looking for.

    A personal firewall, therefore, is one of the methods you can use to deny such intrusions.

    How Firewalls work?

    Firewalls basically work as a filter between your application and network connection. They act as gatekeepers and as per your settings, show a port as open or closed for communication. You can grant rights for different applications to gain access to the internet and also in a reverse manner by blocking outside applications trying to use ports and protocols and preventing attacks. Hence you can block ports that you don't use or even block common ports used by Trojans.

    Using Firewalls you can also block protocols, so restricting access to NetBIOS will prevent computers on the network from accessing your data. Firewalls often use a combination of ports, protocols, and application level security to give you the desired security.

    Firewalls are configured to discard packets with particular attributes such as:

    • Specific source or destination IP addresses.

    • Specific protocol types

    • TCP flags set/clear in the packet header.

    Choosing a firewall:

    Choose the firewalls which have the ability to ward of all intrusion attempts, control applications that can access the internet, preventing the malicious scripts or controls from stealing information or uploading files and prevent Trojans and other backdoor agents from running as servers.

    The purpose of having a firewall cannot be diminished in order to gain speed. However, secure, high-performance firewalls are required to remove the bottleneck when using high speed Internet connections. The World-Wide-Web makes possible the generation of enormous amounts of traffic at the click of a mouse.

    Some of the good firewall performers available in the market are below:

    • BlackICE Defender

    • eSafe Desktop

    • McAfee Personal Firewall

    • Neowatch

    • Norton Personal Firewall

    • PGP Desktop Security

    • Sygate Personal Firewalls

    • Tiny Personal Firewall

    • Zone Alarm

    • Zone Alarm Pro

    Most of these firewalls are free for personal use or offer a free trial period. All the personal firewalls available can't ensure 100% security for your machine. Regular maintenance of the machine is needed for ensuring safety.

    Some of the tasks advised for maintaining system not prone to intrusions:

    • Disable file and print sharing if you are not going to be on network.

    • Update your antivirus signature files regularly.

    • Use a specialized Trojan cleaner.

    • Regular apply security patches to your software and operating system.

    • Don't open email attachments if you have don't know the contents it may contain.

    • Don't allow unknown applications to access to the internet or to your system.

    • Regularly check log files of your personal firewall and antivirus software.

    • Disable ActiveX and java and uninstall windows scripting host if not required.

    • Turn off Macros in Applications like Microsoft Office and turn macro protection on.

    • Check the open ports of your system and see them against the common list of Trojans ports to see if they are being used by some Trojan.

    • Log Off from your internet connection if not required. Being online on the internet for long duration gives any intruder more and sufficient time to breach system security.

    • Unplug peripherals like web cam, microphone if they are not being used.

    About The Author

    Pawan Bangar,
    Technical Director,
    Birbals,India
    ebirbals@gmail.com

    [tags]internet security,firewall,internet protection,virus,spyware,spam,spam filter,anti virus,ISP[/tags]

    วันอาทิตย์ที่ 24 สิงหาคม พ.ศ. 2551

    Safe Surfing

    If you're going to connect to the internet, you need to protect your computer, otherwise it's like leaving your front door wide open with a big 'Robbers Welcome' doormat on your front step. You've probably heard all the terms – such as virus, hacker, firewall, spyware and a million more – but perhaps think that the anti-virus programme that came with the computer, or that your PC-savvy mate downloaded for you is enough to keep you safe, right? Wrong …

    First of all, you need a firewall. This is your first line of defence, making it extremely difficult for any hacker or malicious programme to get through. Nothing is 100% impenetrable, however, and an anti-virus programme that will always be on the lookout for anything nasty that manages to find its way in is essential.

    But there are things that manage to get onto your pc in the most unlikely of ways: it can be inadvertently added by you as you download music, screensavers or games onto your PC, or it can even be added by someone you know and trust, such as a suspicious spouse or your employer. This is Spyware and is a frightening breach of privacy which allows people or programmes to see what you're doing, what sites you look at and even log your keystrokes so that they can reproduce everything you type, such as passwords and credit card details.

    The only way to truly guard against spyware is to have a dedicated programme that detects and removes it.

