Sunday, November 8, 2009

All About Computer Viruses

All About Computer Viruses

by: Kara Glover

Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net
Word Count = 1,500
Word Wrapped to 60 characters per line
URL: http://www.karathecomputertutor.com
Author photo: http://www.karathecomputertutor.com
Date of copyright: November 2004
All About Computer Viruses
by Kara Glover
kara333@earthlink.net
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.
You might have a virus.
Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?
Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.
In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.
In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.
A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.
When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.
This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.
Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)
These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.
As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.
Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.
For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.
But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.
During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.
Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.
Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.
Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.
So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)
On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.
Worms sit in your working memory, or RAM, Nachenberg said.
OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?
Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.
Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.
Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.
There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.
The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.
For these other intentions, we first need to explain the “backdoor” concept.
The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.
Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.
Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.
Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.
OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.
That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.
Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.
Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.
Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!
©2004 by Kara Glover
About the author:
Kara Glover is a Computer Tutor and Troubleshooter.
You can find her articles and tutorials on topics such as
Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com
Circulated by Article Emporium

Friday, November 6, 2009

Why Do I Need Anti Virus Software For My Computer?

Why Do I Need Anti Virus Software For My Computer?

by: Angie Noack

If you’ve recently purchased a computer, or are just learning about using email and the internet, you may have heard about computer viruses and anti-virus software. You may be wondering if this is something that you should be concerned about, and if so, what you should do about it. This article will attempt to answer these questions for you.
First, you may be wondering just what a computer virus is. Basically a computer virus is one of many types of small programs that install themselves on your computer without your consent. Usually they enter your program through an email, or while you are browsing a website.
When these programs run, usually without you knowing, they can cause all types of problems with your computer. Some viruses can be mildly annoying, slowing down your computer as they use your computer’s resources for another purpose. Others can be very dangerous, collecting your personal information and sending it to another party, or damaging your hard-drive.
True to their name, viruses are able to use your internet connection and email program and send themselves to the computers of other people you know, spreading themselves just like a contagious disease.
Because of this, just like the health of your body, when it comes to computer viruses, an ounce of prevention is worth a pound of cure. It is much easier to prevent viruses from entering your computer than it is to get rid of them and cure your computer once it becomes infected. This is why Anti-Virus software is important.
Once you realize that you need anti-virus software installed and running on your computer, you’ll have to choose which one to purchase and install. This can be a complicated process, but here are some tips to make it a bit easier.
First, check your computer to see if it came with anti-virus software. Many new computers are shipped with anti-virus programs already to go on them, you just need to turn them on. Check your instruction manual to see if this is the case with your computer.
Check with the vendor. If you purchased your computer from a local retailer, check with them to see what anti-virus program they recommend. They should be more than willing to help you and may even be able to provide you with a discount since you purchased a computer from them.
Once you have your anti-virus installed and running on your computer, be sure to contact the software’s support if you have any questions. It is also important to keep your software updated. Many of these programs will automatically update themselves when you are online. This is very important since new viruses are always appearing and you want to make sure your computer is protected.
About the author:
Angie Noack is a business strategist with a sharp edge for technology. With her unique ability to combine these two skills, she's able to help businesses save time and increase profits. You can find her online at http://softwaresoftwaresystems.com
Circulated by Article Emporium


Wednesday, November 4, 2009

Different Types of Computer Infection!

Different Types of Computer Infection!

by: Silent One

When you listen to the news, you hear about many different forms of electronic infection. The most common are:
Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
E-mail viruses - An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.
Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.
Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.


About the author:
http://www.a1-sypware-4u.info/
Circulated by Article Emporium

Tuesday, November 3, 2009

Top 10 Ways To Protect Yourself From Computer Viruses

Top 10 Ways To Protect Yourself From Computer Viruses

by: Jim Faller

As more and more people are becoming comfortable using their computers at school, home or in the office it’s only a matter of time before they encounter a computer virus. Here are our top 10 steps to protect you from computer viruses.
Use a high quality anti-virus program. There are many different anti-virus computers programs on the market some of them are better than others. Look to reputable computer magazines or websites for ratings to help you find the one that matches your needs.
Always use your anti-virus software. Make sure your anti-virus software is always turned on and scanning, incoming and outgoing email messages, and any software programs you run.
Keep your antivirus programs up to date. Most programs come with a yearly subscription make sure you take advantage of the updates. More advanced programs allow you to schedule updates or full system scans for “off hours” like 2AM when you aren’t likely to be using your computer.
Keep your computer up to date. From time to time operating systems fall victim to security holes or issue updates. Make sure you check periodically to make sure you are running stable up to date versions of your software.
Backup your data regularly. Most windows computer users keep their documents in the “My documents” folder. This makes it easy to back up all of your important documents. Make weekly or monthly copies to CD or USB drives.
If you use floppy disks or USB drives on public computers like your school computer lab, Kinko’s, or even digital photo printing store make sure you scan them for viruses. Public computers are notorious for not being up to date and properly protected.
Be wary of email attachments. Treat any email attachment as potentially dangerous. Never open attachments from people you weren’t expecting. Also be careful of attachments from people you know but weren’t expecting. Many computer viruses replicate themselves by reading the contacts from an infected computer.
Use text email if possible. While HTML email is prettier and allows you more control over formatting it also can carry computer viruses. If you use text based email the only way to get a virus is by opening an attachment.
Use downloaded freeware and shareware files or software with caution. Try to download them from popular reputable sources that scan the programs before they are uploaded. To make sure you are safe scan the program before you install it on your computer.
Be wary of links in IM or instant messaging software. Don’t accept invitations from people you don’t know and never click a link from someone you don’t trust, they can easily redirect you to another website that will try to install a virus on your computer system.
© Computers.6ln.com, All Rights Reserved.
About the author:
This article was written by Jim Faller of http://computers.6ln.coma website with information about viruses, spyware, adware, backups, data recovery and computer security.
Circulated by Article Emporium

