Ads, Spyware and Popups: the Internet is an aggressively commercial place. Internet marketing is hugely profitable; owners of frequently visited websites can make a reasonable living just off a few banner ads placed on their site. Software was quickly developed that would attempt to block these ads from loading and being displayed leaving the Internet free from irritants so the user could just view the information that they were after. Not surprisingly the Internet fought back with ads becoming more and more tricky in their execution.
The Internet pornography industry is often at the forefront of new advertising technologies. It was they who first discovered methods to lock the 'back' button on the browser from allowing users who stumbled (accidentally or otherwise) into the 'darker' areas of the Internet. Then came Internet-hijacking: changing a browser's home page so that every time the Internet is connected the user is instantly taken to a certain site. There are ads that lie dormant in the system and pop up long after the user has moved on from the original site or even after they've stopped using the internet. These people went everywhere they could, and the rest of the Internet world soon followed.
So, how can we keep ourselves safe? Unfortunately, the answer usually lies in having a number of protection programs running in the background at all times which can slow down a computer. This is a lot more positive than having a computer terminally slowed down by the malicious side of the Internet though, so we just have to take the bad with the good.
The first port of call should be an anti-virus program. If you're even vaguely concerned about online security you're going to need one installed. A friend of mine decided that this was a foolish suggestion and picked up almost 100 viruses in a single day. These programs range in price and quality, with more expensive (but very good) packages such as Norton's Anti Virus (or their comprehensive Internet Security bundle) or free programs, such as AVG Free Edition, available from http://free.grisoft.com/freeweb.php/doc/2/
Once you have your computer protected from automated viruses it's time to shield yourself from malicious hackers and their kind with a firewall. Windows XP comes with a firewall straight out of the box, with Service Pack 2 offering security upgrades. MacOS also has a firewall. It's often not a bad idea to install a third party one though, as they are generally more customisable and in a lot of cases more secure. A few good firewalls are ZoneAlarm (http://www.zonelabs.com/store/content/home.jsp) and Kerio Personal Firewall (http://www.kerio.com/kpf_home.html) as well as those offered in the commercial Internet security packages (such as Norton's, mentioned above).
Next up is the Spyware and ad blocking software that was the initial concern. The two major software packages for spyware protection and removal are Spybot- Search and Destroy (http://www.safer-networking.org/en/index.html) and AdAware (http://www.lavasoftusa.com/software/adaware/) although there are alternatives including a recent Microsoft release. (http://www.microsoft.com/athome/security/spyware/software/default.mspx).
These threats are often not dealt with by Internet security packs (strangely enough) although some protection is now starting to be included.
Chances are you will have picked up an ad blocker somewhere in the collection of programs by now, but just in case you can make your Internet browsing experience a less commercial affair by downloading software such as Hitware Lite (http://www.rightutilities.com/products/hitwarelite/hitware_lite.htm) or Stop the Popup (http://www.stopthepopup.com/). These programs stop ads before they reach you, leaving you to browse only the information you're after.
Besides installing protection software your best bet is just to be careful with your surfing. Don't open weird emails with strange attachments if you don't know the origins (don't even open the email... often the viruses and Trojans will have an auto open script written into the email itself, so you've instantly opened up your computer by simply looking at the email). Be careful about the sites you visit. Make sure that you're well protected before entering the Internet 'grey' areas, such as ROM, Warez, Appz etc. sites. If you perform a web search and some of the sites that show up have descriptions and titles consisting only of keywords, it's usually a fair bet that you should stay clear of that site. It usually won't have anything useful to offer and may contain hazardous material. With a bit of care you can keep your system going strong and enjoy the Internet safely and relatively ad free.
Make your computer FREE of VIRUS. Provide solutions to kill virus..and safety tips....
Saturday, January 9, 2010
Spyware - Is Your Computer Safe?
Spyware is the virtual plague of the new Millenium. You no longer have to receive emails with viruses in them or even click on dangerous links on websites. Simply surfing the web can now leave you wide open to the scourge of spyware. You may also hear spyware referred to as malware.
What is spyware?
Spyware is when a program is placed on your PC without your consent. The most common way for this to happen is when you install a separate application such as a file sharing program or free download utility on your computer. The program you install also places some "extra" programs on your PC. These extra programs perform tasks from recording what websites you visit to popping up ads on your screen. More worrying are the spyware programs that record everything you type on your keyboard. That's right. Your most private instant messages, emails and chat room discussions can easily be stored and transmitted without your approval. Scary stuff!
Are there different types of spyware?
There are many different classifications of spyware but the following are the most dangerous types:
Adware
The most common type of spyware. These are small programs which sit on your computer waiting for you to go online. Once the adware detects that you're connected to the Internet it starts sending you popup, popover and popunder ads for anything from airline tickets to porn site membership. Not only that but information on your viewing habits is then sold on to marketing companies who will then send you more junk email and popup ads than you ever thought possible.
Browser Hijacker
These are just plain annoying. These install themselves on your computer and change your default homepage and search engine to something else. Every time you start your web browser it will bring you to a page filled with ads, porn or other unwanted material. This interrupts your web browsing and is intensely annoying. Most browser hijackers are also data miners. A data mining program reports your web browsing habits to a central database. This information is then sold on to marketing companies.
Keyboard Logger
These programs are designed for one thing - theft. When you log in to your online banking these can record your PIN number. When you check your private email account these programs can record your password. Keyboard loggers are potentially one of the most damaging pieces of spyware because of the potential financial dangers and theft of personal information.
Modem Hijacker
Potentially the most costly spyware. Modem hijackers are also referred to as diallers. Diallers normally install themselves to your computer via a virus infection or from warez, mp3 or adult websites. A dialler is a small piece of software that will dial long distance, premium rate phone numbers when you're not at your PC. These phone numbers are normally for adult chat line services located in Russia, China, South America and the Phillipines. I have personally seen unlucky victims receive $2,000 bills for one month of telephone calls.
How do you remove spyware from your PC?
Thankfully several responsible companies have made it their mission to help eradicate the menace of spyware. You'll need 2 - 3 programs to remove spyware from your PC. The first of these is Ad Aware which is a free download. The second application is Spybot Search and Destroy which is also a free download. Last but not least I'd recommend also getting yourself a copy of CrapCleaner 1.0. These applications can only remove the spyware already on your PC - they cannot protect your PC from being cluttered with new spyware.
How do you stop spyware infecting your PC?
1. Do not click on links offering free movies, competitions, prize draws, free software or anything that looks suspicious. If it looks like a dog, smells like a dog and walks like a dog... well it's a dog.
2. Install firewall software. This is absolutely critical for Broadband or Highspeed users. All computers connected to the Internet today should have firewall software installed - regardless of your connection speed.
3. Make sure your antivirus software is updated. Good antivirus software can find and delete the most harmful types of spyware.
If you'd like more information on fighting viruses drop by www.affiliate-advocate.com for our spyware fighting guide.
What is spyware?
Spyware is when a program is placed on your PC without your consent. The most common way for this to happen is when you install a separate application such as a file sharing program or free download utility on your computer. The program you install also places some "extra" programs on your PC. These extra programs perform tasks from recording what websites you visit to popping up ads on your screen. More worrying are the spyware programs that record everything you type on your keyboard. That's right. Your most private instant messages, emails and chat room discussions can easily be stored and transmitted without your approval. Scary stuff!
Are there different types of spyware?
There are many different classifications of spyware but the following are the most dangerous types:
Adware
The most common type of spyware. These are small programs which sit on your computer waiting for you to go online. Once the adware detects that you're connected to the Internet it starts sending you popup, popover and popunder ads for anything from airline tickets to porn site membership. Not only that but information on your viewing habits is then sold on to marketing companies who will then send you more junk email and popup ads than you ever thought possible.
Browser Hijacker
These are just plain annoying. These install themselves on your computer and change your default homepage and search engine to something else. Every time you start your web browser it will bring you to a page filled with ads, porn or other unwanted material. This interrupts your web browsing and is intensely annoying. Most browser hijackers are also data miners. A data mining program reports your web browsing habits to a central database. This information is then sold on to marketing companies.
Keyboard Logger
These programs are designed for one thing - theft. When you log in to your online banking these can record your PIN number. When you check your private email account these programs can record your password. Keyboard loggers are potentially one of the most damaging pieces of spyware because of the potential financial dangers and theft of personal information.
Modem Hijacker
Potentially the most costly spyware. Modem hijackers are also referred to as diallers. Diallers normally install themselves to your computer via a virus infection or from warez, mp3 or adult websites. A dialler is a small piece of software that will dial long distance, premium rate phone numbers when you're not at your PC. These phone numbers are normally for adult chat line services located in Russia, China, South America and the Phillipines. I have personally seen unlucky victims receive $2,000 bills for one month of telephone calls.
How do you remove spyware from your PC?
Thankfully several responsible companies have made it their mission to help eradicate the menace of spyware. You'll need 2 - 3 programs to remove spyware from your PC. The first of these is Ad Aware which is a free download. The second application is Spybot Search and Destroy which is also a free download. Last but not least I'd recommend also getting yourself a copy of CrapCleaner 1.0. These applications can only remove the spyware already on your PC - they cannot protect your PC from being cluttered with new spyware.
How do you stop spyware infecting your PC?
1. Do not click on links offering free movies, competitions, prize draws, free software or anything that looks suspicious. If it looks like a dog, smells like a dog and walks like a dog... well it's a dog.
2. Install firewall software. This is absolutely critical for Broadband or Highspeed users. All computers connected to the Internet today should have firewall software installed - regardless of your connection speed.
3. Make sure your antivirus software is updated. Good antivirus software can find and delete the most harmful types of spyware.
If you'd like more information on fighting viruses drop by www.affiliate-advocate.com for our spyware fighting guide.
Crouching Trojan, Hidden Malware
Trojans are not just more dangerous than computer viruses, they're stealthier, too. Find out where they hide.
Minions of an evil master lurk in your hard drive, crouching in your system registry, ready to pounce.
What Is a Trojan?
The word "Trojan" is a mystery to most people, even many who think they know its true meaning. If more people really understood what Trojans are and the risk they pose, there would be fewer Trojans, since fewer people would ever leave their machines vulnerable to them.
A Trojan is malware. Malware is a special kind of software, like spyware, adware, and viruses that no one wants. Yet a Trojan is more dangerous than any other kind of malware. Unlike those other types of malware, Trojans are not mindless flunkies hurled at your computer by their masters. A Trojan is a master that first craftily infiltrates your PC, then unleashes its malware henchman.
What Trojans Do
• Some Trojans may install worms, which are programs that use your computer and internet connection to send out armies of server requests in the hope of shutting a particular website down, or to spread viruses or worms to other computers.
• Other Trojans are thieves, out to steal your computer's processing power and turn it over to their hacker masters, often by setting up a backdoor, a hidden internet connection that allows for outside manipulation of your machine.
• Some thieving Trojans are fraudsters that may go after your financial information by installing keyloggers that record what you type--especially passwords and important banking numbers.
How Do Trojans Hide?
No one thinks they have a Trojan on their computer until it is too late. That's because they do such a good job of blending in.
• Trojans come disguised in innocuous file names, often pretending to be a helper application to software or an essential operating system component.
• Trojans try to avoid calling attention to themselves, and so will often only interfere a little, if at all, with your computer's performance, choosing instead to do their dirty work while your machine is idle. Computers left on and connected to the internet while their owners are asleep or at work or school are favorite targets.
How Do You Remove Trojans?
Removing Trojans can be a can of worms. Here's why you need to proceed with caution:
• Since Trojans can disguise themselves as software your computer actually needs, you could accidentally delete a vital program or system registry entry. In the worst case scenario, you won't be able to restart your computer.
• Many Trojans are trained for survival. When you try to removal them manually, they may simply copy themselves to another directory.
Intimidated? You don't have to be. Rather than trying to defuse a Trojan yourself, why not call in the bomb squad? Good anti-spyware and antivirus software will fight Trojans, too. Just make sure to look for a program that specifically says it fights Trojans. After all, this is no job for amateurs.
Minions of an evil master lurk in your hard drive, crouching in your system registry, ready to pounce.
What Is a Trojan?
The word "Trojan" is a mystery to most people, even many who think they know its true meaning. If more people really understood what Trojans are and the risk they pose, there would be fewer Trojans, since fewer people would ever leave their machines vulnerable to them.
A Trojan is malware. Malware is a special kind of software, like spyware, adware, and viruses that no one wants. Yet a Trojan is more dangerous than any other kind of malware. Unlike those other types of malware, Trojans are not mindless flunkies hurled at your computer by their masters. A Trojan is a master that first craftily infiltrates your PC, then unleashes its malware henchman.
What Trojans Do
• Some Trojans may install worms, which are programs that use your computer and internet connection to send out armies of server requests in the hope of shutting a particular website down, or to spread viruses or worms to other computers.
• Other Trojans are thieves, out to steal your computer's processing power and turn it over to their hacker masters, often by setting up a backdoor, a hidden internet connection that allows for outside manipulation of your machine.
• Some thieving Trojans are fraudsters that may go after your financial information by installing keyloggers that record what you type--especially passwords and important banking numbers.
How Do Trojans Hide?
No one thinks they have a Trojan on their computer until it is too late. That's because they do such a good job of blending in.
• Trojans come disguised in innocuous file names, often pretending to be a helper application to software or an essential operating system component.
• Trojans try to avoid calling attention to themselves, and so will often only interfere a little, if at all, with your computer's performance, choosing instead to do their dirty work while your machine is idle. Computers left on and connected to the internet while their owners are asleep or at work or school are favorite targets.
How Do You Remove Trojans?
Removing Trojans can be a can of worms. Here's why you need to proceed with caution:
• Since Trojans can disguise themselves as software your computer actually needs, you could accidentally delete a vital program or system registry entry. In the worst case scenario, you won't be able to restart your computer.
