Pages

Showing posts with label Virus. Show all posts
Showing posts with label Virus. Show all posts

Monday, October 21, 2013

GAMPANG MEMBUAT HALAMAN FAKE LOGIN

Dengan software ini kita akan memuat halaman fake login, sopware ini bisa digunakan untuk membuat berbagai macam halaman fake login. Mari kita mulai

1 .Matikan Antivirus
Seperti biasa software untuk melakukan keusilan selalu saja dikira virus oleh antivirus.
2. EKSEKUSI Programnya
Setelah matikan antivirus ekstrak filenya dan jalankan Phish Creator.exe



 
Setelah program terbuka, ada 2 pilihan yaitu kita ingin mengkopi halaman utama sebuah website atau kita akan mengkopi sebuah file html, tentu saja html itu adalah halaman utama dari sebuah website. Agar lebih mudah pilih saja phis an url. Perlu diingat bahwa kita harus konek internet kalau ingin memilih phish An url Dan kemudian kita masukkan alamat web yg ingin kita buat fake loginnya, misal www.facebook.com atau mail.yahoo.comatau mail.google.com. dan pada save as kita tentukan tujuan penyimpanan dari file fake loginnya, paling gampang ditempatkan saja di desktop. Kemudian klik CREATE PHISHER dan tunggu sebentar. Setelah itu nanti akan muncul peringatan bahwa fake login telah berhasil dibuat. Setelah fake login berhasil dibuat jangan lupa membuat file text bernama passes.txt dan simpan bersama file fake login tadi, membuatnya cukup notepad kosong dan simpan dengan nama passes.txt

3. Cobalah
Buka di browser file fake login tadi dan kamu akan kaget karena fake loginnya mirip banget hehehe, selanjutnya tinggal upload ke web hosting. Dan sebarkan link fake login tsb.
DOWNLOAD:
PHISH CREATOR  ( artikel di atas adalah contoh jebakan penyebar virus )

CARA GANTI SUARA DETEKSI VIRUS AVIRA

Yang pake antivirus avira pasti tau donk suara "Tulit".."Tulit" saat terdeteksi virus, suara itu cukup mengganggu ya apalagi klo leptop kita banyak virus dan kita lagi hotspotan dan kemudian bunyi tulit...tulittt.tulittt.. pasti malu2in n ketahuan kalo komputernya banyak virusnya hehe....
Dengan cara ini kamu bisa ganti suara deteksi virusnya dengan suara yang sedikit lebih bagus daripada suara bawaan avira yang bunyinya nggak meng-enakkan.
Oia avira yang aku gunakan kali ini yaitu Avira Free versi 2012. untuk versi yang lain kira2 hampir sama langkahnya.
1. Buka Aviranya

2. Klik menu Extras -> Configuration, atau kamu bisa langsung tekan F8 untuk membuka konfigurasi avira.
3. Pastikan berada pada Expert Mode.
4. Setelah berada pada Expert mode klik Tab General dan pilih menu Acoustic Alerts, lalu tinggal pilih opsi Use The Following WAVE bla...bla...bla... trus tinggal cari file suara berformat *.wav, kalo nggak punya aku sudah sediakan link downloadnya di bawah. Setelah dipilih file nya klik OK dan taaddaaa... sekarang tiap avira mendeteksi virus, suara yang muncul akan lebih enak didengar.
DOWNLOAD:

Thursday, October 17, 2013

Download Windows Defender Terbaru



Free download windows defender terbaru 

Free Download Windows Defender Version 1.1.1593 Terbaru
Hai Sobat GSoft, Kali iini Gubuk Software akan kembali share sebuah perangkat lunak. Perangkat lunak tersebut adalah Windows Defender.
Windows Defender Merupakan sebuah software yang dapat membantu melindung computer sobat dari pop-up, dapat mempercepat kinerja computer yang lambat dan melindingi dari ancaman serangan virus maupun spyware.



Free download windows defender terbaru 
Beberapa Fungsi Dari Windows Devender Version 1.1.1593 :
  • Deteksi spyware dan penghapusan.
  • Peningkatan keamanan browsing
  • Perlindungan terhadap ancaman terbaru.
 Download Windows Defender Terbaru

Sunday, October 13, 2013

5 Antivirus Gratis Terbaik 2013

5 Antivirus Gratis Terbaik 2013 - antivirus merupakan software yang wajib di instal di komputer/ laptop agan, ok mungkin agan sudah tahu akan hal tersebut ma'af jika garing, nah sekarang hal yang perlu agan ketahui adalah free antivirus terbaik di tahun 2013, mungkin agan pengguna AVG, Avast, Avira, Smadav atau yang lain nya, ingat ya antivirus gratis no crack no fake serial etc.

Ok berikut 5 Antivirus Gratis Terbaik 2013 hasil saya search

5. Microsoft Security Essentials 

Unggul dalam bidangnya membuat Microsoft tampil terdepan untuk sebuah antivirus yang tersemat di operasi sistem Windows 7 besutannya. Melindungi PC sepanjang waktu dari serangan virus, spyware, dan program merugikan lainnya. Microsoft security essentials ini tentu saja gratis anda gunakan. Kabarnya antivirus dari Microsoft muncul kekhawatiran dari antivirus lainnya sebab keunggulan yang ditawarkan sudah menyamai versi Premium dan sangat mudah digunakan.


antivirus gratis - microsoft security esentials
4. Avira Free Antivirus 2013
Salah satu program ampuh yang juga diminati di pasar software antivirus sebab sangat bagus kinerjanya dalam mendeteksi serangan virus, spywarem dan rootkit threat. Juga ampu mendeteksi berbagai malware yang mengganggu. Sayangnya, versi gratisan ini tidak bisa otomatis melacak datangya email yang masuk yang dikhawatirkan disusupi oleh virus jahat. Sehingga anda harus melakukan proses pemindaian secara konvensional.

antivirus gratis - avira
3. Ad-Aware Free Antivirus
Lebih ramping, lebih kejam, lebih cepat. Antivirus+ gratis Ad-Aware menggabungkan kami Anti-spyware legendaris dengan Antivirus yang super cepat dan gratis. Itu sekarang fitur download perlindungan (blok file jahat sebelum sedang ditulis ke disk), sandboxing (membuat tidak diketahui aplikasi berjalan dalam lingkungan virtual) dan advanced pendeteksian - antivirus gratis yang paling kuat kita belum.