Monday, November 2, 2009

Steps to Protect your MS Windows System from Viruses

Steps to Protect your MS Windows System from Viruses

by: Evgeny Kovalenko

Nowadays as the Internet and other networks are greatly developed computer viruses are distributed rapidly and intensively. Everyday several new viruses capable to damage considerably your computer system arise. Anti-virus specialists work hardly to make updates their software against new viruses as soon as possible. The viruses can get inside computer in different ways. That is why there is no simple method to protect system. Only series of measures can give you reliable protection from the infection. Below are 9 steps to protect MS Windows based PC system from viruses.
1. Make regular backups.
It should be said that there is no absolutely safe way of protection. Virus creators regularly find holes in new computer products to use them for infection of computer systems. Some dangerous viruses can considerably damage data files or even erase entire file system. Make regular backups of your data files to separate file storage device. It can be separate hard drive, flash card, compact disc or another file storage device which you choose. To ease the procedure you can use some automatic backup software. And be ready if the system will die because of virus infection.
2. Be ready to reinstall your system if it dies because of viruses.
Get distributives of your operation system and distributives of software which you use and keep them together, for instance, on a set of CDs not far away from you. In this case if virus infection will cause unrecoverable system failure you can rapidly reinstall your working medium.
3. Protect your network connection with Firewall.
Firewall is a software which blocks suspicious potentially dangerous connections to preventing viruses from network to penetrate into your system. Windows XP system has quit simple but reliable built-in firewall. You can enable it as follows. 1) in Control Panel, double-click Networking and Internet Connections, and then click Network Connections. 2) Right-click the connection on which you would like to enable firewall, and then click Properties. 3) On the Advanced tab, check the option to Protect my computer and network.
If you need more flexible control of connections with network you can get and install more advanced firewall software like Norton Personal Firewall or Outpost Firewall. If you use this software you have ability to permit or to block particular connections and to monitor network activity.
4. Use antivirus software.
Install antivirus software which will scan your system searching and erasing viruses on a regular basis. Leaders in antivirus software products for Windows systems are Norton Antivirus, McAfee, Kaspersky Anti-Virus and PC-cilin.
5. Regularly update operating system.
Windows XP has built-in automatic update service. It regularly contacts Microsoft server to find updates and notifies you if updates are ready to be installed. Updates are important because hackers regularly find holes in operating system which are often used by virus creators.
6. Don't install and don't run suspicious software.
Check new programs which you are going to install with anti-virus software. Don't download software from suspicious websites. To download software always seek website of software creator or official distributor. Do not open applications received by email from unknown persons.
7. Limit access to your computer.
Protect enter to system with password.
8. If you use Internet Explorer, consider moving to another browser.
As IE is the most distributed browser today virus creators actively use defects in its security system to infect computers. Infection may arise if you will visit webpage which contains invisible harmful code. You are more safe if you use less known browser only because virus creators do not pay much attention to it. Major IE competitors Firefox and Opera browsers provide now the same comfortable interface and range of services for working on the Web.
9. Use spam protection.
Viruses are often distributed via email. Switch on spam filters in your email box to block spam receiving. If you need assistance with using of the filters you can ask your email service provider.
About the author:
Evgeny Kovalenko is the Editor of FSSD computer software directory with free submission service for software developers and distributors.
Circulated by Article Emporium

Sunday, November 1, 2009

Malware Quiz

Malware Quiz

by: Joel Walsh

Most people who think they know all about spyware, Trojans, viruses, and other malware really don't. Take this quiz to make sure you know who your enemies are.
This quiz tests your knowledge of five of the most common kinds of malware, the software you don't want on your computer: Trojan, worm, virus, spyware, and adware. Keep in mind that there are at least seven other kinds of malware we know about.
The answers are located at the end of the quiz.
1. Which of the following is most likely to make your computer stop working?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
2. Which of the following is not a stand-alone program?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
3. Which of the following is most likely to send spam emails from your computer?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
4. Which of the following is lest likely to be detected with standard antivirus software?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
5. Which of the following is most likely to come with other malware?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
6. Which of the following is bundled with the peer-to-peer file-sharing software, Kazaa?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
7. Which of the following is most likely to install a "backdoor" internet connection?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
8. Which of the following is most likely to be involved in a denial-of-service attack?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
9. Which of the following is the only malware publicly documented as having been employed by the FBI to bring a suspect to trial?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
10. Which of the following is most likely to steal your identity?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware
Answers:
1. c. virus. Trojans, worms, spyware, and adware all depend on your computer staying up and running. They use your computer's resources to accomplish whatever their designer intended, such as sending emails, displaying advertising, or stealing information from your computer. Viruses, however, are usually created by vandals who just want to damage as many computers as possible.
2. c. virus. Viruses are not stand-alone programs. Just as biological viruses must take over the cells of their host in order to function and reproduce; computer viruses must take over one or more files of the computer on which they are stored. Trojans, worms, spyware, and adware are all stand-alone programs that can run without the help of another application, though they often come bundled with other applications as a decoy, or with other malware.
3. b. worm. Worms are stand-alone programs that are often used to send spam emails, or emails containing viruses. Trojans often contain worms which are then installed for the purpose of sending spam emails, but the worms are what actually send the emails.
4. e. adware. In the strictest sense, adware is rarely patently illegal or destructive, and so antivirus software makers have traditionally avoided treating it as malware. Adware designers are usually large advertising companies with hundreds of millions of dollars, and they take care to insert end-user licensing agreements (EULA) that supposedly mean that the software is installed with permission. Also, adware will not usually do anything more destructive than show advertising. Nonetheless, adware can quickly multiply on a computer, hogging system resources and causing a computer to slow down or even malfunction. That's why most anti-spyware software makers target adware as well.
5. a. Trojan. By definition, Trojans bear other malware within them, just as the mythical wooden worse bore Greek warriors. The malware can be viruses, worms, spyware, or adware.
6. e. adware, though d. spyware, is also correct. Kazaa's developers, Sharman Networks, make most of their money from the advertising shown by the included adware. The adware typically runs even when the Kazaa software is not in use. Sharman Networks has adamantly denied that the adware that comes with Kazaa is spyware, since, like most adware, it comes with an end-user license agreement that says the user grants permission for the software to be installed. In reality, few Kazaa users, until recently, were aware of just how much adware was being installed on their machines (as much as a dozen or more). Plus, the adware does monitor your internet usage, and so is spyware in the strictest sense.
7. b. worm. Worms most commonly install a "backdoor" internet connection in order to send out data (for instance, spam emails or requests to remote servers) undetected.
8. b. worm. Worms, which most commonly install a "backdoor" internet connection on the host computer, are perfect for sending out the millions of server requests needed to achieve a denial-of-service attack. A denial-of-service attack is when a server is maliciously sent so many hits that it is overwhelmed and cannot continue to operate.
9. a. Trojan. The Trojan "Magic Lantern" was famously used to install monitoring software on the computer of a suspect who was later brought to trial partly on the strength of the evidence gathered.
10. e. Spyware. Spyware is malware that collects information from your computer and sends it to another remote machine, so by definition any software that steals your identity is spyware. However, spyware is often installed on your computer by a Trojan, or sent to you by another computer infected with a worm, so other kinds of malware pose an indirect threat of identity theft as well.
About the author:
Joel Walsh writes for spyware-refuge.com about spyware, viruses, Trojans, adware, worms, and other malware: http://www.spyware-refuge.com?Computer Viruses[Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "Computer Viruses" OR leave this bracketed message intact.]
Circulated by Article Emporium

Saturday, October 31, 2009

Computer-Virus Writer's: A Few Bats In The Belfry?

Computer-Virus Writer's: A Few Bats In The Belfry?