• Many Trojans are trained for survival. When you try to removal them manually, they may simply copy themselves to another directory.
Intimidated? You don't have to be. Rather than trying to defuse a Trojan yourself, why not call in the bomb squad? Good anti-spyware and antivirus software will fight Trojans, too. Just make sure to look for a program that specifically says it fights Trojans. After all, this is no job for amateurs.
Network Security 101
As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. It is important to protect your network and ensure the safety of all computers and users in that network.
What is a Network?
In order to fully understand network security, one must first understand what exactly a network is. A network is a group of computers that are connected. Computers can be connected in a variety of ways. Some of these ways include a USB port, phone line connection, Ethernet connection, or a wireless connection. The Internet is basically a network of networks. An Internet Service Provider (ISP) is also a network. When a computer connects to the internet, it joins the ISP’s network which is joined with a variety of other networks, which are joined with even more networks, and so on. These networks all encompass the Internet. The vast amount of computers on the Internet, and the number of ISPs and large networks makes network security a must.
Common Network Security Breeches
Hackers often try to hack into vulnerable networks. Hackers use a variety of different attacks to cripple a network. Whether you have a home network or a LAN, it is important to know how hackers will attack a network.
One common way for a hacker to wreak havoc is to achieve access to things that ordinary users shouldn’t have access to. In any network, administrators have the ability to make certain parts of the network “unauthorized access.” If a hacker is able to gain access to a protected area of the network, he or she can possibly affect all of the computers on the network. Some hackers attempt to break into certain networks and release viruses that affect all of the computers in the network. Some hackers can also view information that they are not supposed to see.
Destructive Attacks
There are two major categories for destructive attacks to a network. Data Diddling is the first attack. It usually is not immediately apparent that something is wrong with your computer when it has been subjected to a data diddler. Data diddlers will generally change numbers or files slightly, and the damage becomes apparent much later. Once a problem is discovered, it can be very difficult to trust any of your previous data because the culprit could have potentially fooled with many different documents.
The second type of data destruction is outright deletion. Some hackers will simply hack into a computer and delete essential files. This inevitably causes major problems for any business and can even lead to a computer being deemed useless. Hackers can rip operating systems apart and cause terrible problems to a network or a computer.
The Importance of Network Security
Knowing how destructive hackers can be shows you the importance of Network Security. Most networks have firewalls enabled that block hackers and viruses. Having anti-virus software on all computers in a network is a must. In a network, all of the computers are connected, so that if one computer gets a virus, all of the other computers can be adversely affected by this same virus. Any network administrator should have all of the essential files on back up disks. If a file is deleted by a hacker, but you have it on back up, then there is no issue. When files are lost forever, major problems ensue. Network security is an important thing for a business, or a home. Hackers try to make people’s lives difficult, but if you are ready for them, your network will be safe.
What is a Network?
In order to fully understand network security, one must first understand what exactly a network is. A network is a group of computers that are connected. Computers can be connected in a variety of ways. Some of these ways include a USB port, phone line connection, Ethernet connection, or a wireless connection. The Internet is basically a network of networks. An Internet Service Provider (ISP) is also a network. When a computer connects to the internet, it joins the ISP’s network which is joined with a variety of other networks, which are joined with even more networks, and so on. These networks all encompass the Internet. The vast amount of computers on the Internet, and the number of ISPs and large networks makes network security a must.
Common Network Security Breeches
Hackers often try to hack into vulnerable networks. Hackers use a variety of different attacks to cripple a network. Whether you have a home network or a LAN, it is important to know how hackers will attack a network.
One common way for a hacker to wreak havoc is to achieve access to things that ordinary users shouldn’t have access to. In any network, administrators have the ability to make certain parts of the network “unauthorized access.” If a hacker is able to gain access to a protected area of the network, he or she can possibly affect all of the computers on the network. Some hackers attempt to break into certain networks and release viruses that affect all of the computers in the network. Some hackers can also view information that they are not supposed to see.
Destructive Attacks
There are two major categories for destructive attacks to a network. Data Diddling is the first attack. It usually is not immediately apparent that something is wrong with your computer when it has been subjected to a data diddler. Data diddlers will generally change numbers or files slightly, and the damage becomes apparent much later. Once a problem is discovered, it can be very difficult to trust any of your previous data because the culprit could have potentially fooled with many different documents.
The second type of data destruction is outright deletion. Some hackers will simply hack into a computer and delete essential files. This inevitably causes major problems for any business and can even lead to a computer being deemed useless. Hackers can rip operating systems apart and cause terrible problems to a network or a computer.
The Importance of Network Security
Knowing how destructive hackers can be shows you the importance of Network Security. Most networks have firewalls enabled that block hackers and viruses. Having anti-virus software on all computers in a network is a must. In a network, all of the computers are connected, so that if one computer gets a virus, all of the other computers can be adversely affected by this same virus. Any network administrator should have all of the essential files on back up disks. If a file is deleted by a hacker, but you have it on back up, then there is no issue. When files are lost forever, major problems ensue. Network security is an important thing for a business, or a home. Hackers try to make people’s lives difficult, but if you are ready for them, your network will be safe.
5 Steps to Remove Spyware for Free
Have you ever tried to remove Spyware off your PC only to
find out it never left or it came back? Tired of all those
annoying Popups, Viruses, and Ads on your system day in and
day out? Well, listen closely because the day has come to
remove Spyware programs and Viruses - forever!
I will give you some very useful tricks and tips to remove
Spyware and Viruses for good! Follow closely:
Steps to Remove Spyware, Viruses, and Adware
1. There are many types of software available today that
claim to remove spyware off our system, but which one REALLY
does the job? What you need is software that not only will
remove spyware, but TOTALLY removes it for good and keeps it
off. After searching for the best of the best, here is THE
BEST: Panda Online Scan. Why? It does not constantly run
on your system, slowing it down and using bunches of memory!
In other words, it runs from Panda on the web, then searches
your whole system, will remove spyware and other bugs, then
gives detailed info on the bug and tells you how to keep it
off your system! Here is the address to get started:
http://www.stopspywareforfree.com/scan.html
It only installs a few plug-ins to run on your system, and
no full installation!
2. Check your system services and systray items! The
biggest mistake people make is never checking what programs
are running in the background or memory of the system. A key
step to remove spyware from your system is knowing this.
Without knowing these things, you probably have bugs running
on your system, and never know it! Why? They like to hide!
Download and install a program called HIJACK THIS. It tells
you exactly what is running and what is not running so you
know exactly what might be hiding behind closed doors! Here
is the address for this:
http://www.stopspywareforfree.com/hijackthis.html
3. Shutdown the SYSTEM RESTORE! (Windows XP)
Spyware and Viruses attach themselves to your system's
restore files. This is an easy way for them to hide, even
after you reinstall Windows! Right click on 'MY COMPUTER',
then click on 'Properties'. Look for a tab on top called
'System Restore', and click there. Check the box that says
'Turn off system restore on all drives'. Click 'APPLY',
then 'OK'. That's it!
4. Use an Anonymous IP address when surfing the web!
This is a huge step in keeping bugs off your system forever!
Bugs get onto your system and retrieve info about you by
capturing your IP address. Your IP address tells everyone
who you are, where you're located, your system info, what
kind of Windows you use, your browser, etc. An anonymous IP
hides your IP by using an Anonymous address and makes you
invisible to everyone, including Spyware and Ads! Here is an
address to a good proxy list:
http://www.stopspywareforfree.com/proxylist.html
Please follow these instructions carefully for Microsoft
Internet Explorer:
a) Scroll down on the page from the above link. On the
list, look at the numbers listed under IP:Port Host name.
Make sure the uptime on the right is at least 97 to 99 %.
b) Go to the Control Panel in Windows.
c) Open up ' Internet Options'.
d) Click on the 'Connections' tab on top.
e) Click on 'LAN Settings'.
f) Put a check-mark where it says PROXY SERVER.
g) In the Address box, copy and paste the IP address listed
on the proxy list (for example: 148.244.150.58 - These are
the numbers shown BEFORE the ':' (semi-colon).
h) Copy and paste the port number into the PORT box (for
example: '80' - the number immediately after the
semi-colon).
i) Click OK, and OK again to close, and close everything.
j) Go ahead and open up your browser and try surfing the
internet to test.
Thats it! You are now surfing invisibly!
For the Firefox browser:
a) Open up the browser and go to 'TOOLS' then 'OPTIONS'.
b) Go to 'GENERAL' on the left, then click the 'Connection
Settings' button below.
c) Choose 'Manual' proxy config from the choices.
d) Check the 'use the same proxy' checkbox.
e) In the 'HTTP Proxy' box, copy and paste the anonymous IP,
and the PORT number in the PORT box (remove the zero first).
f) Click OK, then OK again to close.
g) Now test your browser by surfing the web.
You are now invisible.
**note - if your browsing gets super slow or has a problem,
look for another IP and Port number on the list and try
again. Most of the time the proxies from Mexico work best.
Happy surfing! The free proxy list can be found here:
http://www.stopspywareforfree.com/proxylist.html
5. Download and install the new FIREFOX browser!
Please get rid of Microsoft Internet Explorer on your
system! It is like a pipe that feeds Spyware, Ads and
Viruses onto your system. There are just too many holes
there letting everything in. Mozilla is a fairly new company
that introduced a new breed of browser that blocks popups,
and tries hard to keep these bugs off your system. It has
very few or even NO holes or pipes to let the bugs in! Many
people use it for this very reason, and it has a great look,
better speed, and lets you change the theme of it! Awesome!
Here is the address:
http://www.stopspywareforfree.com/firefox.html
Well that about sums up how to remove spyware in 5 steps.
Follow them CLOSELY and you will see how great it is to surf
virus free Forever! Guaranteed!
find out it never left or it came back? Tired of all those
annoying Popups, Viruses, and Ads on your system day in and
day out? Well, listen closely because the day has come to
remove Spyware programs and Viruses - forever!
I will give you some very useful tricks and tips to remove
Spyware and Viruses for good! Follow closely:
Steps to Remove Spyware, Viruses, and Adware
1. There are many types of software available today that
claim to remove spyware off our system, but which one REALLY
does the job? What you need is software that not only will
remove spyware, but TOTALLY removes it for good and keeps it
off. After searching for the best of the best, here is THE
BEST: Panda Online Scan. Why? It does not constantly run
on your system, slowing it down and using bunches of memory!
In other words, it runs from Panda on the web, then searches
your whole system, will remove spyware and other bugs, then
gives detailed info on the bug and tells you how to keep it
off your system! Here is the address to get started:
http://www.stopspywareforfree.com/scan.html
It only installs a few plug-ins to run on your system, and
no full installation!
2. Check your system services and systray items! The
biggest mistake people make is never checking what programs
are running in the background or memory of the system. A key
step to remove spyware from your system is knowing this.
Without knowing these things, you probably have bugs running
on your system, and never know it! Why? They like to hide!
Download and install a program called HIJACK THIS. It tells
you exactly what is running and what is not running so you
know exactly what might be hiding behind closed doors! Here
is the address for this:
http://www.stopspywareforfree.com/hijackthis.html
3. Shutdown the SYSTEM RESTORE! (Windows XP)
Spyware and Viruses attach themselves to your system's
restore files. This is an easy way for them to hide, even
after you reinstall Windows! Right click on 'MY COMPUTER',
then click on 'Properties'. Look for a tab on top called
'System Restore', and click there. Check the box that says
'Turn off system restore on all drives'. Click 'APPLY',
then 'OK'. That's it!
4. Use an Anonymous IP address when surfing the web!
This is a huge step in keeping bugs off your system forever!
Bugs get onto your system and retrieve info about you by
capturing your IP address. Your IP address tells everyone
who you are, where you're located, your system info, what
kind of Windows you use, your browser, etc. An anonymous IP
hides your IP by using an Anonymous address and makes you
invisible to everyone, including Spyware and Ads! Here is an
address to a good proxy list:
http://www.stopspywareforfree.com/proxylist.html
Please follow these instructions carefully for Microsoft
Internet Explorer:
a) Scroll down on the page from the above link. On the
list, look at the numbers listed under IP:Port Host name.
Make sure the uptime on the right is at least 97 to 99 %.
b) Go to the Control Panel in Windows.
c) Open up ' Internet Options'.
d) Click on the 'Connections' tab on top.
e) Click on 'LAN Settings'.
f) Put a check-mark where it says PROXY SERVER.
g) In the Address box, copy and paste the IP address listed
on the proxy list (for example: 148.244.150.58 - These are
the numbers shown BEFORE the ':' (semi-colon).
h) Copy and paste the port number into the PORT box (for
example: '80' - the number immediately after the
semi-colon).
i) Click OK, and OK again to close, and close everything.
j) Go ahead and open up your browser and try surfing the
internet to test.
Thats it! You are now surfing invisibly!
For the Firefox browser:
a) Open up the browser and go to 'TOOLS' then 'OPTIONS'.
b) Go to 'GENERAL' on the left, then click the 'Connection
Settings' button below.
c) Choose 'Manual' proxy config from the choices.
d) Check the 'use the same proxy' checkbox.
e) In the 'HTTP Proxy' box, copy and paste the anonymous IP,
and the PORT number in the PORT box (remove the zero first).
f) Click OK, then OK again to close.
g) Now test your browser by surfing the web.
You are now invisible.
**note - if your browsing gets super slow or has a problem,
look for another IP and Port number on the list and try
again. Most of the time the proxies from Mexico work best.
