วันศุกร์ที่ 31 ตุลาคม พ.ศ. 2551

How To Stop Spyware

Spyware is one of the biggest threats to your privacy and the security of your data. Here's a series of helpful questions and answers that can help you remove and minimize future spyware from your computer.

Spyware comes in various forms, but basically it is a program or piece of information on your computer that either sends data about you or your computer habits to someone else on the Internet. This can be a company that is collecting data, or a thief seeking to steal access to your computer or data like bank information on it. Spyware can also be a program that places unwanted ads on your computer. Cookies can be considered spyware. They are little piece of information placed in your web browser to track your web habits. This is useful sometimes as a web site can see you have visited it before and let you on without a registration process. Cookies are also used to keep track of your progress through a web store. They are also used to customize website ads to your likes and dislikes.

Spyware is bad because for one it can hog precious system resources like memory and hard disk space. It can also compromise your privacy, providing outsiders with information about your computer habits. If a spyware program installs a keylogger it can capture your keystrokes and send it to a third party. This can potentially expose your user IDs and passwords to thieves. Some spyware are trojans which allows someone to log into your computer remotely and use it for their own purposes like sending spam or launching malicious attacks on other computers on the Internet, making it look like you are at fault.

There are several techniques how spyware get's on your computer. Sometimes they arrive as an automatic download from a website you are surfing. Typically this happens a lot on porn sites. Sometimes if you download a free or illegal piece of software, they are embedded in the installation process. Or spyware can get on your computer via an email attachment that you shouldn't have opened.

Sometimes a spyware program is very obvious and it can be deleted manually. It adds itself to your menu bar and be found listed in your Add/Remove Programs list in your Windows Control Panel. Click START, (then if you have Win95/98/Me click Settings) then Control Panel then Add/Remove Programs and look for a program that you don't recognize. Sometimes its obvious....like "XXX dialer" or something like that. Just use the Add/Remove Programs features to remove it. Sometimes its not as evident and you have to go diving into the registry and delete entries and also search for specific files on your hard drive and remove them. There are good list of spyware removal techniques that can be found on the internet.

There are a few things you can do to stop spyware. Don't download programs by companies you are not familiar with. Avoid shareware and freeware. Don't download illegal pirated software. Set your browser security to high. One Internet Explorer, click Tools > Internet Options > then the Security tab and move the slider to MEDIUM or preferably HIGH. The only problem with this is it may block access to some websites you want to see. Ultimately your best bet is to get an anti-spyware program and scan your system regularly.

Mike Stewart and his company http://www.Freespamfilter.nl provide Free Anti Virus - Spyware remover - Adware removal - Pop Up Blockers and Spam Filters at their website http://www.Freespamfilter.nl

[tags]spyware, adware, remover, removal, anti virus, software, free, popup blocker, pop, up, blocker[/tags]

วันพฤหัสบดีที่ 30 ตุลาคม พ.ศ. 2551

Types Of Computer Infections

Computer infections can be broken up into 4 main categories which are explained in detail below:

Viruses

Computer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Each time you run the program windows explorer the virus will also be executed and perform the function that it was meant to perform. This can be several things such as damaging files on your computer, or erasing them all together. This is also the time in which the virus will try to spread itself onto other programs and even other computers!

Worms

A worm just like a virus is a small piece of software. However worms rather then relying on an external program to function, will run themselves over computer networks and security holes to spread. The worm will scan the network from it's host computer until it finds another computer that it can attach itself to. It will then continue this process to replicate. Because this type of infection runs by itself it can have devastating impacts. The Mydoom worm is estimated to have infected over a quarter million computers in a single day when it first launched back in March 1999.

Trojan Horses

A Trojan horse is a computer programs that claims to be one thing, but is actually another. For example you might receive a Trojan horse that is disguised as an image, but when you go to open the file, it will do whatever it is that it was written to do.

E-mail Viruses

Email Viruses are very common. They work by spreading themselves through email messages. Once they infect a computer, they will then go ahead and replicate themselves by automatically mailing out again to everyone in the victim's e-mail address book. Several of these virus's have raced through the internet. Examples of email virus's are the Melissa Virus, and the ILOVEYOU virus.

Feel free to reprint this article as long as you keep the following caption and author biography in tact with all hyperlinks.

Ryan Fyfe is the owner and operator of Software Area. Which is a great web directory and information center on Anti Virus Software and other computer software related issues.

[tags]Computer virus, viruses, e-mail, worms, Trojan horses, software[/tags]

A Computer Firewall Is Your Primary Defense Against Virtual Attacks

If you have any personal information on your computer at all and access the Internet it is vitally important that you consider the benefits of a computer firewall. Many people lock their homes, lock their cars, keep a watchful eye on their children, and yet leave the bank accounts, personal information, and all kinds of other information vulnerable and exposed through their personal computers.

A virtual attack can be just as devastating financially and emotionally as someone breaking into your home. They are allowed access to secrets you may have shared in confidence with online friends or even offline friends that you correspond with online, they will have passwords for financial and banking accounts, they will know where you buy your coffee; they can learn where your children go to school. The information we have on our personal computers is staggering in terms of personal security nightmares and yet so many people take no steps to secure this information from prying eyes by investing in a simple computer firewall.

The amazing thing is that you can even find free computer firewalls available online if you know where to look. I highly recommend paying for a computer firewall though if you have little knowledge of the inner workings of your computer. If you're going to secure your families secrets you may as well invest in a very good program with constant updates in order to do so.

A computer firewall isn't just a nice thing to have on your computer; it is a vital line of defense for you and your family. Keep this in mind when choosing the best computer firewall for you. Remember you want to have a service that will provide updates and keep up with evolving technology that would harm your computer or steal your personal information.

John Gibb is the owner of Firewall Sources, For more information on Computer Firewalls please check out http://firewall-sources.info

[tags]firewall, antivirus, internet[/tags]

วันพุธที่ 29 ตุลาคม พ.ศ. 2551

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things.

Viruses spread on your PC. The good news is that Spyware applications usually stay put, much like a parasite. Spyware collects information about your messaging and browsing behavior and your online preferences with the intent to sell it to online advertisers.

Adware is an application which shows advertisements on your PC, including banners and pop-ups. Some Adware programs also track the usage behavior of the application user without the knowledge of that user.

If you find ads constantly appearing on your computer, your home page being changed repeatedly, mysterious toolbars appearing on your browser, a noticeably slower PC, or any other weird thing happening then chances are you have some form of Spyware or Adware on your PC.

It's scary to know that you're being "watched", and that your private information that you assume is safe may actually be used against you. Adware/Spyware programs can enter your PC through email, instant messaging, or downloading files. It's especially scary for the Internet marketer, because we are constantly purchasing and downloading new products and services online.

If you let Adware pile up on your computer, things can get pretty ugly. It was getting to the point where every time I opened my browser a search toolbar would appear on top (even though I kept uninstalling it) along with about 5 popup windows. I couldn't get any work done without some kind of interruption every 2 minutes. Talk about annoying! And running virus software such as Norton didn't help.

If you are finding yourself in the same situation, don't despair. There are programs available (both free and paid) to help you get Spyware and Adware off your PC. It is not the intent of this article to try to sell you on any one piece of software. In fact, I recommend starting with free software, then evaluating your situation.

For Spyware, the best free program I've used is Spybot Search & Destroy, which can be downloaded at:

http://www.download.com/Spybot-Search-Destroy/3000-8022_4-10122137.html

For Adware, the best free program I've used is Ad-Aware, which can be downloaded at:

http://www.download.com/3000-2144-10045910.html

These 2 programs got rid of most of the Spyware/Adware on my machine, but I was still experiencing some problems so I went ahead and purchased some software. There are a lot of good programs out there that will get rid of both Spyware and Adware with the push of one button. Most run between $25-$40.

If you are still experiencing popups or other symptoms of Spyware after running the free programs, do a little bit of research and upgrade to a paid version. Most offer some sort of guarantee, and the money you spend will be well worth the headaches and annoyances of Spyware on your PC.

Copyright 2005 Michael Murray

Michael Murray is a 22-year old full-time Internet marketer and college student with Cerebral Palsy who lives in sunny Orlando Florida. His latest site is an information center on how to remove Adware & Spyware from your PC: http://www.adware-software.com

[tags]Internet marketing,online business,adertising,spyware,adware,computers,viruses[/tags]

Protect Your Computer From Spam, Viruses, And Spyware

Breaking and Entering On the Internet!

I like to make analogies between the online world and our physical world. The similarities are becoming more recognized every day. Here's my favorite...

"If you are not taking the security of your home or business computer seriously, it is like leaving the front door of your home open all day and all night whether you are home or not."

The Internet is a big place with every imaginable character out there, many of whom are happy to intrude on your private domain and use it to their benefit. In addition to that, there is a constant battle for your desktop from many of the seemingly trusted software companies including Microsoft, Google, Yahoo and others, large and small. When you start up your computer, they want you to see their stuff and they are constantly fighting over what you see. This creates software conflicts that, over time, can bog down the performance of your computer and slow your productivity. Be an active participant in the management of your computer workspace by taking the time to install these essential protections and following the best practices shown below.

After years of working online, we have put together a set of programs and practices that have allowed us to use the Internet in relative safety and with minimal intrusion from evil doers. By the way, these are our favorite picks. Our objective is to save you the time of analyzing several various solutions on your own.

