Saturday, October 31, 2009

Computer-Virus Writer's: A Few Bats In The Belfry?

Computer-Virus Writer's: A Few Bats In The Belfry?

by: Dean Phillips

"Male. Obsessed with computers. Lacking a girlfriend. Aged
14 to 34. Capable of creating chaos worldwide."
The above description is the profile of the average computer-virus writer, according to Jan Hruska, the chief executive of British-based Sophos PLC, the world's fourth-largest anti-virus solutions provider.
"They have a chronic lack of girlfriends, are usually
socially inadequate and are drawn compulsively to write self-
replicating codes. It's a form of digital graffiti to them,"
Hruska added.
To create and spread cyber infections, virus writers explore
known bugs in existing software, or look for vulnerabilities
in new versions.
With more and more new OS (operating system) versions, there
will be more new forms of viruses, as every single software
or OS will carry new features, and new executables that can
be carriers of the infection.
Executables are files that launch applications in a
computer's operating system, and feature more prominently in
new platforms like Microsoft's Windows 2000 and Windows XP
than they did in the older DOS or Windows 3.1.
Virus writers also share information to create variants of
the same infection, such as the Klez worm, which has been
among the world's most prolific viruses.
The Klez, a mass-mailing worm that originated in November
2001, propagates via e-mail using a wide variety of messages
and destroys files on local and network drives.
But the news gets worse. Recent events have uncovered what
may be a new trend: spammers paying virus writers to create
worms that plant an open proxy, which the spammer then can
use to forward spam automatically. Many suspect this
occurred with the SoBig virus.
The Sobig worms, began spreading in the early part of
2003. The unusual thing about them was they contained an
expiration date and were given a short life cycle to see how
features worked in the wild.
Having an expiration date also makes the virus more
dangerous, because most people would have been alerted to
the new worm within a few weeks and anti-virus definitions
would have been updated.
A variant of Sobig, Sobig-F was so efficient that just a few
infected machines could send thousands of messages. Sobig-F
created a denial-of-service effect on some networks, as e-
mail servers became clogged with copies of the worm.
According to Mikko Hypponen, manager of anti-virus research
for Finland-based F-Secure Corp, Sobig-F sent an estimated 300 million copies of itself.
Computer Economics, Inc. states, "Nearly 63,000 viruses have
rolled through the Internet, causing an estimated $65
billion in damage." However criminal prosecutions have been
few, penalties light and just a handful of people have gone
to prison for spreading the destructive bugs.
Why is so little being done? Antiquated laws and, for many
years, as crazy as it sounds, a "wink, wink" or even admiring attitude toward virus creators.
One person has been sent to prison in the United States and
just two in Britain, authorities say. But the low numbers
are "not reflective of how seriously we take these cases,
but more reflective of the fact that these are very hard
cases to prosecute," said Chris Painter, the deputy chief of computer crimes at the U.S. Department of Justice.
So what can you do to protect yourself against computer viruses?
Well, first and foremost, make sure you have proven anti-virus protection like like Symantec's Norton Anti-Virus or McAfee's ViruScan.
In addition, If you haven't already done so, I highly recommend installing Microsoft's Service Pack 2. SP2 tightens your PC's security with a new Windows Firewall, an improved Automatic Updates feature, and a pop-up ad blocker for Internet Explorer. Plus, the newly minted Security Center gives you one easy-to-use interface for keeping tabs on your PC's security apps.
"Male. Obsessed with computers. Lacking a girlfriend. Aged
14 to 34. Capable of creating chaos worldwide."
Now, I'm no psychiatrist, but to me, the above description
sounds more like someone with a few "bats in the belfry!"
About the author:
Dean Phillips is an Internet marketing expert, writer,
publisher and entrepreneur. Questions? Comments? Dean can be
reached at mailto: dean@lets-make-money.net
Visit his website at: http://www.lets-make-money.net

Help Keep the Computers on Earth Clean and Healthy

Help Keep the Computers on Earth Clean and Healthy

by: Jesse S. Somer

“Aaaaaahhhhhh! I’ve been invaded by a virus!” Getting a virus means getting sick and no one in their right mind wants to be ill. Well, now that computers have become our close friends, it’s a shock to learn that foreign bodies too can invade them with malicious intent. No, your computer doesn’t get a runny nose or diarrhea. This is a sickness that stops your friend from functioning properly, sick in bed, incapacitated.
Well in Nature viruses occur from a power outside of our control. But, with computers it’s different, humans, mean or ignorant humans are creating these viruses. Why? Usually these are disgruntled people who want to wreak some havoc on others or companies that they feel have done wrong to them. In any case we have to be in the know and prepared to deal with these debilitating scourges.
There are many ways to approach the protection of your computer. First of all there’s the step of awareness. Be aware of how viruses are transmitted. You can catch them from a disc but in most cases it is through your email system. Check your email carefully. Be very wary of anything that has an attachment. Check whom it’s from and look at the title of the mail, is it something you were expecting? Even if it’s from someone you know, be careful as their computer could be infected and the virus being transmitted without their knowledge.
Next, read the cover message, you can’t catch the disease without actually opening the message. Look at the name of the attachment; remember viruses are written to entice you. Beware of free offers and generally anything from people you don’t know, as well as messages that sound irrelevant to your contact’s usual style. Delete them straight away. Delete, delete, delete. This will ensure you of a lower risk of infection. You can even send the message back to the sender without opening it to make sure it is valid.
Now for the heavy protection: Virus scanning and virus protection software, and rescue discs are all readily available and easily utilized. Some are free, and others are obtained for a very small charge. Most software manufacturers offer subscriptions for updating services, which automatically download protection to the latest viruses.
There are two main types of virus scanning software: one searches through your entire computer files looking for recognizable viral signatures, the other scans your incoming and outgoing emails. Alerts will show you when a file needs to be erased or repaired. If you do receive a virus that none of the software can repair you can send a copy of it to a company like Symantec who will be happy to develop a cure for it.
The main message here is not to get too worried about your good friend Mrs. PC getting ill or sick. The humans are on top of the case and they seem much better adapted at fixing their technology than they are at beating the viruses that attack our physical bodies. If only we could cure human virus and illness as easily as we solve the problem of computer sickness.
About the author:
Jesse S. Somer
M6.Net
http://www.m6.net
Jesse S. Somer is an analyst hoping to show fellow humans how far the computer age has come in terms of its strengths and weaknesses.
Circulated by Article Emporium

Wednesday, October 28, 2009

Keeping it Clean: Virus Removal Basics

Keeping it Clean: Virus Removal Basics

by: John Lenaghan

The day you learn your computer is infected with a virus or spyware is a lonely yet aggravating day. You’ll be angry that you fell victim, and may feel helpless because of your lack of knowledge about virus removal or pc repair. But don’t worry - you’re not alone! Unfortunately, you’re actually part of a club of tens of thousands of people who feel the same way every day!
According to AVG, virus protection usually doesn’t detect adware or spyware both of which can wreak havoc on a computer. Thousands of people each day are infected with malicious programs! Worry no longer and stop feeling helpless because this guide is a basic computer virus repair guide that will help you identify and remove viruses and malware.
Are You Running Antivirus Software?
If you already have virus software perform an update for the latest version and then run a system scan. If you do not have such software, download a free copy of AVG virus protection at http://www.grisoft.com/doc/40/lng/us/tpl/tpl01. This will give you free real time virus protection, email scanning and virus removal tools.
Next, download and run Ad-Aware to remove spyware, adware, and other troublesome programs http://www.lavasoftusa.com/software/adaware/. Then download SpyBot Search & Destroy http://www.safer-networking.org/en/download/index.html. By using Ad-Aware and SpyBot you will have excellent protection against files that are often missed by virus protection.
To check for and eliminate browser hijackers, download and run CWShredder at http://www.intermute.com/spysubtract/cwshredder_download.html.
With the above programs simply run a scan and follow the prompts to remove any infected files or unwanted programs. Once that is done, upgrade your operating system, or download any needed patches, then reboot your computer.
These steps won’t solve every problem, but they will fix a large percentage of the things that cause your computer to act up.
About the author:
John Lenaghan writes about solving computer problems for the Computer Help Squad website, where he provides valuable tips and advice about internet security, computer upgrades and other computer related topics.
Circulated by Article Emporium

Tuesday, October 27, 2009

Do The Media Spread Computer Viruses?