by: Dean Phillips

"Male. Obsessed with computers. Lacking a girlfriend. Aged
14 to 34. Capable of creating chaos worldwide."
The above description is the profile of the average computer-virus writer, according to Jan Hruska, the chief executive of British-based Sophos PLC, the world's fourth-largest anti-virus solutions provider.
"They have a chronic lack of girlfriends, are usually
socially inadequate and are drawn compulsively to write self-
replicating codes. It's a form of digital graffiti to them,"
Hruska added.
To create and spread cyber infections, virus writers explore
known bugs in existing software, or look for vulnerabilities
in new versions.
With more and more new OS (operating system) versions, there
will be more new forms of viruses, as every single software
or OS will carry new features, and new executables that can
be carriers of the infection.
Executables are files that launch applications in a
computer's operating system, and feature more prominently in
new platforms like Microsoft's Windows 2000 and Windows XP
than they did in the older DOS or Windows 3.1.
Virus writers also share information to create variants of
the same infection, such as the Klez worm, which has been
among the world's most prolific viruses.
The Klez, a mass-mailing worm that originated in November
2001, propagates via e-mail using a wide variety of messages
and destroys files on local and network drives.
But the news gets worse. Recent events have uncovered what
may be a new trend: spammers paying virus writers to create
worms that plant an open proxy, which the spammer then can
use to forward spam automatically. Many suspect this
occurred with the SoBig virus.
The Sobig worms, began spreading in the early part of
2003. The unusual thing about them was they contained an
expiration date and were given a short life cycle to see how
features worked in the wild.
Having an expiration date also makes the virus more
dangerous, because most people would have been alerted to
the new worm within a few weeks and anti-virus definitions
would have been updated.
A variant of Sobig, Sobig-F was so efficient that just a few
infected machines could send thousands of messages. Sobig-F
created a denial-of-service effect on some networks, as e-
mail servers became clogged with copies of the worm.
According to Mikko Hypponen, manager of anti-virus research
for Finland-based F-Secure Corp, Sobig-F sent an estimated 300 million copies of itself.
Computer Economics, Inc. states, "Nearly 63,000 viruses have
rolled through the Internet, causing an estimated $65
billion in damage." However criminal prosecutions have been
few, penalties light and just a handful of people have gone
to prison for spreading the destructive bugs.
Why is so little being done? Antiquated laws and, for many
years, as crazy as it sounds, a "wink, wink" or even admiring attitude toward virus creators.
One person has been sent to prison in the United States and
just two in Britain, authorities say. But the low numbers
are "not reflective of how seriously we take these cases,
but more reflective of the fact that these are very hard
cases to prosecute," said Chris Painter, the deputy chief of computer crimes at the U.S. Department of Justice.
So what can you do to protect yourself against computer viruses?
Well, first and foremost, make sure you have proven anti-virus protection like like Symantec's Norton Anti-Virus or McAfee's ViruScan.
In addition, If you haven't already done so, I highly recommend installing Microsoft's Service Pack 2. SP2 tightens your PC's security with a new Windows Firewall, an improved Automatic Updates feature, and a pop-up ad blocker for Internet Explorer. Plus, the newly minted Security Center gives you one easy-to-use interface for keeping tabs on your PC's security apps.
"Male. Obsessed with computers. Lacking a girlfriend. Aged
14 to 34. Capable of creating chaos worldwide."
Now, I'm no psychiatrist, but to me, the above description
sounds more like someone with a few "bats in the belfry!"
About the author:
Dean Phillips is an Internet marketing expert, writer,
publisher and entrepreneur. Questions? Comments? Dean can be
reached at mailto: dean@lets-make-money.net
Visit his website at: http://www.lets-make-money.net

Help Keep the Computers on Earth Clean and Healthy

Help Keep the Computers on Earth Clean and Healthy

by: Jesse S. Somer

“Aaaaaahhhhhh! I’ve been invaded by a virus!” Getting a virus means getting sick and no one in their right mind wants to be ill. Well, now that computers have become our close friends, it’s a shock to learn that foreign bodies too can invade them with malicious intent. No, your computer doesn’t get a runny nose or diarrhea. This is a sickness that stops your friend from functioning properly, sick in bed, incapacitated.
Well in Nature viruses occur from a power outside of our control. But, with computers it’s different, humans, mean or ignorant humans are creating these viruses. Why? Usually these are disgruntled people who want to wreak some havoc on others or companies that they feel have done wrong to them. In any case we have to be in the know and prepared to deal with these debilitating scourges.
There are many ways to approach the protection of your computer. First of all there’s the step of awareness. Be aware of how viruses are transmitted. You can catch them from a disc but in most cases it is through your email system. Check your email carefully. Be very wary of anything that has an attachment. Check whom it’s from and look at the title of the mail, is it something you were expecting? Even if it’s from someone you know, be careful as their computer could be infected and the virus being transmitted without their knowledge.
Next, read the cover message, you can’t catch the disease without actually opening the message. Look at the name of the attachment; remember viruses are written to entice you. Beware of free offers and generally anything from people you don’t know, as well as messages that sound irrelevant to your contact’s usual style. Delete them straight away. Delete, delete, delete. This will ensure you of a lower risk of infection. You can even send the message back to the sender without opening it to make sure it is valid.
Now for the heavy protection: Virus scanning and virus protection software, and rescue discs are all readily available and easily utilized. Some are free, and others are obtained for a very small charge. Most software manufacturers offer subscriptions for updating services, which automatically download protection to the latest viruses.
There are two main types of virus scanning software: one searches through your entire computer files looking for recognizable viral signatures, the other scans your incoming and outgoing emails. Alerts will show you when a file needs to be erased or repaired. If you do receive a virus that none of the software can repair you can send a copy of it to a company like Symantec who will be happy to develop a cure for it.
The main message here is not to get too worried about your good friend Mrs. PC getting ill or sick. The humans are on top of the case and they seem much better adapted at fixing their technology than they are at beating the viruses that attack our physical bodies. If only we could cure human virus and illness as easily as we solve the problem of computer sickness.
About the author:
Jesse S. Somer
M6.Net
http://www.m6.net
Jesse S. Somer is an analyst hoping to show fellow humans how far the computer age has come in terms of its strengths and weaknesses.
Circulated by Article Emporium

Wednesday, October 28, 2009

Keeping it Clean: Virus Removal Basics

Keeping it Clean: Virus Removal Basics

by: John Lenaghan

The day you learn your computer is infected with a virus or spyware is a lonely yet aggravating day. You’ll be angry that you fell victim, and may feel helpless because of your lack of knowledge about virus removal or pc repair. But don’t worry - you’re not alone! Unfortunately, you’re actually part of a club of tens of thousands of people who feel the same way every day!
According to AVG, virus protection usually doesn’t detect adware or spyware both of which can wreak havoc on a computer. Thousands of people each day are infected with malicious programs! Worry no longer and stop feeling helpless because this guide is a basic computer virus repair guide that will help you identify and remove viruses and malware.
Are You Running Antivirus Software?
If you already have virus software perform an update for the latest version and then run a system scan. If you do not have such software, download a free copy of AVG virus protection at http://www.grisoft.com/doc/40/lng/us/tpl/tpl01. This will give you free real time virus protection, email scanning and virus removal tools.
Next, download and run Ad-Aware to remove spyware, adware, and other troublesome programs http://www.lavasoftusa.com/software/adaware/. Then download SpyBot Search & Destroy http://www.safer-networking.org/en/download/index.html. By using Ad-Aware and SpyBot you will have excellent protection against files that are often missed by virus protection.
To check for and eliminate browser hijackers, download and run CWShredder at http://www.intermute.com/spysubtract/cwshredder_download.html.
With the above programs simply run a scan and follow the prompts to remove any infected files or unwanted programs. Once that is done, upgrade your operating system, or download any needed patches, then reboot your computer.
These steps won’t solve every problem, but they will fix a large percentage of the things that cause your computer to act up.
About the author:
John Lenaghan writes about solving computer problems for the Computer Help Squad website, where he provides valuable tips and advice about internet security, computer upgrades and other computer related topics.
Circulated by Article Emporium

Tuesday, October 27, 2009

Do The Media Spread Computer Viruses?