1. Basic Computer Security To Protect You From Viruses.

McAfee Virus Scan - We like this solution the best. It simply has worked best for us with the least intrusion on our workspace and time. Virus protection, by its very nature is somewhat intrusive. It must update itself every so often to keep up with spammers and virus writers. This one does it in a way that has not gotten in the way of our own work.

We consider McAfee an absolute must. Cost = About $60.00 per year (subscription). www.mcafee.com

2. Basic Spam Protection

CloudMark Spam Filter - CloudMark stands out to us as the best method of keeping up with spammers. You can't stop them, but you can control what you are willing to view. This very successful method uses the collective, real-time knowledge of millions of email subscribers to manage an ever changing database of spammers so it can filter them out before they get a chance to invade your mailbox.

The program creates a spam folder in your Outlook or Outlook Express so you can look through the junk in case a good email message gets caught, but then once you've browsed it, you can dump them all in one fell swoop. Very easy.

In addition, if you receive a spam that was not caught by the filter, you can report to the database with one click which will block it forever more from your good email box and alert the millions of others in the community of this spammer. We consider this a must as well. Get CloudMark here. www.cloudmark.com - Cost - $39.95 per year per user.

3. Basic Spyware and Adware Protection

Ad and Spyware are programs that are (often without your knowledge, unless you like reading lots of fine print) automatically installed on your computer. These programs change the way your computer sees advertisements on the web and often are the reason that you get uncontrollable popups.

There are two programs that we've used successfully to protect our computers from Adware and Spyware. The good news is that they are free. They also offer paid upgrades, but we've gotten by pretty well using both of these free versions.

Spybot Search & Destroy - This is a free program that we've used and it seems to have worked well for us. Get it here. http://spybot.safer-networking.de/en/

Ad-Aware Personal - Catches some of the adware and spyware programs that others don't. Get it here. http://www.lavasoft.com/software/adaware/

4. Update Your Windows Software

It's our opinion that MS Windows has become easier to use and more secure over the years. If you're not running Windows XP or above you are missing out on much easier computing. It's not that expensive to upgrade and the benefits are real.

More important however is that you must update your version and install the latest patches when they come out from time to time. The good news is that the latest MS Windows software does much of this automatically for you.

Remember, there are virus writers out there every day trying to invade your computer. Fortunately, there are just as many good guys fighting them and keeping up with them. By keeping your software updated, you are reducing your chance of being exploited. The crooks have plenty of easy pickings to take advantage of. You don't have to be one of those easy pickings. Just update regularly. Get it here... http://www.microsoft.com

Important Personal & Procedural Policies to Follow

5. Never, Never, Never Believe or Accept Unsolicited Email Offers

If you buy something from an email that was sent to you out of the blue, you are a.) encouraging spam, b.) putting yourself at risk for viruses or bad software, and c.) putting yourself at risk of getting ripped off. Just say no to all Unsolicited Commercial Email (UCE).

In many states, it is illegal. If you don't have a problem with spam now, the surest way to get started having problems is to begin buying from those that send it. You only have to get on one list for your email address to sold and traded all over spam circles and I assure you that it will become a problem for you once you get started.

You may publish this article free of charge in your ezine, web site, ebook or print publication so long as the copyright notice and the resource paragraph (at the end of the article) are included. A courtesy copy of your publication would be appreciated.

Copyright (c) 2005 Joe Salvatore

Joe Salvatore runs an Internet marketing and domain name consultancy called Personaweb and is the North Amerian Marketing Manager for a London based Domain Registry.

Website: http://www.personaweb.com
Phone: 909-590-5660

[tags]computer,internet,security,protection,spam,spyware,viruses,anti,software,program,programs[/tags]

วันอังคารที่ 28 ตุลาคม พ.ศ. 2551

How To Choose The Best Computer Security Suite For Your Needs

Before you begin reading this article, there is something that it is critical to understand. Simply put, there is no such thing as a completely secure web browser or operating system. While any of the major security suites and associated products will greatly reduce your exposure to security risks, they are not silver bullets that will stop everything that may come your way. Any product that claims to eliminate 100 percent of your security risks should be looked at very carefully.

Now that we have the ground rule out of the way, let's consider security suites and computer security. There are a variety of means by which the security of a computer can be breached. Among the most common threats are crackers, phishing, Trojans, viruses, and worms. Potential security risks can also be introduced through spyware, malware, or email attachments, and something called port scanning.

Dshield.org, a Florida-based non-profit company, provides "platform for users of firewalls to share intrusion information". What they do is work with software vendors to allow for a common reporting platform of port scanning activity detected by software. Port scanning is when software scans another computer system looking for open ports to connect to. Port scanning is often a prelude to other types of attacks, and is used by many viruses and worms to propagate themselves.

Among the more interesting items reported by DShield is the "survival time". What this means is how long an unpatched computer will be able to "survive" online before being attacked. Over the course of the past year, the survival time for an unpatched Windows system is approximately 100 minutes. If you have an unpatched Windows system, you can expect it to be attacked in about an hour an a half. Clearly, you need to take matters into your own hands to protect the security of your computer systems.

There are some simple steps you can take to quickly and easily protect your computer.

1. Never run unfamiliar programs on your computer. While it may seem to be common sense, many of the most widely-spread attacks have involved spyware and email attachment worms. The rule is simple: Don't open the attachment if you don't recognize the sender.

2. Never allow others to have unmoderated physical access to your computer. If you have sensitive or confidential information on your computer, if you allow others physical access to the system, they may either inadvertently or intentionally breach the security of the computer.

3. Always use strong passwords. Be sure none of your passwords are easy to guess. Many people use the names of pets or children, or anniversaries or birthdays. Given how many passwords seem to be needed, another common mistake is for someone to use the same password for everything from their picture-sharing website to their online brokerage. By using only one password, if one system is compromised, all systems you have access to can be compromised. Also, if you absolutely must write your password down, never leave it attached to the computer. I recently saw the proprietor of a small business peering under her keyboard to login to her computer.

4. Be sure to keep your operating system and all installed applications up to current patch levels. Most security experts share the opinion that almost all network-based security attacks would stop if users kept their computers up to date with patches and current security fixes. Almost all of us forget to do this regularly. New Trojans, worms, and viruses are being distributed and created every day. Almost all of them are trying to exploit newly-discovered weaknesses in operating systems and applications.

5. Backup backup backup! It can't be said enough that it is vitally important to keep regular backups of any and all important data. Even if your system is kept secure from worms, viruses, and Trojans, it is still vulnerable to fire, theft, flooding, hardware failure, and any number of other things that can destroy your most valuable data. Given the ease and availability of CD and DVD burners, there are no excuses for not keeping your data backed up.

For most people, enabling auto-updates, using safe email practices, and using a password-protected screensaver provides adequate security. If you would rather take some additional measures to improve the security of your computer, you should consider purchasing a comprehensive security suite.

While there are many packages out there, you should start with asking yourself some basic questions: Are you the only user, or are there multiple users? If there are multiple users, are any of them children? Do you need to password-protect individual files, your desktop, or someone's internet access? How much are you willing to spend? What kind of system are you running?

Once you are able to answer those questions, you can begin to research which of the available security suites is best able to meet your needs. Consumer Reports, ZDNet.com, and PC Magazine are just a few of the very informative websites available that offer information and insight into security suites.

There are many different security suites available today. Be sure to conduct your research carefully to find the one that best meets your needs. Listed below are some of the more popular choices, along with what PC World had to say about them.

1. Symantec Norton Internet Security 2006. Symantec's suite produced top-tier malware detection and cleanup scores, but it would benefit from a more streamlined interface and fewer pop-up alerts.

2. McAfee Internet Security Suite 2006. The excellent malware detection and cleanup scores of McAfee's full-featured suite make up for its terrible installation routine.

3. Panda Platinum 2006 Internet Security. Panda has superior heuristics, a top-notch firewall, and speedy on-demand scanning, but its interface needs better organization.

4. F-Secure Internet Security 2006. This suite's five scanning engines--including one for rootkits--produced excellent malware detection scores but the slowest scan speed.

5. Trend Micro PC-cillin Internet Security 2006. Trend Micro's interface, speed, and features (including an antiphishing toolbar) were better than its malware detection scores.

Mike Tetreault is an accomplished developer and systems architect. He is also the managing principal of Macrocosmic Technologies and its PrivacyOnTheGo product line which offers a solution to the security and privacy issues faced by people who use multiple or public computers.

[tags]anti virus,antivirus,anti-virus,firewall,computer security,security,[/tags]

วันจันทร์ที่ 27 ตุลาคม พ.ศ. 2551

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Spyware is extremely difficult to remove manually and should only be removed with spyware protection software.

Spyware protection software is designed to not only get rid of spyware viruses but will shield you and your computer from destructive hackers, data thieves, malicious e-mail attachments, and other emerging Internet threats. It keeps these dangerous viruses from getting into your computer in the first place.

You might be asking if there are free spyware cleaners available why would you want to purchase spyware protection software. The free spyware cleaners are good programs to get rid of spyware viruses you already have on your computer now. But how much of your personal information, passwords and even credit card numbers did these programs send out before they were removed?

Also, many spyware programs automatically reinstall themselves even after they are removed. So you have a false sense of security because the hacker designed the spyware program to start right back up again. Free spyware cleaners should be a warning to you and not a permanent solution to solve spyware and adware problems.

Spyware protection software is designed to find all of these hidden programs and disable them before they have a chance to work. It is the best way of removing spyware and adware from your computer and keeping it away. Whether you take our recommendations or someone else's it's important that you get spyware protection software installed immediately.