Do The Media Spread Computer Viruses?

by: Joel Walsh

Summary: Could the mass media hype about computer viruses actually make the problem worse?
If you believe what you hear in the media, there are an awful lot of viruses going around. No, I'm not talking about the make-you-sick kind of virus, though they get plenty of airtime, too. I'm talking about the kind of virus that enters via your internet connection rather than your nasal passages.
What the mainstream media often don't tell you--at least, in most radio and television newscasts and in the crucial headlines and opening paragraphs of newspaper articles-- is that many of these "viruses" are not viruses at all.
What Computer Viruses Really Are
The main reason the mainstream media always are in alarm over viruses is that they tend to call any malicious computer program a virus. In reality, there are at least eleven distinct types of malicious software, or malware, commonly affecting computers today. The most common of these are worms, Trojans, and spyware.
So, what's the difference between computer viruses and the other types of malware? The difference is that computer viruses are just about the only ones that regularly shut down computers and cause other obvious damage. The most common of the other kinds of malware--worms, Trojans, and spyware--are usually only detectable with a special scan.
The Real Danger of Computer Viruses
If the other types of malware are so unobtrusive that they can only be detected with a special scan, then what's to worry about? For starters, these programs are called malicious for a reason: they are designed to cause some kind of damage, if not to your computer, then to someone else's.
Worms are most famously used to damage, destroy, or disrupt other computer networks than the one on which the host computer is located. For instance, worms have been used by website owners to shut down rival websites by sending overwhelming numbers of requests to the computer that hosts that website. Worms have also been used to send out viruses to other computers, often without infecting the host machine--after all, what would it benefit the worm to shut down its host computer?
Trojans, in turn, are often used to insert worms and other malware on your computer, even if the Trojan itself does no damage.
But even if you don't care what happens to anyone else, you should still be concerned about one kind of malware: spyware, a kind of malware that, true to its name, collects data from your computer and sends it back to a remote host.
Most spyware is only interested in monitoring your internet usage so it can tell other programs, called adware, what advertising to popup on your computer. However, there are criminal spyware programs that steal financial data, or perform a thorough identity theft. Don't think you have personal or financial data on your computer? Some spyware programs contain a keylogger, which is a program that copies whatever you type, usually in order to snatch passwords. Even if you keep no financial information on your computer, if you ever buy anything over the web, the keylogger would allow its owner to buy stuff using the same information you typed in to buy stuff yourself.
Why Blame the Media?
Given the danger of all these different types of malware, isn't it a good thing that the mass media are becoming hysterical about it? And can't they be forgiven the sloppy reporting of calling Trojans, worms, spyware, and other malware "viruses"?
No, no, no.
This is a classic case of bad reporting doing more damage than no reporting at all. In this case, the damage bad reporting has done is to promote a common myth that goes something like this: "The only malicious software is a virus. Viruses damage your computer. Therefore, if my computer is working OK, my computer has no malicious software. I only need to scan my computer for problems when there is a sign of problems."
Thanks to this myth, many people complacently let their antivirus software go months out of date, not wanting to be bothered with scheduling an automatic update. Just as bad, many people don't have any extra software to combat the other types of malware that may not be covered by antivirus software.
In fact, it's not uncommon for people who have found malware on their computers after a scan to say, "but I never had malware on my computer before!" But how would they have known if they had never scanned!
Until the biggest mainstream media--and especially television--start educating the public about the need to have their computers automatically scanned at least daily, the world will continue to have major, drawn-out problems with malware that could have been wiped out as soon as soon as the anti-malware software makers discovered it.
And until that day, the mainstream media will have many more opportunities to run hysterical stories about "viruses," thereby forcing them to sell more newspapers and broadcast to even larger audiences of people who suck at the information trough yet somehow never become full.
About the author:
Joel Walsh writes on all types of malware for spyware-refuge.com: http://www.spyware-refuge.com?adware spyware program [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "adware spyware program" OR leave this bracketed message intact.]
Circulated by Article Emporium

Monday, October 26, 2009

Internet Security Basics 101

Internet Security Basics 101

by: Niall Roche

The explosive growth of the Internet has meant that thousands of people are today experiencing the joys of being online for the first time. With growth there always comes pain. Be it your growing pains as a child or the growth and development of this part of our culture called the Internet.
Firstly we need to quickly explain what the Internet is and where it came from. The Internet is the offspring of a military project called Arpanet. Arpanet was designed to provide reliable communication during global nuclear war. A vast network of interconnected computers was set up all over the world to allow the various branches of US and NATO forces to communicate with each other.
Nuclear war never came (thankfully) and the world was left with a massive network of computers all connected together with nothing to do. Colleges and universities started to use these computers for sharing research internationally. From there it grew and spread outside colleges to local homes and businesses. The World Wide Web was born and its father was a guy called Tim Berners Lee.
When you're connected to the Internet you're sharing a vast network with hundreds of millions of other users. This shared network provides resources that 15 years ago were never thought possible. Unfortunately when something is shared its open to abuse. On the Internet this abuse comes from hackers and virus creators. Their sole intent is to cause chaos and/or harm to your computer system and millions of other computer systems all over the world.
How do you combat this? You need an Internet security system. This might sound complicated but your Internet security system will be quite straigtforward being comprised of just 2 - 3 Internet security products. We'll look at each of these products in more detail now:
AntiVirus Software
The first and most critical element of your Internet security system is antivirus software. If you don't have up-to-date antivirus software on your PC you're asking for trouble. 300 new viruses appear each month and if you're not constantly protecting your system against this threat your computer will become infected with at least one virus - it's only a matter of time.
Antivirus software scans your PC for signatures of a virus. A virus signature is the unique part of that virus. It can be a a file name, how the virus behaves or the size of the virus file itself. Good antivirus software will find viruses that haven't yet infected your PC and eliminate the ones that have.
Antivirus software can only protect your computer from viruses trying to infect it via email, CD-Rom, floppy disk, Word documents or other types of computer files. Antivirus software alone will not keep your computer 100% safe. You also need to use firewall software.
Firewall Software
The use of firewall software by home computer users is a relatively new occurence. All Internet connections are a two way process. Data must be sent and received by your computer. This data is sent through something called ports. These are not physical things rather aspects of the way your computer communicates online.
Firewall software watches these ports to make sure that only safe communication is happening between your computer and other computers online. If it sees something dangerous happening it blocks that port on your computer to make sure your computer stays safe from the person who is trying to hack into your system.
An easier way to understand a firewall would be to picture your computer as an apartment complex. At the front door of this complex there is a security guard. Every person who enters the complex must pass this security guard. If the security guard recognizes the person entering as a resident he allows them to pass without saying anything. If, however, the person entering the complex is unknown to him then he will stop that person and ask for identification. If they have no business being at the apartment complex he escorts them from the building.
If you are not currently using firewall software your computer will get hacked into - that's a guarantee.
PopUP Blocker
You can get a good popup blocker at no cost. An easy way to do this is to install either the Google or Yahoo toolbar. Both of these come with popup blockers built in. Popups are not necessarily dangerous but are a nuisance and using either of these toolbars will make your life that bit easier.
A simple rule for practicing online security is: "If in doubt then don't". If you don't recognize the file, the email address, the website or if your gut feeling says "no" then don't click that button.
About the author:
This article was submitted courtesy of the Spyware & Malware Guide. This site is dedicated to spyware removal and just generally helping users keep their PCs spyware free.
Circulated by Article Emporium

Sunday, October 25, 2009

Does Your PC Have Worms?