Do The Media Spread Computer Viruses?

by: Joel Walsh

Summary: Could the mass media hype about computer viruses actually make the problem worse?
If you believe what you hear in the media, there are an awful lot of viruses going around. No, I'm not talking about the make-you-sick kind of virus, though they get plenty of airtime, too. I'm talking about the kind of virus that enters via your internet connection rather than your nasal passages.
What the mainstream media often don't tell you--at least, in most radio and television newscasts and in the crucial headlines and opening paragraphs of newspaper articles-- is that many of these "viruses" are not viruses at all.
What Computer Viruses Really Are
The main reason the mainstream media always are in alarm over viruses is that they tend to call any malicious computer program a virus. In reality, there are at least eleven distinct types of malicious software, or malware, commonly affecting computers today. The most common of these are worms, Trojans, and spyware.
So, what's the difference between computer viruses and the other types of malware? The difference is that computer viruses are just about the only ones that regularly shut down computers and cause other obvious damage. The most common of the other kinds of malware--worms, Trojans, and spyware--are usually only detectable with a special scan.
The Real Danger of Computer Viruses
If the other types of malware are so unobtrusive that they can only be detected with a special scan, then what's to worry about? For starters, these programs are called malicious for a reason: they are designed to cause some kind of damage, if not to your computer, then to someone else's.
Worms are most famously used to damage, destroy, or disrupt other computer networks than the one on which the host computer is located. For instance, worms have been used by website owners to shut down rival websites by sending overwhelming numbers of requests to the computer that hosts that website. Worms have also been used to send out viruses to other computers, often without infecting the host machine--after all, what would it benefit the worm to shut down its host computer?
Trojans, in turn, are often used to insert worms and other malware on your computer, even if the Trojan itself does no damage.
But even if you don't care what happens to anyone else, you should still be concerned about one kind of malware: spyware, a kind of malware that, true to its name, collects data from your computer and sends it back to a remote host.
Most spyware is only interested in monitoring your internet usage so it can tell other programs, called adware, what advertising to popup on your computer. However, there are criminal spyware programs that steal financial data, or perform a thorough identity theft. Don't think you have personal or financial data on your computer? Some spyware programs contain a keylogger, which is a program that copies whatever you type, usually in order to snatch passwords. Even if you keep no financial information on your computer, if you ever buy anything over the web, the keylogger would allow its owner to buy stuff using the same information you typed in to buy stuff yourself.
Why Blame the Media?
Given the danger of all these different types of malware, isn't it a good thing that the mass media are becoming hysterical about it? And can't they be forgiven the sloppy reporting of calling Trojans, worms, spyware, and other malware "viruses"?
No, no, no.
This is a classic case of bad reporting doing more damage than no reporting at all. In this case, the damage bad reporting has done is to promote a common myth that goes something like this: "The only malicious software is a virus. Viruses damage your computer. Therefore, if my computer is working OK, my computer has no malicious software. I only need to scan my computer for problems when there is a sign of problems."
Thanks to this myth, many people complacently let their antivirus software go months out of date, not wanting to be bothered with scheduling an automatic update. Just as bad, many people don't have any extra software to combat the other types of malware that may not be covered by antivirus software.
In fact, it's not uncommon for people who have found malware on their computers after a scan to say, "but I never had malware on my computer before!" But how would they have known if they had never scanned!
Until the biggest mainstream media--and especially television--start educating the public about the need to have their computers automatically scanned at least daily, the world will continue to have major, drawn-out problems with malware that could have been wiped out as soon as soon as the anti-malware software makers discovered it.
And until that day, the mainstream media will have many more opportunities to run hysterical stories about "viruses," thereby forcing them to sell more newspapers and broadcast to even larger audiences of people who suck at the information trough yet somehow never become full.
About the author:
Joel Walsh writes on all types of malware for spyware-refuge.com: http://www.spyware-refuge.com?adware spyware program [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "adware spyware program" OR leave this bracketed message intact.]
Circulated by Article Emporium

Monday, October 26, 2009

Internet Security Basics 101

Internet Security Basics 101

by: Niall Roche

The explosive growth of the Internet has meant that thousands of people are today experiencing the joys of being online for the first time. With growth there always comes pain. Be it your growing pains as a child or the growth and development of this part of our culture called the Internet.
Firstly we need to quickly explain what the Internet is and where it came from. The Internet is the offspring of a military project called Arpanet. Arpanet was designed to provide reliable communication during global nuclear war. A vast network of interconnected computers was set up all over the world to allow the various branches of US and NATO forces to communicate with each other.
Nuclear war never came (thankfully) and the world was left with a massive network of computers all connected together with nothing to do. Colleges and universities started to use these computers for sharing research internationally. From there it grew and spread outside colleges to local homes and businesses. The World Wide Web was born and its father was a guy called Tim Berners Lee.
When you're connected to the Internet you're sharing a vast network with hundreds of millions of other users. This shared network provides resources that 15 years ago were never thought possible. Unfortunately when something is shared its open to abuse. On the Internet this abuse comes from hackers and virus creators. Their sole intent is to cause chaos and/or harm to your computer system and millions of other computer systems all over the world.
How do you combat this? You need an Internet security system. This might sound complicated but your Internet security system will be quite straigtforward being comprised of just 2 - 3 Internet security products. We'll look at each of these products in more detail now:
AntiVirus Software
The first and most critical element of your Internet security system is antivirus software. If you don't have up-to-date antivirus software on your PC you're asking for trouble. 300 new viruses appear each month and if you're not constantly protecting your system against this threat your computer will become infected with at least one virus - it's only a matter of time.
Antivirus software scans your PC for signatures of a virus. A virus signature is the unique part of that virus. It can be a a file name, how the virus behaves or the size of the virus file itself. Good antivirus software will find viruses that haven't yet infected your PC and eliminate the ones that have.
Antivirus software can only protect your computer from viruses trying to infect it via email, CD-Rom, floppy disk, Word documents or other types of computer files. Antivirus software alone will not keep your computer 100% safe. You also need to use firewall software.
Firewall Software
The use of firewall software by home computer users is a relatively new occurence. All Internet connections are a two way process. Data must be sent and received by your computer. This data is sent through something called ports. These are not physical things rather aspects of the way your computer communicates online.
Firewall software watches these ports to make sure that only safe communication is happening between your computer and other computers online. If it sees something dangerous happening it blocks that port on your computer to make sure your computer stays safe from the person who is trying to hack into your system.
An easier way to understand a firewall would be to picture your computer as an apartment complex. At the front door of this complex there is a security guard. Every person who enters the complex must pass this security guard. If the security guard recognizes the person entering as a resident he allows them to pass without saying anything. If, however, the person entering the complex is unknown to him then he will stop that person and ask for identification. If they have no business being at the apartment complex he escorts them from the building.
If you are not currently using firewall software your computer will get hacked into - that's a guarantee.
PopUP Blocker
You can get a good popup blocker at no cost. An easy way to do this is to install either the Google or Yahoo toolbar. Both of these come with popup blockers built in. Popups are not necessarily dangerous but are a nuisance and using either of these toolbars will make your life that bit easier.
A simple rule for practicing online security is: "If in doubt then don't". If you don't recognize the file, the email address, the website or if your gut feeling says "no" then don't click that button.
About the author:
This article was submitted courtesy of the Spyware & Malware Guide. This site is dedicated to spyware removal and just generally helping users keep their PCs spyware free.
Circulated by Article Emporium

Sunday, October 25, 2009

Does Your PC Have Worms?