Spyware dangers have become so common, they have now moved ahead of viruses as the number one danger facing computer users today. It's worth a little time and a little cost now to invest into quality spyware protection software. Your personal information and computer are at risk until you do.

Copyright © 2005 Spyware Information.com All Rights Reserved

This article is provided by http://www.spyware-information.com where you will find free spyware cleaners, downloads, removal software, valuable tips and updated articles about adware and spyware removal programs to protect your identity. For other informative spyware and adware articles go to http://spyware-information.com/articles_1.html

[tags]spyware protection software,removing spyware from computer,get rid spyware virus[/tags]

วันอาทิตย์ที่ 26 ตุลาคม พ.ศ. 2551

Computer & Network Security Two Anti Virus Strategies

Rootkits and advanced spyware have fundamentally changed the playing field says Mike Danseglio, Program Manager in the Security Solutions group at Microsoft, according to Fox News' "Microsoft Official: Malware Recovery Not Always Possible" by Ryan Naraine, reporting from InfoSec World on April 5th, 2006. "When you are dealing with rootkits and some advanced spyware programs, the only solution is to rebuild from scratch. In some cases, there really is no way to recover without nuking the systems from orbit," states Mr. Danseglio.

He cites a recent instance where an unnamed branch of the U.S. government struggled to design an automated process to wipe and rebuild 2,000 infected client machines. "In that case, it was so severe that trying to recover was meaningless." While training costs can be high, they pale in comparison to the mounting expenses incurred by detecting damage, recovering lost work and rebuilding compromised systems--let alone "nuking" and starting all over again from scratch.

Rootkits, for example, use kernel hooks which often make them undetectable. Because of this, they are able to hide malware programs, making them the weapon of choice to compromise computer systems. Mr. Danseglio adds that IT administrators may never even know if the entire rootkit has been successfully removed. The cleanup process is "just way too hard."

"We've seen the self-healing malware that actually detects that you're trying to get rid of it. You remove it, and the next time you look in that directory, it's sitting there. It can simply reinstall itself," he said. "Detection is difficult, and remediation is often impossible," Danseglio declared. "If it doesn't crash your system or cause your system to freeze, how do you know it's there? The answer is you just don't know," he explained. "Lots of times, you never see the infection occur in real time, and you don't see the malware lingering or running in the background.

Fortunately, however, the alternative, training, is easier than it ever was, thanks to new online technologies such distance learning. The important point to remember is that, with today's viruses. all employees--not just IT people--must be trained.

Tom McClintock is a Senior Analyst with NSI Partners (http://www.nsipartners.com), the consulting firm that operates the IT distance learning web site eLearnConnect which can be found at http://www.elearnconnect.com

[tags]computer virus, computer security, anti virus[/tags]

Security Systems Software And Basics

Anti-Virus Software:

Install virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. Update your anti-virus software daily or weekly and schedule a regular scan. Make sure all family members know what to do if the home computer becomes infected.

Locate Anti-Virus Software - http://www.monitoring-software.net/

Install Firewall Software:

Firewalls act as a gatekeepers between your computer or network and the Internet. They are essential for those who keep their computers online through the popular DSL and cable modem connections, but they are also valuable for those who still dial in. Protect your computer from Internet intruders. Use firewalls. Firewalls are usually software product but can also be hardware solutions.

Passwords:

Choose passwords or Personal Identification Numbers (PINs) that are difficult for others to guess. Use both letters and numbers and a combination of lower- and upper-case letters if the passwords are case-sensitive. Use a different password for each of your Internet accounts.

Passwords should not be names, or words (from any language). Hackers who try to obtain passwords for accounts that don't belong to them (called crackers) use large dictionaries filled with these kinds of passwords. In order to protect yourself against these people, simply don't use common words!

Change these passwords frequently. Don't keep your password where someone can see it. If it can possibly be avoided, don't write it down at all. There are ways to create passwords that are both secure and easy to remember. Remember that your password unlocks your online identity. Don't leave yourself logged in when your machine is unattended. Everything that is done with your account can and will be attributed to you. It's best that you keep your password somewhat esoteric. Do not use the same password for different systems.

More on Passwords - http://www.password-software

Backups:

Back up your computer data on disks or CDs regularly. Retain the only copies of those files on removable media and store the media in a safe place. Use accessories such as rewriteable CD drives and zip disks for copies of your important files - they're easy to use and relatively cheap.

Alert:

Be alert for fraudulent (sometimes called "phishing") emails. They may appear to come from a reputable business or a trusted friend but are actually designed to trick you into downloading a virus to your computer or directing you to a Web site to disclose sensitive or personal information. An ounce of prevention is worth a pound of cure, educate all system users to be alert for phishing scams.

Practice Safe Computing:

Protect shared files and folders. Set the permissions on the share to "read-only." This means that no one will be able to copy, delete, modify, or rename your files. Set-up login accounts and file permissions, so only authorised users can access the system. Unix and Windows NT/2000 have these security functions built in. If you run Windows 95/98/Me, you can buy products to provide this protection.

Configure the access restrictions to individual files or folders, so other users can only access the files you want them to. Understand and use the security features provided by your PC software, such as those included in many operating systems, browsers and word processing systems. The safest option is to set your computer to ignore Java and ActiveX programming languages. Otherwise set your browser to ask you each time it is about to run Java and ActiveX code.

Depending on what you know about the site, you will at least have the choice to run it, or not. If information privacy is imperative you should also consider using a file- or disk-encryption system on the sensitive files.

Copyright 2006 Francesca Black

About the Author:
Francesca Black develops educational material for http://www.security-port.com and http://www.security-protection.net a top resource for locating security related RSS feeds.

[tags]security, secure, password, hack, firewall, anti-virus, software, crack, safe computing, computer, p[/tags]

วันเสาร์ที่ 25 ตุลาคม พ.ศ. 2551

Virus Strains

What we need is the Dewey Decimal System to go digital ...

Specifically, someone needs to coax their keepers into putting some logical order into how computer viruses are sorted.

Recently, warnings abounded about the Kama Sutra virus quickly proliferating cyberspace, joining the Grew.A and Nyxem.E as serious threats to computer file security. However, only those who took a closer look at these strains were able to discover that they all had something in common.

They were virtually the same virus.

There is uniformity in the library world when it comes to catalogging the millions of books contained therein, thanks to Dewey. The weather service administrators do their bit for personnification by breathing a bit of nefarious charm into the tropical storms they track by assigning them names in alphabetical order each year. They key to both of these facts is that someone devised a universal means of identifying something that assists the general public in dealing with it.

The time is rapidly approaching when someone needs to step forward and put some order into the villainous world of computer infections.

New viruses arise so suddenly and spread so quickly that those whose job it is to seek and destroy them have little time to muse over what to name them. With Dama Sutra, for instance, its file-destroying program seemed to be spread by junk e-mail enticements to visit porn sites. The news media ran with that theme and gave it a headline-grabbing handle; Kama Sutra, of course, is the legendary lovemaking guide compiled to classify the creativity of ancient Hindu hedonism.

Geeks, however, have their own perspective when they put a spin on things. Just as banks need to have stately names, spyware apparently needs to carry Matrix-like titles to make them appear darker, more foreboding and a worthy challenge. After all, who amongst them would want to quash the Kama Sutra? Wouldn't that confirm the geek image as a cyber-eunuch?

Thus, titles like Grew.A and Nyxem.E are coined to look so much more imposing and in need of professional assistance to eradicate.

F-Secure is a Finnish virus fighter and widely acclaimed to be one of the best of its kind on the market. Their stature is such that when they identify an intrusive program, others notice and accept the name they give it. In this case, F-Secure saw the program shared code and techniques with cetain file-destroying predecessors, so they went with 'Nyxem.E,' derived from the acronym for the New York Mercentile Exchange, whose web site was targeted by the initial culprit.

Other vendors took note that this program destroyed files instead of overloading websites with fake traffic. Using a logic known only to one of the backroom gnomes in their employ, this meant that 'Grew.A' was the most appropriate description. I can only think that asking for a clarification for that decision would cause most of us as much of a headache as trying to remove the program after it has hit our computers.

Anyway, in these trying times of terrorism alerts, if nobody else is willing to tackle the task of virus classification, those rock-lifters and cobweb-sweepers at the USA Department of Homeland Security are prepared to step into the fray. They have devised a system of virus naming through the Common Malware Enumeration, or CME. Outbreaks are assigned a random number, which in this case turned out to be '24.'

We'll see if such a system captures teh public's imagination.

This is an important point, because if a unified virus identification system is to be effective, it has to immediately raise a general awareness so that the virus' spread can be better contained.

If nothing else, 'Kama Sutra' generated enough clicks to quickly spread the word that a cyber-invader was on the prowl. Once named as such, a program that had been circulating for weeks, but was set to destroy files only on the third day of each month, finally came to the public's attention. That gave vendors time to update their products and warn customers.

Incidentally, this strain is known to corrupt documents using the most common file types, including '.doc,' '.pdf' and '.zip.' It affects most versions of Microsoft's Windows operating system, which caused them to issue the most widely-heeded warning of the problem.

Given the recent animosity-filled anti-trust suit brought by the American government against the software giant, it does seem like their efforts to raise the awareness of this virus has necessitated that they become the proverbial strange bedfellows.

It's only appropriate that something named Kama Sutra would bring them together. It's inevitable that they would find themselves in this position. The task now is for them --- and everyone else --- to agree upon what to call it.

