Posts

Protecting Your Computer from Unwelcome Intruders

These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system. A computer virus is the most subtle of computer problems. It usually loads itself into your computer system when you run a program to which it has attached itself. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive. What it does then depends on the malevolence of its creator. Some viruses are nothing more than a practical joke. They may bring up a message like "Merry Xmas" or melt your display. Most of them though, either start

How to Protect Your Computer from Spyware and Adware?

Without help, you have no way to prevent adware or spyware. Old antivirus programs don't even prevent adware, since they didn't consider them viruses or worms. First, you usually give permission to install adware, although you do so unwittingly because adware and spyware pushers are deceptive. Second, adware doesn't behave like a typical virus or worm. They don't usually do actual damage to your computer, other than wrecking its performance, and they don't spread themselves using your address book. (Although some kinds of adware can break your anti-spyware tools.) Things are changing for the better, though. Most popular antivirus products now include adware and spyware scanning. For example, the latest versions of McAfee VirusScan , Norton AntiVirus 2004 , and Trend Micro PC-Cillin 2004 now scan for some adware and spyware. Also, some Internet service providers (ISPs) are introducing protection from adware and spyware. For example, America Online (AOL

Crimeware

Crimeware is a class of malware designed specifically to automate cybercrime. The term was coined by Peter Cassidy, Secretary General of the Anti-Phishing Working Group to distinguish it from other kinds of malevolent programs. Crimeware is designed to perpetrate identity theft in order to access a computer user's online accounts at financial services companies and online retailers for the purpose of taking funds from those accounts or completing unauthorized transactions that enrich the thief controlling

Adware

Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. The object of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some adware may come with integrated spyware such as key loggers and other privacy-invasive software

Spyware

Spyware is a type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as key logger  are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow co

Trojan horse

Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. User are typically tricked into loading and executing it on their systems", as Cisco describes. The term is derived from the Trojan horse story in Greek mythology. Functions of Trojan horse * Remote Access * Data Destruction * Downloader/dropper * Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.) * Disable security software * Denial-of-service attack (DoS)

Worm

Worm is a self-replicating malware computer program. It uses a computer network to send copies of itself to other computers on the network and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.