Happy surfing! The free proxy list can be found here:
http://www.stopspywareforfree.com/proxylist.html
5. Download and install the new FIREFOX browser!
Please get rid of Microsoft Internet Explorer on your
system! It is like a pipe that feeds Spyware, Ads and
Viruses onto your system. There are just too many holes
there letting everything in. Mozilla is a fairly new company
that introduced a new breed of browser that blocks popups,
and tries hard to keep these bugs off your system. It has
very few or even NO holes or pipes to let the bugs in! Many
people use it for this very reason, and it has a great look,
better speed, and lets you change the theme of it! Awesome!
Here is the address:
http://www.stopspywareforfree.com/firefox.html
Well that about sums up how to remove spyware in 5 steps.
Follow them CLOSELY and you will see how great it is to surf
virus free Forever! Guaranteed!
Is "Spyware" Watching You?
Imagine my surprise when I received a phone call from a
friend who told me he'd been the victim of a "spyware"
attack that left him shaking at his loss of privacy.
I listened to his horror story with a sympathetic ear, but
I felt secure since I carry anti-virus software and a
firewall (both by Norton).
At his suggestion - and to my surprise - I ran a program
called "Spy Sweeper" and found a veritable minefield of
dangerous and harmful programs lurking on my computer.
"Spyware" is software that gets onto your computer and
literally "spies" on your activities.
The spying can range from relatively harmless use of
cookies tracking you across multiple websites... to
extremely dangerous "keystroke loggers" which record
passwords, credit cards, and other personal data. That data
then gets relayed to the person who put the software on
your computer.
Three primary types of spyware exist to complicate your
online life, including:
1. "cookies"
2. "adware"
3. malicious programs like "keystroke loggers"
Cookies represent mostly a danger of lost privacy.
In theory, someone could use a "cookie" to track you across
multiple sites, combine that data with several databases,
and figure out a lot more information about you than would
make you comfortable.
"Adware" tracks more than just your movement across sites,
it spies on your installed software and computer habits to
then serve up advertising, modify websites before you see
them, and generally do things without your knowledge with
the intention of trying to get you to buy things.
"Keystroke loggers" and other malicious programs exist for
one purpose: to cause personal mayhem and financial damage.
Spyware gets on your computer in one of several different
ways.
First, it rides along with software you download from the
'Net and install on your system.
Second, they come as email attachments (much like viruses)
and automatically install themselves on your computer when
you open the email message.
Third, hackers find an open port on your computer and use
the "back door" to install basically anything they want.
And fourth, the more malicious types, like keystroke
loggers, can even get installed by someone with direct
physical access to your computer such as an employer,
suspicious spouse, business competitor, or someone who
wants to know exactly what you're doing.
Now, suppose you carry an up-to-date anti-virus program and
a firewall - shouldn't that represent potent protection?
In a word: NO!
I can personally attest that even the most up-to-date anti-
virus programs and firewalls will not (repeat, WILL NOT)
catch all the spyware that can infest your computer.
You need a program that specifically scans your system for
the tens-of-thousands of existing spyware programs along
with the new ones appearing daily.
Check out "Spy Sweeper" from webroot.com - this is the
program I used to discover the spyware on my computer.
One thing I noticed, however, is that this program is a
memory hog, so once I scanned, I turned it off and then
use it 2-3 times a week... not the best strategy, but
I want to give you the "whole" picture.
I also got the following recommendations from numerous
subscribers about 2 programs to specifically help identify
and remove spyware from your system (PC):
1. "Ad Aware" from lavasoft.de
2. "Spybot Search & Destroy" from safer-networking.org
The overwhelmingly recommended firewall suggested by readers
was Zone Alarm Pro from Zone Labs
=> http://www.ebookfire.com/zonealarm.html
The bottom line seems pretty simple (but lengthy) if you
want to protect yourself against this growing threat.
~ Keep your anti-virus program current
~ Install a firewall
~ Carefully screen software before installing it
~ Scan for specifically for spyware weekly
~ Stay current on this growing threat.
friend who told me he'd been the victim of a "spyware"
attack that left him shaking at his loss of privacy.
I listened to his horror story with a sympathetic ear, but
I felt secure since I carry anti-virus software and a
firewall (both by Norton).
At his suggestion - and to my surprise - I ran a program
called "Spy Sweeper" and found a veritable minefield of
dangerous and harmful programs lurking on my computer.
"Spyware" is software that gets onto your computer and
literally "spies" on your activities.
The spying can range from relatively harmless use of
cookies tracking you across multiple websites... to
extremely dangerous "keystroke loggers" which record
passwords, credit cards, and other personal data. That data
then gets relayed to the person who put the software on
your computer.
Three primary types of spyware exist to complicate your
online life, including:
1. "cookies"
2. "adware"
3. malicious programs like "keystroke loggers"
Cookies represent mostly a danger of lost privacy.
In theory, someone could use a "cookie" to track you across
multiple sites, combine that data with several databases,
and figure out a lot more information about you than would
make you comfortable.
"Adware" tracks more than just your movement across sites,
it spies on your installed software and computer habits to
then serve up advertising, modify websites before you see
them, and generally do things without your knowledge with
the intention of trying to get you to buy things.
"Keystroke loggers" and other malicious programs exist for
one purpose: to cause personal mayhem and financial damage.
Spyware gets on your computer in one of several different
ways.
First, it rides along with software you download from the
'Net and install on your system.
Second, they come as email attachments (much like viruses)
and automatically install themselves on your computer when
you open the email message.
Third, hackers find an open port on your computer and use
the "back door" to install basically anything they want.
And fourth, the more malicious types, like keystroke
loggers, can even get installed by someone with direct
physical access to your computer such as an employer,
suspicious spouse, business competitor, or someone who
wants to know exactly what you're doing.
Now, suppose you carry an up-to-date anti-virus program and
a firewall - shouldn't that represent potent protection?
In a word: NO!
I can personally attest that even the most up-to-date anti-
virus programs and firewalls will not (repeat, WILL NOT)
catch all the spyware that can infest your computer.
You need a program that specifically scans your system for
the tens-of-thousands of existing spyware programs along
with the new ones appearing daily.
Check out "Spy Sweeper" from webroot.com - this is the
program I used to discover the spyware on my computer.
One thing I noticed, however, is that this program is a
memory hog, so once I scanned, I turned it off and then
use it 2-3 times a week... not the best strategy, but
I want to give you the "whole" picture.
I also got the following recommendations from numerous
subscribers about 2 programs to specifically help identify
and remove spyware from your system (PC):
1. "Ad Aware" from lavasoft.de
2. "Spybot Search & Destroy" from safer-networking.org
The overwhelmingly recommended firewall suggested by readers
was Zone Alarm Pro from Zone Labs
=> http://www.ebookfire.com/zonealarm.html
The bottom line seems pretty simple (but lengthy) if you
want to protect yourself against this growing threat.
~ Keep your anti-virus program current
~ Install a firewall
~ Carefully screen software before installing it
~ Scan for specifically for spyware weekly
~ Stay current on this growing threat.
Malware: Computing's Dirty Dozen
It seems that no sooner do you feel safe turning on your computer than you hear on the news about a new kind of internet security threat. Usually, the security threat is some kind of malware (though the term "security threat" no doubt sells more newspapers).
What is malware? Malware is exactly what its name implies: mal (meaning bad, in the sense of malignant or malicious rather than just poorly done) ware (short for software). More specifically, malware is software that does not benefit the computer's owner, and may even harm it, and so is purely parasitic.
The Many Faces of Malware
According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.
1. Viruses. The malware that's on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there's no need to belabor the point.
2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own.
3. Wabbits.Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it's not hard to see why: they don't do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.
4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that's only because they have bigger targets: your financial information, your computer's system resources, and sometimes even massive denial-of-service attacks launched by having thousands of computers all try to connect to a web server at the same time. Trojans can even
5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it's possible to be both adware and spyware at the same time.)
6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a "backdoor" onto a computer, providing a network connection for hackers or other malware to enter or for viruses or spam to be sent out through.
7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.
8. Rootkit. The malware most likely to have a human touch, rootkits are installed by crackers (bad hackers) on other people's computers. The rootkit is designed to camouflage itself in a system's core processes so as to go undetected. It is the hardest of all malware to detect and therefore to remove; many experts recommend completely wiping your hard drive and reinstalling everything fresh.
9. Keyloggers. No prize for guessing what this software does: yes, it logs your keystrokes, i.e., what you type. Typically, the malware kind of keyloggers (as opposed to keyloggers deliberately installed by their owners to use in diagnosis computer problems) are out to log sensitive information such as passwords and financial details.
10. Dialers. Dialers dial telephone numbers via your computer's modem. Like keyloggers, they're only malware if you don't want them. Dialers either dial expensive premium-rate telephone numbers, often located in small countries far from the host computer; or, they dial a hacker's machine to transmit stolen data.
11. URL injectors. This software "injects" a given URL in place of certain URLs when you try to visit them in your browser. Usually, the injected URL is an affiliate link to the target URL. An affiliate link is a special link used to track the traffic an affiliate (advertiser) has sent to the original website, so that the original website can pay commissions on any sales from that traffic.
12. Adware. The least dangerous and most lucrative malware (lucrative for its distributors, that is). Adware displays ads on your computer. The Wikipedia entry on malware does not give adware its own category even though adware is commonly called malware. As Wikipedia notes, adware is often a subset of spyware. The implication is that if the user chooses to allow adware on his or her machine, it's not really malware, which is the defense that most adware companies take. In reality, however, the choice to install adware is usually a legal farce involving placing a mention of the adware somewhere in the installation materials, and often only in the licensing agreement, which hardly anyone reads.
Are you ready to take on this dirty dozen? Don't go it alone. Make sure you have at least one each of antivirus and antispyware.
What is malware? Malware is exactly what its name implies: mal (meaning bad, in the sense of malignant or malicious rather than just poorly done) ware (short for software). More specifically, malware is software that does not benefit the computer's owner, and may even harm it, and so is purely parasitic.
The Many Faces of Malware
According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.
1. Viruses. The malware that's on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there's no need to belabor the point.
2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own.
3. Wabbits.Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it's not hard to see why: they don't do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.
4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that's only because they have bigger targets: your financial information, your computer's system resources, and sometimes even massive denial-of-service attacks launched by having thousands of computers all try to connect to a web server at the same time. Trojans can even
5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it's possible to be both adware and spyware at the same time.)
6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a "backdoor" onto a computer, providing a network connection for hackers or other malware to enter or for viruses or spam to be sent out through.
7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.
8. Rootkit. The malware most likely to have a human touch, rootkits are installed by crackers (bad hackers) on other people's computers. The rootkit is designed to camouflage itself in a system's core processes so as to go undetected. It is the hardest of all malware to detect and therefore to remove; many experts recommend completely wiping your hard drive and reinstalling everything fresh.
9. Keyloggers. No prize for guessing what this software does: yes, it logs your keystrokes, i.e., what you type. Typically, the malware kind of keyloggers (as opposed to keyloggers deliberately installed by their owners to use in diagnosis computer problems) are out to log sensitive information such as passwords and financial details.
10. Dialers. Dialers dial telephone numbers via your computer's modem. Like keyloggers, they're only malware if you don't want them. Dialers either dial expensive premium-rate telephone numbers, often located in small countries far from the host computer; or, they dial a hacker's machine to transmit stolen data.
11. URL injectors. This software "injects" a given URL in place of certain URLs when you try to visit them in your browser. Usually, the injected URL is an affiliate link to the target URL. An affiliate link is a special link used to track the traffic an affiliate (advertiser) has sent to the original website, so that the original website can pay commissions on any sales from that traffic.
12. Adware. The least dangerous and most lucrative malware (lucrative for its distributors, that is). Adware displays ads on your computer. The Wikipedia entry on malware does not give adware its own category even though adware is commonly called malware. As Wikipedia notes, adware is often a subset of spyware. The implication is that if the user chooses to allow adware on his or her machine, it's not really malware, which is the defense that most adware companies take. In reality, however, the choice to install adware is usually a legal farce involving placing a mention of the adware somewhere in the installation materials, and often only in the licensing agreement, which hardly anyone reads.
Are you ready to take on this dirty dozen? Don't go it alone. Make sure you have at least one each of antivirus and antispyware.
How to Increase Your Computer Speed Fast
I'm sure you've come across tons of articles and even suggestions from some of your friends on how to get your computer to work faster. Its really not that hard to increase your internet speed. I'm going to make it real simple for you and you don't need to be a computer geek to make this work. The first thing you need to remember is to never, and I mean absolutely never download programs especially free software without reading the fine print. Most free computer software will bombard your computer with spyware which will eventually bring your internet speed to a screeching halt! If your computer is already infected with spyware you can download the leading spyware remover called ad-aware which will scan your computer and remove spyware and tracking cookies from your computer.
Another way of making your computer and internet connection faster is by clicking on start, then run and typing in msconfig. Go to start tab and remove any program except your antivirus software and any other program which you must have start when windows starts. This tip will increase your computer start up time dramatically!
Step number 3, and I do this almost on a daily basis is to clean up your internet cache. Go to your control panel which you can access from your start button and click on internet options. Go to temporary internet files and clear your history. I would recommend that you also set internet history to a maximum of 2 days. Next step is to delete your temporary internet files including offline content. Last step is to delete cookies. Be careful though because deleting your cookies will also delete useful information from your computer. You can read a how to on cookies here www.howstuffworks.com/cookie.htm.
These steps are the basics you can take which will speed up your internet connection immediately. I would also recommend doing a virus check on your computer on a weekly basis. If you don't have antivirus software, get it! You'll be happy you did. Just one virus can wreak havoc on your computer! Make sure you test your internet speed whether its broadband or dial-up, before and after you take these simple steps so you can compare if these steps you've taken have worked. Taking these basic steps will make you a happy surfer and will restore your faith in the World wide web!