Copyright 2006 – The Longer Life Group

J Square Humboldt is the featured columnist at the Longer Life website, which is dedicated to providing information, strategies, analysis and commentary designed to improve the quality of living. His page can be found at http://longerlifegroup.com/cyberiter.html and his observations are published three times per week.

[tags]Kama Sutra virus, computer virus, computer viruses, CME, Common Malware Enumeration, Cyberiter[/tags]

9 Steps To Protect Your Computer From Virus Infection

Virus can create havoc in your computer. It can at the very least cause nuisance to your computer, to as bad as making your computer a useless junk. Here we list 9 steps you can take to protect your computer from being infected by viruses.

1. Install antivirus software, and get a high quality one. You can find many different anti-virus computers programs on the market, and some of them are just better than others. Do your research from reputable websites or computer magazines for ratings and reviews to help you find the one that is best for you.

2. Keep your antivirus software up to date. When you buy antivirus software or the license to the software it is very likely that you are subscribed for one-year updates. Most of them provide daily updates. Make sure you update you antivirus programs or database whenever an update is available. Remember that the crooks create tens of new viruses every day.

3. Keep your anti-virus software active all the time. Make sure your anti-virus software is set to scan incoming and outgoing email messages, downloads, and any software programs you run.

4. Keep your computer's operating system up to date. Check for updates periodically to make sure you are running updated versions of your software. Windows XP has a feature that automatically checks for updates. Use it. The updates may address some security fault that may put your computer at risk to virus attacks.

5. If you use floppy disks or USB drives on public computers like your school computer lab make sure you scan them for viruses when you get home or back in your office. You don't want to be infected by viruses that may be present in those public computers.

6. Be careful with email attachments. Treat any email attachment as potential hazard. Never open attachments from senders you don't recognize, or even from senders you know but look suspicious. Some computer viruses disguise themselves as someone you know by reading addresses from the contacts in your email program.

7. Be cautious of links in instant messaging software. Don't accept invitations or click a link from people you don't know or trust. The link may take you to a website that may try to install a virus on your computer.

8. If you need to download software try downloading them from popular sites that have good reputation that scan software before they are uploaded. To make sure you are doubly safe scan the software for viruses with your antivirus software before installing it.

9. Lastly, make backups of your data regularly. Perform weekly or monthly backups to CD or USB drives. If you lose your data on the hard drive due to virus attacks, you still can fall back to your backups.

Pauzi Said is the owner of the website More On Virus that discusses virus and antivirus. For more info on virus and antivirus visit More On Virus.

[tags]virus,antivirus,computer,anti virus[/tags]

วันศุกร์ที่ 24 ตุลาคม พ.ศ. 2551

14 Household Ways To Protect Your Computer From Viruses

Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or even worse, fatal to your computer. Individuals who create these viruses, estimated at 10-15 new ones a day, are the electronic version of terrorists. Their goal is to inflict havoc and destruction on as many people as possible by disabling, stealing, damaging, or destroying computer and information resources. Often, they have no specific target in mind, so no one is safe. If you access the internet, share files or your computer with others, or load anything from diskettes, CDs, or DVDs onto your computer, you are vulnerable to viruses.

Fortunately, there are good guys working just as hard as the hackers to develop cures for viruses as quickly as they send them off into cyberspace. And there are many things you can do to keep your computer from catching viruses in the first place.

Defining Viruses:

A virus is a small computer program that can copy and spread itself from one computer to another, with or without the help of the user. However, viruses typically do more than just be fruitful and multiply, which is bad enough in itself because it hogs system resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often, they cannot deliver their payload until an unsuspecting user does something to make the virus execute its programmed function. This could be as simple as clicking on an innocent looking file attachment with the .exe (executable) extension.

Catching a Virus:

Most viruses are spread through e-mail attachments because it's the easiest way to do it. Although Macintosh, Unix, and Linux systems can catch viruses, hackers are particularly keen on exploiting the security weaknesses in anything Microsoft, particularly Microsoft Outlook and Outlook Express. Because of the popularity of this software, hackers get maximum bang for their buck, and they probably get some satisfaction from continually reminding Microsoft that being big doesn't mean you're perfect.

Solution 1: Anti-virus Software

Your first line of defense is to install anti-virus software. To be extra safe, also install firewall software, which is now included in some anti-virus packages. This software can scan all of your drives for viruses and neutralize them. Here are some features to consider when evaluating anti-virus software.

- Compatibility with your operating system - Make sure the software works with your system, particularly if you are using an older operating system like Windows 98.

- Firewall software - If it's not included, find out if it's available. If you must, buy it from another vendor.

- Automatic background protection - This means your software will constantly scan behind the scenes for infections and neutralize them as they appear. This provides some peace of mind.

- Automatic, frequent updates - Because new viruses appear every day, you'll want regular updates. It's even better if they occur automatically when you connect to the internet. If automatic updating isn't included, you'll have to check the vendor's website and download updates yourself. This is vitally important, because you will not be protected from new viruses if your software is out of date.

- Disaster recovery - Software with a recovery utility to help you get your system back to normal after a virus attack is always good to have.

- ICSA certification - The International Computer Security Associatioin has standards for the detection rates of anti-virus software. Make sure your software has the ICSA certification.

- Technical support - It's a good idea to select a package that offers free technical support, either online or through a toll-free number. If you're ever felled by a virus, you may need it. Some anti-virus software vendors are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan), Trend Micro Inc. (PC-cillin), and Zone Labs Inc. (Zone Alarm Suite).

Solution 2: The Virus Scan

If you receive a particularly juicy attachment that you're dying to open, save it on your Windows desktop and run your anti-virus software on it first. To do this, click once gently on the file on your desktop ... don't actually open it ... then right click and choose Scan with (Name of Anti-Virus Software) to activate a virus scan.

If it's infected, your anti-virus software may neutralize it, or at least tell you the attachment is too dangerous to open. On the other hand, don't feel guilty if the very thought of saving a potentially damaging file anywhere on your system is enough to quell your eagerness to open it and make you delete it immediately.

Solution 3: Delete first, ask questions later.

When in doubt about the origin of an e-mail, the best thing to do is delete it without previewing or opening it. However, some viruses, such as Klez, propagate by fishing in people's address books and sending themselves from any contact they find to another random contact. You can spread a virus just by having people in your address book, even if you don't actually e-mail them anything. They'll receive it from someone else in your address book, which really makes life confusing. Because of the proliferation of porn on the internet, e-mail viruses often tempt victims by using sexual filenames, such as nudes.exe. Don't fall for it.

Solution 4: Beware of virus hoaxes

E-mails warning you about viruses are almost always hoaxes. You may be tempted to believe them because you typically receive them from well-meaning friends, who received them from friends, etc. These e-mails themselves usually aren't viruses, but some have actually fallen into the hands of hackers who loaded them with viruses and forwarded them merrily on their way as a sick joke.

The proliferation of e-mails about virus hoaxes can become nearly as bad as a real virus. Think about it, if you obey an e-mail that tells you to forward it to everyone in your address book, and they THEY do it, and this goes on long enough, you could bring the internet to its knees. If you ever want to verify a virus warning, your anti-virus vendor may have a list of hoaxes on it website. It's in the business of providing the fixes, so it will know which viruses are real.

Solution 5: Beware of filename extensions

The extension of a filename is the three characters that come after the dot. Windows now defaults to hiding filename extensions, but it isn't a good idea. Just being able to see a suspicious extension and deleting the file before opening it can save you from a virus infection.

To see filename extensions in all your directory listings, on the Windows XP desktop, click Start button | Control Panels | Folder Options | View Tab. Clear the check box for Hide extensions of known file types. Click Apply | OK. System files will still be hidden, but you'll be able to see extensions for all the files you need to be concerned with. Viruses often live on files with these extensions - .vbs, .shs, .pif, .Ink - and they are almost never legitimately used for attachments.

Solution 6: Disable the .shs extension

One dangerous extension you can easily disable is .shs. Windows won't recognize it and will alert you before attempting to open an .shs file. The extension is usually just used for "scrap object" files created in Word and Excell when you highlight text and drag it to the desktop for pasting into other documents. If this isn't something you ever do, or you have Word and Excell 2000 or later, which allow you to have 12 items on the Clipboard, click the Start button | Control Panel | Folder Options | File Types tab. Under Registered file types, scroll down and highlight the SHS extension. Click Delete | Yes | Apply | OK.

Solution 7: Dealing with double extensions

When you turn on your extensions in Windows, you'll be able to detect viruses that piggy-back themselves onto innocent looking files with a double extension, such as happybirthday.doc.exe. NEVER trust a file with a double extension - it goes against Nature.

Solution 8: Beware of unknown .exe files

A virus is a program that must be executed to do its dirty work, so it may have an .exe extension. Unfortunately, this is the same extension used by legitimate program files. So, don't panic if you find files named Word.exe or Excel.exe on your system - they're your Microsoft software. Just don't EVER open any file with an .exe extension if you don't know what the file's purpose is.

Solution 9: Watch out for icons

Viruses in attachment files have been known to assume the shape of familiar looking icons of text or picture files, like the wolf in the hen house. If you recieve an unexpected attachment, don't open it without first running it through your anti-virus software.

Solution 10: Don't download from public newgroups

What better place for a hacker to lurk and stick his virus than in the middle of a crowd? Sooner or later, someone's bound to download it and get the virus going. Don't download files and programs from newsgroups or bulletin boards, or open attachments sent from strangers in chatrooms ("Let's exchange pictures!") without first scanning with your anti-virus software.