    So, you have your firewall and your anti-virus programme in place; surely an anti-spyware programme is just money down the drain? Unfortunately not: this will fill the cracks left by your other security programmes, and although it will not make your computer completely impenetrable (unfortunately the people writing these programmes are extremely good at what they do) it will be the equivalent of locking all your doors and windows and having an alarm system armed before you leave your house – someone could still get in if they really wanted to, but they'd probably rather go next door, where they've rather invitingly left a downstairs window open.

    People are now using their computers for a range of personal and business applications, the loss or infiltration of which could do them serious emotional and financial damage. Taking preventative measures to ensure your online security should be as natural as closing the door behind you when you go out, and there are affordable and easy to use programmes out there to help you do just that.

    For a full range of products to keep your computer safe, visit http://www.vaultlock.com

    Otherwise you might as well order that 'Robbers Welcome' mat now!

    [tags]vaultlock, web, largest, leading, IT Security, IT, Security, warehouse, virus, hacker, protection, s[/tags]

    Protecting Your PC Against Viruses And Spyware

    Spyware, trojans, dialers and viruses can cripple your PC's performance, destroy data and compromise your security. Find out how to identify if your PC is at risk and how to lock it down from attacks in the future by reading this factsheet.

    What is spyware?

    Spyware is software which can track what you do on a computer and report it back to another computer. With the widespread use of Broadband, spyware has an easy route back to its precipitator. Most spyware is quite benign - almost all applications will 'call home' to check for new versions, including your operating system. There are, however more advanced and aggressive spyware applications which can try to take over your PC, perhaps by forcing your web browser to another search engine page, or by displaying popups. Worse still, some spyware can store every keystroke on your computer, passing this back to its owner - this could include usernames and passwords, along with the websites that you may have entered them into. Still feel safe doing your banking online? Some applications will install a phone dialer which will change your dialup settings - instead of dialing your standard local rate number it'll dial a premium rate number, sometimes several Pounds per minute - you will only find out when you get your bill unless you notice the number's changed, and don't expect the phone company to reimburse you!

    Where does spyware come from?

    The main spread of spyware comes from the human weakness to get something for nothing. Free toolbars, wallpapers, smileys, application add-ons or 'cracked' software often contain spyware or viruses. So if you download ANYTHING, try to make sure it comes from a reputable source, scan it for viruses and perhaps do a google search to see if anyone else has had problems with this application. Note that some programs require the 'spyware' in order to run, so it's possible that the program will stop working, or work incorrectly after spyware removal, however I have never had this happen to any mainstream program, and this is a warning that most Antispyware apps mention just to cover themselves.

    What are viruses?

    Viruses have been around for a long time, and have actually become less destructive (at least in my opinion). Going back 15 years it was not uncommon for a virus to wipe out the boot sector of the hard disc, similar to ripping out the index of a book. Nowadays viruses can corrupt files but most concentrate on their own propagation and stealth. They'll try to bypass or even disable your antivirus software and firewall, send themselves out to all of your address book and perhaps deliver another payload - some even turn your PC into a 'zombie' to perform predefined tasks. This might either be a SPAM attack or a DoS (Denial of Service) attack, where any infected PC sends out junk data to one specific server. If enough PCs do this it effectively swamps the server so that it cannot respond to legitimate traffic, bringing it down.

    How do I know if I have spyware/viruses?

    The symptoms can differ depending on the infection. I once cleaned a PC that had 700+ pieces of spyware/viruses on. Many of these were duplicates/mutations of the same one (MS Blaster), but nevertheless the effect was the same - a very lethargic PC that behaved erratically. It was incredibly slow, sometimes rebooted and would popup adverts for porn regularly. The start page was also configured to goto another search engine, and changing it within Internet Explorer settings made no difference.

    Another useful tip is to open up Task Manager (right click on the taskbar and select it from the menu). Look at all of the processes that are running under your username login. Do a 'google' for the EXE filename - almost every application will have some writeup on its legitimacy and status so you can quickly determine applications that have a right to be running and those of a suspicious nature.

    How can I get rid of spyware?

    The best way to know if you are infected is to use one of the many excellent and free spyware detectors. The two best apps are LavaSoft Adaware and Spybot Search and Destroy, both of which are free.