antivirus gratis - ad-aware free antivirus

2. AVG AntiVirus Free 2013
Siapa yang tidak kenal dengan AVG, sudah malang melintang di dunia program antivirus berbagai penghargaan di sabetnya. Kenyang akan pengalaman sebagai musuh virus, layak dijadikan perhatian utama kita kali ini sebagai antivirus top dan ampuh melindungi komputer pribadi. Meski gratis layanannya tidak kalah juga dengan versi premium lainnya anda juga bisa mengupgradenya menjadi premium dengan mudah sekali jika anda mau. AVG sangat praktis dan mudah digunakan proses installnya juga hanya butuh beberapa menit saja.

antivirus gratis - AVG Antivirus 2013

1. avast
Avast antivirus ini tersedia dalam 2 versi gratisan dan berbayar. Hadir sangat lengkap melindungi komputer dari serangan virus dan sebangsanya. Mesin satu ini dilengkapi pula senjata melawan spyware, firewall, mengidentifikasi website yang terkandung virus, dan antispam sebagai perlindungan ganda komputer anda. Sangat muda digunakan dan aman untuk semua sistem komputer.

antivirus gratis - avast
Sudah tahu kan urutan 5 Antivirus Gratis Terbaik 2013, sekarang di no urut berapakah antibiotics antivirus agan atau sista ? silahkan di jawab melalui kolom komentar di bawah ini. 

Saturday, October 12, 2013

Daftar Proxy Tercepat Indonesia

Daftar Proxy Tercepat Indonesia - buat yang lagi nyari-nyari proxy, kali ini admin bagikan Daftar Proxy Tercepat Indonesia. Silahkan digunakan dengan baik dan gunakan dijalan yang benar.
Berikut ini merupakan daftar Proxy Tercepat di Indonesia :
  •  202.146.143.89:3128
  • 202.137.26.108:3128
  • 203.189.89.153:8080
  • 118.98.35.251:8080
  • 222.124.217.170:8080
  • 110.138.208.116:8008
  • 118.96.248.140:8080
  • 180.247.4.194:8080
  • 180.247.4.194:80
  • 116.90.208.30:8080   
  • 219.83.100.205:8080
  • 222.124.178.98:3128
  • 202.72.221.126:80
  • 125.162.243.44:8080
  • 118.96.40.165:8080
  • 118.97.171.74:3128
  • 111.94.140.115:3128
  • 202.53.255.68:3128   
  • 118.97.94.194:3128
  • 202.148.16.2:8000
  • 202.51.120.58:8080
  • 118.97.190.53:8080   
  • 110.139.133.16:3128
  • 202.146.143.3:3128
  • 180.241.218.132:3128
  • 180.243.236.210:8080
  • 210.23.70.87:80
  • 202.145.7.154:8080
  • 124.81.210.178:8080
  • 202.162.202.125:3128
  • 110.138.175.88:3128
  • 202.51.207.105:8080
  • 124.195.60.142:3128
  • 116.199.207.202:8080
  • 125.162.66.132:3128
  • 118.98.162.108:8080
  • 222.124.198.136:3128
  • 222.124.132.146:8080
  • 124.195.55.171:3128
  • 202.147.249.55:8080
  • 117.102.91.6:8080
  • 110.139.187.222:8080
  • 202.122.161.77:8080
  • 203.148.84.26:3128
  • 202.51.107.37:8080
  • 118.97.67.34:3128
  • 118.98.169.21:80
  • 202.169.241.40:8080
  • 58.147.191.77:3128
  • 118.96.135.146:8080
  • 118.96.152.81:8080
  • 118.98.163.2:8080
  • 222.124.134.205:8080
  • 61.8.70.167:8080
  • 202.154.23.225:8080
  • 118.98.169.18:80
  • 118.98.214.58:3128
  • 118.96.230.18:3128
  • 203.190.117.3:80
  • 202.43.115.16:3128
  • 118.96.200.126:8080
  • 203.153.113.188:8080
  • 118.96.57.124:3128
  • 202.123.231.125:8080
  • 118.96.13.5:8080
  • 203.128.73.146:8080
  • 110.139.188.79:8080
  • 118.96.146.83:8080
  • 202.159.15.106:8080
  • 61.247.45.110:8080
  • 118.98.219.70:3128
  • 124.195.59.77:8080
  • 222.124.192.155:8080
  • 116.66.206.161:8080
  • 125.167.121.119:3128
  • 118.96.24.227:8080
  • 125.161.40.48:8080
  • 110.136.204.63:3128
  • 202.122.163.245:8080
  • 110.137.45.170:3128
  • 117.103.170.45:8080
  • 61.247.21.58:8080
  • 222.124.213.118:8080
  • 222.124.251.151:8080
  • 116.66.204.18:8080
  • 202.138.240.3:8085
  • 222.124.192.156:8080
  • 123.108.103.214:3128
  • 110.138.240.15:3128
  • 117.103.170.42:8080
  • 119.47.93.118:8080
  • 110.137.110.235:3128
  • 110.137.122.187:8000
  • 125.163.78.51:3128
  • 125.162.245.3:3128
  • 202.138.250.54:8080
  • 125.160.76.84:8080
  • 118.96.75.142:3128
  • 118.96.207.126:8888
  • 117.103.170.44:8080
  • 58.147.191.150:3128
  • 222.124.223.42:8080
  • 202.123.231.66:3127
  • 60.253.114.26:3128
  • 115.69.217.106:8080
  • 115.166.104.199:8080
  • 125.167.78.37:80
  • 118.97.234.250:8080
  • 222.124.134.201:8080
  • 203.148.85.131:3128
  • 125.162.65.72:3128
  • 202.162.193.211:3128
  • 118.96.146.135:3128
  • 118.98.212.242:3128
  • 118.98.214.100:3128
  • 125.162.64.192:3128
  • 110.137.48.136:8080
  • 118.96.148.70:8080

Sekian info tentang Daftar Proxy Tercepat Indonesia JULI 2012 Buat yang punya daftar proxy lain nya bisa sharing ke kita ya..