Does Your PC Have Worms?

by: Joel Walsh

Worms aren't just for dogs anymore. Find out how to inoculate your computer against these nasty parasites.
What Are Worms?
Worms are descended from viruses and are even nastier. Just as ever stronger doses of pesticide breed ever more resilient locusts, better and better anti-spyware software bred ever more devious viruses.
Finally, some virus designers stopped having their creations infect and take over files the way real viruses infect and take over cells. Instead, they created programs that could stand on their own and cause plenty of trouble without the help of any other software applications. Just worms are independent organisms that can infect a host directly, so do computer worms infect computers directly.
What Do Worms Do?
Worm designers are often even more sinister than virus designers, since worm designers are not just vandals. Worm designers often use their creations to achieve specific goals:
• Backdoor creation. Worms often try to set up another kind of malware, a backdoor. A backdoor is a hidden opening in your network connection that lets the worm send data out and take data in. Practically speaking, the data it's sending out are often spam emails, and the data it takes in are instructions on spam emails to send.
• Denial of service attack. Some worm designers really are vandals rather than profit-hungry con artists sending spam. But their vandalism can be more targeted. They use worms to send out numerous requests to remote computers, such as web servers, in order to overwhelm them and therefore shut them down. This is called a denial of service attack.
• Spyware, Trojan, adware, and virus installation. Worms are often used simply to unleash other forms of malware on a computer that might otherwise block them.
• Information theft and fraud.Worms can multitask in order to set up spyware that gathers sensitive information--often financial information--and then set up backdoors, Trojans, viruses, or dialers to disseminate the stolen data.
How Do Worms End Up on a PC?
Worms enter PCs just as viruses, spyware and other malware do: any way they can! Some favorite points of entry for worms:
• Websites can actually download software to your computer without you realizing it. This software includes not only worms, but also spyware, adware, viruses, and other malware. These malware programs find their way into websites either by the deliberate design of the site owner or because hackers have installed the software on the website's server.
• Peer-to-peer file-sharing networkscontain many nice-enough-looking files that are really worms. One of the sneakiest disguises is a filename that indicates the spyware is really a video of a beautiful actress.
• Email, the favored route of viruses, can still be exploited by Spyware. But since new email programs usually block the automatic opening of file attachments, this is less of a problem than it used to be.
• Any internet connection inevitably lets data flow both in and out, and so is vulnerable to attacks by worms.
How Do You Get Rid of Worms?
There's really only one good way to make sure your computer is rid of worms: scan it with multiple antivirus and anti-spyware programs using a full-system scan. Worms are tricky, so anything less than a full-system scan might let them escape. Worse, with new worms coming out all the time, some antivirus and anti-spyware packages may not even know about a new worm until after its wreaking havoc on your machine. That's why you should try using more than one antivirus program and more than one anti-spyware program to increase your odds of successfully detecting the malware.
Don't have more than one anti-spyware and antivirus software? You'd better start downloading. After all, worms won't take excuses.
About the author:
Joel Walsh writes for http://www.spyware-refuge.comabout worm removal http://www.spyware-refuge.com?spyware anti virus [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "spyware anti virus" OR leave this bracketed message intact.]
Circulated by Article Emporium

Is Your Computer Sick?

Is Your Computer Sick?

by: Jim Edwards

© Jim Edwards All Rights Reserved
http://www.thenetreporter.com
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Viruses and spyware usually show up on your computer one of
two ways.
Either they invade your system with a frontal assault like
the Huns attacking the Romans, or they sneak in a back door
like a cat burglar.
Either way, once a virus or piece of spyware gets on your
system, getting it off can rate harder than curing a severe
case of trench foot!
Viruses, malicious programs designed to disrupt normal
computing, and spyware, programs intended to literally "spy"
on your activities, can enter your computer a number of
ways.
Most commonly they enter your system through an email
attachment, by sharing files with an infected computer by
disk, as a "ride along" with a 3rd party program you
install, or through a "back door" port in your computer.
Regardless of how they get on your system, once in place,
they cause no end of headaches and frustration.
The following represent typical signs you may suffer from
infection by a virus or piece of spyware.
Your computer starts acting oddly by doing things it never
did previously.
Your modem starts trying to dial out to the Internet without
you initiating a surfing session.
You notice that files start disappearing, the system stalls,
runs slowly, or even crashes frequently.
Your computer takes progressively longer to boot up every
time you start it or you notice that your available hard
drive space has disappeared. Strange popup windows appear,
even when you're not surfing the web, or you delete a
program and it "magically" reappears next time you boot the
system.
If you suspect you a virus or a piece of spyware has invaded
your computer, follow these steps to first identify and then
delete the offending code:
Step 1 - Back up your important files, but remember to scan
these files for viruses before reinstalling to avoid
accidentally re-infecting your system.
Step 2 - Update your anti-virus definitions and perform a
scan of your hard drive.
If you don't carry virus protection, or you suspect your
anti-virus software got corrupted somehow, then log on to
www.pandasoftware.com and use the free Panda Active Scan
service to check your hard drive for viruses.
Follow the instructions for quarantining and removing the
offending files.
Step 3 - Scan your hard drive with an adware, scumware, or
spyware detection and removal tool like Adaware
www.lavasoft.de/support/download/ or Spybot
http://spybot.safer-networking.de/.
Step 4 - In many cases, when the virus or spyware program
gets installed with a free utility or game you download from
the Web, you must usually uninstall the utility or game to
finally get rid of the problem once and for all.
Step 5 - Avoid re-infection by keeping your anti-virus and
firewall up-to-date at all times.
As a last resort, if you run into a program you simply can't
get rid of, but can figure out the offending file's name, do
a search for the file name on Google.com. Often you will
find you're not the first victim and may get valuable advice
for cleaning up your system.
However, be very careful of the information you find and
think twice before modifying any system files.
About the author:
Jim Edwards is a syndicated newspaper columnist and the
co-author of an amazing new ebook that will teach you how
to use fr^e articles to quickly drive thousands of targeted
visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to
your website for weeks, even months... without spending a
dime on advertising! ==> http://www.turnwordsintotraffic.com
Circulated by Article Emporium

Saturday, October 24, 2009

Basic Steps To Optimize Your Internet Security

Basic Steps To Optimize Your Internet Security

by: Popescu Alexandru

After seeing many people complain about their weak Internet security I decided to write down some things that will help you for your Internet security.
First, here are some tips to make windows safer :
For basic security and update patches install Service Pack 2 for Windows XP or Service Pack 4 for Windows 2000.
Once a month use Windows Update so you can get the latest pacthes.
When you download software from the Internet make sure you download it from the original website.
Always run anti Trojan and anti virus software.
Even if you don't use it you have to make your Internet Explorer as safe as possible.
When you access the Internet you are browsing the web using a browser such as Internet Explorer.The Internet Explorer contains several security vulnerabilities. You should make it as safe as possible or switch your default browser to an alternative. You will have to set some options from the Manage Add-Ons in the Internet Options. You will see a list of add-ons that can be activated or deactivated. If you see any unusual entries just deactivate them so you can be sure you don't have a trojan/worm.
Under Internet Options -> Security -> Internet -> you will see the Edit Level.You should set it to high in order to disable most of the security threats.
Your Web Browser should be ok now. Let's see what we have to do from our email point of view.
Because it's built-in in their Windows system lots of users like to use Outlook Express for emailing. But it's a fact that it contains many security vulnerabilities so I advise you to use alternatives. If you use a web based Email (you can browse your email with your web browser) you can delete viruses even if you don't download them to your PC.
Make sure you have installed an Anti Virus for 100% virus protection. One that I've found to be very good and never disappointed me is the AVG Anti virus. If you take the time to regularly update it you will be safe enough with it.
Lots of people install Firewalls because they belive their Internet security will be higher. I personaly disagree. If you do not know how to best configure it, and you have to know much about the tech behind it to do so, it will just make your PC slow and software not working.You can just use the Windows XP SP2 firewall for basic security.
All this tips should make your PC safer. I browse the Internet every single day for some time now and they worked great for me. I haven't met a virus/worm for some time now.