    - Lavasoft

    - Spybot

    Download BOTH applications and perform a full system scan. What one doesn't find the other invariably will. Both will flag up 'cookies' as a security risk, however do not delete these unless they are obviously dodgy (e.g. they mention sex, for example and you've not been frequenting porn sites!) Many cookies are useful, storing your online preferences (e.g. your Amazon preferences...)

    At the time of writing Microsoft has a free beta of its antispyware software available, which may also catch some items that Adaware and Spybot miss. If something shows up in either app that cannot be removed then give it a try as initial reports show it to be very good.

    You should also run a complete virus scan, as antivirus software will remove trojans (pieces of code that are hidden inside other programs) just as successfully. AVG from Grisoft is an excellent free av program.

    Once you've run all of the above applications several times and no more nasties are coming up recheck the Task Manager and ensure that no suspicious applications are still running. If there are any that a Google search shows as malicious, do another google for the name of the file and 'removal' - most of the big antivirus sites will have instructions on how to remove the tool, or may even provide free online tools to eradicate it from your system. Chances are that you will have to get your hands dirty and edit the Windows Registry. This is not as frightening as it sounds, as long as you a) take a backup of the registery and b) follow the instructions to the letter.

    Sometimes using the System Restore feature in Windows can fix problems, so for the less technically experienced this might be the more painless route to go if the above scanning solutions don't work and you don't want to play around with the registry.

    How do I prevent further attacks?

    This is really down to common sense. There are a number of things you can do:

    - Don't click on popup adverts or any suspicious 'error messages'. Some popups are disguised to look like error messages, saying 'Your computer is at risk from spyware - click here to fix the problem'. Quite ironic really...

    - Install a popup blocker. Windows XP Service Pack 2 has one as standard. Alternativey the Google toolbar has one, with many other features besides

    - Run regular scans with Adaware, Spybot and your chosen antivirus sofware. Free antivirus software such as AVG is pretty much as good as Norton and (in my opinion) will not slow your PC down as much!

    - Don't open any attachments unless a) you know who sent them, b) you were expecting the email AND c) you've saved it to your hard disc and scanned it with up-to-date antivirus software. If in doubt email the source to confirm validity. Many viruses will replicate by sending an email addressed from you with a file attached renamed as one of your files.

    If you use P2P software be extra careful with what you download

    Ensure that your PC is patched and up-to-date. Ideally, set Windows Update to check for updates every day and install automatically. Do not leave your PC connected to the Internet while you are not there (either switch it off or switch off your modem/router)

    Ensure that you are running a firewall. This will stop people from hacking into your computer. Windows XP Service Pack 2 has a perfectly adequate one, although you might also consider ZoneAlarm, which is free. Check to see how vulnerable your PC is by running the 'Shields Up' online test

    About The Author
    Martin Bailey is author of Marketing your Business and has been working with computers since 1982. He is available for marketing consultancy, web design and search engine optimisation. More information at http://www.marketingyour.biz.

    [tags]free spyware, spyware applications[/tags]

    วันเสาร์ที่ 23 สิงหาคม พ.ศ. 2551

    Desktop Security Software Risks - Part 1

    This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.

    Reason #2: the Desktop Security Software Risks

    The risks of placing software on the desktop are such that I will be breaking this article into two parts.

    Fundamentally we think of having software on our desktops as a good thing. I love downloading or installing new packages and seeing what new creative things people do to the user interface or what they do to make certain aspects of my life easier or more fun.

    But there are problems inherent with software that resides on the desktop, especially security software. All developers will know what I mean. First and foremost, desktop software can be reverse engineered. What's that mean? Have you ever inadvertently double-clicked on a file and had garbage show up or seen something that looks similar to this?

    http://www.checkinmyemail.com/Articles/image001.jpg

    The old hex dump. Programmers will know it well. We actually spend a good deal of time trying to read this stuff. Basically, if there are programs that can (and do) turn instructions like the following

    If UserBirthDate < "01/01/1960" then

    IsReallyOld = "Yes

    Else

    IsReallyOld = "No"

    End If

    into something like the picture above, then the reverse is true: people have developed software that can take that gobbeldy-gook in the picture above and turn it somewhat into the if-statement I wrote out. The reversing software won't know that I had an item called UserBirthDate, but it will know I was testing for a value of January 1, 1960 and it will be able to say that based on that value I set another item to Yes or No.