Does Your PC Have Worms?

by: Joel Walsh

Worms aren't just for dogs anymore. Find out how to inoculate your computer against these nasty parasites.
What Are Worms?
Worms are descended from viruses and are even nastier. Just as ever stronger doses of pesticide breed ever more resilient locusts, better and better anti-spyware software bred ever more devious viruses.
Finally, some virus designers stopped having their creations infect and take over files the way real viruses infect and take over cells. Instead, they created programs that could stand on their own and cause plenty of trouble without the help of any other software applications. Just worms are independent organisms that can infect a host directly, so do computer worms infect computers directly.
What Do Worms Do?
Worm designers are often even more sinister than virus designers, since worm designers are not just vandals. Worm designers often use their creations to achieve specific goals:
• Backdoor creation. Worms often try to set up another kind of malware, a backdoor. A backdoor is a hidden opening in your network connection that lets the worm send data out and take data in. Practically speaking, the data it's sending out are often spam emails, and the data it takes in are instructions on spam emails to send.
• Denial of service attack. Some worm designers really are vandals rather than profit-hungry con artists sending spam. But their vandalism can be more targeted. They use worms to send out numerous requests to remote computers, such as web servers, in order to overwhelm them and therefore shut them down. This is called a denial of service attack.
• Spyware, Trojan, adware, and virus installation. Worms are often used simply to unleash other forms of malware on a computer that might otherwise block them.
• Information theft and fraud.Worms can multitask in order to set up spyware that gathers sensitive information--often financial information--and then set up backdoors, Trojans, viruses, or dialers to disseminate the stolen data.
How Do Worms End Up on a PC?
Worms enter PCs just as viruses, spyware and other malware do: any way they can! Some favorite points of entry for worms:
• Websites can actually download software to your computer without you realizing it. This software includes not only worms, but also spyware, adware, viruses, and other malware. These malware programs find their way into websites either by the deliberate design of the site owner or because hackers have installed the software on the website's server.
• Peer-to-peer file-sharing networkscontain many nice-enough-looking files that are really worms. One of the sneakiest disguises is a filename that indicates the spyware is really a video of a beautiful actress.
• Email, the favored route of viruses, can still be exploited by Spyware. But since new email programs usually block the automatic opening of file attachments, this is less of a problem than it used to be.
• Any internet connection inevitably lets data flow both in and out, and so is vulnerable to attacks by worms.
How Do You Get Rid of Worms?
There's really only one good way to make sure your computer is rid of worms: scan it with multiple antivirus and anti-spyware programs using a full-system scan. Worms are tricky, so anything less than a full-system scan might let them escape. Worse, with new worms coming out all the time, some antivirus and anti-spyware packages may not even know about a new worm until after its wreaking havoc on your machine. That's why you should try using more than one antivirus program and more than one anti-spyware program to increase your odds of successfully detecting the malware.
Don't have more than one anti-spyware and antivirus software? You'd better start downloading. After all, worms won't take excuses.
About the author:
Joel Walsh writes for http://www.spyware-refuge.comabout worm removal http://www.spyware-refuge.com?spyware anti virus [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "spyware anti virus" OR leave this bracketed message intact.]
Circulated by Article Emporium

Is Your Computer Sick?

Is Your Computer Sick?

by: Jim Edwards

© Jim Edwards All Rights Reserved
http://www.thenetreporter.com
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Viruses and spyware usually show up on your computer one of
two ways.
Either they invade your system with a frontal assault like
the Huns attacking the Romans, or they sneak in a back door
like a cat burglar.
Either way, once a virus or piece of spyware gets on your
system, getting it off can rate harder than curing a severe
case of trench foot!
Viruses, malicious programs designed to disrupt normal
computing, and spyware, programs intended to literally "spy"
on your activities, can enter your computer a number of
ways.
Most commonly they enter your system through an email
attachment, by sharing files with an infected computer by
disk, as a "ride along" with a 3rd party program you
install, or through a "back door" port in your computer.
Regardless of how they get on your system, once in place,
they cause no end of headaches and frustration.
The following represent typical signs you may suffer from
infection by a virus or piece of spyware.
Your computer starts acting oddly by doing things it never
did previously.
Your modem starts trying to dial out to the Internet without
you initiating a surfing session.
You notice that files start disappearing, the system stalls,
runs slowly, or even crashes frequently.
Your computer takes progressively longer to boot up every
time you start it or you notice that your available hard
drive space has disappeared. Strange popup windows appear,
even when you're not surfing the web, or you delete a
program and it "magically" reappears next time you boot the
system.
If you suspect you a virus or a piece of spyware has invaded
your computer, follow these steps to first identify and then
delete the offending code:
Step 1 - Back up your important files, but remember to scan
these files for viruses before reinstalling to avoid
accidentally re-infecting your system.
Step 2 - Update your anti-virus definitions and perform a
scan of your hard drive.
If you don't carry virus protection, or you suspect your
anti-virus software got corrupted somehow, then log on to
www.pandasoftware.com and use the free Panda Active Scan
service to check your hard drive for viruses.
Follow the instructions for quarantining and removing the
offending files.
Step 3 - Scan your hard drive with an adware, scumware, or
spyware detection and removal tool like Adaware
www.lavasoft.de/support/download/ or Spybot
http://spybot.safer-networking.de/.
Step 4 - In many cases, when the virus or spyware program
gets installed with a free utility or game you download from
the Web, you must usually uninstall the utility or game to
finally get rid of the problem once and for all.
Step 5 - Avoid re-infection by keeping your anti-virus and
firewall up-to-date at all times.
As a last resort, if you run into a program you simply can't
get rid of, but can figure out the offending file's name, do
a search for the file name on Google.com. Often you will
find you're not the first victim and may get valuable advice
for cleaning up your system.
However, be very careful of the information you find and
think twice before modifying any system files.
About the author:
Jim Edwards is a syndicated newspaper columnist and the
co-author of an amazing new ebook that will teach you how
to use fr^e articles to quickly drive thousands of targeted
visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to
your website for weeks, even months... without spending a
dime on advertising! ==> http://www.turnwordsintotraffic.com
Circulated by Article Emporium

Saturday, October 24, 2009

Basic Steps To Optimize Your Internet Security

Basic Steps To Optimize Your Internet Security

by: Popescu Alexandru

After seeing many people complain about their weak Internet security I decided to write down some things that will help you for your Internet security.
First, here are some tips to make windows safer :
For basic security and update patches install Service Pack 2 for Windows XP or Service Pack 4 for Windows 2000.
Once a month use Windows Update so you can get the latest pacthes.
When you download software from the Internet make sure you download it from the original website.
Always run anti Trojan and anti virus software.
Even if you don't use it you have to make your Internet Explorer as safe as possible.
When you access the Internet you are browsing the web using a browser such as Internet Explorer.The Internet Explorer contains several security vulnerabilities. You should make it as safe as possible or switch your default browser to an alternative. You will have to set some options from the Manage Add-Ons in the Internet Options. You will see a list of add-ons that can be activated or deactivated. If you see any unusual entries just deactivate them so you can be sure you don't have a trojan/worm.
Under Internet Options -> Security -> Internet -> you will see the Edit Level.You should set it to high in order to disable most of the security threats.
Your Web Browser should be ok now. Let's see what we have to do from our email point of view.
Because it's built-in in their Windows system lots of users like to use Outlook Express for emailing. But it's a fact that it contains many security vulnerabilities so I advise you to use alternatives. If you use a web based Email (you can browse your email with your web browser) you can delete viruses even if you don't download them to your PC.
Make sure you have installed an Anti Virus for 100% virus protection. One that I've found to be very good and never disappointed me is the AVG Anti virus. If you take the time to regularly update it you will be safe enough with it.
Lots of people install Firewalls because they belive their Internet security will be higher. I personaly disagree. If you do not know how to best configure it, and you have to know much about the tech behind it to do so, it will just make your PC slow and software not working.You can just use the Windows XP SP2 firewall for basic security.
All this tips should make your PC safer. I browse the Internet every single day for some time now and they worked great for me. I haven't met a virus/worm for some time now.