Another way of making your computer and internet connection faster is by clicking on start, then run and typing in msconfig. Go to start tab and remove any program except your antivirus software and any other program which you must have start when windows starts. This tip will increase your computer start up time dramatically!
Step number 3, and I do this almost on a daily basis is to clean up your internet cache. Go to your control panel which you can access from your start button and click on internet options. Go to temporary internet files and clear your history. I would recommend that you also set internet history to a maximum of 2 days. Next step is to delete your temporary internet files including offline content. Last step is to delete cookies. Be careful though because deleting your cookies will also delete useful information from your computer. You can read a how to on cookies here www.howstuffworks.com/cookie.htm.
These steps are the basics you can take which will speed up your internet connection immediately. I would also recommend doing a virus check on your computer on a weekly basis. If you don't have antivirus software, get it! You'll be happy you did. Just one virus can wreak havoc on your computer! Make sure you test your internet speed whether its broadband or dial-up, before and after you take these simple steps so you can compare if these steps you've taken have worked. Taking these basic steps will make you a happy surfer and will restore your faith in the World wide web!
How to Find What You Want with Google
Most people who search on the internet have a favorite search engine. In fact, the majority of internet users choose Google.
Do you fall into this category? If so, are you taking advantage of everything Google offers?
If an internet search means you go to www.google.com and simply type 2 or 3 words into the search box, hoping to find what you're looking for, you aren't even scratching the surface.
How Can You Get Better Results?
Google is the number one search engine for good reason - their results are generally the most accurate. Even so, there are ways to pinpoint what you're looking for even more effectively.
You have two options when it comes to fine-tuning your searches - you can use the Google Advanced Search screen or you can use "modifiers" in the main Google search.
Option 1: Google Advanced Search
When you go to www.google.com, there is a little "Advanced Search" link to the right of the main search box. If you click on that, you'll get the much more detailed Google search, where you can make very specific requests.
The first four sections, highlighted in blue, are some of the most important. Here you can specify any of the following:
1. All of the words - this will give you results with all of your search words, but not in any particular order. They can also be anywhere on the page.
2. The exact phrase - this will give you results with exactly the phrase you enter. The phrase must appear on the page exactly the way you enter it.
3. At least one of the words - this will show results with any one or more of your search words on the page.
4. Without the words - this will give you results that don't include your search terms at all.
These four sections can be used independently or combined to work together.
For example, you could search for the exact phrase 'free virus software' without the words 'trial' or 'tryout' if you're looking for free virus software but don't want trial versions that will expire after a short time.
As another example, you could use option #3 (at least one of the words) if you're looking for something but don't know exactly how to spell it. Put a few possible spellings in and it will find pages with any one or more of those spellings.
The rest of the sections on the Advanced Search page are pretty self-explanatory. One that I will point out is the Domain option. You can specify a website and either search for something only on that site, or anywhere but that site.
If you've found an interesting website that doesn't have a search function of its own, you can use this to limit Google to searching that site for whatever you're looking for. In fact, the Google search is often better even if the site does have its own search function.
You can also use it to find other references to something you might have read on a particular website. If you search for it and exclude the site you saw it on, you'll find other references to it that you can cross-check.
Option 2: Using Modifiers
Modifiers will let you use all the advanced features without having to go to the Advanced Search page every time. These modifiers can just be entered in the standard Google search box to get the same results as the advanced options.
There are quite a few different modifiers that can be used, but some of the most useful are as follows:
Putting "" around a phrase will search for the exact phrase. Searching for free antivirus software will show you pages with those three words anywhere on the page. Searching for "free antivirus software" shows you pages that contain that exact phrase.
Putting a - before a word is the same as the advanced option "without the words." So, to use the example used earlier, searching for "free virus software" -trial -tryout will show pages with that exact phrase, not including the other two words.
Using site: followed by the domain name of the website you want to search will only return results from that particular website. For example, searching for "virus protection" site:computer-help-squad.com will only return results from the www.computer-help-squad.com website.
Again, these can be combined so -site: will return results from any site except the one you specify.
How to Figure Out the Modifiers
The easiest way to see how to use modifiers in your searches is to try some searches with the Advanced Search page and see how Google formats them.
Using our example again, if you enter 'free antivirus software' in the "with the exact phrase" box and the words 'trial' and 'tryout' in the "without the words" box, the search that Google runs looks like this:
"free virus software" -trial -tryout
If you play around a bit with the advanced searches, you'll see how Google formats them for you. Next time, you can just enter them yourself in the standard search box instead of going to the Advanced Search page.
Once you get the hang of these options in Google, you'll find that your searches get even more accurate because you can filter out the stuff you don't want.
Do you fall into this category? If so, are you taking advantage of everything Google offers?
If an internet search means you go to www.google.com and simply type 2 or 3 words into the search box, hoping to find what you're looking for, you aren't even scratching the surface.
How Can You Get Better Results?
Google is the number one search engine for good reason - their results are generally the most accurate. Even so, there are ways to pinpoint what you're looking for even more effectively.
You have two options when it comes to fine-tuning your searches - you can use the Google Advanced Search screen or you can use "modifiers" in the main Google search.
Option 1: Google Advanced Search
When you go to www.google.com, there is a little "Advanced Search" link to the right of the main search box. If you click on that, you'll get the much more detailed Google search, where you can make very specific requests.
The first four sections, highlighted in blue, are some of the most important. Here you can specify any of the following:
1. All of the words - this will give you results with all of your search words, but not in any particular order. They can also be anywhere on the page.
2. The exact phrase - this will give you results with exactly the phrase you enter. The phrase must appear on the page exactly the way you enter it.
3. At least one of the words - this will show results with any one or more of your search words on the page.
4. Without the words - this will give you results that don't include your search terms at all.
These four sections can be used independently or combined to work together.
For example, you could search for the exact phrase 'free virus software' without the words 'trial' or 'tryout' if you're looking for free virus software but don't want trial versions that will expire after a short time.
As another example, you could use option #3 (at least one of the words) if you're looking for something but don't know exactly how to spell it. Put a few possible spellings in and it will find pages with any one or more of those spellings.
The rest of the sections on the Advanced Search page are pretty self-explanatory. One that I will point out is the Domain option. You can specify a website and either search for something only on that site, or anywhere but that site.
If you've found an interesting website that doesn't have a search function of its own, you can use this to limit Google to searching that site for whatever you're looking for. In fact, the Google search is often better even if the site does have its own search function.
You can also use it to find other references to something you might have read on a particular website. If you search for it and exclude the site you saw it on, you'll find other references to it that you can cross-check.
Option 2: Using Modifiers
Modifiers will let you use all the advanced features without having to go to the Advanced Search page every time. These modifiers can just be entered in the standard Google search box to get the same results as the advanced options.
There are quite a few different modifiers that can be used, but some of the most useful are as follows:
Putting "" around a phrase will search for the exact phrase. Searching for free antivirus software will show you pages with those three words anywhere on the page. Searching for "free antivirus software" shows you pages that contain that exact phrase.
Putting a - before a word is the same as the advanced option "without the words." So, to use the example used earlier, searching for "free virus software" -trial -tryout will show pages with that exact phrase, not including the other two words.
Using site: followed by the domain name of the website you want to search will only return results from that particular website. For example, searching for "virus protection" site:computer-help-squad.com will only return results from the www.computer-help-squad.com website.
Again, these can be combined so -site: will return results from any site except the one you specify.
How to Figure Out the Modifiers
The easiest way to see how to use modifiers in your searches is to try some searches with the Advanced Search page and see how Google formats them.
Using our example again, if you enter 'free antivirus software' in the "with the exact phrase" box and the words 'trial' and 'tryout' in the "without the words" box, the search that Google runs looks like this:
"free virus software" -trial -tryout
If you play around a bit with the advanced searches, you'll see how Google formats them for you. Next time, you can just enter them yourself in the standard search box instead of going to the Advanced Search page.
Once you get the hang of these options in Google, you'll find that your searches get even more accurate because you can filter out the stuff you don't want.
The Opera alternative
Security flaws have long plagued Internet Explorer (IE), the market-dominating web browser from Microsoft. IE won the early browser wars, not only because it was free and bundled with Windows, but because it had some features and capabilities that its only real competitor, Netscape, didn't have. But the behind-the-scenes programming that makes those features possible is the very coding that also leaves wide gaps in IE's defenses against viruses and malicious scripting. Among several browser alternatives for Windows users, the Opera browser stands out in functionality and integration, and is gaining a wider following as a safer surfing alternative to Internet Explorer.
To be sure, there are other browsers such as the one from Mozilla and their newest release, Firefox. There are several flavors of IE "overlays", which use the core IE programming for web page display, and thus aren't any safer than the original IE. (You should of course always use anti-virus software to protect your PC, regardless of browser. Many viruses arrive as email attachments, and opening those on a Windows-based PC will cause problems). Among non-IE browsers, it seems to be down to a two-horse race between Mozilla and Opera.
Opera, from Oslo, Norway, based Opera Software ASA, provides many popular features. An integrated email client, contact book, bookmarks with searchable notes, tabbed multiple windows, a built-in password manager, a pop-up blocker, multiple language support, saved sessions, privacy controls, built-in chat, and the ability to read RSS feeds from within Opera mail make the Opera browser a very powerful and worthwhile IE replacement candidate.
Unless you have special need for IE, such as a browser toolbar or web interaction software that you use, there is really no reason not to give Opera a try if you're worried about safe surfing. While Opera does have a paid version, you can also download a sponsored version (with ads unobtrusively placed in the browser control area), which is free
To be sure, there are other browsers such as the one from Mozilla and their newest release, Firefox. There are several flavors of IE "overlays", which use the core IE programming for web page display, and thus aren't any safer than the original IE. (You should of course always use anti-virus software to protect your PC, regardless of browser. Many viruses arrive as email attachments, and opening those on a Windows-based PC will cause problems). Among non-IE browsers, it seems to be down to a two-horse race between Mozilla and Opera.
Opera, from Oslo, Norway, based Opera Software ASA, provides many popular features. An integrated email client, contact book, bookmarks with searchable notes, tabbed multiple windows, a built-in password manager, a pop-up blocker, multiple language support, saved sessions, privacy controls, built-in chat, and the ability to read RSS feeds from within Opera mail make the Opera browser a very powerful and worthwhile IE replacement candidate.
Unless you have special need for IE, such as a browser toolbar or web interaction software that you use, there is really no reason not to give Opera a try if you're worried about safe surfing. While Opera does have a paid version, you can also download a sponsored version (with ads unobtrusively placed in the browser control area), which is free
5 Critical Steps to Protecting Your Computer on the Internet
Spyware, viruses and worms... oh my!
If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road.
With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection.
And that protection needs to be in place as soon after you hook up your new machine as possible.
The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark.
1. Running a Personal Firewall
A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet.
Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting.
If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer.
If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:
- Your computer came pre-loaded with a firewall such as Norton Internet Security or McAfee Internet Security
- You have no firewall installed and should download one ASAP.
If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free.
You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm
2. Turn on Windows Updates
Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis.
These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy.
If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not.
To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify."
To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify."
Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed.
3. Install & Update Antivirus Software
Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet.
It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded.
The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else.
In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you.
If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is.
4. Install Anti-Spyware Software
Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent.
Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones.
One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer.
Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan.
You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware
5. Set up a Free Email Account
This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail.
Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam.
If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk.
This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address.
If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire.
Some of the better free email services are www.hotmail.com, www.gmail.com and www.yahoomail.com.
If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system.
If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road.
With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection.
And that protection needs to be in place as soon after you hook up your new machine as possible.
The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark.
1. Running a Personal Firewall
A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet.
Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting.
If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer.
If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:
- Your computer came pre-loaded with a firewall such as Norton Internet Security or McAfee Internet Security
- You have no firewall installed and should download one ASAP.
If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free.
You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm
2. Turn on Windows Updates
Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis.
These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy.
If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not.
To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify."
To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify."
Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed.
3. Install & Update Antivirus Software
Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet.
It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded.
The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else.
In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you.
If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is.
4. Install Anti-Spyware Software
Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent.
Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones.
One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer.
Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan.
You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware
5. Set up a Free Email Account
This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail.
Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam.
If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk.
This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address.
If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire.
Some of the better free email services are www.hotmail.com, www.gmail.com and www.yahoomail.com.
If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system.
The Quickest Way I Know To Secure Your PC-Safety In 7 Easy Steps
The Quickest Way I Know To Secure Your PC-Safety In 7
Easy Steps And Only Using Free Software While Not Missing The
One Critical Piece Of Free Software That's Been Overlooked By
Many.
Can You Prevent Spyware, Worms, Trojans, Viruses,
... To Work When You Switch Your Pc On ?
I Can And I Do It On A Pro-active Basis.
Surfing Means More And More To Stay Invisible, To Be Clean From
The Inside And To Prevent Installment Of Malicious Software
(So Preventing Unwanted Communication From Inside To Outside
And From Outside To Inside).
How do you stay invisible while surfing? Of course
by installing a firewall. How do I get one free?
That's the easy point.
You like to stay invisible. But are you? And how do you know?
You could do a test from someone out there trying to get in.
But who can you trust?
Suppose you are doing a test. Do you obtain objective and
reliable information about your PC-vulnerability (for free)?
Now even if you stay invisible, you will visit websites
leaving cookies in your PC and you will download software.
By doing so you will get spyware, viruses, ...
How can you detect them and delete them? That's also
the easy point: you have to install an anti-virus program
and anti-spyware programs. Research on the internet makes
it clear that you need 2 anti-spyware programs. Why 2?
Because a great fish may be caught by the net but a small fish
can swim through the holes. Using 2 makes the holes smaller.
What are those 2 free programs you have to download?