    So now we install our fool-proof anti-virus software on our desktop (or our firewall for that matter). Well, so too can a virus author. And that virus author or hacker will also have gotten a copy of the latest reverse-engineering software from his local hacking site. He now goes upon his task of reverse-engineering the software and then trying to decipher the results. It's not easy but it can be done. Unfortunately, vendors know this and understand this as an acceptable risk.

    The problem here is that your security software is at risk. If your vendor codes an error, the virus author can and will detect it. For example, if your vendor should exclude a file from scanning, it's possible the virus author will figure out which file (or type of file) that is and bury his code there. If the vendor excludes files from scanning or heuristics, it's possible that virus author will figure out a way to corrupt that file.

    That being said, there are other risks. As we have said, once software is on the desktop it affords virus authors an opportunity to reverse-engineer security software. The knowledge that reverse-engineering provides is invaluable to a virus author when building his next software attack. Third, virus authors can learn where the anti-virus vendors put there software and put the links to their software (directory folders, registry entries, etc.). This too is invaluable information. In fact, in some ways it teaches people intent on writing malicious software clues as to how to infiltrate the computers' operating system, where registry entries need to be made to force software to be loaded every time a computer is started, etc.

    This information is generally available all over the web and in manuals for operating systems, especially manuals on such subjects as the Windows Registry. But having the software teach you where things belong to be effective is powerful knowledge.

    Lastly, and perhaps most significantly, is the issue of forebearance. The anti-virus vendors usually know more about the potential exploits inherent in programs than virus authors but they are bound by the fact that should they try to prevent them before the exploits occur, they could be branded as irresponsible for teaching virus authors about these very exploits.

    For example, when Microsoft first released the macro capabilities of Word, anti-virus vendors immediately realized the potential for danger in macros, but they were handcuffed. If they released software that disabled macros before the first macro virus was ever released, they would signal to virus authors the inherent destructive powers of macros. They chose instead to wait, handcuffed by the limitations of desktop software.

    Until the Internet there really has been no better medium for delivering virus solutions than desktop software. It was relatively inexpensive to deploy (either market the software and sell it in stores or provide free downloads on bulletin boards and web sites). It is, however, expensive to keep updated in terms of time and effort, even with automated update systems.

    The Internet caused several things to happen: by becoming a powerful medium for sharing files, whole families of viruses disappeared practically overnight (boot sector viruses, for example); by becoming the option of choice for sharing files, it was easier to infect a single file and have thousands download it.

    A better solution is to place the security software in an offsite appliance of its own making. All Internet, intranet, networking connections flow through the appliance.

    Selling off the shelf hardware appliances with built-in security software is better than a desktop software solution but it still suffers –to a lesser extent- from the pratfalls that desktop software falls prey to.

    Even better is to create a service that a 3rd party vendor manages in a secure environment. In such an instance both the software and the hardware are away from the prying eyes of the malicious software authors. This further reduces the opportunity for malicious authors to discover the tricks and techniques employed by the security vendors to protect you.

    About The Author

    Tim Klemmer
    CEO, OnceRed LLC
    http://www.checkinmyemail.com

    Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.

    timklemmer@checkinmyemail.com

    [tags]internet security,firewall,internet protection,virus,spyware,spam,spam filter,anti virus,ISP[/tags]

    วันศุกร์ที่ 22 สิงหาคม พ.ศ. 2551

    What Is A Virus And Spyware And What's The Difference

    I know you've heard the terms Virus and Spyware. These terms are always on the internet and in the news. "But what are they", you ask? Not only is it very difficult to give you a definition in plain English but both act very similarly.

    Here's what you should know about Viruses and Spyware.

    1- It doesn't matter which you have, both are very bad! Both Viruses and Spyware can do great harm to your computer. Things like: destroy important data on your PC, create physical problems with your computer, steal bank account information (like passwords,credentials, etc...), steal other personal info (like credit card info). DOES THIS SOUND VERY SCARY AND BE A CAUSE FOR CONCERN? YOU BET!!!