About the author:
DSW Distribution Ltd has all you need for your internet security: mcafee antivirus, norton antivirus 2005, microsft office 2003 standard edition, panda antivirus, windows xp and many more ...Visit us at http://www.dswtrade.com
Circulated by Article Emporium

Friday, October 23, 2009

The never ending Spyware……story

The never ending Spyware……story

by: Doug Woodall

It’s been with us since 1993, it’s gotten more intrusive, more complicated.
It’s created a whole ecosystem, so to speak.
A person sits somewhere, writing a new virus, a new application of Spyware. It is put onto the Internet and Anti-Virus and Anti-Spyware vendors begin to develop definitions to combat it, maybe even to stop it permanently. These fixes are incorporated into the new versions of the software they sell, or distribute as freeware.
Existing companies, businesses, and users struggle to keep up with what to use, overwhelmed, their lifeline to the Internet depends on it. In this portion of the ecosystem you have;
The end user. YOU!
Your Internet Provider, Hosting Service, ect.
The businesses on the Internet, all of em.
The existing companies and vendors providing the Anti-Virus and Anti-Spyware Programs.
Adding to this ecosystem, new companies start up to get into the rapidly exploding business, marketing their own software.
More additions occur as new businesses start up to sell the software the companies have produced.
New and old online users buy upgraded and new software to try and protect their personal information from being stolen. Interlaced into all the above is the knowledge required to know how to protect ourselves with the basics. A hardware or software Firewall, Anti-Virus and Anti-Spyware.
Whew! Ok, rest.
Point to ponder while resting….recent eWeek.com tests reveal that some Vendors are failing to provide solutions when it comes to finding and permanently destroying Viruses and Spyware.
Rested? Then let’s look at it from another angle shall we?
Without the person somewhere in the world writing the virus or Spyware, there would be no need for the person that is writing the program to combat it. There would be no need for the company that employs the person writing the programs to combat the virus or Spyware. No need for the Businesses that sell the programs the company markets.
Still with me? Good. And finally,
No need for the user, you, to protect yourself.
I hope this lil exercise has proved informative.
Take Care.
About the author:
About the Author:
Doug Woodall has a website at http://www.spywarebiz.com
There he provides free information and recommended products to combat Spyware.
He is a member of the IWA (International Webmasters Association)
Doug can be reached at spywarebiz@comcast.net.
Article edited for proper content by Wendy McCallum
Permission to copy ok as long as about author info remains with article.
Copyright 2005 SpywareBiz
Circulated by Article Emporium

Alien Intruders!

Alien Intruders!

by: Seamus Dolly

You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.
Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.
So what is a virus?
A virus is a program that can self replicate or reproduce itself.
These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.
They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.
A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.
Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation
A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.
What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.
Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them. If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.
Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.
Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.
Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs.
Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.
These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.
If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.
Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.
Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.
Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.
Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.
Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.
Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently(not faster), through experience.
About the author:
Seamus Dolly is the webmaster at www.CountControl.com
Circulated by Article Emporium

More Free Tools Increase Security For Your PC

More Free Tools Increase Security For Your PC
by: Jim Edwards
- by Jim Edwards
(c) Jim Edwards All Rights Reserved
http://www.thenetreporter.com
=====================================
A recent article about preventing hackers from breaking
into your computer caused an overwhelming response by
readers.
It seems everyone has an opinion about the best software
and advice for keeping your computer safe from viruses and
online predators. The following will help you increase your
online security and usually without spending a dime!
Zone Alarm
Zone Alarm offers several versions of their
popular firewall software with various options for
increased security. The basic firewall software comes free
of charge and ranks among the most highly rated firewalls
available. The paid version helps you to eliminate
everything from pop-up windows to unwanted advertising and
also helps you track hackers back to their source.
Visit www.zonealarm.com to download your copy today,
especially if you don't already carry a firewall on your
system.
The Guru Of Security
Visit www.grc.com if you want a real "eye opener!" Frankly,
some of the things I saw on this website shocked me. I had
no idea so many potential problems existed for breaches in
your online security.
But what also shocked me was how simple most of the "fixes"
rate for securing your computer against attack. It became
very apparent to me that most computer hackers don't
exploit hardware or software weaknesses, they actually
exploit our ignorance about the simple steps we should take
to protect ourselves and others.
When you visit www.grc.com you'll see the site covers a lot
of ground. Since you might find it easy to get sidetracked
with all the interesting information, make sure to
specifically check out the "Shields Up!" area. This section
offers two comprehensive tests of your Internet connection
to check for the typical points of entry used by hackers.
The first test, "Test My Shields," checks the security of
your Internet connection itself and how much system and
personal information others can obtain without your
knowledge.
The second test, "Probe My Ports," attempts to find open
ports on your computer and evaluate how and where a hacker
could enter.
Both tests will help you spot the most common and obvious
vulnerabilities most of us face when connected to the
Internet. Also to its credit (and unlike similar sites),
this website doesn't use these tests as a lead-in to try to
sell you anything.
Free Anti-Virus Software
Visit www.grisoft.com to download a free anti-virus
software package that rivals anything you could buy. The
software comes with free updates on virus definitions
(critical for up-to-date protection) and will even certify
your outgoing email as virus free!
I have used this software myself and, though nothing rates
perfect, I have found it rivals products costing $50 or
more. If you don't carry virus protection software on your
computer, stop this minute and go to www.grisoft.com to
download the free version now.
With so many resources and advice available for free, no
valid excuse exists for not immediately securing your
computer against hackers, vandals, viruses and malicious
code.

About the author:
Jim Edwards is a syndicated newspaper columnist and the co-
author of an amazing new ebook that will teach you how to
use free articles to quickly drive thousands of targeted
visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to
your website for weeks, even months... without spending a
dime on advertising! ==> "Turn Words Into
Traffic"

Circulated by Article Emporium

How to thwart the Barbarian Spyware!