Can you prevent spyware to install on your PC? Maybe,
maybe not. There is one free software that might prevent it
(but not with 100% guarantee).
And even then you need an additional freeware program to
prevent a piranha to install itself on your PC (just enabling
itself to start up whenever you switch your PC on).
This freeware program is overlooked by many and gives you
an additional feeling of relief and security. It gives you
also a hint whether some new downloaded software is good or bad
(and thus giving you the chance to delete it anyway before it
becomes too malicious).
Now you owe it to yourself to maximize the safety of your PC
for surfing. You need a firewall,an anti-virus software,
2 anti-spyware programs, one spyware preventing program,
a trusty guard preventing installment in your startup files
and even 3 musketeers. And last but not least do a safe test
to get an objective idea about the vulnerability of your PC.
Everything is free. It only needs your attention.
So look after the fully simple and logical steps in:
http://startwithoutadime.blogspot.com/2005/02/first-things-first-pc-safety_13.html
http://startwithoutadime.blogspot.com/2005/02/first-things-first-pc-safety-ii.html
After all, preventing a disease is better than curing it !!
Easy Steps And Only Using Free Software While Not Missing The
One Critical Piece Of Free Software That's Been Overlooked By
Many.
Can You Prevent Spyware, Worms, Trojans, Viruses,
... To Work When You Switch Your Pc On ?
I Can And I Do It On A Pro-active Basis.
Surfing Means More And More To Stay Invisible, To Be Clean From
The Inside And To Prevent Installment Of Malicious Software
(So Preventing Unwanted Communication From Inside To Outside
And From Outside To Inside).
How do you stay invisible while surfing? Of course
by installing a firewall. How do I get one free?
That's the easy point.
You like to stay invisible. But are you? And how do you know?
You could do a test from someone out there trying to get in.
But who can you trust?
Suppose you are doing a test. Do you obtain objective and
reliable information about your PC-vulnerability (for free)?
Now even if you stay invisible, you will visit websites
leaving cookies in your PC and you will download software.
By doing so you will get spyware, viruses, ...
How can you detect them and delete them? That's also
the easy point: you have to install an anti-virus program
and anti-spyware programs. Research on the internet makes
it clear that you need 2 anti-spyware programs. Why 2?
Because a great fish may be caught by the net but a small fish
can swim through the holes. Using 2 makes the holes smaller.
What are those 2 free programs you have to download?
Can you prevent spyware to install on your PC? Maybe,
maybe not. There is one free software that might prevent it
(but not with 100% guarantee).
And even then you need an additional freeware program to
prevent a piranha to install itself on your PC (just enabling
itself to start up whenever you switch your PC on).
This freeware program is overlooked by many and gives you
an additional feeling of relief and security. It gives you
also a hint whether some new downloaded software is good or bad
(and thus giving you the chance to delete it anyway before it
becomes too malicious).
Now you owe it to yourself to maximize the safety of your PC
for surfing. You need a firewall,an anti-virus software,
2 anti-spyware programs, one spyware preventing program,
a trusty guard preventing installment in your startup files
and even 3 musketeers. And last but not least do a safe test
to get an objective idea about the vulnerability of your PC.
Everything is free. It only needs your attention.
So look after the fully simple and logical steps in:
http://startwithoutadime.blogspot.com/2005/02/first-things-first-pc-safety_13.html
http://startwithoutadime.blogspot.com/2005/02/first-things-first-pc-safety-ii.html
After all, preventing a disease is better than curing it !!
Reclaim Your PC from the Internet Spies
Most Internet users recognize the need of protecting their computers against viruses, as the vast majority of us sooner or later become painfully aware of these nasty little programs when they shut down our PC, spam our mailbox or delete our files.
Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs.
Spywares are known by many names such as adware, trojans, malware, browser hijackers etc. The thing they all have in common is that they will transmit your personal information to companies and individuals who have an interest in knowing about your surfing habits, online purchases, credit worthiness, interests, web searchs, chats, birth date and even your credit card number. The list goes on and on, since Spywares are constructed by promotional companies who need to know as much as possible about the online consumers to target them effectively. By ewes dropping on you online, these companies hope to be more successful when sending out promotional materials.
Spyware usually enter your PC by piggybacking on other software downloads. Every time you use downloaded or otherwise shared files, including Freeware, Shareware or p2p sharing programs, you stand the risk of unknowingly infecting your computer with Spyware. Even confirmed virus free music files, films and computer programs can have Spyware stowaways. Once inside your computer, they will hide, monitor all your actions and promptly start telling your secrets to anyone willing to listen.
Contrary to most viruses the Spywares actually make an effort not to be observed. Since they won’t cause obvious harm such as deleting important files or shutting down your computer, they can thrive in your PC for years without you noticing, sending out massive amounts of information about all your online habits.
At a first glance, you might find this annoying but essentially harmless. Why not let the companies send me promotional material about things I am actually interested in? Spyware is however far from harmless, since the infiltration by Spyware not only let the companies know about your latest online search, but also much more private matters such as credit card details, online purchases of medicine and your private e-mail correspondence with family, friends and business partners.
There are even examples of how this massive gathering of personal information has led to an overall loss of privacy and stolen identities. In the computerized world of today it is not hard to imagine the amount of damage and personal suffering the fraudulent use of a persons’ identity can cause.
It is obvious to anyone that we must start combating the Spyware programs, but the best way of doing this is not to panic and pull the plug on your PC, never go online again and keep five feet away from all Freeware. There is a much better solution: Support Cave
Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs.
Spywares are known by many names such as adware, trojans, malware, browser hijackers etc. The thing they all have in common is that they will transmit your personal information to companies and individuals who have an interest in knowing about your surfing habits, online purchases, credit worthiness, interests, web searchs, chats, birth date and even your credit card number. The list goes on and on, since Spywares are constructed by promotional companies who need to know as much as possible about the online consumers to target them effectively. By ewes dropping on you online, these companies hope to be more successful when sending out promotional materials.
Spyware usually enter your PC by piggybacking on other software downloads. Every time you use downloaded or otherwise shared files, including Freeware, Shareware or p2p sharing programs, you stand the risk of unknowingly infecting your computer with Spyware. Even confirmed virus free music files, films and computer programs can have Spyware stowaways. Once inside your computer, they will hide, monitor all your actions and promptly start telling your secrets to anyone willing to listen.
Contrary to most viruses the Spywares actually make an effort not to be observed. Since they won’t cause obvious harm such as deleting important files or shutting down your computer, they can thrive in your PC for years without you noticing, sending out massive amounts of information about all your online habits.
At a first glance, you might find this annoying but essentially harmless. Why not let the companies send me promotional material about things I am actually interested in? Spyware is however far from harmless, since the infiltration by Spyware not only let the companies know about your latest online search, but also much more private matters such as credit card details, online purchases of medicine and your private e-mail correspondence with family, friends and business partners.
There are even examples of how this massive gathering of personal information has led to an overall loss of privacy and stolen identities. In the computerized world of today it is not hard to imagine the amount of damage and personal suffering the fraudulent use of a persons’ identity can cause.
It is obvious to anyone that we must start combating the Spyware programs, but the best way of doing this is not to panic and pull the plug on your PC, never go online again and keep five feet away from all Freeware. There is a much better solution: Support Cave
Registry Cleaner: Protection for Your PC
Your personal computer saves all the processes that are happening within it. The operating system has its own log of these programs running, and changes that are happening within it. What is a registry cleaner? First you must understand what a registry is. A registry is an applet within your compendium pack of an operating system. Within the term itself ¡°registry¡± registers the processes that take place. It also takes note of the automatic processes that are happening in your PC and are running in the background. Think of the registry as a big notebook of your PC¡¯s to-do list and it logs everything into it.
Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!
Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.
When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.
A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.
Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!Your personal computer saves all the processes that are happening within it. The operating system has its own log of these programs running, and changes that are happening within it. What is a registry cleaner? First you must understand what a registry is. A registry is an applet within your compendium pack of an operating system. Within the term itself ¡°registry¡± registers the processes that take place. It also takes note of the automatic processes that are happening in your PC and are running in the background. Think of the registry as a big notebook of your PC¡¯s to-do list and it logs everything into it.
Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!
Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.
When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.
A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.
Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!Your personal computer saves all the processes that are happening within it. The operating system has its own log of these programs running, and changes that are happening within it. What is a registry cleaner? First you must understand what a registry is. A registry is an applet within your compendium pack of an operating system. Within the term itself ¡°registry¡± registers the processes that take place. It also takes note of the automatic processes that are happening in your PC and are running in the background. Think of the registry as a big notebook of your PC¡¯s to-do list and it logs everything into it.
Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!
Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.
When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.
A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.
Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!
Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!
Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.
When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.
A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.
Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!Your personal computer saves all the processes that are happening within it. The operating system has its own log of these programs running, and changes that are happening within it. What is a registry cleaner? First you must understand what a registry is. A registry is an applet within your compendium pack of an operating system. Within the term itself ¡°registry¡± registers the processes that take place. It also takes note of the automatic processes that are happening in your PC and are running in the background. Think of the registry as a big notebook of your PC¡¯s to-do list and it logs everything into it.
Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!
Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.
When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.
A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.
Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!Your personal computer saves all the processes that are happening within it. The operating system has its own log of these programs running, and changes that are happening within it. What is a registry cleaner? First you must understand what a registry is. A registry is an applet within your compendium pack of an operating system. Within the term itself ¡°registry¡± registers the processes that take place. It also takes note of the automatic processes that are happening in your PC and are running in the background. Think of the registry as a big notebook of your PC¡¯s to-do list and it logs everything into it.
Why a registry cleaner important? Registry cleaners are important because it protects your PC from other processes that are not considered viruses, but can be harmful to your PC. Is your computer slowing down without your knowledge? Are you having errors that are not distinguished by your anti-virus program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must!
Your PC might be inflicted by Adwares, Spywares and Spambots. In addition, your registry might be littered with logs that commands your PC to execute these files. A registry cleaner is needed to clean some of these programs. Registry cleaners detect errors in your PC. Registry cleaners help your PC function properly and registry cleaners detect errors, and deletes and/or fixes them. For your PC to function in its optimum performance, you must have a registry cleaner. The basic programs that your PC should have in order to function properly should be: anti-virus software, firewall, anti-spam, and a good registry cleaner.
When your PC suddenly has a mind of its own, it might have caught a Spyware, or an Adware from the internet. Spywares and adwares are small programs that download themselves from the internet to your PC. They affect your PC¡¯s registry and a registry cleaner can possibly fix the errors that they cause. Spywares monitor your PC¡¯s activity?the programs running, registry information, websites visited. Adwares are annoying pop-ups and spam mails. Registry cleaners often block these from proliferating in your PC. These programs are not considered virus by your anti-virus, but it tinkers your PC¡¯s registry, and sometimes cause errors.
A registry cleaner fixes ¡°bugs¡± or errors that are inherent in your PC. If you don¡¯t have a registry cleaner, your PC will function at a slower rate. Also, without a registry cleaner, a PC will be inflicted with many annoying programs that run on the background. A registry cleaner scans, identifies and fixes the bugs that are contained in your operating system¡¯s registry. Some of the bugs in your PC are actually from other programs that you have installed. Sometimes, your PC is running programs that are non-existent anymore. Installation and uninstallation processes also affect your PC¡¯s performance. Registry cleaners also deal with these errors. Sometimes, files are corrupted when you uninstall. Some PC¡¯s even restart on their own, behaving erratically and uncontrollable. If you have these problems, you need a registry cleaner.
Registry cleaners are softwares. You can download free registry cleaners in the internet. But it is advisable to buy a licensed registry cleaner because it offers better technical support. Crashes are inevitable without registry cleaners. Losing all your data, or having a corrupted program is a nightmare, so be wise, have a registry cleaner!
Does it worth to backup emails from clients like Outlook Express?
How often do people loose their email data?
Is this important to backup your email client before loosing important emails?
Are you thinking it won’t happen to you?
Well, for those who use an email client and loosing their emails is one of the worst nightmares. Unfortunately this situation is quite probable.
There are several causes for this:
- Hard disk failure
- Viruses and Trojans
- Windows crashes
- Some time un-expected things
Hard Disk can fail from several reasons: logical problems like bad partitions, hardware problems caused by dropping them or something on them, or, sometimes they just stop functioning. You can use several data recovery tools like GetDataBack or Acronis, which might save your day. But you might not be able to get back any byte.
Viruses are increasing their numbers day by day. It’s hard to keep up even for the big players like Symantec or Kaspersky. They reduced the response time for a new virus, but if you are unlucky, the virus crashes your computer before you can apply the antivirus.
Well, we all know how reliable Windows is. There is no person that can say he never saw a “blue screen”. Because most of the email clients store email, account and settings data in My documents, Program files or in Windows registry. When you reinstall the operating system you loose them all. Even Microsoft CEO Bill Gates acknowledged that they counted 5 percent of total Windows based computers to crash twice every day. Here’s a small report: http://www.nytimes.com/2003/07/25/technology/25SOFT.html - September 1, 2005.
The best way to count those situations is to backup emails on a CD or another hard disk. People who know a little about Windows and computers can do it by hand. Outlook Express is still the most used email client.
If you want to backup Outlook Express by hand, you have to save registry keys and DBX files. Saving messages, signatures and the address book can be done within the email client, but for settings you have to search through Windows registry. It can be pretty difficult to do it for a beginner.
After a long search now I found a tool that can do this job automatically. Adolix Outlook Express Backup: http://www.adolix.com/outlook-express-backup/home.html You can use this software to backup Outlook Express, IncrediMail and some other email clients. It’s an email saver program that can backup and restore emails, addresses, folders, signatures and options.
What it cannot do is backing up Outlook Express and restoring to Pegasus Mail for instance. Synchronization can take place between different instances of the same email client.