    2- How can you get a Virus or Spyware? Here's where there are some slight differences between the two. Most viruses are distributed thru email attachments or downloads. Most Spyware gets distributed from going onto websites. The "bad" websites automatically install spyware or trick you into downloading spyware. They trick you by creating popups on your computer. When you try to close the popup, spyware gets installed. I'm not saying all popups are bad. I use a popup on my website to give you the option to subscribe to my newsletter. I'm talking about those annoying advertisements that popup 50 times on your screen and you can never seem to close them.

    3- What are some symptoms? I'll give you some of the most popular symptoms to look out for. Is your fairly new system a little or very slow? If so, you more than likely have been affected by Spyware. Do you keep getting unwanted popups on your computer even though you're not connected to the internet? This is usually a sign of Spyware. Do you notice any program or software that you know you didn't install? Could be Spyware! Viruses are a little more difficult to detect. If your PC is doing some unusual things like: the monitor colors changing or your PC constantly rebooting on it's own; you might have a virus.

    4- What can I do? There are several things you can do to protect yourself against these dangerous programs. I'll give you some suggestions to help you but these suggestions aren't full proof. The more tools the "good guys" bring out, the more Viruses and Spyware the "bad guys" create. It's a vicious cycle. Here are some tips that will help:

    A) Purchase and install AntiVirus software. Installing Antivirus software will help detect and possibly delete any viruses on your computer.

    B) Purchase and install Anti Spyware software: Installing AntiSpyware software will help detect, clean and possibly block Spyware from being installed on your PC. Here is Anti Spyware software that I would recommend. I feel it is a great product. It's very effective! I not only use this product personally, I've recommended this very product for our IT department at work. You can purchase it here:

    http://www.webroot.com/consumer/products/spysweeper/index.html?acode=af2&rc=4238

    C) Learn how to and download Microsoft Critical Updates. I've provided some instructions on how to do this. Please read my "Tip" section in my newsletter.

    D) If you receive an email that requests verification of personal info, verify that the email is legitimate (call the bank or credit card company to verify if necessary).

    E) If downloading music or videos, make sure it's from a well respected website MTV, Yahoo, etc...) and not an unknown or unheard of (like Kazza or Porn Sites).

    I hope this information was very helpful to you. It's very difficult to totally stop viruses and Spyware from being installed on your computer but if you follow some of these simple suggestions, you're way ahead of most people.

    My name is Andrew Pena. I have been in the computer industry for over 15 years.I'm a Network Administrator with a Fortune 500 company.

    I've been doing volunteer computer training for about 5 years now and I love it. I really enjoy sharing my computer knowledge and people actually "Getting It.!" That's why I write a newsletter.

    If you're interested in subscribing to my newsletter, please do by sending me an email: subscribe@beapcgeek.com

    [tags]computer,computers,pc,computer beginner,beginner,training,teaching,novice[/tags]

    วันพฤหัสบดีที่ 21 สิงหาคม พ.ศ. 2551

    Worms A Threat, Hype, Or Dud

    The Worm_Grew.A Virus Got Allot Of Attention
    ---------------------
    The 3rd has come and gone. What has been the real effect or impact of the "WORM_GREW.A (Also know as Nyxem, BlackMal, MyWife, and so on)" virus? For weeks there has been tons of warnings, in the news, print, e-zines, you name the forum and it has been a discussion topic. Current information indicates that the WORM_GREW.A virus has not caused mass destruction as promised or suspected. I'm sure some of those 600,000 or so suspected infected computers were impacted, but who really knows at this point.

    Viruses Can Impact You In Various Ways
    ---------------------
    There is one thing I do know however; Even if the BlackMal virus has not done as much physical damage as predicted, it has done a good deal of indirect damage. Think about how much time corporate technical people have spent preparing for the possibilities, making sure their enterprise anti-virus solution is functioning properly, the time devoted to discussing and planning for disaster recovery in the event a direct impact is realized. What about all the home and small business people stressed about the doom looming over their computers head in the form of a "possible" destructive and wide spread infection.