How to thwart the Barbarian Spyware!
by: Doug Woodall
Today,on most internet user's computers, we have the
ability to employ software, along with our
intelligence, to prevent viruses and spyware.
To put this article into proper perspective, we'll use
Medieval defense tactics.
This is accomplished by 3 methods. First, a firewall...
'The Castle Moat' so to speak. A firewall can't see
inside your computer beforehand though, so if any viruses
or spyware were present before the firewall was installed
then its of no use. Of course, its extremely good at preventing new
attacks.
Second, a anti-virus program.... 'The Castle Drawbridge!
They will not provide much help with spyware, but good
virus protection is as desirable as one of Avaris's
dreams! One drawback can be the updates, of course.If
you've just updated Wednesday night and a virus hits the
next day, then you may not be protected till next
Wednesday night, and by then it may be too late. If you're
smart, you will have signed up for email alerts with
the provider, or even better, you'll have a anti-virus
program that has a real time update feature. I get the
tingles when I see that little pop-up saying a update
is available and click here. Its downloaded ,installed,
and updated in about 20 seconds! A new virus or Trojan or
God forbid, a new keylogger can hit the internet and spread
in a matter of days, and I'm sure this must make the definition
writers lives a living hell. I have great admiration for
them as they could have been wealthy doctors, but they have
chosen to help us... the end users. (moment of silence here)
Last, we have anti-spyware programs,'The Flaming oil'! (my favorite).
Their update features are like the anti-virus programs,
so you have to be as vigilant with this method of defense
too as you would be with the others. I've heard there are
people out there that don't even know when their
updates run, or even if its configured to do so! I
refuse to believe this sordid rumor!
So you've got your defenses set up, you're looking good.
But the best defense is a good offense, attack!
That's what some organizations do. They prowl the net
looking for websites that harbor drive-by downloads,
URL Re-Directing and such. When they find them, they
shut them down, or report them so effective protection
can be manufactured. These people have my sincere
thanks for what they do. With identity theft on the
rise and Websense reporting that the average computer
has 28 items of Spyware on it, we need all the help we
can get. Oh sure, you're saying not my computer !
Well, lets discuss those little boxes that you click
"I Agree" to when you download something. Do you read
the entire statement? This is one way spyware has
become so rampant, because so many downloads have extra
software included in them. These can be harmful to
your computers well being. KeyLoggers, popups, adware, malware...
Need I go on?
So my idea is that we need these shining knights from the
castle to journey forth on a quest. They will be
little robots or spiders like the search engines use.
They will be given absolute power over harmful
programs they find. They will be like Gort in the
movie "The Day the Earth Stood Still".
Dell recently reported that 12% of their calls were
for spyware damage, Microsoft says half of their
reports of system crashes are caused by spyware. These
calls cost these companies millions of dollars in
revenue, which they then pass the costs of onto us,
the consumers.
Who knows, if viruses and spyware ever get controlled,
the average computer may only cost a dollar!
About the author:
About the Author: Doug Woodall has a web site at http://www.spywarebiz.com
There he provides free information and recommended products to combat Spyware.
His Website is recognized by Learning Fountain and ISafe
Doug's Articles have earned him Trusted Author Status at ImpactArticles.com
He is a member of the IWA (International Webmasters Association)
Article edited for proper content by Wendy McCallum
Permission to copy ok as long as about author info remains with article.
Copyright 2005 SpywareBiz
Circulated by Article Emporium

Thursday, October 22, 2009

3 Summer Computer Tips

3 Summer Computer Tips
by: Sharron Senter
Written By: Sharron Senter
#1 – Summer Computer Travel
Holiday travelers should be on alert when arriving home from long weekends, such as the Fourth of July, a popular time for computer viruses to spread.
Most computer users have a tendency to turn off their computers when away on trips, which means you’re not getting newly-released anti-virus patches or anti-spyware updates; the two most common areas that cause computers problems. We recommend you update anti-virus and anti-spyware scans before opening e-mail or going online after an extended absence.
We consistently see an increase in calls for virus related problems immediately following long weekends. Avoid the problems altogether by updating your security software before using your computer. For a free listing of viruses, spyware threats and trends, visit: www.VisitingGeeks.com/downloads.htm
#2 -- Should You Leave Your Computer Running?
One question we hear frequently is, "Should I leave my desktop computer on or turn it off?"
There are 2 schools of thought…
Turning it on and off numerous times during the day subjects the microcircuits to flexing and fatigue due to change in temperatures. Over time this could lead to a break in the circuitry and result in system failure.
Leaving the computer on all the time puts excess wear on the mechanical components (the hard drive spindle motor and cooling fans).
Best compromise. First user in the morning turns it on; last user turns it off.
We leave our desktops on all the time allowing for scheduled utility tasks to run during overnight hours. We also restart the systems (to flush the RAM and reset the operating system) on a regular basis and routinely remove the case covers to clean out any dust that may have accumulated, especially around the fans and screens.
#3 -- Stop Popups!
Never click inside the window of a popup. Instead, close it by clicking on the X in the upper right corner. Many people are fooled into installing spyware applications by popups that promise to clean their system. If you receive a message saying it can help, assume it’s spyware and don’t click!
About the author:
About the Author
Sharron Senter is co-founder of http://www.VisitingGeeks.com- an on site computer repair, security and networking company serving north of Boston, Southern NH and Maine. Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster. Learn more about Sharron at http://www.SharronSenter.com
Circulated by Article Emporium

How To Take Care Of Your Laptop Computer

How To Take Care Of Your Laptop Computer
by: Joe Chianese
As the proud owner of a laptop computer, you'll want to keep
your machine in the best possible condition.
Aside from cleaning your screen and dusting the keyboard,
however, you'll need to take a few extra steps to maintain
your laptop's health:
-- Play it cool
A laptop computer generates a lot of heat, especially when
running the latest high-powered software. Too much heat and
you risk damaging the internal circuitry.
Always try to keep your laptop in a well-ventilated, cool
environment. And ensure you don't block the fan grills on
the sides, back, or bottom of the machine at any time.
-- Handle the screen carefully
Avoid touching or playing with your LCD screen.
Yes, it might be fun to watch the waves generated by your
finger against the screen, but LCD displays are fragile
devices that must be cared for.
Take care when cleaning the screen too, and use only
approved cleaning materials.
You won't want to pay the money for screen repairs or, even
worse - a new machine entirely.
-- Don't drop it
Whatever you do, don't drop your laptop computer! Keep it
safe inside of a carrying case when moving around or
traveling.
Don't leave it on the edge of a table or on an unstable
support of some kind. One ill fated drop to the floor could
spell death for your mobile office.
Try to make sure the rubber feet underneath are in good
condition and are still attached. This will prevent the
device from sliding around accidentally.
-- Be careful with those drinks...
If you need to have a drink while working or playing, be
careful not to spill it.
Your laptop computer could suffer the consequences from just
a few drops of liquid poured in the right places.
While you probably do eat and drink around it regardless,
you will want to occasionally wipe down the edges, the
keyboard, the touchpad, and maybe even wipe down the screen
to keep any dirt from accumulating.
-- Just say no to viruses
Security wise, make sure you obtain an anti-virus program.
Secondly, keep it updated!
Buying an anti-virus one month and not updating it for the
next six really negates it purpose. Your laptop computer
could be exposed to hundreds and thousands of new viruses
every month if you don't update your virus definitions.
Most anti-virus programs have automatic update methods,
eliminating the need for you to have to remember to do it
manually.
-- Avoid Popups
Pop-ups are particularly annoying on a laptop computer.
Trying to close a bunch of windows without a regular mouse
can be a nuisance.
You'll want a pop-up blocker, such as the Google Toolbar
(located at http://tools.google.com), to prevent these pop-
up ads.
Many intrusive forms of advertising, and even some viruses,
can install software on your machine by using various forms
of pop-ups. It's best to get yourself a blocker and avoid
the situation entirely.
-- Use a firewall
Always utilize a firewall on your Internet or network-
enabled laptop computer. Even if you use Windows XP's built-
in firewall (or purchase one from such companies as Norton),
your security will greatly benefit from it.
Blocking out all the unnecessary ports and closing all the
loopholes will prevent a hacker or virus from freely
entering your hard drive.
So there you go. Combine all of the above tactics and help
your laptop enjoy a happier and healthier lifestyle!
About the author:
Joe Chianese is a technical writer and frequent contributor to HowToBuyALaptop.com For advice on how to find the right laptop computer for you, visit: http://HowToBuyALaptop.com
Circulated by Article Emporium

Protection for your computer system - Painless and free !