Tuesday, February 16, 2010

How to Avoid Getting Ripped-Off Online

Online security is one of the top catch phrases these days, but hardly anybody knows what it means and worse, most home computer users think security only applies to corporations and online businesses.

Most people think online security means simply protecting your credit card data from fraud and theft, but it actually goes way beyond that.

The potential for mayhem and just plain disruption of your life doesn't just mean credit card fraud - it can mean having your identity stolen, your life disrupted and spending hours cleaning up after an online 'vandalism' attack.

You must protect yourself from everyone from the teenage computer hacker to the organized crime syndicate using computer worms and keystroke logging viruses.

The great news is that a number of simple techniques should protect you against the vast majority of threats, since the evil doers will simply move on to easier pastures.


Update your anti-virus files

The widespread 'Bad Trans' worm logged keystrokes and transmitted potentially sensitive data such as credit card and social security numbers to the 'bad guys'.

Though this virus contained a high level of criminal intent, it was easily blocked by anyone with up-to-date anti-virus files.

If you don't have anti-virus software with current virus definitions installed, you leave the door wide open for security problems.


Install a 'Firewall'

A firewall helps prevent unauthorized access to your computer by 'hackers'.

It closes off the entry points (called open 'ports') carried by virtually every computer connected to the Internet.

A common misconception is that firewalls are only for people with cable or other high-speed connections.

Even if you use a dial up connection to get online, a firewall can help you detect and prevent people from logging on to your computer, stealing files or even using your computer to break into others!

You can take a free test of your computer's security by logging on to http://www.symantec.com/securitycheck/ and clicking 'Find out today if you are safe'. The results may surprise you.


Use secure sites

Only give sensitive data such as credit cards, social security numbers and important passwords over a secure connection.

This means the little yellow lock appears in the lower part of your browser and nobody but the website you are connected to should be able to read the data you send.


Change passwords often

An easy way for you to protect your sensitive data and email is to change your passwords on a monthly basis, or even more often depending on how frequently you use computers away from home.

If you log on to your email at the library, in 'cyber cafes' or any other remote computer then the possibility exists that computer could have a key-stroking virus present.

This means everything you type into the computer (passwords, birthdays, social security numbers, credit cards) could be logged and used by someone else.

** Change your passwords at lease once a month.


Though not fool-proof, these security tips should help reduce your vulnerability and keep you safer online.

Tips For Safer Computing Online

New computer viruses threaten the unwary user everyday. Hackers
jeopardize your online security with invasive computer techniques to
steal your passwords, personal information, even identity.

Unscrupulous marketers bait you with free software that unleashes
spyware, trojans, or worms, on your system.

While other marketers bombard you with popups at every turn. And
others send unsolicited spy emails asking you to click links to unsafe websites that install threating software on your computer, or try to download your private information.

These are only a few of the security issues involved while online.

Read through the following list to arm your computer and protect yourself against these vicious and often malicious online attacks.


1. Install a good anti-virus software.
Here's a good free anti-virus software...
Fr** AVG Anti-Virus......
New - AVG Fr** Edition is now available for all single home users
worldwide! More detailed information can be found in the AVG Free
Edition License Agreement.
Click Here To Download:
http://www.grisoft.com/us/us_dwnl_free.php


2. Install a personal firewall.
This personal firewall is one of the best online....
http://www.zonealarm.com

3. Install a good pop up blocker.
Google has a free pop up blocker so does Yahoo. The only drawback
is you will have to download and install their toolbar.

4. Know Privacy Policy.
Read the websites privacy policy before releasing personal information.
Note do they share or sell your information with third parties. If they do you might reconsider releasing your personal information.

5. Passwords.
Never use easy to guess passwords like your favorite color, your social security number, your birthdate, words less than six characters. Mix up passwords with combinations of numbers and symbols.

6.Virus Warnings.
Don't forward virus warnings you receive in emails. It's not your
job to warn others. And you might be circulating a fake warning
designed to scare receivers into downloading trojans or removing
important files on their computer.

7. Keep It Secret.
Don't give your password to anyone. Be wary of emails asking you to give out your personal passwords for accounts online. Or emails asking you to click a link and enter your password on the site. This site might be a fake sent by hackers "phishing" for victims.

8. Primary Email Address.
Don't divulge your primary email address on unfamiliar sites. You
might be bombarded with unsolicited emails by marketers who
sell your address to third parties online.

9. Free Accounts
Set up several free email accounts with a psuedo name to handle
spam, when you register with unfamiliar sites, or to use on chat and message boards.

10. Chat Line And Message Board Warnings.
Don't release personal information on chat lines or
message boards. This is one way many identity thefts occur.

Internet Scams 102 -- Hijackings and Spyware

My friend Janice is afraid to go on the Internet because of the terrible things that might happen to her. She views a simple trip to get e-mail the way she views going alone, late at night, to a dangerous part of town.

Please . . . it’s not that bad. Though, come to think of it, it’s ALMOST that bad: hijackers can now do things to people who already have antivirus and anti-spyware programs. To people who have carefully NOT clicked on scam e-mails. Some hijackers can disable your firewall, your antivirus software, and your spyware killers. Or they can prevent antivirus and spyware from being updated.

But there are solutions. Here’s what you do:

HIJACKINGS

You know you’ve been hijacked if your start page is different and if you keep getting things you didn’t intend to get -- frequently pornographic sites and popup ads. You change things back the way they were, but they won’t stay changed.

These nasties nabbed you through a security hole in Microsoft Windows. If you haven’t been caught and don’t want to be, http://www.spywareinfo.com/articles/hijacked/prevent.php says,

“First and most simply, stop using Internet Explorer. If you use either Mozilla, Firefox or Opera, you are immune to virtually all browser hijackers.”

Actually, it’s not that simple. There are ways scammers can get around Firefox. Microsoft is also busy locking its barn doors, though I’m afraid the horse has already been stolen.

If you decide to stay with Internet Explorer, be sure to keep it up to date, especially with what they call “critical updates.”

PREVENTING ATTACKS

The most basic and most necessary protection, one you’ve probably installed already, is antivirus protection. The antivirus programs upgrade constantly to protect us from the latest viruses. Norton is the most common, and a good choice. If you prefer a simple, uncomplicated solution, go to the site that sells Norton, http://symantec.com/, and download all the antivirus protection you want.