    How Do You Know If Your Business Is Protected Against Viruses
    ---------------------
    A business associate of mine recently worked on a project in which he performed a complete infrastructure upgrade for a document / information heavy business. During the upgrade, he found that the anti-virus solution they were using was not functioning properly, had not updated its virus signatures for eight months, and on top of this, their very expensive tape backup solution had not been working for about as long. The customer kept changing the tapes, but they were blank. Just imagine what would have happened if they had not had this upgrade done, and an effective anti-virus and tape backup solution put back in place. If they had contracted this virus it could have not only shut them down for a period of time, it very well may have cost them huge financial losses or worse.

    Virus Threat, Hype, or Somewhere in Between
    ---------------------
    Do I think this particular virus scare is a product of a real threat, fueled by hype, or a dud? Quite frankly I think it has been a little of all three. The threat was / is definitely real, the hype was all over the media and other information outlets, and as far as being a dud, if you analyze it using the equation threat+hype= impact, maybe.

    I think what really has set this virus apart from recent malware / threats, is its destructive capabilities. Many malware developers have moved away from creating destructive worms and viruses in favor of creating cash generating malware. There's no money in it for them if they just blow up your system.

    Conclusion
    ---------------------
    It's quite interesting, the parallel between how we deal with threats and risks in our personal lives, and that of the technology world. Many of us only prepare for a negative or damaging event shortly before the event takes place. That is if we have been warned with time to prepare. The bottom line is we can never let our guard down. Consistency, persistence, awareness, and preparedness need to be in the forefront of our minds.

    You may reprint or publish this article free of charge as long as the bylines are included.

    Original URL (The Web version of the article)
    ---------------------
    http://www.defendingthenet.com/newsletters/Worm_Grew.A-Threat-Hype-Or-Dud.htm

    About The Author
    ---------------------
    Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals. If you would like to contact Darren you can e-mail him at Darren.Miller@defendingthenet.com. If you would like to know more about computer security please visit us at http://www.defendingthenet.com

    [tags]Worm_grew.a, Nyxem, MyWife, BlackMal, destructive virues, Feb 5th Virus[/tags]

    วันพุธที่ 20 สิงหาคม พ.ศ. 2551

    10 Smart Ways To Protect Your Computer Against Viruses

    Virus infection on your computer may cause a very serious damage and even loss on your business. You can just imagine it may wreck your system registry or your entire computer (with all your receivables data on it!) or all your HTML programs! It will come to total black out screen, it will not boot at all. But that is actually the worse scenario that may happen. Are you going to wait for this worse scenario in your life to happen? I guess NOT, right?

    Here are the 10 smart ways that I personally do to protect my computers against viruses, malicious dialers and spywares.

    (1)If you are using Windows XP, always turn on the firewall.

    (2)Always run all necessary latest updates & service packs (all windows! including all your programs & software!---keep them updated)

    (3)Run your anti-virus program everyday (some do it every week) There are many virus programs that you can get for free scanning.

    (4)Run your anti-spyware/adaware once a week (I run Spybot Search & Destroy & Lavasoft Adware Personal --- they are shareware, meaning it's free!). What I do is that, I run the Lavasoft Adware first, then run the Spybot Search and Destroy (I also run it with "immunize" tool). These two tools are always on top of my desktop for easy access.

    (5)Turn on the pop-up blocker – this feature is available on Windows XP (you can see this under tools>Internet Options >Privacy>click Block Pop Ups. In addition to this, I also download another pop up blocker, the Google Toolbar. I find their pop up blocker the most effective in blocking pop ups.

    (6)Never open mails that are suspicious to you or not known to you. If they are in your bulk mail, send it back to your provider as "spam"! I never enable my bulk mail. I automatically delete emails from my bulk mail.

    (7)When using messenger (IM) services, be very careful with files being sent through instant messenger. Rather choose to have it emailed it to you. Most of email services now has virus check and clears it if the file has virus or not.

    (8)Be very careful when downloading files or any programs from the internet, pay attention on the instructions while downloading it. Downloading may sometimes cause error on the system registry or the entire computer system (one example, my nephew got his computer badly infected with viruses because of heavy downloading of games and music! – I guess!)