It can be used to move emails from one computer to another. For instance if you own a laptop and a PC, you can transfer emails between them. Furthermore, you can backup Outlook Express from Windows98 and restore it to Windows XP.
Adolix Outlook Express Backup has a wizard mode for beginners, but the most experienced users can use Standard mode for more speed. It costs only $24.95 and I think worth for too much.
It’s pretty clear that anyone can loose emails. So backing up your email client is essential, but you have to decide whether to do it by hand or to purchase a tool like Adolix Outlook Express Backup.
Is this important to backup your email client before loosing important emails?
Are you thinking it won’t happen to you?
Well, for those who use an email client and loosing their emails is one of the worst nightmares. Unfortunately this situation is quite probable.
There are several causes for this:
- Hard disk failure
- Viruses and Trojans
- Windows crashes
- Some time un-expected things
Hard Disk can fail from several reasons: logical problems like bad partitions, hardware problems caused by dropping them or something on them, or, sometimes they just stop functioning. You can use several data recovery tools like GetDataBack or Acronis, which might save your day. But you might not be able to get back any byte.
Viruses are increasing their numbers day by day. It’s hard to keep up even for the big players like Symantec or Kaspersky. They reduced the response time for a new virus, but if you are unlucky, the virus crashes your computer before you can apply the antivirus.
Well, we all know how reliable Windows is. There is no person that can say he never saw a “blue screen”. Because most of the email clients store email, account and settings data in My documents, Program files or in Windows registry. When you reinstall the operating system you loose them all. Even Microsoft CEO Bill Gates acknowledged that they counted 5 percent of total Windows based computers to crash twice every day. Here’s a small report: http://www.nytimes.com/2003/07/25/technology/25SOFT.html - September 1, 2005.
The best way to count those situations is to backup emails on a CD or another hard disk. People who know a little about Windows and computers can do it by hand. Outlook Express is still the most used email client.
If you want to backup Outlook Express by hand, you have to save registry keys and DBX files. Saving messages, signatures and the address book can be done within the email client, but for settings you have to search through Windows registry. It can be pretty difficult to do it for a beginner.
After a long search now I found a tool that can do this job automatically. Adolix Outlook Express Backup: http://www.adolix.com/outlook-express-backup/home.html You can use this software to backup Outlook Express, IncrediMail and some other email clients. It’s an email saver program that can backup and restore emails, addresses, folders, signatures and options.
What it cannot do is backing up Outlook Express and restoring to Pegasus Mail for instance. Synchronization can take place between different instances of the same email client.
It can be used to move emails from one computer to another. For instance if you own a laptop and a PC, you can transfer emails between them. Furthermore, you can backup Outlook Express from Windows98 and restore it to Windows XP.
Adolix Outlook Express Backup has a wizard mode for beginners, but the most experienced users can use Standard mode for more speed. It costs only $24.95 and I think worth for too much.
It’s pretty clear that anyone can loose emails. So backing up your email client is essential, but you have to decide whether to do it by hand or to purchase a tool like Adolix Outlook Express Backup.
Are You A Spam Zombie?
Over the past few years you've all become familiar with the terms spam, spam filter, whitelists, blacklists and a whole myriad of other terminology associated with the problem of spam. You now have to add a new and extremely worrying phrase to that list - spam zombie.
With the net closing in around them spammers are looking for new and more inventive ways to send out their junk email. Spam filters and challenge response systems are becoming progressively more intelligent and blocking more spam each day. What was a spammer to do? The spammers took the next step - infiltrating your PC and using it as a spamming tool.
When most of you think of the word zombie you're reminded of old B movies with groaning zombies chasing the terrified actress through a castle, swamp or whatever low cost setting the movie revolved around. Spam zombies are, however, far more real and far more dangerous.
A spam zombie is when your computer is taken over by a type of virus called a Trojan. Once this Trojan virus is on your computer it sets up an SMTP (Simple Mail Transfer Protocol) application which allows it to begin sending email directly from your PC to tens of thousands of victims. This all happens invisibly in the background and can be difficult to detect for even the experienced computer user.
How do these Trojans get onto your computer? As in most cases they come from porn, warez or similar sites. One of the first spam zombie trojans to appear became available via a link on sites promising viewers free access to a porno webcam. One click later and the Trojan is installed on your computer ready to send out spam. Phatbot and Proxy-Guzu are two of the more common Trojans used for the purpose of turning your computer into a spam zombie.
How can you check if your computer has become a spam zombie? Make absolutely certain that both your anti-virus and firewall software have current detection signatures and have been completely patched and updated. Working online without taking these necessary security precautions is simply asking for trouble.
Internet Service Providers are under huge pressure to quarantine the IP address of any computer which has been turned into a spam zombie. This is done on the basis that the ISP risks their entire IP range being blacklisted or banned by some spam filtering services or companies.
The very least you owe yourself is to run a full virus and spyware scan on your computer today. You might be unpleasantly surprised at what you'll find lurking there.
With the net closing in around them spammers are looking for new and more inventive ways to send out their junk email. Spam filters and challenge response systems are becoming progressively more intelligent and blocking more spam each day. What was a spammer to do? The spammers took the next step - infiltrating your PC and using it as a spamming tool.
When most of you think of the word zombie you're reminded of old B movies with groaning zombies chasing the terrified actress through a castle, swamp or whatever low cost setting the movie revolved around. Spam zombies are, however, far more real and far more dangerous.
A spam zombie is when your computer is taken over by a type of virus called a Trojan. Once this Trojan virus is on your computer it sets up an SMTP (Simple Mail Transfer Protocol) application which allows it to begin sending email directly from your PC to tens of thousands of victims. This all happens invisibly in the background and can be difficult to detect for even the experienced computer user.
How do these Trojans get onto your computer? As in most cases they come from porn, warez or similar sites. One of the first spam zombie trojans to appear became available via a link on sites promising viewers free access to a porno webcam. One click later and the Trojan is installed on your computer ready to send out spam. Phatbot and Proxy-Guzu are two of the more common Trojans used for the purpose of turning your computer into a spam zombie.
How can you check if your computer has become a spam zombie? Make absolutely certain that both your anti-virus and firewall software have current detection signatures and have been completely patched and updated. Working online without taking these necessary security precautions is simply asking for trouble.
Internet Service Providers are under huge pressure to quarantine the IP address of any computer which has been turned into a spam zombie. This is done on the basis that the ISP risks their entire IP range being blacklisted or banned by some spam filtering services or companies.
The very least you owe yourself is to run a full virus and spyware scan on your computer today. You might be unpleasantly surprised at what you'll find lurking there.
How to protect yourself from online attack
It's a jungle out there on the net, but by using these few simple tricks and traps, anybody can protect themselves from the virtual beasts that lurk there, waiting to attack the unwary.
Online security is not just for big corporations. It's true that they stand to lose more, in terms of value, than you or I, but they have sufficient reserves to be able to weather the storm, whereas the average small business or man on the street is in a much more precarious position.
Using your credit or debit card online is no longer as dangerous as it once was, but
there are other ways in which use of your computer can be made difficult, even impossible. Viruses are just the tip of the iceberg. There are so many different ways in which your computer can be preyed on whilst you are online, and even after you have disconnected. Apart from worms, viruses, trojans, data miners, and keystroke loggers, there is spyware, adware and who knows what else out there. All of them trying to take advantage of you and/or your computer.
These products have many purposes. Very few of them are purely vindictive or disruptive.
For example, many viruses which install themselves onto a computer do it no harm at all. Instead, they use the email program running on the computer to send out spam, starting with everyone in the computer's address book. And although everybody I know deletes spam immediately, presumably there must be some sales, or this type of virus would be of no value to the author.
It is important to be as secure as you can, because in extreme cases, your very identity
can be stolen, and used in ways that will disadvantage you for a long time to come. And though this may be quite rare, there are many viruses or trojans which disrupt the data you have on your computer, in some cases causing so much damage that you have to reformat the disk and start again - which is fine if you have kept backups (as we have all been taught to do), but how many of us really do back our data up? We know we should do this, but when was the last time you made a complete copy of all your data?
This sort of attack tends to be at the amateur end of the scale. But if you have
children who surf the net, or you correspond with someone who has kids who surf, you are
at risk. The areas where they surf are some of the most likely sources of this type of
virus. But any of us can fall victim just by a single moment of inattention when checking
through our emails.
So how can you protect yourself from all these different threats?
- Get yourself a firewall. Sysoft offer a free personal firewall that is very good, and makes your computer invisible to many types of attack - the best defence possible.
- If you haven't got one already, install a virus-checker, such as AVG, which is available for free download and set it to start up whenever you turn on your computer.
- Schedule a daily or weekly update for your virus checker at a time when you are usually
online, but not using the computer for anything requiring 100% of its resources.
- Get a copy of Ad-Aware, available for free download, and run it once a week.
- Download and install a free copy of Spyware Blaster This will load up when you start up your computer and sit in the background, preventing access to your private data by thousands of different types of spyware. Do make sure it is regularly updated, though, or you may fall foul of a new attacker.
- Run Spybot Search and Destroy once a week to check for anything missed by your other
lines of defence.
- Even though you may have installed all these pieces of software, keep them up to date and use them religiously, it is still vital to take care with incoming emails. If you get an email which is very short and doesn't 'sound' like the person it is supposed to be from, with an attachment, DO NOT open it. Delete it straight away. If there is any doubt, still delete it, but you could email your friend and just check with them that they didn't send you anything. It is far better to be safe, and cause a tiny bit of inconvenience, than to end up trashing your hard disk.
- When making a payment online, make sure the connection is secure. Secure sites start with https:// instead of the usual http://. On IE, a yellow lock symbol will appear in the bottom right hand corner of the screen in the status bar.
- Don't make payments on public computers, such as at internet cafes, libraries and so on. You don't know how secure these are, they are very likely to be infected by keystroke recording viruses.
- In addition, if logging onto an Instant Messenger such as Yahoo or MSN on a public computer, make sure the box to remember the password is UNCHECKED, or someone could steal your identity and send offensive material to your buddies (this happened to a friend of mine).
- Finally, if it is practical, change your password regularly. However, do not fall into the trap of changing it so frequently that you cannot remember it and have to write it down or put it in a data file. That would be a lot less secure than keeping to the same password you've always had.
(To make it easy for you, I have collected links to all the above-mentioned security programs http://www.informationzone.biz/security.html
Using these tools, you can protect yourself from almost any malicious program, and if you do pick up a virus or piece of spyware, for example, you will catch it quickly, before it can do irrecoverable damage.
Online security is not just for big corporations. It's true that they stand to lose more, in terms of value, than you or I, but they have sufficient reserves to be able to weather the storm, whereas the average small business or man on the street is in a much more precarious position.
Using your credit or debit card online is no longer as dangerous as it once was, but
there are other ways in which use of your computer can be made difficult, even impossible. Viruses are just the tip of the iceberg. There are so many different ways in which your computer can be preyed on whilst you are online, and even after you have disconnected. Apart from worms, viruses, trojans, data miners, and keystroke loggers, there is spyware, adware and who knows what else out there. All of them trying to take advantage of you and/or your computer.
These products have many purposes. Very few of them are purely vindictive or disruptive.
For example, many viruses which install themselves onto a computer do it no harm at all. Instead, they use the email program running on the computer to send out spam, starting with everyone in the computer's address book. And although everybody I know deletes spam immediately, presumably there must be some sales, or this type of virus would be of no value to the author.
It is important to be as secure as you can, because in extreme cases, your very identity
can be stolen, and used in ways that will disadvantage you for a long time to come. And though this may be quite rare, there are many viruses or trojans which disrupt the data you have on your computer, in some cases causing so much damage that you have to reformat the disk and start again - which is fine if you have kept backups (as we have all been taught to do), but how many of us really do back our data up? We know we should do this, but when was the last time you made a complete copy of all your data?
This sort of attack tends to be at the amateur end of the scale. But if you have
children who surf the net, or you correspond with someone who has kids who surf, you are
at risk. The areas where they surf are some of the most likely sources of this type of
virus. But any of us can fall victim just by a single moment of inattention when checking
through our emails.
So how can you protect yourself from all these different threats?
- Get yourself a firewall. Sysoft offer a free personal firewall that is very good, and makes your computer invisible to many types of attack - the best defence possible.
- If you haven't got one already, install a virus-checker, such as AVG, which is available for free download and set it to start up whenever you turn on your computer.
- Schedule a daily or weekly update for your virus checker at a time when you are usually
online, but not using the computer for anything requiring 100% of its resources.
- Get a copy of Ad-Aware, available for free download, and run it once a week.
- Download and install a free copy of Spyware Blaster This will load up when you start up your computer and sit in the background, preventing access to your private data by thousands of different types of spyware. Do make sure it is regularly updated, though, or you may fall foul of a new attacker.
- Run Spybot Search and Destroy once a week to check for anything missed by your other
lines of defence.
- Even though you may have installed all these pieces of software, keep them up to date and use them religiously, it is still vital to take care with incoming emails. If you get an email which is very short and doesn't 'sound' like the person it is supposed to be from, with an attachment, DO NOT open it. Delete it straight away. If there is any doubt, still delete it, but you could email your friend and just check with them that they didn't send you anything. It is far better to be safe, and cause a tiny bit of inconvenience, than to end up trashing your hard disk.
- When making a payment online, make sure the connection is secure. Secure sites start with https:// instead of the usual http://. On IE, a yellow lock symbol will appear in the bottom right hand corner of the screen in the status bar.
- Don't make payments on public computers, such as at internet cafes, libraries and so on. You don't know how secure these are, they are very likely to be infected by keystroke recording viruses.
- In addition, if logging onto an Instant Messenger such as Yahoo or MSN on a public computer, make sure the box to remember the password is UNCHECKED, or someone could steal your identity and send offensive material to your buddies (this happened to a friend of mine).