If you’re a thorough person, however, one who wants to learn about all the options, go to http://antivirus.about.com/od/antivirussoftwarereviews/, and you will learn of problems and solutions you never dreamed existed.

WHAT YOU GET FOR NOTHING IS NOTHING -- OR WORSE

Unfortunately, an antivirus program alone is not enough these days. You need ANTI-SPYWARE.

Because the latest hijackers can disable anti-spyware -- AND keep you from downloading updates -- you want some that is really, really good. The techie who manages my website says, “Get something that can WARD OFF attacks, not just remove them after they’ve infected you. Once really vicious spyware is on your machine, it may be impossible for anyone but an expert to remove it.”

“But what about all the free anti-spyware?” you ask. If you go to http://www.apcug.net/Reports/Editorial/2004.htm, you’ll see under December 2004 an article “Beware of SCUMWARE Pretending to be Anti-Spyware” which tells one man’s experience. Sometimes what you get for nothing is nothing. Or worse than nothing.

When my computer ran slower and slower, some parts of my website disappeared, and question marks appeared all over my website homepage, I yelped for help. Should have yelped sooner, but better late than never. Asked my website manager what he uses. He uses Lavasoft’s PROFESSIONAL program of Ad-Aware and Ad-Watch. I bought it, and it found 17 pieces of spyware (Alexas and tracking cookies), plus a possible browser hijack attempt. (The techie said, “That’s nothing. They found 83 pieces of spyware on mine!” But then he’s a pro.) Ad-Aware removed all the problems except the question marks on my website home page, http://foodandfiction.com/Entrance.html. These are probably due to the attempted hijack. I’m stuck with them. Fortunately they don’t show on any computer except mine.

If you want to lead a simple life, come here to http://lavasoft.com and download their PROFESSIONAL type of Ad-Aware and Ad-Watch.

If you prefer an in-depth investigation of anti-spyware,
http://www.pcworld.com/reviews/article/0,aid,119572,00.asp can help you. They’ve tested most of the anti-spyware out there, though I must say that Ad-Aware’s pro version was not tested, only the pc version.

Just don’t wait until you’re in big trouble. Do something now!

IF YOU’VE BEEN HIJACKED

A good, basic article can be found by going to http://www.apcug.net/Reports/Editorial/2004.htm. Scroll down to September 2004 and download “Help! I’ve Been Hijacked . . .”

Another good article is, “How to Remove Adware and Spyware,” http://antivirus.about.com/od/securitytips/a/removespyware.htm.

You might also read “Invasion of the Browser Snatchers” at
http://www.pcworld.com/news/article/0,aid,84464,tk,dn021402X,00.asp. The article will explain how to undo the damage -- although some hijack damage can’t be removed that easily.

MORE INFORMATION

Here are more good sources of spyware information:

http://www.scumware.com/ - a website about nothing else but.

http://www2.spywareinfo.com/category/news/ has fascinating current Internet security news flashes, which you will enjoy if you like to feel that civilization as we know it is under constant threat.

More Free Tools Increase Security For Your PC

A recent article about preventing hackers from breaking
into your computer caused an overwhelming response by
readers.

It seems everyone has an opinion about the best software
and advice for keeping your computer safe from viruses and
online predators. The following will help you increase your
online security and usually without spending a dime!

Zone Alarm

Zone Alarm offers several versions of their
popular firewall software with various options for
increased security. The basic firewall software comes free
of charge and ranks among the most highly rated firewalls
available. The paid version helps you to eliminate
everything from pop-up windows to unwanted advertising and
also helps you track hackers back to their source.

Visit www.zonealarm.com to download your copy today,
especially if you don't already carry a firewall on your
system.

The Guru Of Security

Visit www.grc.com if you want a real "eye opener!" Frankly,
some of the things I saw on this website shocked me. I had
no idea so many potential problems existed for breaches in
your online security.

But what also shocked me was how simple most of the "fixes"
rate for securing your computer against attack. It became
very apparent to me that most computer hackers don't
exploit hardware or software weaknesses, they actually
exploit our ignorance about the simple steps we should take
to protect ourselves and others.

When you visit www.grc.com you'll see the site covers a lot
of ground. Since you might find it easy to get sidetracked
with all the interesting information, make sure to
specifically check out the "Shields Up!" area. This section
offers two comprehensive tests of your Internet connection
to check for the typical points of entry used by hackers.

The first test, "Test My Shields," checks the security of
your Internet connection itself and how much system and
personal information others can obtain without your
knowledge.

The second test, "Probe My Ports," attempts to find open
ports on your computer and evaluate how and where a hacker
could enter.

Both tests will help you spot the most common and obvious
vulnerabilities most of us face when connected to the
Internet. Also to its credit (and unlike similar sites),
this website doesn't use these tests as a lead-in to try to
sell you anything.

Free Anti-Virus Software

Visit www.grisoft.com to download a free anti-virus
software package that rivals anything you could buy. The
software comes with free updates on virus definitions
(critical for up-to-date protection) and will even certify
your outgoing email as virus free!

I have used this software myself and, though nothing rates
perfect, I have found it rivals products costing $50 or
more. If you don't carry virus protection software on your
computer, stop this minute and go to www.grisoft.com to
download the free version now.

With so many resources and advice available for free, no
valid excuse exists for not immediately securing your
computer against hackers, vandals, viruses and malicious
code.

How to thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the
ability to employ software, along with our
intelligence, to prevent viruses and spyware.
To put this article into proper perspective, we'll use
Medieval defense tactics.

This is accomplished by 3 methods. First, a firewall...
'The Castle Moat' so to speak. A firewall can't see
inside your computer beforehand though, so if any viruses
or spyware were present before the firewall was installed
then its of no use. Of course, its extremely good at preventing new
attacks.