Solution 11: Avoid bootleg software

This may seem like a no brainer, but sometimes that tiny price tag on a popular but expensive package can be too good to resist. Resist it! Likewise, be careful about accepting application software from others. You don't know where it's been, and what may have started out as a perfectly clean package could have become infected during installation on someone else's infected computer.

Solution 12: Protect macros in MS Word, Excel, and Powerpoint

A common type of virus uses macros. Macros are sets of stored commands that users can save as shortcuts to perform long functions in just a few keystrokes. A macro virus may perform such mischief as changing file types from text files or spreadsheets into templates, locking up keyboards, and deleting files. Word, Excel, and PowerPoint come with macro virus protection. To make sure yours is activated, open each application, then click Tools menu | Macro | Security. On the Security Level tab, make sure Medium or High is selected. Clcik OK. If you are already infected with a macro virus, you may find that the steps of this procedure are unavailable becasue the virus has disabled them. In that event, run a virus scan on your system to see if your anti-virus software can kill the virus.

Solution 13: Use passwords

If you share your computer, it's a good idea to assign everyone a password. Passwords should be a combination of letters and numbers no less than eight characters long, and preferably nonsensical. Never write passwords and stick them anywhere near the computer. To assign passwords in Windows XP, click the Start button | Control Panel | User Accounts. Follow the prompts to assign/change passwords.

Solution 14: Update application software

Microsoft constantly issues patches for the security holes in its operating system and applications software. however, don't be lulled into complacency if you have Windows Update automatically checking things for you. Update checks for patches to repair bugs in the operating system, not for security problems.

To get the latest security hotfixes (as Microsoft calls them), visit www.microsoft.com and look for hotfixes for all your Microsoft software, particularly Outlook and Outlook Express.

Microsoft also has a free downloadable package called Microsoft Baseline Security Analyzer (MBSA) that scans your system for missing hotfixes. It works with Windows 2000 and XP Home and Professional only. It doesn't support Windows 95, 98, or ME.

To download the MBSA, go to the TechNet section of the Microsoft Website. Be warned that the information is written in techie language, so you may find it daunting.

Last Words:

Now that you know some ways for avoiding and dealing with viruses, let's wrap things up with some solution you've probably heard before but have ignored.

- Back up your files regularly - If a virus crashes your sytem, you'll feel much better if you've got backup copies of all your important files. Make the backup copies on a media that's separate from the computer, such as on diskettes, CDs, or zip disks. Scan them for viruses before you put them away to make sure they aren't infected. If they are, they'll do you no good if you ever have to use them because they will just transmit the virus right back onto your computer.

- Make a boot disk - Create an emergency boot diskette before you have a problem so you can start your computer after a serious security problem To make a boot diskette with Windows XP, put a blank floppy disk in the drive. Open My Computer, then right click the floppy drive. Click Format. Under Format options, click Create an MS-DOS startup disk. Click Start. Keep the disk in a safe place. With luck, you'll never need to use it.

- Turn off you computer - DSL and cable connections that are "always on" may be convenient, but you should always turn off your computer when its not in use. Hackers can't get to a machine that's powered off.

You are free to reprint this article in its entirety as long as the clickable URLs remain in the "About the author" section.

About the Author:

Marv Ko has many years of experience in business software and security. He is the editor of http://bestarticles.biz and also oversees http://best4biz.info Email: editor@bestarticles.biz

[tags]virus, anti-virus, security, protect, computer[/tags]

วันพฤหัสบดีที่ 23 ตุลาคม พ.ศ. 2551

Viruses And Worms Your System Needs Protection

Computer systems across the world are constantly threatened by viruses and worms. These malwares are created by disgruntled or malicious programmers, who let loose their treacherous creations on unwary hosts. Oftentimes, the damage that is caused is immense. Due to the severity of the attacks a small cottage industry has grown up to protect systems from viruses and worms.

With a virus that spreads automatically, a huge number of computers can be infected through the Internet and can be very hard to control. Because of this, the virus is the greatest danger to the security of personal computers today.

Companies in the antivirus industry discover large numbers of viruses' everyday. Scores of viruses are latent or dormant and continue to be present long before they are ever noticed. There are viruses that delete files, displays pop-ups, exchange the buttons of your mouse, uninstall Internet Explorer, they can even slow down your computer's fan.

A computers efficiency is reduced tremendously due to viruses and if that wasn't enough they also corrupt files as well as stored data. For that reason, it is imperative to locate and eliminate viruses before the damage occurs.

There are a couple of important precautionary measures you can take and that is:

1. Avoid opening e-mails from people you do not know.

2. Avoid downloading anything from websites that are not well known or trustworthy.

If you land on a website that is providing content that is possibly unlawful or improper you may well be at risk and you would certainly be better off avoiding it.

Another important step is to keep your operating system updated on a regular schedule to reduce the threat to your computer. The Microsoft.com website is a good place to keep track of security patches that have been created to plug the loopholes that viruses exploit.

Now an absolute must for your computer is a reliable antivirus suite. There are many good free anti-virus packages like Avast (avast.com) that are available, although it is best to get reputable antivirus software like Norton or McAfee to deal with viruses and worms.

A few other security measures for your computer are file protection, memory explorers and firewalls, although at times they can conflict with other software, confuse users, or use up scarce resources. It is always good a idea to listen to the advice of security experts to save your system from damages caused by viruses and worms.

Unfortunately, the majorities of people learn these lessons the hard way and realize the risks involved only after they suffered. If you can understand the risks involved, you can take on safety measures to guard your computer from these threats.

Garry Allen is a successful Webmaster and publisher of Spyware Blockers Tips.com. Providing you with more information on spyware protection and answering the question how harmful is adware that you can research in your bathrobe on his website.

[tags]viruses, worms, spyware, protection[/tags]

Protecting Your Computer And Your Privacy

We've all heard about computer viruses and spy ware, but for some reason we all assume that it won't happen to us. Unfortunately, we are all more at risk than we realize because every time you get on the Internet you expose your personal information and the functioning ability of your computer to viruses. Visiting the wrong website, reading the wrong email, or downloading the wrong program will leave you and your computer wide open for the viruses to attack. Luckily, there are things that you can do to protect yourself.

First, virus protection should be your first priority when you buy a new computer. Before you install any other programs you'll want to ensure that your computer is fully protected from the viruses that come in all shapes and sizes. If your computer is not new, it's not too late. You should look into downloading programs such as Spybot, Norton Antivirus, Spysweeper, or the virus programs offered by McAfee. All of these programs will help you control what types of programs are allowed to run on your computer. Most of these programs can be set up so that they run every day at the same time. This means that you will have your computer swept clean of any suspicious or dangerous programs daily so that they do not have the time to affect your computer files in negative ways. These programs are highly effective and will most likely catch viruses and suspicious programs before they can invade your privacy and wall of protection. Most of these programs can be downloaded or purchased from your electronics retailer very inexpensively, making the retail price more than worth it.

It is also a great idea to align yourself with a web provider that helps you protect yourself from viruses. Most of the big web providers such as America Online scan each email before you open it for viruses and protect you from emails that have links and such in them so that you are not taken to a website that will put you at risk. The automatic scanning of emails really help eliminate the opportunity for you to become infected with any type of virus, big or small. When you have an Internet provider that does this along with at least one virus protection software program, you'll see that you can stop the intrusion of your privacy and the corruption of your important files.

As you can see, protecting your computer from viruses isn't all that difficult, it just takes some thought and planning. If you don't have the software you need or you don't run them regularly your computer can be rendered useless and your personal information can be stolen. Planning and protection is key!

Learn how to keep your computer secure from spyware, malware, worms and computer viruses at http://www.pcviruses.net.

[tags]spyware, virus, anti-virus, malware, norton[/tags]

วันพุธที่ 22 ตุลาคม พ.ศ. 2551

Check Out That Privacy Policy

Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. If you do, you may be giving away personal information to strangers, and you know what your mom said about talking to strangers.

Okay, back up a minute. You want to buy a new necklace for your wife at that great dot com you recently found. They require you to fill out a form first - your name, address, phone number and credit card information. They also want your email address, gender and income range.

So you know these people? Think about it for a minute. How many of your friends (even your best ones) have you told your true age or how much money you make. Have you divulged your credit card data to your co-workers at work? Perhaps you give your social security number to the kid at the McDonalds?

I didn't think so. Then why do you insist on giving this data to a faceless computer? You don't have any idea who is on the other side of the screen - yet every day you give away information that you would never dream of telling your parents or best friends.

Before typing in the information look around the site until you find a link named "privacy". Usually it is on the bottom of the home page (at least), and good sites will have a link to it from EVERY page. Click on the link and read the policy from start to finish. Make sure you understand it - if there are any words you do not understand pull out your handy dictionary and check them out. Once you are done, read it again. Slowly.

What's so important about this that it requires all this work? Look, you are giving out personal data about yourself. The web site owners have an obligation to inform you how this data is going to be used.

Questions that should be answered by any decent privacy policy include:

  • How do you get in contact with the owners of the company?

  • How do you erase your private data or remove yourself from mailing lists?

  • Are they going to keep your information to themselves or sell it to third parties? If so, can you stop this and how?

  • What are they going to do with your credit card data? How do they keep it safe?

  • Why do they need the information? For example, our site asks each person who signs up for an award their age. Why? Because the COPPA law does not allow us to collect information from people under 13 years old. How else are you going to ensure you are in compliance with this kind of law except to ask?