- Finally, if it is practical, change your password regularly. However, do not fall into the trap of changing it so frequently that you cannot remember it and have to write it down or put it in a data file. That would be a lot less secure than keeping to the same password you've always had.
(To make it easy for you, I have collected links to all the above-mentioned security programs http://www.informationzone.biz/security.html
Using these tools, you can protect yourself from almost any malicious program, and if you do pick up a virus or piece of spyware, for example, you will catch it quickly, before it can do irrecoverable damage.
Anti Spam at the Enterprise Level
Every one of us knows how spam impacts us. Every day we either get a ton of spam - or if we're fairly well protected by spam filters - only a few pieces.
Like a large number of people, I don't use any spam filters. Ah. You think I'm insane. But wait. My problem is that I get a lot of email from marketing types which I want to receive. And the spam filtering software is not very sensitive to my needs. Even white-listing doesn't always work. So, I prefer to get all that spam and just delete it.
Now this solution can work for me despite the time it takes to delete my daily overdose of spam. However, at the enterprise level, it's a whole different story. If you have a relatively large internal network with even a modest number of email users, you're looking at a major problem. And the more users you have, the worse the problem is.
Sure, you can put up software on the mail server. Works, kind of. But pretty soon you may find you need to upgrade the mail server. And that's after you already put it on a stand-alone machine.
Rather than continuing to buy ever more expensive software to run on a machine that keeps needing to be upgraded, you might want to think about a dedicated anti spam appliance.
To give you some idea of what's possible let's take a look at Barracuda Networks dedicated anti spam appliance. All you need to do is put this baby in front of your mail server. I say baby, advisedly because this one will learn by doing and by training provided by your users.
Dean Drako, CEO of Barracuda Networks said, "Bayesian filtering is still one of the most accurate defenses against spam. The new plug-ins allow users to directly train the Bayesian filter, making the Barracuda Spam Firewall even more accurate based on the users individual email preferences. Viruses and other threats can infect the network quickly if they are not stopped at the network edge. With Intent Analysis our customers have an advantage over these threats because the Barracuda Spam Firewall is able to block them real time. Consequently we have consistently been a first responder when some of the most malicious virus attacks have hit, saving our customers from potentially devastating damage to their networks."
This is one beautiful little machine. A Barracuda Spam Firewall can support from 1,000 to 30,000 active users. It can usually be installed in less than five minutes and receives automatic hourly updates for new forms of spam and viruses. It has a 10 layer defense system beyond the use of open source anti spam and anti virus solutions: denial of service and security protection, IP block list, rate control, virus check with archive decompression, proprietary virus check, user specified rules, spam fingerprint check, Intent Analysis, spam rule-based scoring, and Bayesian analysis. Plus it also does both inbound and outbound email filtering with the inclusion of sophisticated outbound email filtering techniques (just in case you've got a spam zombie on board or somebody's got an infected PC).
However, it isn't exactly cheap. Still, when you consider the time, bandwidth, user frustration and potential hardware upgrade costs, the price may look a lot more reasonable. You can check it out at http://www.barracudanetworks.com/
If you are in the market for an anti-spam appliance, the Barracuda Spam Firewall isn't your only choice. The impact of spam on internet businesses - even those who primarily use it for just email - is so great that a simple search for "anti spam appliance" will find you a number of alternatives to examine. Even McAfee is getting into the anti spam hardware game.
I'm hoping that it won't be too long before I can pick up a Bayesian multi-level anti spam, anti virus firewall appliance for my home PC that keeps me safe and cuts my need to delete without deep-sixing the email I want or costing me more than I can afford. I suspect it's on the way.
Like a large number of people, I don't use any spam filters. Ah. You think I'm insane. But wait. My problem is that I get a lot of email from marketing types which I want to receive. And the spam filtering software is not very sensitive to my needs. Even white-listing doesn't always work. So, I prefer to get all that spam and just delete it.
Now this solution can work for me despite the time it takes to delete my daily overdose of spam. However, at the enterprise level, it's a whole different story. If you have a relatively large internal network with even a modest number of email users, you're looking at a major problem. And the more users you have, the worse the problem is.
Sure, you can put up software on the mail server. Works, kind of. But pretty soon you may find you need to upgrade the mail server. And that's after you already put it on a stand-alone machine.
Rather than continuing to buy ever more expensive software to run on a machine that keeps needing to be upgraded, you might want to think about a dedicated anti spam appliance.
To give you some idea of what's possible let's take a look at Barracuda Networks dedicated anti spam appliance. All you need to do is put this baby in front of your mail server. I say baby, advisedly because this one will learn by doing and by training provided by your users.
Dean Drako, CEO of Barracuda Networks said, "Bayesian filtering is still one of the most accurate defenses against spam. The new plug-ins allow users to directly train the Bayesian filter, making the Barracuda Spam Firewall even more accurate based on the users individual email preferences. Viruses and other threats can infect the network quickly if they are not stopped at the network edge. With Intent Analysis our customers have an advantage over these threats because the Barracuda Spam Firewall is able to block them real time. Consequently we have consistently been a first responder when some of the most malicious virus attacks have hit, saving our customers from potentially devastating damage to their networks."
This is one beautiful little machine. A Barracuda Spam Firewall can support from 1,000 to 30,000 active users. It can usually be installed in less than five minutes and receives automatic hourly updates for new forms of spam and viruses. It has a 10 layer defense system beyond the use of open source anti spam and anti virus solutions: denial of service and security protection, IP block list, rate control, virus check with archive decompression, proprietary virus check, user specified rules, spam fingerprint check, Intent Analysis, spam rule-based scoring, and Bayesian analysis. Plus it also does both inbound and outbound email filtering with the inclusion of sophisticated outbound email filtering techniques (just in case you've got a spam zombie on board or somebody's got an infected PC).
However, it isn't exactly cheap. Still, when you consider the time, bandwidth, user frustration and potential hardware upgrade costs, the price may look a lot more reasonable. You can check it out at http://www.barracudanetworks.com/
If you are in the market for an anti-spam appliance, the Barracuda Spam Firewall isn't your only choice. The impact of spam on internet businesses - even those who primarily use it for just email - is so great that a simple search for "anti spam appliance" will find you a number of alternatives to examine. Even McAfee is getting into the anti spam hardware game.
I'm hoping that it won't be too long before I can pick up a Bayesian multi-level anti spam, anti virus firewall appliance for my home PC that keeps me safe and cuts my need to delete without deep-sixing the email I want or costing me more than I can afford. I suspect it's on the way.
Internet Scams 101 -- Attacking You Through Your E-mail
The Internet is filled with scams, and eventually they wind up in your e-mail box. The ingenuity of these people is astonishing. Their goal is usually to get you to click on an e-mail attachment, so they can infect your computer with a virus, a tracking cookie, and/or a trojan horse.
• COMPUTER VIRUSES strike fear into all our hearts. When a particularly vicious virus comes out, announcements are made on television and in newspapers. For a good discussion of computer viruses, go to http://computer.howstuffworks.com/virus.htm.
• A COOKIE can be perfectly aboveboard and even helpful. For example, when you visit Amazon.com, you get a cookie which enables their computer to recognize you when you return and to remember the sort of thing you’re interested in. TRACKING COOKIES, on the other hand, record the places you go online and what links you click on, telling advertisers what type of ads should be aimed at you. It’s true, they won’t transmit a virus, but who wants an Internet bloodhound baying on their trail? Good anti-spyware will remove tracking cookies.
• A TROJAN HORSE pretends to be something it is not, such as an e-mail from a friend or something you’ve ordered. The text of the e-mail may say, “Here is the information you wanted.” Or, “Keep this as a secret between you and me.” Or, “You’ve just won our grand prize!” Anything to make you click on that attachment. Once you do, the trojan horse takes over your computer. It can do any malicious thing it wants, from erasing files to changing your desktop. It then propagates by sending itself to other people in your address book.
A good friend just had his Internet address list stolen, and I’ve been getting messages supposedly from him ever since. They all want me to click on an attachment to the e-mail. I e-mailed asking him if he’d sent that message. He had not.
Even if you’re smart enough not to click on a trojan horse attachment yourself, one of the friends on your address list may do so, your address will then be stolen, and off you go into the underworld.
Once scammers get your e-mail address, they may use it to send malicious e-mails to thousands of people in your name. I usually discover this when I get “I’m out of the office” automatic responder messages from people I never heard of. It’s frustrating, but I know it isn’t my fault.
• Anti-scam rule 1: Never click on an attachment from a good friend unless you are positive the friend sent it. It takes only a minute to click on “Reply” and ask the friend, “Did you really send this?”
• Anti-scam rule 2: Never double-click on an e-mail attachment that contains an executable, such as an EXE, COM or VBS suffix. Once you click on it, an executable can do any sort of damage it wants. (Enough people now know this to make the scammer say, “This attachment is virus-free.” If you believe that, I’ve got a nice bridge I’d like to sell you.)
• Anti-scam rule 3: Your computer CANNOT be infected by an e-mail attachment unless you click on the attachment. If you simply delete the suspicious message without clicking on a link or the attachment, you’re okay.
REAL CHUTZPAH
It’s so awful it’s funny, but after the scammers have used your stolen address to scam thousands, they have one more scam up their sleeves. This is the message they sent me:
“Your e-mail account was used to send a huge amount of spam during this week. Obviously, your computer was compromised and now contains a trojan proxy server. Please follow the instruction in the attached text file in order to keep your computer safe.
Sincerely yours,
The foodandfiction.com team.”
My first thought was, “How nice. These people are sympathetic to my problem and want to help me.” And then I thought, “Wait a minute! This message is supposedly from the foodandfiction.com team. Food and Fiction, http://foodandfiction.com, is me, myself, and I, and I never sent that message.” Of course, if my e-mail address had been, say, AOL, the message would have been signed, “the AOL.com team.” I might have thought the dear folks at AOL were trying to help me, and I’d have clicked on that attachment. Which was of course from the scammer, not AOL, and would have infected me.
• Anti-scam rule 4: Having your address stolen does NOT infect you with a virus or trojan horse. If you don’t open suspicious attachments, you are all right -- though you may want to warn your friends that they’ll be getting attachments pretending to be from you, which attachments will infect them if they open them.
• COMPUTER VIRUSES strike fear into all our hearts. When a particularly vicious virus comes out, announcements are made on television and in newspapers. For a good discussion of computer viruses, go to http://computer.howstuffworks.com/virus.htm.
• A COOKIE can be perfectly aboveboard and even helpful. For example, when you visit Amazon.com, you get a cookie which enables their computer to recognize you when you return and to remember the sort of thing you’re interested in. TRACKING COOKIES, on the other hand, record the places you go online and what links you click on, telling advertisers what type of ads should be aimed at you. It’s true, they won’t transmit a virus, but who wants an Internet bloodhound baying on their trail? Good anti-spyware will remove tracking cookies.
• A TROJAN HORSE pretends to be something it is not, such as an e-mail from a friend or something you’ve ordered. The text of the e-mail may say, “Here is the information you wanted.” Or, “Keep this as a secret between you and me.” Or, “You’ve just won our grand prize!” Anything to make you click on that attachment. Once you do, the trojan horse takes over your computer. It can do any malicious thing it wants, from erasing files to changing your desktop. It then propagates by sending itself to other people in your address book.
A good friend just had his Internet address list stolen, and I’ve been getting messages supposedly from him ever since. They all want me to click on an attachment to the e-mail. I e-mailed asking him if he’d sent that message. He had not.
Even if you’re smart enough not to click on a trojan horse attachment yourself, one of the friends on your address list may do so, your address will then be stolen, and off you go into the underworld.
Once scammers get your e-mail address, they may use it to send malicious e-mails to thousands of people in your name. I usually discover this when I get “I’m out of the office” automatic responder messages from people I never heard of. It’s frustrating, but I know it isn’t my fault.
• Anti-scam rule 1: Never click on an attachment from a good friend unless you are positive the friend sent it. It takes only a minute to click on “Reply” and ask the friend, “Did you really send this?”
• Anti-scam rule 2: Never double-click on an e-mail attachment that contains an executable, such as an EXE, COM or VBS suffix. Once you click on it, an executable can do any sort of damage it wants. (Enough people now know this to make the scammer say, “This attachment is virus-free.” If you believe that, I’ve got a nice bridge I’d like to sell you.)
• Anti-scam rule 3: Your computer CANNOT be infected by an e-mail attachment unless you click on the attachment. If you simply delete the suspicious message without clicking on a link or the attachment, you’re okay.
REAL CHUTZPAH
It’s so awful it’s funny, but after the scammers have used your stolen address to scam thousands, they have one more scam up their sleeves. This is the message they sent me:
“Your e-mail account was used to send a huge amount of spam during this week. Obviously, your computer was compromised and now contains a trojan proxy server. Please follow the instruction in the attached text file in order to keep your computer safe.
Sincerely yours,
The foodandfiction.com team.”
My first thought was, “How nice. These people are sympathetic to my problem and want to help me.” And then I thought, “Wait a minute! This message is supposedly from the foodandfiction.com team. Food and Fiction, http://foodandfiction.com, is me, myself, and I, and I never sent that message.” Of course, if my e-mail address had been, say, AOL, the message would have been signed, “the AOL.com team.” I might have thought the dear folks at AOL were trying to help me, and I’d have clicked on that attachment. Which was of course from the scammer, not AOL, and would have infected me.
• Anti-scam rule 4: Having your address stolen does NOT infect you with a virus or trojan horse. If you don’t open suspicious attachments, you are all right -- though you may want to warn your friends that they’ll be getting attachments pretending to be from you, which attachments will infect them if they open them.
How to reduce Computer problems?