Second, a anti-virus program.... 'The Castle Drawbridge!
They will not provide much help with spyware, but good
virus protection is as desirable as one of Avaris's
dreams! One drawback can be the updates, of course.If
you've just updated Wednesday night and a virus hits the
next day, then you may not be protected till next
Wednesday night, and by then it may be too late. If you're
smart, you will have signed up for email alerts with
the provider, or even better, you'll have a anti-virus
program that has a real time update feature. I get the
tingles when I see that little pop-up saying a update
is available and click here. Its downloaded ,installed,
and updated in about 20 seconds! A new virus or Trojan or
God forbid, a new keylogger can hit the internet and spread
in a matter of days, and I'm sure this must make the definition
writers lives a living hell. I have great admiration for
them as they could have been wealthy doctors, but they have
chosen to help us... the end users. (moment of silence here)

Last, we have anti-spyware programs,'The Flaming oil'! (my favorite).
Their update features are like the anti-virus programs,
so you have to be as vigilant with this method of defense
too as you would be with the others. I've heard there are
people out there that don't even know when their
updates run, or even if its configured to do so! I
refuse to believe this sordid rumor!

So you've got your defenses set up, you're looking good.
But the best defense is a good offense, attack!
That's what some organizations do. They prowl the net
looking for websites that harbor drive-by downloads,
URL Re-Directing and such. When they find them, they
shut them down, or report them so effective protection
can be manufactured. These people have my sincere
thanks for what they do. With identity theft on the
rise and Websense reporting that the average computer
has 28 items of Spyware on it, we need all the help we
can get. Oh sure, you're saying not my computer !
Well, lets discuss those little boxes that you click
"I Agree" to when you download something. Do you read
the entire statement? This is one way spyware has
become so rampant, because so many downloads have extra
software included in them. These can be harmful to
your computers well being. KeyLoggers, popups, adware, malware...
Need I go on?
So my idea is that we need these shining knights from the
castle to journey forth on a quest. They will be
little robots or spiders like the search engines use.
They will be given absolute power over harmful
programs they find. They will be like Gort in the
movie "The Day the Earth Stood Still".
Dell recently reported that 12% of their calls were
for spyware damage, Microsoft says half of their
reports of system crashes are caused by spyware. These
calls cost these companies millions of dollars in
revenue, which they then pass the costs of onto us,
the consumers.
Who knows, if viruses and spyware ever get controlled,
the average computer may only cost a dollar!

3 Summer Computer Tips

#1 – Summer Computer Travel
Holiday travelers should be on alert when arriving home from long weekends, such as the Fourth of July, a popular time for computer viruses to spread.

Most computer users have a tendency to turn off their computers when away on trips, which means you’re not getting newly-released anti-virus patches or anti-spyware updates; the two most common areas that cause computers problems. We recommend you update anti-virus and anti-spyware scans before opening e-mail or going online after an extended absence.

We consistently see an increase in calls for virus related problems immediately following long weekends. Avoid the problems altogether by updating your security software before using your computer. For a free listing of viruses, spyware threats and trends, visit: www.VisitingGeeks.com/downloads.htm

#2 -- Should You Leave Your Computer Running?
One question we hear frequently is, "Should I leave my desktop computer on or turn it off?"

There are 2 schools of thought…
Turning it on and off numerous times during the day subjects the microcircuits to flexing and fatigue due to change in temperatures. Over time this could lead to a break in the circuitry and result in system failure.

Leaving the computer on all the time puts excess wear on the mechanical components (the hard drive spindle motor and cooling fans).

Best compromise. First user in the morning turns it on; last user turns it off.

We leave our desktops on all the time allowing for scheduled utility tasks to run during overnight hours. We also restart the systems (to flush the RAM and reset the operating system) on a regular basis and routinely remove the case covers to clean out any dust that may have accumulated, especially around the fans and screens.

#3 -- Stop Popups!
Never click inside the window of a popup. Instead, close it by clicking on the X in the upper right corner. Many people are fooled into installing spyware applications by popups that promise to clean their system. If you receive a message saying it can help, assume it’s spyware and don’t click!


How To Take Care Of Your Laptop Computer

As the proud owner of a laptop computer, you'll want to keep
your machine in the best possible condition.

Aside from cleaning your screen and dusting the keyboard,
however, you'll need to take a few extra steps to maintain
your laptop's health:

-- Play it cool

A laptop computer generates a lot of heat, especially when
running the latest high-powered software. Too much heat and
you risk damaging the internal circuitry.

Always try to keep your laptop in a well-ventilated, cool
environment. And ensure you don't block the fan grills on
the sides, back, or bottom of the machine at any time.

-- Handle the screen carefully

Avoid touching or playing with your LCD screen.

Yes, it might be fun to watch the waves generated by your
finger against the screen, but LCD displays are fragile
devices that must be cared for.

Take care when cleaning the screen too, and use only
approved cleaning materials.

You won't want to pay the money for screen repairs or, even
worse - a new machine entirely.

-- Don't drop it

Whatever you do, don't drop your laptop computer! Keep it
safe inside of a carrying case when moving around or
traveling.

Don't leave it on the edge of a table or on an unstable
support of some kind. One ill fated drop to the floor could
spell death for your mobile office.

Try to make sure the rubber feet underneath are in good
condition and are still attached. This will prevent the
device from sliding around accidentally.

-- Be careful with those drinks...

If you need to have a drink while working or playing, be
careful not to spill it.

Your laptop computer could suffer the consequences from just
a few drops of liquid poured in the right places.

While you probably do eat and drink around it regardless,
you will want to occasionally wipe down the edges, the
keyboard, the touchpad, and maybe even wipe down the screen
to keep any dirt from accumulating.

-- Just say no to viruses

Security wise, make sure you obtain an anti-virus program.

Secondly, keep it updated!

Buying an anti-virus one month and not updating it for the
next six really negates it purpose. Your laptop computer
could be exposed to hundreds and thousands of new viruses
every month if you don't update your virus definitions.

Most anti-virus programs have automatic update methods,
eliminating the need for you to have to remember to do it
manually.

-- Avoid Popups

Pop-ups are particularly annoying on a laptop computer.
Trying to close a bunch of windows without a regular mouse
can be a nuisance.

You'll want a pop-up blocker, such as the Google Toolbar
(located at http://tools.google.com), to prevent these pop-
up ads.

Many intrusive forms of advertising, and even some viruses,
can install software on your machine by using various forms
of pop-ups. It's best to get yourself a blocker and avoid
the situation entirely.