About the author:
DSW Distribution Ltd has all you need for your internet security: mcafee antivirus, norton antivirus 2005, microsft office 2003 standard edition, panda antivirus, windows xp and many more ...Visit us at http://www.dswtrade.com
Circulated by Article Emporium

Friday, October 23, 2009

The never ending Spyware……story

The never ending Spyware……story

by: Doug Woodall

It’s been with us since 1993, it’s gotten more intrusive, more complicated.
It’s created a whole ecosystem, so to speak.
A person sits somewhere, writing a new virus, a new application of Spyware. It is put onto the Internet and Anti-Virus and Anti-Spyware vendors begin to develop definitions to combat it, maybe even to stop it permanently. These fixes are incorporated into the new versions of the software they sell, or distribute as freeware.
Existing companies, businesses, and users struggle to keep up with what to use, overwhelmed, their lifeline to the Internet depends on it. In this portion of the ecosystem you have;
The end user. YOU!
Your Internet Provider, Hosting Service, ect.
The businesses on the Internet, all of em.
The existing companies and vendors providing the Anti-Virus and Anti-Spyware Programs.
Adding to this ecosystem, new companies start up to get into the rapidly exploding business, marketing their own software.
More additions occur as new businesses start up to sell the software the companies have produced.
New and old online users buy upgraded and new software to try and protect their personal information from being stolen. Interlaced into all the above is the knowledge required to know how to protect ourselves with the basics. A hardware or software Firewall, Anti-Virus and Anti-Spyware.
Whew! Ok, rest.
Point to ponder while resting….recent eWeek.com tests reveal that some Vendors are failing to provide solutions when it comes to finding and permanently destroying Viruses and Spyware.
Rested? Then let’s look at it from another angle shall we?
Without the person somewhere in the world writing the virus or Spyware, there would be no need for the person that is writing the program to combat it. There would be no need for the company that employs the person writing the programs to combat the virus or Spyware. No need for the Businesses that sell the programs the company markets.
Still with me? Good. And finally,
No need for the user, you, to protect yourself.
I hope this lil exercise has proved informative.
Take Care.
About the author:
About the Author:
Doug Woodall has a website at http://www.spywarebiz.com
There he provides free information and recommended products to combat Spyware.
He is a member of the IWA (International Webmasters Association)
Doug can be reached at spywarebiz@comcast.net.
Article edited for proper content by Wendy McCallum
Permission to copy ok as long as about author info remains with article.
Copyright 2005 SpywareBiz
Circulated by Article Emporium

Alien Intruders!

Alien Intruders!

by: Seamus Dolly

You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.
Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.
So what is a virus?
A virus is a program that can self replicate or reproduce itself.
These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.
They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.
A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.
Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation
A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.
What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.
Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them. If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.
Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.
Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.
Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs.
Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.
These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.
If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.
Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.
Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.
Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.
Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.
Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.
Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently(not faster), through experience.
About the author:
Seamus Dolly is the webmaster at www.CountControl.com
Circulated by Article Emporium

More Free Tools Increase Security For Your PC

More Free Tools Increase Security For Your PC
by: Jim Edwards
- by Jim Edwards
(c) Jim Edwards All Rights Reserved
http://www.thenetreporter.com
=====================================
A recent article about preventing hackers from breaking
into your computer caused an overwhelming response by
readers.
It seems everyone has an opinion about the best software
and advice for keeping your computer safe from viruses and
online predators. The following will help you increase your
online security and usually without spending a dime!
Zone Alarm
Zone Alarm offers several versions of their
popular firewall software with various options for
increased security. The basic firewall software comes free
of charge and ranks among the most highly rated firewalls
available. The paid version helps you to eliminate
everything from pop-up windows to unwanted advertising and
also helps you track hackers back to their source.
Visit www.zonealarm.com to download your copy today,
especially if you don't already carry a firewall on your
system.
The Guru Of Security
Visit www.grc.com if you want a real "eye opener!" Frankly,
some of the things I saw on this website shocked me. I had
no idea so many potential problems existed for breaches in
your online security.
But what also shocked me was how simple most of the "fixes"
rate for securing your computer against attack. It became
very apparent to me that most computer hackers don't
exploit hardware or software weaknesses, they actually
exploit our ignorance about the simple steps we should take
to protect ourselves and others.
When you visit www.grc.com you'll see the site covers a lot
of ground. Since you might find it easy to get sidetracked
with all the interesting information, make sure to
specifically check out the "Shields Up!" area. This section
offers two comprehensive tests of your Internet connection
to check for the typical points of entry used by hackers.
The first test, "Test My Shields," checks the security of
your Internet connection itself and how much system and
personal information others can obtain without your
knowledge.
The second test, "Probe My Ports," attempts to find open
ports on your computer and evaluate how and where a hacker
could enter.
Both tests will help you spot the most common and obvious
vulnerabilities most of us face when connected to the
Internet. Also to its credit (and unlike similar sites),
this website doesn't use these tests as a lead-in to try to
sell you anything.
Free Anti-Virus Software
Visit www.grisoft.com to download a free anti-virus
software package that rivals anything you could buy. The
software comes with free updates on virus definitions
(critical for up-to-date protection) and will even certify
your outgoing email as virus free!
I have used this software myself and, though nothing rates
perfect, I have found it rivals products costing $50 or
more. If you don't carry virus protection software on your
computer, stop this minute and go to www.grisoft.com to
download the free version now.
With so many resources and advice available for free, no
valid excuse exists for not immediately securing your
computer against hackers, vandals, viruses and malicious
code.

About the author:
Jim Edwards is a syndicated newspaper columnist and the co-
author of an amazing new ebook that will teach you how to
use free articles to quickly drive thousands of targeted
visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to
your website for weeks, even months... without spending a
dime on advertising! ==> "Turn Words Into
Traffic"

Circulated by Article Emporium

How to thwart the Barbarian Spyware!

How to thwart the Barbarian Spyware!
by: Doug Woodall
Today,on most internet user's computers, we have the
ability to employ software, along with our
intelligence, to prevent viruses and spyware.
To put this article into proper perspective, we'll use
Medieval defense tactics.
This is accomplished by 3 methods. First, a firewall...
'The Castle Moat' so to speak. A firewall can't see
inside your computer beforehand though, so if any viruses
or spyware were present before the firewall was installed
then its of no use. Of course, its extremely good at preventing new
attacks.
Second, a anti-virus program.... 'The Castle Drawbridge!
They will not provide much help with spyware, but good
virus protection is as desirable as one of Avaris's
dreams! One drawback can be the updates, of course.If
you've just updated Wednesday night and a virus hits the
next day, then you may not be protected till next
Wednesday night, and by then it may be too late. If you're
smart, you will have signed up for email alerts with
the provider, or even better, you'll have a anti-virus
program that has a real time update feature. I get the
tingles when I see that little pop-up saying a update
is available and click here. Its downloaded ,installed,
and updated in about 20 seconds! A new virus or Trojan or
God forbid, a new keylogger can hit the internet and spread
in a matter of days, and I'm sure this must make the definition
writers lives a living hell. I have great admiration for
them as they could have been wealthy doctors, but they have
chosen to help us... the end users. (moment of silence here)
Last, we have anti-spyware programs,'The Flaming oil'! (my favorite).
Their update features are like the anti-virus programs,
so you have to be as vigilant with this method of defense
too as you would be with the others. I've heard there are
people out there that don't even know when their
updates run, or even if its configured to do so! I
refuse to believe this sordid rumor!
So you've got your defenses set up, you're looking good.
But the best defense is a good offense, attack!
That's what some organizations do. They prowl the net
looking for websites that harbor drive-by downloads,
URL Re-Directing and such. When they find them, they
shut them down, or report them so effective protection
can be manufactured. These people have my sincere
thanks for what they do. With identity theft on the
rise and Websense reporting that the average computer
has 28 items of Spyware on it, we need all the help we
can get. Oh sure, you're saying not my computer !
Well, lets discuss those little boxes that you click
"I Agree" to when you download something. Do you read
the entire statement? This is one way spyware has
become so rampant, because so many downloads have extra
software included in them. These can be harmful to
your computers well being. KeyLoggers, popups, adware, malware...
Need I go on?
So my idea is that we need these shining knights from the
castle to journey forth on a quest. They will be
little robots or spiders like the search engines use.
They will be given absolute power over harmful
programs they find. They will be like Gort in the
movie "The Day the Earth Stood Still".
Dell recently reported that 12% of their calls were
for spyware damage, Microsoft says half of their
reports of system crashes are caused by spyware. These
calls cost these companies millions of dollars in
revenue, which they then pass the costs of onto us,
the consumers.
Who knows, if viruses and spyware ever get controlled,
the average computer may only cost a dollar!
About the author:
About the Author: Doug Woodall has a web site at http://www.spywarebiz.com
There he provides free information and recommended products to combat Spyware.
His Website is recognized by Learning Fountain and ISafe
Doug's Articles have earned him Trusted Author Status at ImpactArticles.com
He is a member of the IWA (International Webmasters Association)
Article edited for proper content by Wendy McCallum
Permission to copy ok as long as about author info remains with article.
Copyright 2005 SpywareBiz
Circulated by Article Emporium