Protection for your computer system - Painless and free !
by: John Roberts
Painless (and FREE) P.C. Protection
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it’s Security and Performance.
You can do something about it and you can do it FREE, using some or all of the following programs and tips.
Anti-Virus protection.
One of the best Free programs for this is AntiVir Personal Edition Anti-Virus software. Download it from:
http://www.free-av.com
Install on your PC and leave it running to block any incoming bugs or viruses! It can also be used to scan your system for any previous invasions, but be patient, this takes about 15 minutes to complete. Worth running periodically, to check all is ok.
FireWalls and Broadband.
If you are on Broadband, consider using Firewall software. Most good ISP’s now supply free. (eg AOL). If yours doesn’t, you can get a reasonably good Free personal firewall system from ‘ZoneAlarm’ at http://www.zonelabs.com .
Tip – DON’T leave your PC connected to the Internet when you are not using it! Reduce the chance of something loading while you are not monitoring things !
SpyBot finders and Ad blockers.
Various programs available on the web, both ‘Paid’ and ‘Free’. You can get good results from using 2 Free packages that are available. These are ‘SpyBot Search & Destroy’ and ‘Ad-Aware’. Downloads available at
http://www.lavasoft.de for AD-Aware
http://www.safer-networking.org for SpyBot
Using both of these packages ensures that, you get with one, any ‘bots’ that the other one misses.
Suspect you have a virus ?
If you think you already have a virus, a good Free tool for checking and killing them is McAfee Stinger. Free download at:
http://us.mcafee.com/virusInfo/default.asp?id=stinger
Some General Tips
Get in the habit of , every time you disconnect from the web, deleting ALL files from the following folders:
C:/WINDOWS/Cookies
C:/WINDOWS/Temporary Internet
Beware ‘Boys Toys’ and ‘Freebies’! Think, if someone wants to spread a bug, get tracking software onto your PC etc, the best place for them to do it is places where you go to get ‘freebies’ to download! The above sites are normally ‘ad free’, but be aware that if you download porn, free music, free games, free software, there is often a ‘price’ to pay. Always use the above programs after visiting ANY of these sorts of sites!

About the author:
John Roberts ia a freelance Training Consultant and Director of JayrConsulting Ltd http://www.jayrconsulting.co.ukJohn is an active member of TrainerBase at http://www.trainerbase.co.uk and is always open to discuss any training related issues
Circulated by Article Emporium

Internet Scams 102 -- Hijackings and Spyware

Internet Scams 102 -- Hijackings and Spyware

by: Janette Blackwell

My friend Janice is afraid to go on the Internet because of the terrible things that might happen to her. She views a simple trip to get e-mail the way she views going alone, late at night, to a dangerous part of town.
Please . . . it’s not that bad. Though, come to think of it, it’s ALMOST that bad: hijackers can now do things to people who already have antivirus and anti-spyware programs. To people who have carefully NOT clicked on scam e-mails. Some hijackers can disable your firewall, your antivirus software, and your spyware killers. Or they can prevent antivirus and spyware from being updated.
But there are solutions. Here’s what you do:
HIJACKINGS
You know you’ve been hijacked if your start page is different and if you keep getting things you didn’t intend to get -- frequently pornographic sites and popup ads. You change things back the way they were, but they won’t stay changed.
These nasties nabbed you through a security hole in Microsoft Windows. If you haven’t been caught and don’t want to be, http://www.spywareinfo.com/articles/hijacked/prevent.php says,
“First and most simply, stop using Internet Explorer. If you use either Mozilla, Firefox or Opera, you are immune to virtually all browser hijackers.”
Actually, it’s not that simple. There are ways scammers can get around Firefox. Microsoft is also busy locking its barn doors, though I’m afraid the horse has already been stolen.
If you decide to stay with Internet Explorer, be sure to keep it up to date, especially with what they call “critical updates.”
PREVENTING ATTACKS
The most basic and most necessary protection, one you’ve probably installed already, is antivirus protection. The antivirus programs upgrade constantly to protect us from the latest viruses. Norton is the most common, and a good choice. If you prefer a simple, uncomplicated solution, go to the site that sells Norton, http://symantec.com/, and download all the antivirus protection you want.
If you’re a thorough person, however, one who wants to learn about all the options, go to http://antivirus.about.com/od/antivirussoftwarereviews/, and you will learn of problems and solutions you never dreamed existed.
WHAT YOU GET FOR NOTHING IS NOTHING -- OR WORSE
Unfortunately, an antivirus program alone is not enough these days. You need ANTI-SPYWARE.
Because the latest hijackers can disable anti-spyware -- AND keep you from downloading updates -- you want some that is really, really good. The techie who manages my website says, “Get something that can WARD OFF attacks, not just remove them after they’ve infected you. Once really vicious spyware is on your machine, it may be impossible for anyone but an expert to remove it.”
“But what about all the free anti-spyware?” you ask. If you go to http://www.apcug.net/Reports/Editorial/2004.htm, you’ll see under December 2004 an article “Beware of SCUMWARE Pretending to be Anti-Spyware” which tells one man’s experience. Sometimes what you get for nothing is nothing. Or worse than nothing.
When my computer ran slower and slower, some parts of my website disappeared, and question marks appeared all over my website homepage, I yelped for help. Should have yelped sooner, but better late than never. Asked my website manager what he uses. He uses Lavasoft’s PROFESSIONAL program of Ad-Aware and Ad-Watch. I bought it, and it found 17 pieces of spyware (Alexas and tracking cookies), plus a possible browser hijack attempt. (The techie said, “That’s nothing. They found 83 pieces of spyware on mine!” But then he’s a pro.) Ad-Aware removed all the problems except the question marks on my website home page, http://foodandfiction.com/Entrance.html. These are probably due to the attempted hijack. I’m stuck with them. Fortunately they don’t show on any computer except mine.
If you want to lead a simple life, come here to http://lavasoft.com and download their PROFESSIONAL type of Ad-Aware and Ad-Watch.
If you prefer an in-depth investigation of anti-spyware,
http://www.pcworld.com/reviews/article/0,aid,119572,00.asp can help you. They’ve tested most of the anti-spyware out there, though I must say that Ad-Aware’s pro version was not tested, only the pc version.
Just don’t wait until you’re in big trouble. Do something now!
IF YOU’VE BEEN HIJACKED
A good, basic article can be found by going to http://www.apcug.net/Reports/Editorial/2004.htm. Scroll down to September 2004 and download “Help! I’ve Been Hijacked . . .”
Another good article is, “How to Remove Adware and Spyware,” http://antivirus.about.com/od/securitytips/a/removespyware.htm.
You might also read “Invasion of the Browser Snatchers” at
http://www.pcworld.com/news/article/0,aid,84464,tk,dn021402X,00.asp. The article will explain how to undo the damage -- although some hijack damage can’t be removed that easily.
MORE INFORMATION
Here are more good sources of spyware information:
http://www.scumware.com/ - a website about nothing else but.
http://www2.spywareinfo.com/category/news/ has fascinating current Internet security news flashes, which you will enjoy if you like to feel that civilization as we know it is under constant threat.
About the author:
Find the best recipe, food gift, and healthy dieting sites in Janette Blackwell’s Delightful Food Directory, http://delightfulfood.com/main.htmlOr enjoy her country cooking at Food and Fiction, http://foodandfiction.com/Entrance.html
Circulated by Article Emporium