-- Use a firewall

Always utilize a firewall on your Internet or network-
enabled laptop computer. Even if you use Windows XP's built-
in firewall (or purchase one from such companies as Norton),
your security will greatly benefit from it.

Blocking out all the unnecessary ports and closing all the
loopholes will prevent a hacker or virus from freely
entering your hard drive.

So there you go. Combine all of the above tactics and help
your laptop enjoy a happier and healthier lifestyle!

Protection for your computer system - Painless and free !

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it’s Security and Performance.
You can do something about it and you can do it FREE, using some or all of the following programs and tips.

Anti-Virus protection.
One of the best Free programs for this is AntiVir Personal Edition Anti-Virus software. Download it from:
http://www.free-av.com
Install on your PC and leave it running to block any incoming bugs or viruses! It can also be used to scan your system for any previous invasions, but be patient, this takes about 15 minutes to complete. Worth running periodically, to check all is ok.

FireWalls and Broadband.
If you are on Broadband, consider using Firewall software. Most good ISP’s now supply free. (eg AOL). If yours doesn’t, you can get a reasonably good Free personal firewall system from ‘ZoneAlarm’ at http://www.zonelabs.com .
Tip – DON’T leave your PC connected to the Internet when you are not using it! Reduce the chance of something loading while you are not monitoring things !

SpyBot finders and Ad blockers.
Various programs available on the web, both ‘Paid’ and ‘Free’. You can get good results from using 2 Free packages that are available. These are ‘SpyBot Search & Destroy’ and ‘Ad-Aware’. Downloads available at
http://www.lavasoft.de for AD-Aware
http://www.safer-networking.org for SpyBot
Using both of these packages ensures that, you get with one, any ‘bots’ that the other one misses.

Suspect you have a virus ?
If you think you already have a virus, a good Free tool for checking and killing them is McAfee Stinger. Free download at:
http://us.mcafee.com/virusInfo/default.asp?id=stinger

Some General Tips
Get in the habit of , every time you disconnect from the web, deleting ALL files from the following folders:
C:/WINDOWS/Cookies
C:/WINDOWS/Temporary Internet

Beware ‘Boys Toys’ and ‘Freebies’! Think, if someone wants to spread a bug, get tracking software onto your PC etc, the best place for them to do it is places where you go to get ‘freebies’ to download! The above sites are normally ‘ad free’, but be aware that if you download porn, free music, free games, free software, there is often a ‘price’ to pay. Always use the above programs after visiting ANY of these sorts of sites!

Alien Intruders!

You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.

Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.

So what is a virus?

A virus is a program that can self replicate or reproduce itself.

These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.

They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.

A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.

Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation

A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.

What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.

Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them. If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.

Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.

Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.

Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs.

Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.

These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.

If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.

Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.

Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.

Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.

Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.

Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.

Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently(not faster), through experience.

The never ending Spyware……story

It’s been with us since 1993, it’s gotten more intrusive, more complicated.

It’s created a whole ecosystem, so to speak.

A person sits somewhere, writing a new virus, a new application of Spyware. It is put onto the Internet and Anti-Virus and Anti-Spyware vendors begin to develop definitions to combat it, maybe even to stop it permanently. These fixes are incorporated into the new versions of the software they sell, or distribute as freeware.

Existing companies, businesses, and users struggle to keep up with what to use, overwhelmed, their lifeline to the Internet depends on it. In this portion of the ecosystem you have;
The end user. YOU!
Your Internet Provider, Hosting Service, ect.
The businesses on the Internet, all of em.
The existing companies and vendors providing the Anti-Virus and Anti-Spyware Programs.

Adding to this ecosystem, new companies start up to get into the rapidly exploding business, marketing their own software.

More additions occur as new businesses start up to sell the software the companies have produced.

New and old online users buy upgraded and new software to try and protect their personal information from being stolen. Interlaced into all the above is the knowledge required to know how to protect ourselves with the basics. A hardware or software Firewall, Anti-Virus and Anti-Spyware.

Whew! Ok, rest.

Point to ponder while resting….recent eWeek.com tests reveal that some Vendors are failing to provide solutions when it comes to finding and permanently destroying Viruses and Spyware.

Rested? Then let’s look at it from another angle shall we?

Without the person somewhere in the world writing the virus or Spyware, there would be no need for the person that is writing the program to combat it. There would be no need for the company that employs the person writing the programs to combat the virus or Spyware. No need for the Businesses that sell the programs the company markets.
Still with me? Good. And finally,
No need for the user, you, to protect yourself.
I hope this lil exercise has proved informative.

Take Care.

Basic Steps To Optimize Your Internet Security

After seeing many people complain about their weak Internet security I decided to write down some things that will help you for your Internet security.

First, here are some tips to make windows safer :

For basic security and update patches install Service Pack 2 for Windows XP or Service Pack 4 for Windows 2000.

Once a month use Windows Update so you can get the latest pacthes.

When you download software from the Internet make sure you download it from the original website.

Always run anti Trojan and anti virus software.

Even if you don't use it you have to make your Internet Explorer as safe as possible.

When you access the Internet you are browsing the web using a browser such as Internet Explorer.The Internet Explorer contains several security vulnerabilities. You should make it as safe as possible or switch your default browser to an alternative. You will have to set some options from the Manage Add-Ons in the Internet Options. You will see a list of add-ons that can be activated or deactivated. If you see any unusual entries just deactivate them so you can be sure you don't have a trojan/worm.

Under Internet Options -> Security -> Internet -> you will see the Edit Level.You should set it to high in order to disable most of the security threats.

Your Web Browser should be ok now. Let's see what we have to do from our email point of view.

Because it's built-in in their Windows system lots of users like to use Outlook Express for emailing. But it's a fact that it contains many security vulnerabilities so I advise you to use alternatives. If you use a web based Email (you can browse your email with your web browser) you can delete viruses even if you don't download them to your PC.

Make sure you have installed an Anti Virus for 100% virus protection. One that I've found to be very good and never disappointed me is the AVG Anti virus. If you take the time to regularly update it you will be safe enough with it.

Lots of people install Firewalls because they belive their Internet security will be higher. I personaly disagree. If you do not know how to best configure it, and you have to know much about the tech behind it to do so, it will just make your PC slow and software not working.You can just use the Windows XP SP2 firewall for basic security.