    (9)Be careful with files that come from a floppy disk or any other external storage when you open it in your CD ROM of floppy drive. You should know its source, or better yet, when you insert it, have it scanned with your anti-virus program before you open the files.

    (10)Run defragmentation, disk clean up, registry scanner at least once a week. You can find defragmentation by simply pointing your mouse on drive C: (which is usually the hard disk main logical drive)> right click the mouse>click on properties>click on tools>click on defragment now!

    There are so many shareware on the internet that you can get for free! (that is the reason it is a shareware!). Keeping your computer healthy can make you more productive (if you have a business!) or it will make you enjoy more surfing and browsing the internet!

    About the Author: Pinky Mcbanon is a Systems Engineer and a Medical Biller/Coder.

    She shares free computer technical support with http://www.fix-exchange.com She shares her medical billing and coding expertise with http://www.medclaimsplus.com

    [tags]10 ways to avoid virus, computer viruses, dialers, mailers, spyware, free technical support[/tags]

    Viruses And Worms The Problems And Their Solutions

    History and Background

    The virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Bugs and glitches could cause damage unintentionally, but a virus created havoc intentionally, and therefore often caused much more damage then just glitches in software. Technically a virus must be in a host file and spread manually by people, versus a worm which spreads by an automated process and doesn't require a host file, but we will include worms as part of the term virus. Therefore, the threat of viruses quickly multiplied expotentially. One computer infected by a virus is manageable, but a virus spreading uncontrollably and automatically can cause damage to sometimes entire populations. And with the introduction of the Internet, billions of computers worldwide could be accessed with a click of a button. These abilities are what made the virus probably the greatest security to personal computers in the 21st Century.

    What kind of damage will it inflict?

    Since up to 100 new viruses are discovered every minute by anti-virus industries worldwide, the damage they inflict varies considerably. Some will display an annoying popup. Some will swap your mouse buttons. Some will uninstall Internet Explorer. Some will delete all your personal files. And some, though rare, will slow down your computer fan to the point that your computer processor starts smoking. All have 1 thing in common - they reduce your productivity in some way and they inhibit you from comfortably using your PC. Therefore you must take several precautions to insure you do not to become infected with viruses. With just a few simple security measures, the chances of getting infected with a virus can be cut down by over 90%.

    Security Measures

    The most important step - Be careful of everything you do on the Internet! It is extremely rare for a computer to get infected by a virus if you only download and browse trustworthy sites and emails. If an email has an attachment and looks suspicious it is very likey to be a virus. If a site is providing illegal or inappropiate content, it should be considered a risk. These are basic rules of safe browsing of the Internet and unfortunately, most people only learn these rules after a disaster. Don't learn from experience! Don't let it happen in the first place. Keep your system up-to-date. Nearly every major virus threat to operating systems are patched soon after discovery. Visit your operating system update website often, which is www.windowsupdate.com for Windows users. Get a reliable antivirus solution. The most common is Norton Antivirus, but I personally do not like its unreliability and incompatibility with many PCs. On the otherhand, it is probably the most user friendly antivirus solution on the market, and is probably best for PC beginners. If you're looking for a free yet extremely reliable and easy-to-use antivirus solution, Avast may be your answer. I am currently running Avast and am very happy with it. I previously tried Norton Antivirus, Norton Client Security, NOD32 Antivirus and McAfee Antivirus, but each had their own individual problems and so I had to constantly change antivirus software until I finally reached Avast.

    Some people go overboard and install many other security measures but I don't recommend this. These measures only hog resources, confuse users and cause conflicts with other software. Some of this software includes firewalls, memory explorers and file protection. References

    www.wikipedia.org

    us.mafee.com

    www.netmom.com

    www.pcworld.com

    Links

    Avast Antivirus - www.avast.com

    Soroush King is a certified programmer, adept in VB, C++, Delphi, as well as web developer and scripter, having considerable knowledge of both PHP and Perl. He also owns and manages several professional websites.

    This article was originally published at http://www.articlesandtools.com/adware.php For more information on computer security visit http://www.articlesandtools.com.