Thursday, October 22, 2009

3 Summer Computer Tips

3 Summer Computer Tips
by: Sharron Senter
Written By: Sharron Senter
#1 – Summer Computer Travel
Holiday travelers should be on alert when arriving home from long weekends, such as the Fourth of July, a popular time for computer viruses to spread.
Most computer users have a tendency to turn off their computers when away on trips, which means you’re not getting newly-released anti-virus patches or anti-spyware updates; the two most common areas that cause computers problems. We recommend you update anti-virus and anti-spyware scans before opening e-mail or going online after an extended absence.
We consistently see an increase in calls for virus related problems immediately following long weekends. Avoid the problems altogether by updating your security software before using your computer. For a free listing of viruses, spyware threats and trends, visit: www.VisitingGeeks.com/downloads.htm
#2 -- Should You Leave Your Computer Running?
One question we hear frequently is, "Should I leave my desktop computer on or turn it off?"
There are 2 schools of thought…
Turning it on and off numerous times during the day subjects the microcircuits to flexing and fatigue due to change in temperatures. Over time this could lead to a break in the circuitry and result in system failure.
Leaving the computer on all the time puts excess wear on the mechanical components (the hard drive spindle motor and cooling fans).
Best compromise. First user in the morning turns it on; last user turns it off.
We leave our desktops on all the time allowing for scheduled utility tasks to run during overnight hours. We also restart the systems (to flush the RAM and reset the operating system) on a regular basis and routinely remove the case covers to clean out any dust that may have accumulated, especially around the fans and screens.
#3 -- Stop Popups!
Never click inside the window of a popup. Instead, close it by clicking on the X in the upper right corner. Many people are fooled into installing spyware applications by popups that promise to clean their system. If you receive a message saying it can help, assume it’s spyware and don’t click!
About the author:
About the Author
Sharron Senter is co-founder of http://www.VisitingGeeks.com- an on site computer repair, security and networking company serving north of Boston, Southern NH and Maine. Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster. Learn more about Sharron at http://www.SharronSenter.com
Circulated by Article Emporium

How To Take Care Of Your Laptop Computer

How To Take Care Of Your Laptop Computer
by: Joe Chianese
As the proud owner of a laptop computer, you'll want to keep
your machine in the best possible condition.
Aside from cleaning your screen and dusting the keyboard,
however, you'll need to take a few extra steps to maintain
your laptop's health:
-- Play it cool
A laptop computer generates a lot of heat, especially when
running the latest high-powered software. Too much heat and
you risk damaging the internal circuitry.
Always try to keep your laptop in a well-ventilated, cool
environment. And ensure you don't block the fan grills on
the sides, back, or bottom of the machine at any time.
-- Handle the screen carefully
Avoid touching or playing with your LCD screen.
Yes, it might be fun to watch the waves generated by your
finger against the screen, but LCD displays are fragile
devices that must be cared for.
Take care when cleaning the screen too, and use only
approved cleaning materials.
You won't want to pay the money for screen repairs or, even
worse - a new machine entirely.
-- Don't drop it
Whatever you do, don't drop your laptop computer! Keep it
safe inside of a carrying case when moving around or
traveling.
Don't leave it on the edge of a table or on an unstable
support of some kind. One ill fated drop to the floor could
spell death for your mobile office.
Try to make sure the rubber feet underneath are in good
condition and are still attached. This will prevent the
device from sliding around accidentally.
-- Be careful with those drinks...
If you need to have a drink while working or playing, be
careful not to spill it.
Your laptop computer could suffer the consequences from just
a few drops of liquid poured in the right places.
While you probably do eat and drink around it regardless,
you will want to occasionally wipe down the edges, the
keyboard, the touchpad, and maybe even wipe down the screen
to keep any dirt from accumulating.
-- Just say no to viruses
Security wise, make sure you obtain an anti-virus program.
Secondly, keep it updated!
Buying an anti-virus one month and not updating it for the
next six really negates it purpose. Your laptop computer
could be exposed to hundreds and thousands of new viruses
every month if you don't update your virus definitions.
Most anti-virus programs have automatic update methods,
eliminating the need for you to have to remember to do it
manually.
-- Avoid Popups
Pop-ups are particularly annoying on a laptop computer.
Trying to close a bunch of windows without a regular mouse
can be a nuisance.
You'll want a pop-up blocker, such as the Google Toolbar
(located at http://tools.google.com), to prevent these pop-
up ads.
Many intrusive forms of advertising, and even some viruses,
can install software on your machine by using various forms
of pop-ups. It's best to get yourself a blocker and avoid
the situation entirely.
-- Use a firewall
Always utilize a firewall on your Internet or network-
enabled laptop computer. Even if you use Windows XP's built-
in firewall (or purchase one from such companies as Norton),
your security will greatly benefit from it.
Blocking out all the unnecessary ports and closing all the
loopholes will prevent a hacker or virus from freely
entering your hard drive.
So there you go. Combine all of the above tactics and help
your laptop enjoy a happier and healthier lifestyle!
About the author:
Joe Chianese is a technical writer and frequent contributor to HowToBuyALaptop.com For advice on how to find the right laptop computer for you, visit: http://HowToBuyALaptop.com
Circulated by Article Emporium

Protection for your computer system - Painless and free !

Protection for your computer system - Painless and free !
by: John Roberts
Painless (and FREE) P.C. Protection
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it’s Security and Performance.
You can do something about it and you can do it FREE, using some or all of the following programs and tips.
Anti-Virus protection.
One of the best Free programs for this is AntiVir Personal Edition Anti-Virus software. Download it from:
http://www.free-av.com
Install on your PC and leave it running to block any incoming bugs or viruses! It can also be used to scan your system for any previous invasions, but be patient, this takes about 15 minutes to complete. Worth running periodically, to check all is ok.
FireWalls and Broadband.
If you are on Broadband, consider using Firewall software. Most good ISP’s now supply free. (eg AOL). If yours doesn’t, you can get a reasonably good Free personal firewall system from ‘ZoneAlarm’ at http://www.zonelabs.com .
Tip – DON’T leave your PC connected to the Internet when you are not using it! Reduce the chance of something loading while you are not monitoring things !
SpyBot finders and Ad blockers.
Various programs available on the web, both ‘Paid’ and ‘Free’. You can get good results from using 2 Free packages that are available. These are ‘SpyBot Search & Destroy’ and ‘Ad-Aware’. Downloads available at
http://www.lavasoft.de for AD-Aware
http://www.safer-networking.org for SpyBot
Using both of these packages ensures that, you get with one, any ‘bots’ that the other one misses.
Suspect you have a virus ?
If you think you already have a virus, a good Free tool for checking and killing them is McAfee Stinger. Free download at:
http://us.mcafee.com/virusInfo/default.asp?id=stinger
Some General Tips
Get in the habit of , every time you disconnect from the web, deleting ALL files from the following folders:
C:/WINDOWS/Cookies
C:/WINDOWS/Temporary Internet
Beware ‘Boys Toys’ and ‘Freebies’! Think, if someone wants to spread a bug, get tracking software onto your PC etc, the best place for them to do it is places where you go to get ‘freebies’ to download! The above sites are normally ‘ad free’, but be aware that if you download porn, free music, free games, free software, there is often a ‘price’ to pay. Always use the above programs after visiting ANY of these sorts of sites!