All this tips should make your PC safer. I browse the Internet every single day for some time now and they worked great for me. I haven't met a virus/worm for some time now.

Internet Security Basics 101

The explosive growth of the Internet has meant that thousands of people are today experiencing the joys of being online for the first time. With growth there always comes pain. Be it your growing pains as a child or the growth and development of this part of our culture called the Internet.

Firstly we need to quickly explain what the Internet is and where it came from. The Internet is the offspring of a military project called Arpanet. Arpanet was designed to provide reliable communication during global nuclear war. A vast network of interconnected computers was set up all over the world to allow the various branches of US and NATO forces to communicate with each other.

Nuclear war never came (thankfully) and the world was left with a massive network of computers all connected together with nothing to do. Colleges and universities started to use these computers for sharing research internationally. From there it grew and spread outside colleges to local homes and businesses. The World Wide Web was born and its father was a guy called Tim Berners Lee.


When you're connected to the Internet you're sharing a vast network with hundreds of millions of other users. This shared network provides resources that 15 years ago were never thought possible. Unfortunately when something is shared its open to abuse. On the Internet this abuse comes from hackers and virus creators. Their sole intent is to cause chaos and/or harm to your computer system and millions of other computer systems all over the world.


How do you combat this? You need an Internet security system. This might sound complicated but your Internet security system will be quite straigtforward being comprised of just 2 - 3 Internet security products. We'll look at each of these products in more detail now:



AntiVirus Software
The first and most critical element of your Internet security system is antivirus software. If you don't have up-to-date antivirus software on your PC you're asking for trouble. 300 new viruses appear each month and if you're not constantly protecting your system against this threat your computer will become infected with at least one virus - it's only a matter of time.


Antivirus software scans your PC for signatures of a virus. A virus signature is the unique part of that virus. It can be a a file name, how the virus behaves or the size of the virus file itself. Good antivirus software will find viruses that haven't yet infected your PC and eliminate the ones that have.

Antivirus software can only protect your computer from viruses trying to infect it via email, CD-Rom, floppy disk, Word documents or other types of computer files. Antivirus software alone will not keep your computer 100% safe. You also need to use firewall software.



Firewall Software
The use of firewall software by home computer users is a relatively new occurence. All Internet connections are a two way process. Data must be sent and received by your computer. This data is sent through something called ports. These are not physical things rather aspects of the way your computer communicates online.

Firewall software watches these ports to make sure that only safe communication is happening between your computer and other computers online. If it sees something dangerous happening it blocks that port on your computer to make sure your computer stays safe from the person who is trying to hack into your system.

An easier way to understand a firewall would be to picture your computer as an apartment complex. At the front door of this complex there is a security guard. Every person who enters the complex must pass this security guard. If the security guard recognizes the person entering as a resident he allows them to pass without saying anything. If, however, the person entering the complex is unknown to him then he will stop that person and ask for identification. If they have no business being at the apartment complex he escorts them from the building.

If you are not currently using firewall software your computer will get hacked into - that's a guarantee.

Do The Media Spread Computer Viruses?

Summary: Could the mass media hype about computer viruses actually make the problem worse?

If you believe what you hear in the media, there are an awful lot of viruses going around. No, I'm not talking about the make-you-sick kind of virus, though they get plenty of airtime, too. I'm talking about the kind of virus that enters via your internet connection rather than your nasal passages.

What the mainstream media often don't tell you--at least, in most radio and television newscasts and in the crucial headlines and opening paragraphs of newspaper articles-- is that many of these "viruses" are not viruses at all.

What Computer Viruses Really Are

The main reason the mainstream media always are in alarm over viruses is that they tend to call any malicious computer program a virus. In reality, there are at least eleven distinct types of malicious software, or malware, commonly affecting computers today. The most common of these are worms, Trojans, and spyware.

So, what's the difference between computer viruses and the other types of malware? The difference is that computer viruses are just about the only ones that regularly shut down computers and cause other obvious damage. The most common of the other kinds of malware--worms, Trojans, and spyware--are usually only detectable with a special scan.

The Real Danger of Computer Viruses

If the other types of malware are so unobtrusive that they can only be detected with a special scan, then what's to worry about? For starters, these programs are called malicious for a reason: they are designed to cause some kind of damage, if not to your computer, then to someone else's.

Worms are most famously used to damage, destroy, or disrupt other computer networks than the one on which the host computer is located. For instance, worms have been used by website owners to shut down rival websites by sending overwhelming numbers of requests to the computer that hosts that website. Worms have also been used to send out viruses to other computers, often without infecting the host machine--after all, what would it benefit the worm to shut down its host computer?

Trojans, in turn, are often used to insert worms and other malware on your computer, even if the Trojan itself does no damage.

But even if you don't care what happens to anyone else, you should still be concerned about one kind of malware: spyware, a kind of malware that, true to its name, collects data from your computer and sends it back to a remote host.

Most spyware is only interested in monitoring your internet usage so it can tell other programs, called adware, what advertising to popup on your computer. However, there are criminal spyware programs that steal financial data, or perform a thorough identity theft. Don't think you have personal or financial data on your computer? Some spyware programs contain a keylogger, which is a program that copies whatever you type, usually in order to snatch passwords. Even if you keep no financial information on your computer, if you ever buy anything over the web, the keylogger would allow its owner to buy stuff using the same information you typed in to buy stuff yourself.

Why Blame the Media?

Given the danger of all these different types of malware, isn't it a good thing that the mass media are becoming hysterical about it? And can't they be forgiven the sloppy reporting of calling Trojans, worms, spyware, and other malware "viruses"?

No, no, no.

This is a classic case of bad reporting doing more damage than no reporting at all. In this case, the damage bad reporting has done is to promote a common myth that goes something like this: "The only malicious software is a virus. Viruses damage your computer. Therefore, if my computer is working OK, my computer has no malicious software. I only need to scan my computer for problems when there is a sign of problems."

Thanks to this myth, many people complacently let their antivirus software go months out of date, not wanting to be bothered with scheduling an automatic update. Just as bad, many people don't have any extra software to combat the other types of malware that may not be covered by antivirus software.

In fact, it's not uncommon for people who have found malware on their computers after a scan to say, "but I never had malware on my computer before!" But how would they have known if they had never scanned!