How can I prevent Computer problems? This is a question that people have asked me many times. The entire process of reducing Computer problems can be bundled under the banner of Computer Preventive Maintenance.
It is not rocket science and you don’t have to be an IT professional to keep your PC in a good shape. Any computer user can follow guidelines I have mentioned below and can reduce their PC problems dramatically.
Use this article as a computer maintenance tutorial.
So what you should do as part of preventive maintenance?
1. Use a good anti virus program. This is the most important piece of work in preventive maintenance. Installing the anti virus program is not good enough. You should do following as well.
- Set-up the program to download and install updates automatically.
- Schedule periodic full system scans.
- Check the virus definitions date regularly and see whether it is up to date.
2. Set-up your PC to Download and install “Windows Updates” automatically.
Windows updates include Operating System patches for bugs and PC security related issues. These patches can reduce many unknown computer problems.
3. Install anti Spyware program to detect Spyware tools.
4. Install a Personal Firewall. Most of the anti virus programs are bundled with a Personal Firewalls these days. Personal firewall is a barrier between your PC and the outside world. This can prevent your PC from hackers and Spyware tools.
5. Do not download and install unknown software from Internet. This is the biggest mistake most of the PC users are doing. Some of this software can damage the Windows registry, which cause lot of errors.
6. Uninstall unnecessary programs installed in your PC.
7. Be very careful when you download music from the Internet. Always stick to one trustworthy web site.
8. Perform Scandisk periodically to check the Hard Drive.
9. Delete temporary Internet files.
Readers can find detailed information FREE on above at www.preventiveguru.com
Most of above tasks can be done while you are reading this article. So what are you waiting for? Start now.
It is not rocket science and you don’t have to be an IT professional to keep your PC in a good shape. Any computer user can follow guidelines I have mentioned below and can reduce their PC problems dramatically.
Use this article as a computer maintenance tutorial.
So what you should do as part of preventive maintenance?
1. Use a good anti virus program. This is the most important piece of work in preventive maintenance. Installing the anti virus program is not good enough. You should do following as well.
- Set-up the program to download and install updates automatically.
- Schedule periodic full system scans.
- Check the virus definitions date regularly and see whether it is up to date.
2. Set-up your PC to Download and install “Windows Updates” automatically.
Windows updates include Operating System patches for bugs and PC security related issues. These patches can reduce many unknown computer problems.
3. Install anti Spyware program to detect Spyware tools.
4. Install a Personal Firewall. Most of the anti virus programs are bundled with a Personal Firewalls these days. Personal firewall is a barrier between your PC and the outside world. This can prevent your PC from hackers and Spyware tools.
5. Do not download and install unknown software from Internet. This is the biggest mistake most of the PC users are doing. Some of this software can damage the Windows registry, which cause lot of errors.
6. Uninstall unnecessary programs installed in your PC.
7. Be very careful when you download music from the Internet. Always stick to one trustworthy web site.
8. Perform Scandisk periodically to check the Hard Drive.
9. Delete temporary Internet files.
Readers can find detailed information FREE on above at www.preventiveguru.com
Most of above tasks can be done while you are reading this article. So what are you waiting for? Start now.
Computer Hardware Preventive Maintenance Software
Computers often break down at the worst of all times. These problems can be averted, or at least minimized with preventive maintenance. Several methods of keeping computer hardware in good working order deal with the external components of the computer, such as the keyboard and monitor. For example, it is important to keep the processor away from excess heat and moisture. There are also computer hardware preventive maintenance software programs that can help with the upkeep of other internal aspects of a computer.
While it is rare to find a CMMS that works on all of a computer’s hardware, many different programs can be utilized simultaneously. Some computers have periodic automatic updates available that can be downloaded and used to improve the computer’s performance. Other software programs, known as disk defragmenters, manage hard drive space so that software programs take less time to access. Programs known as hardware diagnostic utilities can check the computer’s hardware components and alert the user about any potential failures. Since some new hardware will not always work on all computers and could cause existing hardware to malfunction, it is important to have a CMMS program to ensure that the new hardware is compatible with existing hardware.
Antivirus programs are another important component of computer hardware preventive maintenance software. Computer viruses have become increasingly common in recent years and can render a good computer useless. While computer viruses mainly attack software programs, they can ruin hardware as well. Several manufacturers make reliable antivirus software. A couple of well-known companies are Norton and McAfee. As with much preventive maintenance software, these programs are usually available for a free trial period before the user must pay a subscription fee.
Computer hardware preventive maintenance software is necessary to keep computers in good working order. This software manages aspects of computer hardware that would be difficult and time-consuming for even the most computer savvy users.
While it is rare to find a CMMS that works on all of a computer’s hardware, many different programs can be utilized simultaneously. Some computers have periodic automatic updates available that can be downloaded and used to improve the computer’s performance. Other software programs, known as disk defragmenters, manage hard drive space so that software programs take less time to access. Programs known as hardware diagnostic utilities can check the computer’s hardware components and alert the user about any potential failures. Since some new hardware will not always work on all computers and could cause existing hardware to malfunction, it is important to have a CMMS program to ensure that the new hardware is compatible with existing hardware.
Antivirus programs are another important component of computer hardware preventive maintenance software. Computer viruses have become increasingly common in recent years and can render a good computer useless. While computer viruses mainly attack software programs, they can ruin hardware as well. Several manufacturers make reliable antivirus software. A couple of well-known companies are Norton and McAfee. As with much preventive maintenance software, these programs are usually available for a free trial period before the user must pay a subscription fee.
Computer hardware preventive maintenance software is necessary to keep computers in good working order. This software manages aspects of computer hardware that would be difficult and time-consuming for even the most computer savvy users.
Looking after your Computer
If you are going to work and do a lot of browsing on the Internet, the first thing you need to learn is how to take care of your computer.
It is far better that you take the trouble to look after your computer regularly, rather than have it freeze or crash when you lose everything on it, at which time you’ll have to pay out a lot to have it fixed.
Here are some tips to prevent disasters:
1) Set your virus checker to update itself automatically. This way, it is always updated with the latest protection.
2) Scan your computer daily when you finish working on it.
3) If on a certain day you happen to download many pages, software, programs, zipped files, exe files, etc., immediately after downloading everything, scan your computer. This way, just in case a virus existed in anything you downloaded, you will catch it in time before it infects your entire Hard Drive.
4) Use your online scanner to scan your computer once a week.
5) Use your adware/spyware checker once a week.
6) Do not open any attachments in emails from people you do not know.
7) Do not open any attachments even from people you do know, if you are not expecting anything from them.
8) A virus could replicate itself to everyone on the address book and send itself out by email, without the owner even knowing this has been done.
9) Do not download free music on the Internet – these free sites are always infected.
10) Do not download any free games from the Internet.
11) Adult sites are particularly prone to viruses.
12) Back up all your data on a daily basis. Use floppy disks, flash drives, memory sticks, zip disks, CD-Roms, etc.
13) Print out contracts, payment forms, agreements and all legal documents and file them away in a ring-binder.
14) Try not to keep anything to do with your finances, payment details, payment processor passwords, credit card details, etc. on your computer.
15) A hacker could easily access all these details, if they are anywhere on your computer.
Sadly, despite all these precautions your computer might still get infected, as the people who invent these malicious programs are getting even sneakier.
When this happens, the easiest way to rid your computer of a virus is by rebooting your computer. This is not as difficult as it may sound, and if you learn how to do this yourself you could save yourself hundreds of dollars in repair bills.
Click on this link to find out how to reboot your computer step-by-step:
http://www.ecourses-for-newbies.com/vp.htm
It is far better that you take the trouble to look after your computer regularly, rather than have it freeze or crash when you lose everything on it, at which time you’ll have to pay out a lot to have it fixed.
Here are some tips to prevent disasters:
1) Set your virus checker to update itself automatically. This way, it is always updated with the latest protection.
2) Scan your computer daily when you finish working on it.
3) If on a certain day you happen to download many pages, software, programs, zipped files, exe files, etc., immediately after downloading everything, scan your computer. This way, just in case a virus existed in anything you downloaded, you will catch it in time before it infects your entire Hard Drive.
4) Use your online scanner to scan your computer once a week.
5) Use your adware/spyware checker once a week.
6) Do not open any attachments in emails from people you do not know.
7) Do not open any attachments even from people you do know, if you are not expecting anything from them.
8) A virus could replicate itself to everyone on the address book and send itself out by email, without the owner even knowing this has been done.
9) Do not download free music on the Internet – these free sites are always infected.
10) Do not download any free games from the Internet.
11) Adult sites are particularly prone to viruses.
12) Back up all your data on a daily basis. Use floppy disks, flash drives, memory sticks, zip disks, CD-Roms, etc.
13) Print out contracts, payment forms, agreements and all legal documents and file them away in a ring-binder.
14) Try not to keep anything to do with your finances, payment details, payment processor passwords, credit card details, etc. on your computer.
15) A hacker could easily access all these details, if they are anywhere on your computer.
Sadly, despite all these precautions your computer might still get infected, as the people who invent these malicious programs are getting even sneakier.
When this happens, the easiest way to rid your computer of a virus is by rebooting your computer. This is not as difficult as it may sound, and if you learn how to do this yourself you could save yourself hundreds of dollars in repair bills.
Click on this link to find out how to reboot your computer step-by-step:
http://www.ecourses-for-newbies.com/vp.htm
5 Mac Security Tips You Can’t Live Without
So, you’ve bought a new Macintosh, and now you may be wondering how to make it safer. There are several things that you can do which will protect your Mac from viruses and hackers. Macs are already very difficult to hack, but don’t let that fact allow you to become lenient with your security.
1. Download all of the software updates available. This seems like a no-brainer, but some Mac users forget to download the newest updates. You can even set your computer to automatically download new updates. However, some dial-up users encounter trouble when trying to downloaded updates. If you are a dial-up user, the best suggestion is to leave your Mac on overnight and let it download. Apple releases many programs that fix bugs in iLife applications, and in Mac OS X. Probably the most important of these updates are the security updates. Apple periodically offers security updates for its operating systems (Panther and Tiger).
2. Be careful what you download. Some people use P2P downloads for Macintosh (I.E. Poisoned). Be careful when downloading using a P2P because you do not know where the music or file is coming from. Some P2P users specifically make corrupted files to send via music downloading programs. Generally, it is a good idea to stick to iTunes, because those files are ACC Protected and offered through Apple so they certainly won’t have viruses.
3. Choose the best and safest Internet Browser. Safari comes standard on all new Macs as part of iLife. However, some people do not enjoy Safari as much as others. Some say that Safari is not as safe from hackers as other browsers. Safari can also be a problem if you are going to a web page that requires a version of Internet Explorer or Netscape to view it. You can download Internet Explorer and Netscape for Mac, but again, some believe that these browsers are not as safe from hackers. Many people believe that Mozilla Firefox (my personal favorite) is the safest browser to use because of its customizable features. Firefox is available for downloading on the Macintosh.
4. Don’t be afraid to buy anti-virus software. If you have to download files from the internet as part of a job or hobby, then it is probably a good idea to have some sort of anti-virus software on your Macintosh. Apple provides a wide-variety of anti-virus software that is constantly updated.
5. Finally, keep an eye on those e-mail attachments and instant messages. Some hackers have programmed viruses to IM you from one of your friends’ screen names. Don’t click on any link without knowing what it is first. Most e-mail providers use virus scans automatically, but you should always be extra careful when downloading an attachment. If it is from someone you do not know, don’t trust it.
Apple computers are very safe from hackers, but they can always be improved. Keeping a computer safe, and running well requires a great amount of time and energy. Just remember that if your computer is safe, your Apple experience will be much more rewarding.
1. Download all of the software updates available. This seems like a no-brainer, but some Mac users forget to download the newest updates. You can even set your computer to automatically download new updates. However, some dial-up users encounter trouble when trying to downloaded updates. If you are a dial-up user, the best suggestion is to leave your Mac on overnight and let it download. Apple releases many programs that fix bugs in iLife applications, and in Mac OS X. Probably the most important of these updates are the security updates. Apple periodically offers security updates for its operating systems (Panther and Tiger).
2. Be careful what you download. Some people use P2P downloads for Macintosh (I.E. Poisoned). Be careful when downloading using a P2P because you do not know where the music or file is coming from. Some P2P users specifically make corrupted files to send via music downloading programs. Generally, it is a good idea to stick to iTunes, because those files are ACC Protected and offered through Apple so they certainly won’t have viruses.
3. Choose the best and safest Internet Browser. Safari comes standard on all new Macs as part of iLife. However, some people do not enjoy Safari as much as others. Some say that Safari is not as safe from hackers as other browsers. Safari can also be a problem if you are going to a web page that requires a version of Internet Explorer or Netscape to view it. You can download Internet Explorer and Netscape for Mac, but again, some believe that these browsers are not as safe from hackers. Many people believe that Mozilla Firefox (my personal favorite) is the safest browser to use because of its customizable features. Firefox is available for downloading on the Macintosh.
4. Don’t be afraid to buy anti-virus software. If you have to download files from the internet as part of a job or hobby, then it is probably a good idea to have some sort of anti-virus software on your Macintosh. Apple provides a wide-variety of anti-virus software that is constantly updated.
5. Finally, keep an eye on those e-mail attachments and instant messages. Some hackers have programmed viruses to IM you from one of your friends’ screen names. Don’t click on any link without knowing what it is first. Most e-mail providers use virus scans automatically, but you should always be extra careful when downloading an attachment. If it is from someone you do not know, don’t trust it.
Apple computers are very safe from hackers, but they can always be improved. Keeping a computer safe, and running well requires a great amount of time and energy. Just remember that if your computer is safe, your Apple experience will be much more rewarding.
Subscribe to:
Comments (Atom)