About the author:
John Roberts ia a freelance Training Consultant and Director of JayrConsulting Ltd http://www.jayrconsulting.co.ukJohn is an active member of TrainerBase at http://www.trainerbase.co.uk and is always open to discuss any training related issues
Circulated by Article Emporium

Internet Scams 102 -- Hijackings and Spyware

Internet Scams 102 -- Hijackings and Spyware

by: Janette Blackwell

My friend Janice is afraid to go on the Internet because of the terrible things that might happen to her. She views a simple trip to get e-mail the way she views going alone, late at night, to a dangerous part of town.
Please . . . it’s not that bad. Though, come to think of it, it’s ALMOST that bad: hijackers can now do things to people who already have antivirus and anti-spyware programs. To people who have carefully NOT clicked on scam e-mails. Some hijackers can disable your firewall, your antivirus software, and your spyware killers. Or they can prevent antivirus and spyware from being updated.
But there are solutions. Here’s what you do:
HIJACKINGS
You know you’ve been hijacked if your start page is different and if you keep getting things you didn’t intend to get -- frequently pornographic sites and popup ads. You change things back the way they were, but they won’t stay changed.
These nasties nabbed you through a security hole in Microsoft Windows. If you haven’t been caught and don’t want to be, http://www.spywareinfo.com/articles/hijacked/prevent.php says,
“First and most simply, stop using Internet Explorer. If you use either Mozilla, Firefox or Opera, you are immune to virtually all browser hijackers.”
Actually, it’s not that simple. There are ways scammers can get around Firefox. Microsoft is also busy locking its barn doors, though I’m afraid the horse has already been stolen.
If you decide to stay with Internet Explorer, be sure to keep it up to date, especially with what they call “critical updates.”
PREVENTING ATTACKS
The most basic and most necessary protection, one you’ve probably installed already, is antivirus protection. The antivirus programs upgrade constantly to protect us from the latest viruses. Norton is the most common, and a good choice. If you prefer a simple, uncomplicated solution, go to the site that sells Norton, http://symantec.com/, and download all the antivirus protection you want.
If you’re a thorough person, however, one who wants to learn about all the options, go to http://antivirus.about.com/od/antivirussoftwarereviews/, and you will learn of problems and solutions you never dreamed existed.
WHAT YOU GET FOR NOTHING IS NOTHING -- OR WORSE
Unfortunately, an antivirus program alone is not enough these days. You need ANTI-SPYWARE.
Because the latest hijackers can disable anti-spyware -- AND keep you from downloading updates -- you want some that is really, really good. The techie who manages my website says, “Get something that can WARD OFF attacks, not just remove them after they’ve infected you. Once really vicious spyware is on your machine, it may be impossible for anyone but an expert to remove it.”
“But what about all the free anti-spyware?” you ask. If you go to http://www.apcug.net/Reports/Editorial/2004.htm, you’ll see under December 2004 an article “Beware of SCUMWARE Pretending to be Anti-Spyware” which tells one man’s experience. Sometimes what you get for nothing is nothing. Or worse than nothing.
When my computer ran slower and slower, some parts of my website disappeared, and question marks appeared all over my website homepage, I yelped for help. Should have yelped sooner, but better late than never. Asked my website manager what he uses. He uses Lavasoft’s PROFESSIONAL program of Ad-Aware and Ad-Watch. I bought it, and it found 17 pieces of spyware (Alexas and tracking cookies), plus a possible browser hijack attempt. (The techie said, “That’s nothing. They found 83 pieces of spyware on mine!” But then he’s a pro.) Ad-Aware removed all the problems except the question marks on my website home page, http://foodandfiction.com/Entrance.html. These are probably due to the attempted hijack. I’m stuck with them. Fortunately they don’t show on any computer except mine.
If you want to lead a simple life, come here to http://lavasoft.com and download their PROFESSIONAL type of Ad-Aware and Ad-Watch.
If you prefer an in-depth investigation of anti-spyware,
http://www.pcworld.com/reviews/article/0,aid,119572,00.asp can help you. They’ve tested most of the anti-spyware out there, though I must say that Ad-Aware’s pro version was not tested, only the pc version.
Just don’t wait until you’re in big trouble. Do something now!
IF YOU’VE BEEN HIJACKED
A good, basic article can be found by going to http://www.apcug.net/Reports/Editorial/2004.htm. Scroll down to September 2004 and download “Help! I’ve Been Hijacked . . .”
Another good article is, “How to Remove Adware and Spyware,” http://antivirus.about.com/od/securitytips/a/removespyware.htm.
You might also read “Invasion of the Browser Snatchers” at
http://www.pcworld.com/news/article/0,aid,84464,tk,dn021402X,00.asp. The article will explain how to undo the damage -- although some hijack damage can’t be removed that easily.
MORE INFORMATION
Here are more good sources of spyware information:
http://www.scumware.com/ - a website about nothing else but.
http://www2.spywareinfo.com/category/news/ has fascinating current Internet security news flashes, which you will enjoy if you like to feel that civilization as we know it is under constant threat.
About the author:
Find the best recipe, food gift, and healthy dieting sites in Janette Blackwell’s Delightful Food Directory, http://delightfulfood.com/main.htmlOr enjoy her country cooking at Food and Fiction, http://foodandfiction.com/Entrance.html
Circulated by Article Emporium

Tips For Safer Computing Online

Tips For Safer Computing Online

by: BB Lee

by BB Lee (C)2004
New computer viruses threaten the unwary user everyday. Hackers
jeopardize your online security with invasive computer techniques to
steal your passwords, personal information, even identity.
Unscrupulous marketers bait you with free software that unleashes
spyware, trojans, or worms, on your system.
While other marketers bombard you with popups at every turn. And
others send unsolicited spy emails asking you to click links to unsafe websites that install threating software on your computer, or try to download your private information.
These are only a few of the security issues involved while online.
Read through the following list to arm your computer and protect yourself against these vicious and often malicious online attacks.
1. Install a good anti-virus software.
Here's a good free anti-virus software...
Fr** AVG Anti-Virus......
New - AVG Fr** Edition is now available for all single home users
worldwide! More detailed information can be found in the AVG Free
Edition License Agreement.
Click Here To Download:
http://www.grisoft.com/us/us_dwnl_free.php
2. Install a personal firewall.
This personal firewall is one of the best online....
http://www.zonealarm.com
3. Install a good pop up blocker.
Google has a free pop up blocker so does Yahoo. The only drawback
is you will have to download and install their toolbar.
4. Know Privacy Policy.
Read the websites privacy policy before releasing personal information.
Note do they share or sell your information with third parties. If they do you might reconsider releasing your personal information.
5. Passwords.
Never use easy to guess passwords like your favorite color, your social security number, your birthdate, words less than six characters. Mix up passwords with combinations of numbers and symbols.
6.Virus Warnings.
Don't forward virus warnings you receive in emails. It's not your
job to warn others. And you might be circulating a fake warning
designed to scare receivers into downloading trojans or removing
important files on their computer.
7. Keep It Secret.
Don't give your password to anyone. Be wary of emails asking you to give out your personal passwords for accounts online. Or emails asking you to click a link and enter your password on the site. This site might be a fake sent by hackers "phishing" for victims.
8. Primary Email Address.
Don't divulge your primary email address on unfamiliar sites. You
might be bombarded with unsolicited emails by marketers who
sell your address to third parties online.
9. Free Accounts
Set up several free email accounts with a psuedo name to handle
spam, when you register with unfamiliar sites, or to use on chat and message boards.
10. Chat Line And Message Board Warnings.
Don't release personal information on chat lines or
message boards. This is one way many identity thefts occur.
____________________________________________________________
BB Lee is Editor of SmallBizBits News.
Visit: http://www.smallbizbitsnews.com
Subscribe Now! Receive A Free Ad in newsletter!
mailto:Smallbiz-subscribe@topica.com
About the author:
BB Lee is Editor of SmallBizBits News.
Visit: http://www.smallbizbitsnews.com
Subscribe Now! Receive A Free Ad in newsletter!
mailto:Smallbiz-subscribe@topica.com
Circulated by Article Emporium