Until the biggest mainstream media--and especially television--start educating the public about the need to have their computers automatically scanned at least daily, the world will continue to have major, drawn-out problems with malware that could have been wiped out as soon as soon as the anti-malware software makers discovered it.

And until that day, the mainstream media will have many more opportunities to run hysterical stories about "viruses," thereby forcing them to sell more newspapers and broadcast to even larger audiences of people who suck at the information trough yet somehow never become full.

Is Your Computer Sick?

Viruses and spyware usually show up on your computer one of
two ways.

Either they invade your system with a frontal assault like
the Huns attacking the Romans, or they sneak in a back door
like a cat burglar.

Either way, once a virus or piece of spyware gets on your
system, getting it off can rate harder than curing a severe
case of trench foot!

Viruses, malicious programs designed to disrupt normal
computing, and spyware, programs intended to literally "spy"
on your activities, can enter your computer a number of
ways.

Most commonly they enter your system through an email
attachment, by sharing files with an infected computer by
disk, as a "ride along" with a 3rd party program you
install, or through a "back door" port in your computer.

Regardless of how they get on your system, once in place,
they cause no end of headaches and frustration.

The following represent typical signs you may suffer from
infection by a virus or piece of spyware.

Your computer starts acting oddly by doing things it never
did previously.

Your modem starts trying to dial out to the Internet without
you initiating a surfing session.

You notice that files start disappearing, the system stalls,
runs slowly, or even crashes frequently.

Your computer takes progressively longer to boot up every
time you start it or you notice that your available hard
drive space has disappeared. Strange popup windows appear,
even when you're not surfing the web, or you delete a
program and it "magically" reappears next time you boot the
system.

If you suspect you a virus or a piece of spyware has invaded
your computer, follow these steps to first identify and then
delete the offending code:

Step 1 - Back up your important files, but remember to scan
these files for viruses before reinstalling to avoid
accidentally re-infecting your system.

Step 2 - Update your anti-virus definitions and perform a
scan of your hard drive.

If you don't carry virus protection, or you suspect your
anti-virus software got corrupted somehow, then log on to
www.pandasoftware.com and use the free Panda Active Scan
service to check your hard drive for viruses.

Follow the instructions for quarantining and removing the
offending files.

Step 3 - Scan your hard drive with an adware, scumware, or
spyware detection and removal tool like Adaware
www.lavasoft.de/support/download/ or Spybot
http://spybot.safer-networking.de/.

Step 4 - In many cases, when the virus or spyware program
gets installed with a free utility or game you download from
the Web, you must usually uninstall the utility or game to
finally get rid of the problem once and for all.

Step 5 - Avoid re-infection by keeping your anti-virus and
firewall up-to-date at all times.

As a last resort, if you run into a program you simply can't
get rid of, but can figure out the offending file's name, do
a search for the file name on Google.com. Often you will
find you're not the first victim and may get valuable advice
for cleaning up your system.

However, be very careful of the information you find and
think twice before modifying any system files.

About the author:
Jim Edwards is a syndicated newspaper columnist and the
co-author of an amazing new ebook that will teach you how
to use fr^e articles to quickly drive thousands of targeted
visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to
your website for weeks, even months... without spending a
dime on advertising! ==> http://www.turnwordsintotraffic.com

Does Your PC Have Worms?

Worms aren't just for dogs anymore. Find out how to inoculate your computer against these nasty parasites.

What Are Worms?

Worms are descended from viruses and are even nastier. Just as ever stronger doses of pesticide breed ever more resilient locusts, better and better anti-spyware software bred ever more devious viruses.

Finally, some virus designers stopped having their creations infect and take over files the way real viruses infect and take over cells. Instead, they created programs that could stand on their own and cause plenty of trouble without the help of any other software applications. Just worms are independent organisms that can infect a host directly, so do computer worms infect computers directly.

What Do Worms Do?

Worm designers are often even more sinister than virus designers, since worm designers are not just vandals. Worm designers often use their creations to achieve specific goals:

• Backdoor creation. Worms often try to set up another kind of malware, a backdoor. A backdoor is a hidden opening in your network connection that lets the worm send data out and take data in. Practically speaking, the data it's sending out are often spam emails, and the data it takes in are instructions on spam emails to send.

• Denial of service attack. Some worm designers really are vandals rather than profit-hungry con artists sending spam. But their vandalism can be more targeted. They use worms to send out numerous requests to remote computers, such as web servers, in order to overwhelm them and therefore shut them down. This is called a denial of service attack.

• Spyware, Trojan, adware, and virus installation. Worms are often used simply to unleash other forms of malware on a computer that might otherwise block them.

• Information theft and fraud.Worms can multitask in order to set up spyware that gathers sensitive information--often financial information--and then set up backdoors, Trojans, viruses, or dialers to disseminate the stolen data.

How Do Worms End Up on a PC?

Worms enter PCs just as viruses, spyware and other malware do: any way they can! Some favorite points of entry for worms:

• Websites can actually download software to your computer without you realizing it. This software includes not only worms, but also spyware, adware, viruses, and other malware. These malware programs find their way into websites either by the deliberate design of the site owner or because hackers have installed the software on the website's server.

• Peer-to-peer file-sharing networkscontain many nice-enough-looking files that are really worms. One of the sneakiest disguises is a filename that indicates the spyware is really a video of a beautiful actress.

• Email, the favored route of viruses, can still be exploited by Spyware. But since new email programs usually block the automatic opening of file attachments, this is less of a problem than it used to be.

• Any internet connection inevitably lets data flow both in and out, and so is vulnerable to attacks by worms.

How Do You Get Rid of Worms?

There's really only one good way to make sure your computer is rid of worms: scan it with multiple antivirus and anti-spyware programs using a full-system scan. Worms are tricky, so anything less than a full-system scan might let them escape. Worse, with new worms coming out all the time, some antivirus and anti-spyware packages may not even know about a new worm until after its wreaking havoc on your machine. That's why you should try using more than one antivirus program and more than one anti-spyware program to increase your odds of successfully detecting the malware.

Don't have more than one anti-spyware and antivirus software? You'd better start downloading. After all, worms won't take excuses.

Amung

Label