  • It's very important to totally understand what they plan to do with your email address ... you don't want to get spam, after all. How do they use cookies?

  • Do they make use of your TCP/IP address and other similar information, and if so what is it used for? Virtually every site logs this data, but rarely is it used for anything except mass statistics and error checking.

  • If the site has third party advertisers, banners, web bugs, banners and so on, what similar information is available for how they use any information? This is most pertinent for cookies and TCP/IP data that is automatically logged. At the very least, their should be links to third party sites so you can look at their privacy policies also.

  • Are there any special relationships such as partners who use the information also? If so, how is that information shared and used? If the web site asks for information, how do they ensure that COPPA (a law which attempts to ensure that information is not gathered from minors without their parents permission) is adhered to.

  • Under what conditions will you receive mailings and how do you opt- in and out of them.

Once you fully understand a privacy policy you can make an intelligent decision as to whether or not you want to give these people your information.

I know it seems like a lot of work, but remember you don't know who these people are and you don't know what they will do with your information. If you read the privacy policy, you can at least understand what they will do with it.

So now, go finish ordering new jewelry for your wife. That's important.

About The Author

Richard Lowe Jr. is the webmaster of Internet Tips And Secrets. This website includes over 1,000 free articles to improve your internet profits, enjoyment and knowledge.

Web Site Address: http://www.internet-tips.net

Weekly newsletter: http://www.internet-tips.net/joinlist.htm

Claudia Arevalo-Lowe is the webmistress of Internet Tips And Secrets and Surviving Asthma. Visit her site at http://survivingasthma.com

[tags]internet security,firewall,internet protection,virus,spyware,spam,spam filter,anti virus,ISP[/tags]

วันอังคารที่ 21 ตุลาคม พ.ศ. 2551

Protect Your Computer From Malicious Intent

There are many types of malware, malicious software designed to disrupt the normal use of your computer. Some types of malware are simply nuisances to the one sitting behind the keyboard while others can actually harm or destroy the computer itself. Another threat posed by malware is the invasion of your privacy and it has the potential to cause you considerable personal and/or financial harm. Most types of malware get onto your computer via web browsing, instant messaging, or peer-to-peer file sharing. Malware is a self-inflicted injury. You do it to yourself by using the Internet. Many people use the following terms interchangeably but there are definite differences in the types of infections you can "catch" on your computer.

SPYWARE -- Spyware is a program that has been downloaded, usually unbeknownst to you, because it can be piggy-backed with some other type of desired program, usually freeware or shareware. Once this spyware is secretly installed on your computer it can do such things as change computer settings, track viewed websites, collect passwords, history and private information, and can even record your keystrokes. This information is then sent back to the program's originator or to a third party. Spyware is extremely difficult to eradicate.

A particularly annoying type of spyware is called adware which generates a tremendous amount of advertising in the form of pop-up advertisements or banners scrolling across your screen. This program can actually track your activities and cause similar ads to pop up hoping to interest you in related products. It can be quite intrusive and distracting but hardly as malicious as other types of spyware.

VIRUSES -- A computer virus, also rides on the coat-tails of other programs when downloaded, and can reproduce and run itself when the host program is executed. It can infect and corrupt files and sometimes causes hard drives to 'crash' depending on its design. A virus can infect other computers through the sending of email and/or file exchanges.

WORM -- A worm is a self-contained program that can replicate itself and uses a network to infect other systems on your computer. Depending on how the worm was designed, it can secretly send documents though email and even delete necessary files. Unlike a virus which causes harm to the computer and its files, a worm causes harm to other computers on the network and consumes bandwidth, thus slowing down your environment.

SPAM -- Spam is electronic junk mail, usually unsolicited. It uses up tremendous amounts of network bandwidth. Spam is usually trying to sell you some product or service and is sent to generated mailing lists and newsgroups. Though it cannot cause you or your computer much harm, it is extremely annoying and time consuming to delete. It is estimated that more than 60% of all email on the internet is spam.

WHAT CAN YOU DO? -- Visiting Geeks technicians strongly urge all owners to install an anti-virus software program on their computers. We also recommend at least one anti-spyware program, if not more than one. Depending on Internet usage, you should set both programs to automatically scan on a regular basis. These programs can actually find and remove unwanted "infections" and can also prevent their future installations. It isn't enough, however, to simply install these programs and think yourself entirely protected thereafter, because new spyware and viruses are constantly being designed. You must update your anti-spyware and anti-virus programs daily in order to pick up on these newest threats.

Though no one program can be relied on to keep your computer completely clear of sypware and viruses, there are many reputable anti-spyware and anti-virus programs available on today's market. When our customers need an anti-spyware program our technicians install Counter Spy by Sunbelt Software. For those customers with no anti-virus we will install PC-Cillin Internet Security by Trend Micro which even has the added benefit of Parental Control Features.

It is much easier to prevent your computer from being infected with these above-mentioned malware than it is to try to get rid of them, so browse the internet wisely. To clean a computer of unwanted spyware and viruses can be a costly and lengthy process. "An ounce of prevention is worth a pound of cure," so the saying goes.

ABOUT VISITING GEEKS

Marilyn Astell is an employee of Visiting Geeks, LLC, cofounded by Harold Belbin and Sharron Senter http://www.VisitingGeeks.com – an on site computer repair, security and networking company serving north of Boston, Southern NH and Maine. Visiting Geeks' technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster. Learn more about Sharron Senter at http://www.SharronSenter.com

[tags]internet security,worms,internet worm,internet virus,spyware,adware,adware removal,anti virus[/tags]

Keeping Worms Out Of Your Network...

No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms.

This worm is a self-replicating (makes a copy of itself, aunt sookie!) program that reproduces itself over a network. It can be hidden in an email attachment from an unknown sender, a movie download from a suspicious website, or an application sent from someone you don't know. Once on your computer it then can replace a single file, like a winsock.dll or many files and send copies of itself along with email or newsgroup messages that you can post.

The following are ways to keep these type of worms out of your network:

a) Never, I said never (for emphasis) connect an unpatched, non updated computer or other Internet related device to the Internet. How do you update and patch a computer without connecting to the Internet? Get a cd from Microsoft with the latest and greatest patches and updates, then connect the device and then check for updates while connected to make sure you have protection.

b) Always, I said always (yes I am being redundant) use a firewall between your network of computers and the Internet. Even if your network of computers is 1 or 2 computers, it is still a network and needs a firewall to protect it, really protect it. A single computer connected to the Internet is now part of a world wide network thru it's Internet connection and is therefore vulnerable without protection. Get a firewall, a real firewall.

c) Educate and train anyone who uses your computer(s) network. Many times an infection is invited by careless users who download infected email, visit infected sites, or bring infected machines (laptop's, pda's) into a network from outside.

d) Patch and update, patch and update, patch and update (redundant, oh yeah). Yes it's a pain, and it requires time to do and verify that it's actually patched and updated. However it's definitely simpler and cheaper than trying to fix an infestation, or explain to everyone why the network is down or their computers won't work because a worm is eating through everything they have worked hard to save and protect.

e) Make sure up-to-date anti-virus software is on every machine, everything connected to the Internet. Anti-virus packages aid in protection and detection against worms.

f) Establish security rules for your network and educate everyone who touches the network. They must be enforced, daily.

g) Frequently check your network for vulnerabilities. Visit vulnerability website's, take advantage of free scanning tools on the Internet to test your machines. New vulnerabilities and new exploits are released constantly, and you can't protect against what you have no idea what is coming your way.

********************************************************

Daviyd Peterson: 10-year consultant, instructor, trainer Helps african american homeschools bridge the digital divide by becoming computer homeschools. Free article on "Computer Homeschooling" and other related articles http://www.homeschoolwireless.com/homeschoolwireless.htm

*************************************************************

[tags]computer homeschools, african american education technology, homeschool resource, worms virus attack[/tags]

วันจันทร์ที่ 20 ตุลาคม พ.ศ. 2551

Everything You Need To Know About Spyware And Malware

You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. You click on a link, and BLAM you are redirected to a search page you've never heard of and the "back" button won't work.

You've got Spyware! Just what is "Spyware?" The word brings to mind exploding pens and shoe phones. In fact, software makers have struggled to define what spyware is, and is not.

The Anti-Spyware Coalition, a group of companies that include EarthLink, Microsoft, and Hewlett-Packard, have recently published a document that defines spyware as such: "Spyware impairs users control over material changes that affect their user experience, privacy or system security; use of their system resources, including what programs are installed on their computers; or collection, use and distribution of their personal or otherwise sensitive information"

In simpler terms, spyware "spies" the software on your computer, personal information, what web pages you look at, and in some cases, usernames and passwords. Ugh.

The first spyware distribution was in 1999, and is attributed to a popular freeware program called "Elf Bowling." Many users found to their dismay that this "harmless game," was sending information to the creators, Nsoft. This spawned the first anti-spyware program in the year 2000.

Now, both spyware and anti-spyware programs are too numerous to count.

There are several types of software that fall under the generic description of spyware. Let's look at a few, and what they do.

Adware – adware is an application that displays advertising banners. The reason this is criticized is that it can send information back to the company, who then "targets" you with specific banners based on the web pages you've opened. This is different from clicking on a banner for more information. This program sneaks in the "back door," not "advertising" its presence. Please note that the word "AdWare" is a trademark of AdWare Systems, an honest software company. They are not a part of adware, just share the unfortunate name.

Key loggers are just that. They collect the keystrokes you make, like logging into your bank account, and send it to the hacker. Now he has your account number, user name, and password.