How to Avoid Getting Ripped-Off Online

How to Avoid Getting Ripped-Off Online

by: Jim Edwards

(c) Jim Edwards All Rights Reserved
=====================================
Online security is one of the top catch phrases these days, but hardly anybody knows what it means and worse, most home computer users think security only applies to corporations and online businesses.
Most people think online security means simply protecting your credit card data from fraud and theft, but it actually goes way beyond that.
The potential for mayhem and just plain disruption of your life doesn't just mean credit card fraud - it can mean having your identity stolen, your life disrupted and spending hours cleaning up after an online 'vandalism' attack.
You must protect yourself from everyone from the teenage computer hacker to the organized crime syndicate using computer worms and keystroke logging viruses.
The great news is that a number of simple techniques should protect you against the vast majority of threats, since the evil doers will simply move on to easier pastures.
Update your anti-virus files
The widespread 'Bad Trans' worm logged keystrokes and transmitted potentially sensitive data such as credit card and social security numbers to the 'bad guys'.
Though this virus contained a high level of criminal intent, it was easily blocked by anyone with up-to-date anti-virus files.
If you don't have anti-virus software with current virus definitions installed, you leave the door wide open for security problems.
Install a 'Firewall'
A firewall helps prevent unauthorized access to your computer by 'hackers'.
It closes off the entry points (called open 'ports') carried by virtually every computer connected to the Internet.
A common misconception is that firewalls are only for people with cable or other high-speed connections.
Even if you use a dial up connection to get online, a firewall can help you detect and prevent people from logging on to your computer, stealing files or even using your computer to break into others!
You can take a free test of your computer's security by logging on to http://www.symantec.com/securitycheck/ and clicking 'Find out today if you are safe'. The results may surprise you.
Use secure sites
Only give sensitive data such as credit cards, social security numbers and important passwords over a secure connection.
This means the little yellow lock appears in the lower part of your browser and nobody but the website you are connected to should be able to read the data you send.
Change passwords often
An easy way for you to protect your sensitive data and email is to change your passwords on a monthly basis, or even more often depending on how frequently you use computers away from home.
If you log on to your email at the library, in 'cyber cafes' or any other remote computer then the possibility exists that computer could have a key-stroking virus present.
This means everything you type into the computer (passwords, birthdays, social security numbers, credit cards) could be logged and used by someone else.
** Change your passwords at lease once a month.
Though not fool-proof, these security tips should help reduce your vulnerability and keep you safer online.
About the author:
Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr^e articles to quickly drive thousands of targeted visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> http://www.turnwordsintotraffic.com
Circulated by Article Emporium

Tuesday, October 20, 2009

Advice about the most up-to-date advice with reference to computer virus.

Advice about the most up-to-date advice with reference to computer virus.

by: Tom

When you are trying to find the best information relating to computer virus, you will find it hard separating quality information from ill-equiped computer virus suggestions or help so it's prudent to know how to qualify the advice you are presented with.
Avocent: Network Security Solution
Provides KVM switching and network connectivity solutions for data centers. Includes desktop, rackmount and wireless KVM connections and extenders.
Here's a few guidelines which we think you should use when you are searching for information about computer virus. Understand that the guidance we give is only applicable to internet advice about computer virus. We are unable to offer any advice or guidance when you are also conducting research in books or magazines.
INSA: Network Security Services
Reseller of network security products, including firewalls, intrusion detection and prevention devices, anti-virus appliances, and more.
An excellent piece of advice to follow when you're presented with help and advice regarding a computer virus web is to research who is behind the website. This may show you who owns the site computer virus authorizations The easiest way to reveal who owns the computer virus website is to look on the 'about' page or 'contact' page.
Any worthwhile website providing information on computer virus, will almost certainly provide an 'about' or 'contact' page which will record the site owner's contact details. The details should make known some advice about the owner's necessary expertise. This means you can conduct an appraisal about the webmaster's depth of experience, to offer guidance about computer virus.
About the author:
Joe Brown is the webmaster for http://www.detailsspecialnews.info
Circulated by Article Emporium

Malware And Antivirus Software

Malware And Antivirus Software

by: Joel Walsh

Warning: most antivirus programs will not protect you against all forms of malignant software (often called "malware") on their own. Find out how to protect yourself.
Sure, your antivirus software will protect you against viruses. It will probably even do a good job against worms. But what Trojans, exploits, backdoors, spyware and the dozen other nasty software parasites?
Malware and Antivirus Software: a History
The war on computer viruses has led to an arms race between the designers of antivirus software and the designers of viruses (you didn't think viruses just created themselves did you?). Some years ago, virus designers responded to ever more successful antivirus software by creating the descendents of viruses, worms, which did not infect files but rather installed themselves directly on the hard drive, making them harder to detect.
The arms race has since led to a total of at least eleven distinct types of what is now called malware, a neologism meaning bad (as in malignant rather than shoddy) software. According to Wikipedia, these eleven types of malware are:
1. Virus
2. Worm
3. Wabbit
4. Trojan
5. Backdoor
6. Spyware
7. Exploit
8. Rootkit
9. Key Logger
10. Dialer
11. URL injection
There's a twelfth kind of malware: adware, which Wikipedia considers simply to be a subset of spyware.
Why Antivirus Software Isn't Enough for Malware
As you can see, makers of antivirus software have their work cut out for them if they're going to keep every instance of malware off your system. As a result, antivirus software makers have often had to pick their battles. Adware, whose makers often claim they are doing nothing illegal or even questionable, often gets treated more lightly.
Even when antivirus software makers do come out with a product that fights all twelve or so kinds of malware, responding to each new instance of malware to come on the market isn't easy. First the malware has to be identified, which means someone's computer, and probably tens of thousands of computers, will be infected first. Then, the malware has to be dissected. Then a removal program and a filter must both be written. Then the removal program and filter must be tested to make sure they work, and that they don't interfere with any other functions of the antivirus software or the computer itself. When a fix for the virus is out, it then has to be loaded into an antivirus software update and transmitted to every single computer worldwide that has the antivirus software installed.
The speed with which antivirus software makers are able to deliver updates for newly discovered malware would impress even Santa Claus. Yet there's still a crucial window of one to a few days between when the new malware has reached a critical mass of thousands of computers, and when the update is released. If your antivirus software is not set to check for updates automatically every hour or so, that window opens even wider.
Practically speaking, then, you're better off having more than one line of defense against malware. Even if two different anti-malware programs utilize the exact same database, there might be a crucial difference in the speed of getting updates. It makes sense to back up your antivirus software with anti-spyware software. When you consider that dedicated anti-spyware software developers make protection against the non-virus forms of malware their stock-in-trade, you can see why anti-spyware software is so essential. In fact, you should strongly consider having two anti-spyware programs running on your computer at all times, since the gap in updates between two anti-spyware programs can be even longer than for two antivirus programs.
After all, with a dozen kinds of malware out there, shouldn't you at least have two pieces of software to fight them?
About the author:
Joel Walsh writes for http://www.spyware-refuge.comon how to remove spyware: http://www.spyware-refuge.com?spyware adware blocker [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "spyware adware blocker" OR leave this bracketed message intact.]

Eliminate computer viruses forever!