    If you would like to use this article anywhere else, please just notify me by sending an email to kingofkings@gmail.com (you don't have to wait for a response, as this is just a notification, not permission). Please refer on the page that the author of the article was I, Soroush King, and also please note that the article was originally published at http://www.articlesandtools.com/adware.php by providing a link.

    [tags]virus, worm, viruses, worms, antivirus, security, absolutely, soroush king, soroush, avast, norton[/tags]

    วันอังคารที่ 19 สิงหาคม พ.ศ. 2551

    Malicious Software, A Problem At A Deeper Level

    How do you get a cold? You get exposed to a germ, right? This may be a very simplified explanation of getting a cold, but the basic principle is the same when it comes to malicious software. We all know what malicious software is, it is a program that does unwanted and in many cases destructive things on your computer. Typical examples of malicious software are viruses, spyware and ad-ware. You have to expose your computer to a malicious program to get infected by it. This can happen in many ways, by using an infected Floppy Disk, CD, DVD, hard-drive or flash drive. You may get infected when opening an attachment of an infected e-mail message. But if you use common sense you have a smaller chance of getting infected. Only use disks from trusted sources, don't open strange e-mails and even if you use material from a trusted source, ensure that it is scanned by a respectable Anti-virus scanner.

    There is one method of infection I did not mention and that is through the use Internet by browsing from web site to web site. Common sense also plays a role here. If a link looks strange, don't click on it. If you are required to enter sensitive information that is not relevant to your visit, don't do it. By using a browser with good security measures will make you less vulnerable. But one problem that can't be fixed with security software is people's moral values. Ignorance plays a significant role in infections but I don't believe that it plays such a big role as people's intentions when using the Internet.

    Many infections occur when the user was either doing something illegal or immoral. The evidence is clear when you try to fix an infected PC. The Internet History and the Temporary Internet Files folder is most of the times cluttered with cookies and cache of pornographic and piracy sites. Piracy sites range from pirate music to pirate software. Many of the cracks downloaded from the Internet are actual Trojan Horses (a host program that gives malicious software access to your computer) but they usually imply to bypass the anti-piracy sections of a program to allow the user to use a full licensed version of the software. Sometimes they even do actually crack the software but installs a malicious program in the background without the knowledge of the user. Some sites require users to install specific software in order to gain access to their pirate or pornographic content. These programs are nothing other than spyware, which monitors activities like keystrokes from your keyboard to record passwords. They also spy on your online activity and store this information on their servers in order to send you relevant marketing material and spin you deeper into their web. What users often don't realize is that their PC becomes a source of malicious activity. Many of these companies will load your computer with malicious software and try to infect everyone you communicate with, either through your local network or the Internet. Your PC may become a spamming engine, sending spam to all your contacts. Your PC will in the end earn revenue for these dishonest organizations and you may become an accomplice in illegal activities without even knowing it.

    All these are consequences of the immoral and dishonest actions of the user in the first place. If people stay away from piracy and pornography sites we will deal with lesser malicious software threats. If lesser people use these websites, these organizations will make less money from these sites and will in the end be forced to shut it down. This will be to the benefit to the whole online-community, but also the music, television and software industry, due to smaller volumes of piracy. In the end it will put money back into the pocket of the end-user and keep our children safe from the filthy material on the Web.

    It is a simple rule, if you keep your online intentions clean, your will have a clean conscience and a clean conscience will go hand-in-hand with a clean computer.

    Coenraad de Beer was born on 27 February 1982 in small town called Lichtenburg in the North West (Formerly known as Transvaal) province of South Africa. He graduated High school in 2000 and started doing computer programming on his own for 2 years using the C++ programming language. In 2003 he started a career in Accounting and he is currently studying BCompt at the University of South Africa.

    Coenraad is a very dedicated person in whatever he takes on in life and believes that success only comes from hard work and believing in your own abilities, the abilities God gave to you.

    Coenraad is also the Webmaster of Cyber Top Cops - The Cyber Security Specialists

    You can also visit his homepage at http://myweb.absamail.co.za/coendb/

    [tags]Spyware,Adware,Virus,Malicious Software,Piracy,crack,identity theft,internet fraud,spam,ad-ware[/tags]