Hijackers and Toolbars are another form of spyware. Hijackers take over your browser, opening pages you don't want, and preventing you from opening ones you need – like a site that tells you how to get rid of them. Toolbars are the same sort of thing. Now, you may want to have a toolbar like Yahoo or Google on your browser. They can make searches easier, and may have popup or ad blockers. The malware forms of these try to look like them, but they have completely different motives.

Malware is a generic term for "malicious" software. These programs don't just collect information; they are out to get your computer. Technically, these are not spyware, but a brief explanation seems to be in order. Malware spreads itself through the computer, changing files, making copies to send, even erasing the hard drive. Virus' and worms are a part of this group.

Other malware programs are "Trojan Horse, or Backdoor." These hide quietly in your computer until you connect to the internet. Then they creep around your browser, "reporting in" to the owner, who then uses your computer "address" to send out virus's, malware, and spam. Some hackers link several computers to send so much nonsense information to a particular web site that it is overwhelmed, causing it to shut down.

How does spyware end up on your computer? You're not going to like this . . . but most likely you loaded it on yourself! Wait! Before we get nasty letters, let us explain. Remember those "smileys" you downloaded last week? How about the cute cursor the nine year old picked? Most of these "free" programs have spyware attached, or imbedded in them. Even Adobe Reader loads a "Yahoo search bar" when you update the reader.

Remember when you installed the program and that gray box popped up with a thousand lines of small print? Did you read it? I doubt anyone does. The spyware distributor counts on that. If you do manage to slog through the legalese, and stuff only advanced programmers would know (or care about), there will be a few innocuous lines, something along the lines of: "this program will collect information to better your enjoyment of this program," or "a web search toolbar will be added to your browser." When you click on the "accept" button to install the software, you have also agreed to the spyware program.

Another way is when a box pops up claiming to be legitimate software needed to view the site properly, or that it is an update. It only has a "yes" button, implying that you are required to allow the download. These are copying legitimate updates from places like Microsoft, or Macromedia.

Just what is spyware going to do to your computer? Anything you can do, he can do better. It is an executable that can record keystrokes, read your files, watch your word processing program, change your home page, add and delete files, read your cookies (with personal info), then "phone home" with the info. Some spyware will crash your browser if you try to uninstall it. Others may "pretend" to be uninstalled, but they wait until your back is turned to load itself back on your system.

You don't know how the stuff was loaded on your computer, but it is causing all kinds of problems. The computer is running slower, certain programs are not working, and on occasion, you see the dreaded "blue screen of death." (crash). Don't worry, you are not alone According to an October 2004 study by America Online and the National Cyber-Security Alliance, 80% of surveyed users' computers had some form of spyware, with an average of 93 spyware components per computer. 89% of surveyed users with spyware reported that they did not know of its presence, and 95% reported that they had not given permission for it to be installed.

Now what do you do? There are several good "spyware removal" programs out there. But be warned! There are also a number of programs that claim to be anti-spyware that do not work, or worse add more spyware to your system! A good resource for "suspect" spyware is the list at: http://www.spywarewarrior.com/rogue_anti-spyware.htm They have a list of over 200 programs that claim to take care of spyware, but may not do what they claim.

Once you get your computer "clean," how do you avoid getting "dirty" again? There are firewalls and programs designed to watch for known spyware. When you register, the "known spyware" definitions can be updated on a regular basis.

You could use a browser other than Internet Explorer (most spyware exploits problems here). This writer loves Mozilla Firefox – it's free at www.mozilla.org

Our lawmakers are doing their best to stem the tide of spyware/malware. For example, in Washington State, USA, it is illegal for anyone other than the owner/operator of a computer to install software that alters web browser settings, monitors keystrokes, or disables computer security software.

The Gibson Research Corporation, www.grc.com, has several free fixes to "plug holes" in Internet Explorer's security.

There is hope. In 2005, NY Attorney General Eliot Spitzer brought suit against Intermix Media, Inc. Intermix's spyware program spread by drive-by download (loaded without permission), and installed itself in such a way it was very difficult to remove. Intermix settled for $7.5 million dollars.

Spyware is here to stay. Your best bet is to be informed – know the tricks used by spyware to load itself. Use a firewall or spyware blocker program. Most important, understand exactly what that new program will install on your innocent computer.

ABOUT THE AUTHOR:
Mike Christy is the owner of http://www.spywarecenter.info which is a free information site providing the latest Spyware news and instructions on how to remove Spyware from your computer.

[tags]spyware,malware,hijacking,trojan,adware,virus,key logger,popup[/tags]

วันอาทิตย์ที่ 19 ตุลาคม พ.ศ. 2551

Web And Computer Security

Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?

Today’s cyberspace is hazardous. None of today’s PC users can claim that they never had a computer virus issue or a PC security breach. Now, if you count today’s number of PC users worldwide, they will soon be 1 billion by 2010 according to analysts. When I see all the computer viruses, infections, trojans, and what not around me, and compare it with the 1 billion innocent computer users around the world, I simply feel sorry not only for those billion users but for myself too. But again, as a common user myself, I must admit it was not all doomsday for the whole industry since 1987 when I started to use computers. So, as a responsible member of this great IT revolution, I must share some of the best tips and tricks that I learned to use to make the minimum room for productivity on my computer.

Please note this is a tutorial for someone who has basic know-how of computer usage. For those who are newbies, I would recommend asking a local expert’s help before trying anything out mentioned in this tutorial. In that case, make room for payment from deep pocket. For your own convenience, print this tutorial for step-by-step instructions.

Whenever my computer is infected, I act on any of the following options;

1. FORMAT HARD DISK: I back up all of my data on a CD-Writer if it is still accessible. And then format the whole hard disk drive and re-install each and every application.

2. USE SOFTWARE: I exhaust all anti-virus and other software options. This is usually my first priority as compared to formatting the whole computer hard disk drives.

Now, let me explain both options in detail;

PRE-REQUISITES: Make sure you have a CD-Drive (Writer), empty writable CDs, Windows OS CD (bootable) that contains files such as Format.exe, Scandisk.exe, FDisk.exe, and Attrib.exe files. Microsoft Office CD, Anti-Virus CD, GoldenHawk CD Writing Software in DOS (copy2cd.exe and cdtools.exe), Serial Numbers of your License, Driver CDs of Motherboard, VGA, Network, Sound and Modem devices. Optionally, download (using www.download.com or www.tucows.com) these software from any Internet Café when your own computer is inaccessible and save it on a CD so that you can use it anytime for security purposes;

Golden Hawk DOS based CD Writing Software

HTech Fireman Windows based CD Writing Software

Driver Genius Pro

Partition Magic

AVG AntiVirus

SpywareBlaster & SpywareGuard

Spybot Search & Destroy

Ad-Aware

IE-SpyAd

ZoneAlarm

HiJackThis & CWShredder

I have intentionally avoided mention of many commercially good and more friendly software’s mention here as I wanted everything to do FREE without any additional costs apart from the usual OS licenses. For your own convenience, you can research Google or Yahoo search engines find further information about such commercial software and their availability / pricing.

1. FORMAT HARD DISK

I know it is painful and surgical type of solution, but sometimes, it is the ONLY solution left after exhausting all of our efforts to revive our computer machine after a virus attack. Follow this procedure;

Booting Up: Try booting your computer normally first and see if you can login easily. If you can’t or your computer hangs up, try holding F8 key when starting Windows and you will get the Safe Mode. Even if you don’t get the Safe Mode, don’t worry.

Power up your computer and press DEL key or F2 key to login your CMOS. In CMOS, go to Boot Preferences and make CD Drive as boot drive as your first boot drive and change the hard disk drive as the second boot drive. If you don’t see your CD Drive in the boot-up options, your CD Drive is not properly installed. Check the connectors or ask your CD Drive provider for instructions to install the CD Drive. Now, when your CD Drive is ready, insert your Windows OS CD in the CD Drive and restart your computer machine. When prompted, select the option “Boot from CD with CD Option”. When you get the prompt, Notice the CD Drive letter that was allocated to your CD Drive when it installed the CD Driver. It is usually D: drive or the last drive letter depending on the number of your partitions. Note it down as it is the actual drive letter where you will have to type a DOS command like d:

You should now be able to run all software utilities such as Format, Scandisk, FDisk or Windows Installation Setup.exe files. Right now, simply make sure they exist by typing a DOS command dir at the CD drive letter. If you don’t find it with this simple directory command, use dir/s filename to search the file. For example, to search fdisk.exe file, type dir/s fdisk.exe.

BACKING UP YOUR DATA: Before formatting your hard disk drive, please make sure you have proper back up of your critical data files such as Microsoft Word, Excel, Powerpoint, etc files on a CD or any other media for backup that you have access to. In this tutorial, we assume you have a CD-Writer installed for taking backups on Writeable CDs. Their capacity is usually 700MB or less. Here, you should seriously consider using Zipping software like WinZip or WinRAR.

VIA WINDOWS: If you can luckily login to your Windows OS, you should run the CD-Writer software such as HTech Fireman to back up all of your data on an empty CD. If you don’t know how to do it, read their user manual for detailed instruction set. If you can’t access your Windows OS, read on.

VIA DOS: Some of the files that you wish to make back-up, may be hidden. To un-hide them, use attrib *.* +r +s +h.