Eliminate computer viruses forever!

by: Johnathan Crews

PAL Emergency Response
ATTENTION!!! New Virus Epidemic! I-Worm.Mydoom.a and GaoBot.DQ have now infected more than a million computers since they were first detected, causing losses of more than 38,500 million dollars.
Does your computer seem to be running slower than usual? If you've using the Internet over the past month, your computer may be infected with a computer Virus that your current Anti-virus software may have failed to detect and remove.
Some of this computer viruses disable many Antivirus programs so that they remain undetected! PAL Emergency Response is an Anti-virus program that works separate from any other program on your PC and will remove all the latest computer threats.
Completely wipes out all the latest viruses from your PC
Automatic updates saves you time
Works together with most other antiviral programs for extra protection!
Improves your system performance by removing previously undetected Viruses.
All versions of Windows supported
Award Winning Technology
As seen in magazines such as PC Format and Personal Computer World Regular
Price $39.95
Only $19.99 Download Now!
30 Day Money Back Guarantee
Protects your computer automatically Allows you to completely wipe viruses from your PC beyond recovery Compatible with all other Virus program for added extra security! Runs safely in background protecting you from viruses, worms, hackers and anyone invading your privacy
Updates itself automatically
Scanner finds out the latest virus threats
Disables any computer Worms and Hacking tools from entering your computer
Your PC might appear clean... but it could still be full of 'Virus threats' that most antivirus programs fail to detect and it might very well be a Serious threat to your pricacy as many viruses now record everything you type on your PC and broadcast it to the internet. This may include credit card numbers, passwords and sensitive information. Most Anti-virus programs fail to detect all viruses and users need an independent virus scanner in order to detect all viruses in your PC.
Regular Price $39.95 Only $19.99 Download Now! 30 Day Money Back Guarantee
Is PAL Emergency Response easy to use?
Just set and forget! Single click features cleans your PC immediately. Emergency Response runs conveniently in the background automatically removing the latest Virus threats.
PAL Emergency Response is Perfect for both Novice and Advanced Users.
Novice Users. Just set Emergency Response and forget it. Upon loading the program you simply check boxes for which the program will scan for added protection.
System Requirements:
Microsoft Windows™ 95/98/ME/NT/2000/XP.
2 MB hard disk space
32 MB of memory
About the author:
Jonathan Crews is a successful affiliate marketer.
Download Now
Circulated by Article Emporium


Virus prevention and removal

Virus prevention and removal

by: Ashish Jain

A virus is a piece of code that gets loaded onto your computer without your knowledge and runs against your wishes. The first known occurrence of viruses goes back to 1987 when the ARPANET was infected by one.
One common misnomer among people is that you can infect your computer just by opening an email and reading its text. That is not possible; it is usually the files attached to the email that contain the virus. The most common file types are ".SCR" ".VBS" ", ".PIF"
Prevention is better than a cure: Here are some tips to make sure that your computer does not get infected.
* Get a good Anti-Virus software like Norton Anti-Virus, MacAfee, PC Cillin etc.
* Keep your anti virus software updated by downloading new virus definitions regularly. Most Anti-Virus software comes with the feature of updating virus definitions.
* Keep your windows operating system updated by regularly downloading new updates from the Internet. Windows O/S's have a lot of security loopholes and bugs that can be easily exploited by worms and viruses.
* Make sure the anti virus scans the file each time before its opened.
* Floppy disks and removable media are a good source of viruses; always scan them before accessing files on them.
* Never open email attachments from sources that are unknown or suspicious.
* Do not open emails that have questionable subject lines.
* When in doubt about a file, don't open it.
* Even with the best of precautions bad things can still happen. Backup all your data and important files.
Even after taking all these precautions if your computer does get infected, then here are a few things that you can do:
Online clearing tools - are a good source of trying to clean out the virus, there are many Anti-Virus websites that offer free online virus detection and removal services.
Removal tools - If you have an Anti-Virus software then you can go to the website of that software and download removal tools designed specifically for the virus. However, you must find out the name of the virus that infects your PC beforehand.
If you have a backup of all your important files, you can also consider formatting your hard disk.
About the author:
Ashish Jain
M6.Net
http://www.m6.net
Ashish is an integral member of the M6.Net Web Helpers team.
Circulated by Article Emporium

How a computer virus works!

How a computer virus works!

by: Silent One

Computer viruses are mysterious and grab our attention. On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become.
For example, the thing making big news right now is the Mydoom worm, which experts estimate infected approximately a quarter-million computers in a single day (Times Online). Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. That's pretty impressive when you consider that the Melissa and ILOVEYOU viruses are incredibly simple.
In this article, we will discuss viruses -- both "traditional" viruses and the newer e-mail viruses -- so that you can learn how they work and also understand how to protect yourself. Viruses in general are on the wane, but occasionally a person finds a new way to create one, and that's when they make the news.


About the author:
http://www.a1-sypware-4u.info/
Circulated by Article Emporium

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

by: Jason Frovich

Most traditional antivirus programs rely on their database. Potentially hazardous files are matched against the database to see whether they are to be considered safe or not. Since a new virus can spread world wide within a few hours it can cause severe damage to your computer long before the manufacturer of the antivirus program identifies the virus and updates the database. You also need to go online to import the manufacturers' database to you antivirus program, which means that your computer will be online totally unprotected. The new Panda Titanium Active Scan Anti Virus 2005 however, contains TruPrevent Technologies: a new system designed to protect your computer against unknown viruses and intruders.
Every now and then you can read about a new virus and the damage it causes. The millions of viruses cost companies each time they strike. It is however not only companies that are suffering from the damages caused by viruses. A virus can be just as damaging if not more for a private Internet user by destroying important documents, family pictures and everything else you keep on your computer. Therefore should no home computer be without a good virus protection software. This way you can protect your computer and yourself from losing data, corrupted hard drives and a number of other problems. There are several anti virus programs available of which some are free and some are not. You should however always remember that you might get what you paying for, meaning that the service and the updates might be better for the paid alternatives and thereby protect your computer better.
When using a virus program you should try to find one that is fast, reliable and able to discover as many viruses as possible. Whether it is fast or not might seem unimportant if you don't use your computer that much, but you will find that an anti virus program that scans your computer faster will be used more frequently and thereby giving you a better protection. If an anti virus program should be effective when protecting your computer it needs to be able to recognise all viruses, and since new viruses are constantly created this means that the database for the program has to be constantly updated. You should therefore consider how often the different anti virus programs update their databases when choosing which antivirus program to get. You should always make sure to keep your virus program up-to-date.
One of the best anti virus programs on the market today is Panda Active Scan Anti Virus Software Online which has an unrivalled capacity for detecting viruses and other threats online which is the most common path for viruses to reach our computer. Almost all viruses today are spread through the Internet. Panda Titanium Active Scan Anti Virus 2005 is easy to install and once it is installed it finds and remove viruses automatically. Panda Titanium Active Scan Anti Virus 2005 also automatically updates itself if you want it to. In other words: Panda Anti Virus is an anti virus program that manages itself and makes sure that it is up to date and able to keep your computer safe from viruses. Panda Titanium Active Scan Anti Virus 2005 scans your entire computer, including the program itself, to make sure that a virus can't infect any part of the computer. Panda Titanium Active Scan Anti Virus 2005 doesn't just search for virus, it also search your computer for a number of other security risks like spy wares and Trojans.
Panda Titanium Active Scan Anti Virus 2005 contains TruPrevent Technologies. TruPrevent Technologies is a system designed to help Panda Anti Virus protect your computer against unknown viruses and intruders. The user can choose whether they want to use TruPrevent Technologies or not. The technology has been implemented to allow Panda Anti Virus to protect your computer against new virus since a new virus can spread world wide within a few hours. The TruPrevent Technologies allows Panda Anti Virus to detect and block viruses even if they are not yet included in the virus database. This allows Panda Titanium Active Scan Anti Virus 2005 to keep your computer safe against all viruses and not only the ones that are already identified, since you might encounter a new virus despite the fact that Panda updates their database at least once a day. Old anti virus programs - and most of the modern anti virus programs as well - can only protect you against already identified viruses. The ability to protect against unknown viruses is what Panda Titanium Active Scan Anti Virus 2005 a superior choice for an anti virus program.
Panda Titanium Active Scan Anti Virus 2005 does not only offer superior security and very user friendly functionality. It also comes with tech support where experts answer any questions that might arise.
All personal computers should have virus protection since you otherwise risk losing important document, family pictures etcetera and if you are looking for user friendliness and a superior security Panda Titanium Active Scan Anti Virus 2005 is your best choice.
You can get panda antivirus at support cave.
About the author:
Supportcave.com offers new and enhanced free Anti Virus Remover Software. Not only will these programs effectively check and clean your computer from Spyware, once installed they will also shield your computer from future Spyware intrusions and browser hijacks - before the malevolent software even have a chance to enter you PC! Anti Virus Remover Software is an important function all computer users should rely on to ensure their computer is free from nosey software and their privacy protected. http://www.supportcave.com/
Circulated by Article Emporium