Now, use the software from Golden Hawk file named as copy2cd.exe to backup your data files or directories on a writeable CD. Before using this command, make sure you are in an appropriate path on the computer such as E:/ where the actual file copy2cd.exe file resides;

Copy2cd c:data*.* f:

Here we assumed that f: is a CD Writer drive. Now, repeat the same for all of your files to back up. When finished, run cdtools.exe command i.e. cdtools f: to finish by selecting option “Disc Finalization”.

If you can’t back up your data using the above-mentioned procedure, either ask an outside expert’s help personally or via internet. If all fails, forget your data forever and carry on installing a new OS as mentioned in this tutorial.

Backing up Your Drivers: An interesting tool to mentioned here is a software that automatically backs up all of your drivers of CD, modem, sound card, vga, usb, printer or just about anything that is currently installed on your system. But this software works only in an operational windows OS, and not in DOS. It is a good and time-saving practice to keep a backup of all of your drivers on a CD by using such a software. Its name is Driver Genius Pro and it is commercial software, not a freeware.

USING FDISK: You may skip this option and go straight to Formatting Hard Disk option, if you wish to use other useful partitions that may contain your data. Before going ahead with this option, Make sure there is no useful data left on your computer to be backed up. This option will delete all of the computer partitions and create new ones.

i) Boot up your computer using Windows OS CD.

ii) Run this command fdisk

iii) Press option 3 to delete all current partitions.

iv) To create a new partition, select option 1 and select Y to answer the maximum size question by the program.

v) Next, select option 2

vi) Press Esc key to quit and restart your computer to

See the URL http://www.compguystechweb.com/troubleshooting/fdisk/fdisk_scr.html for detailed instructions alongwith screenshots. Now, that you have created the primary partition, you can continue to format the newly created partition. There is a very user-friendly but commercial software called Partition Magic by PowerQuest to manage your partitions easily after installation of Windows.

FORMATTING HARD DISK: Now that you have created new partitions, It is time to format them so that you can start installing Windows. This is how you make your C: drive usable by your Windows OS for installation. Boot up your computer with Windows CD and type format c: command at the prompt. When prompted for maximum size, press, YES. After complete processing you will be presented with the successful report about the formatting of the C: drive. Select your new drive name and press ENTER to finish.

INSTALLING WINDOWS: Microsoft has made it very easy for a newbie to install a completely new OS on a newly formatted partition. It is all wizard based and you simply have to click NEXT each time whenever asked a question. Boot up your computer from the Windows CD and select Start with CD Option. When on DOS prompt, change to the CD Drive that it just created which is usually d: if you have only one partition C. Now type command setup.exe to start the windows installation process.

During installation, make sure you properly name your PC as per your preferences and select your regions and Time zone. When finished, the computer will re-boot and during next re-boot it may ask some drivers of your Sound Card, VGA, Network, or other devices attached. Provide the requisite driver CDs and locate the paths of the appropriate drivers. If you are not sure, leave it like that and press NEXT to ignore. When your windows installation is complete, you can install Microsoft Office, setup internet connection and start using it as normally as you would. Please make sure you install all the security software such as anti-virus, anti-spyware, adware, and other software as mentioned in the next section.

2. USE SOFTWARE

Installing Anti-Virus: Download free AVG Antivirus software and install it. Make sure you get its free key from their website by registering. This software is not auto-updated for critical viruses and for an auto-update version, you will have to pay. If you wish to pay, we would recommend world’s most popular brands Symantec, McAfee and Trend Micros instead. No matter what Anti-Virus software you install, make sure you enable its Auto-Protect feature for automatic protection of your computer’s resources and in-coming or out-going emails from any virus attack. Some software even allow you to setup silent detection and destruction without any disturbance to your work. Further, they are auto-updated via internet at the regular interval that you setup. Hence, you can rest assured that whenever a security threat is spread all over the world, your software will automatically download the requisite updated version and install its defense on your computer.

BROWSER SECURITY: To setup your browser (Internet Explorer on Windows) for maximum security against the usual threats, follow this procedure;

i) Start up your browser

ii) Go to IE > Tools > Windows Update > Product Updates, and selected Security Updates to be automatically updated. Microsoft releases patches and security patches from time to time to make sure your system's security is up-to-date.

iii) Now, go to Internet Options/Security/Internet, press 'default level', then OK. Now press "Custom Level." In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to 'prompt', and 'Initialize and Script ActiveX controls not marked as safe" to 'disable'. Now you will be asked whether you want ActiveX objects to be executed and whether you want software to be installed. Sites that you know for sure are above suspicion can be moved to the Trusted Zone in Internet Option/security.

If you use another browser such as Firefox or Netscape, see their documentation on how to securely set it up against any such internet threats.

Installing Anti-Spyware: Spyware, adware, browser hijackers, and dialers are some of the fastest-growing threats on the Internet today. By simply browsing to a web page, your computer may become a victim. You can install SpywareBlaster and SpywareGuard to effectively guard your computer from such internet threats.

It includes Fast Real-Time Scanning engine for known spyware and heuristic/generic detection capabilities to catch new / mutated spyware and Download Protection along with Browser Hijacking Protection in real-time.

Simply download the software (free) from their website and install it on your system. Make sure you download its latest update too or enable its Auto-Update feature to be updated automatically in the background. Now, when you are ready, run the software to check the spyware on your computer. When spyware are found, it reports accordingly. Press "select all", then press option "kill all checked". Although it won't protect you from 100% spyware, But it is a very important extra layer of protection.

Next, install another software that is called Spybot Search & Destroy. It works exactly like SpywareBlaster, but it never hurts to have a double layer of spyware detection alongwith Spybot R&D.

Installing Anti-Adware: Adware is a common term used to describe potentially dangerous websites and scripts that do data-mining, aggressive advertising, Parasites, Scumware, selected traditional Trojans, Dialers, Malware, Browser hijackers, and tracking components. There is a very good software called Ad-Aware available to scan and remove such nuisances from your system.

To start using it, simply visit Lavasoft USA website and download its free non-commercial version of Ad-Aware Personal Edition. Run its setup program and install it. When prompted, ask it to scan your computer. If there are any adware found, it is detected and removed automatically by Ad-Aware. Run this software on a weekly or daily basis, if possible to keep your system clean.

In addition to the Ad-Aware, Internet Explorer comes with a very handy tool that allows you to block specific sites that may carry well-known advertisers, marketers, crapware pushers to the Restricted sites Zone. If you had to input 50000+ of such sites manually yourself, it would takes years. Luckily, there is a software that does it all automatically and it is called IE-SPYAD. Once you merge this list of sites and domains into the Registry, the web sites for these companies will not be able to use cookies, ActiveX controls, Java applets, or scripting to compromise your privacy or your PC while you surf the Net. Nor will they be able to use your browser to push unwanted pop-ups, cookies, or auto-installing programs on your PC. It is not an ad blocker. It will stop top unwanted crapware from being installed behind your back via "drive-by-downloads"; prevent the hijacking of your home page.

This Restricted sites list is based in part on info from: discussions in the SpywareInfo Forums and other forums that specialize in crapware removal major crapware reference sites: doxdesk, cexx.org, Kephyr.com, PestPatrol and SpywareGuide.

To start using it, simply download it from their website and run its install.bat file. Make sure you run its update as well soon after its installation.

INSTALLING FIREWALL: A firewall software acts as a defense shield against hackers, intruders, and blocks access attempts to your computer. ZoneAlarm is a professional firewall software that works in a stealth mode automatically and makes your computer invisible to anyone on the Internet.

Download it from ZoneLabs website and run its setup for installation. I recommend you use its Express Settings which automatically configures your most commonly used software like browser, chat messengers, ftp software to access internet, while blocks every other internet traffic in real-time. If any software or service tries to upload or download any data, it pops up an alert whereby you can allow or disallow such internet traffic.

Computer Slow Down: It is very common to see many complaining about their computer slow-down. The fastest and easiest cure is using Windows’ built-in Defragmenter utitlity that you can find in Startà Programs à Accessories à System Utitlities à Disk Defragmantor and run thorough defragmantation. It will take a while before it ends.

If your system’s performance does not improve after running defragmantation utility, consider scanning your computer via a software utility called HiJackThis which you can download and install on your system. Use this tool carefully as it is intended for advanced users only. HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect, and optionally remove selected items. The program can create a backup of your original settings and also ignore selected items. Additional features include a simple list of all startup items, default start page, online updates and more.

CWShredder is a utility for removing CoolWebSearch (aka CoolWwwSearch, YouFindAll, White-Pages.ws and a dozen other names). This tool will find and destroy all traces of the CoolWebSearch (CWS) hijacker on your system including redirections, IE slowdowns, start page changes, un-authorized addition of sites in IE Trusted Zone, and blocking access to IE options or setup.

Download CWShredder from their official website only as there is a similar named virus/trojan on the loose at various websites which you may accidently download and install, hence become more infected than being cured instead. When it is installed successfully, run the software to scan your local machine. Select the fix button & it will get rid of everything related to CoolWebSearch. Close ALL other programs & windows, including IE, before running CWShredder. Reboot after doing this.

I know there is still a lot left, but as I wanted to keep this tutorial as brief as possible, hence I covered only the critical elements here. I am sure you will have fewer breakdowns (if not ZERO0 and more productive hours on your computer. I would recommend you to setup all the software’s auto update and auto-check options to free your time for more productive things than just playing hide and seek with spywares, adwares or viruses. Happy and safe computing!

This article is submitted by Kashif Raza http://www.networkingtutorials.net

[tags]Web, Computer Security, Partition Magic, Zone Alarm,Symantec,Firewall,Adware,Virus attack,Spyware[/tags]