Saturday, August 30, 2008

Securing Your Computer System

Today, more and more people are using their computers for everything from communication to online banking and investing to shopping. As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Below are a few easy, cost-effective steps you can take to make your computer more secure.

1. Always make backups of important information and store in a safe place separate from your computer.

2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to locate possible patches for your Office programs.

3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.

4. Review your browser and email settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a minimum set your security setting for the “internet zone” to High, and your “trusted sites zone” to Medium Low.

5. Install antivirus software and set for automatic updates so that you receive the most current versions.

6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.

7. Do not run programs from unknown origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.

8. Disable hidden filename extensions. By default, the Windows operating system is set to “hide file extensions for known file types”. Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.

9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is off.

10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.

...Read more!

Tuesday, August 26, 2008

Surfing The Web Anonymously

When you surf the web it is possible to learn information about you even when you don't want to advertise who you are. This is true even if your system contains no virus or malware software. Specifically information that is easily available online includes your IP address, your country (and often more location information based on IP address), what computer system you are on, what browser you use, your browser history, and other information. It gets worse. People can get your computer's name and even find out your name if your machine supports programs like finger or identd. Also, cookies can track your habits as you move from machine to machine.

How do people get this basic information about you?

When you visit another web site, information about you can be retrieved. Basically, information is intercepted and used by others to track your Internet activities.

How do you stop this from happening?

First of all, it is possible to serf the web anonymously and thereby stop leaving a trail for others to find. Note that this is not fool-proof, but it makes it much harder for people to know who you are. There are products called anonymous proxy servers that help protect you. The anonymous proxy server replaces your Internet address for its own. This has the effect of hiding your IP address and making it much harder for people to track you.

How do I get an anonymous proxy server?

There are many vendors who sell anonymous proxy servers. There are also free proxy servers available to you. Two such products are ShadowSurf and Guardster. Guardster (http://www.guardster.com/) offers various services for anonymous and secure access to the web, some paid as well as a free service. ShadowSurf (http://www.shadowsurf.com/) ShadowSurf provides anonymous surfing at their site for free. Go to it and you will find a box to enter a URL that you want no one to track. There are many others, but here are two that are frequently used.

Another interesting product, given the recent news about the Google search engine filtering its findings for the Chinese government, is Anonymizer (http://www.anonymizer.com). This company, among others, recently (Feb 1st, 2006) pressed that it "is developing a new anti-censorship solution that will enable Chinese citizens to safely access the entire Internet filter-free" (http://www.anonymizer.com/consumer/media/press_releases/02012006.html).

Does an anonymous proxy server make you 100% safe?

No. Still, you are much better off if you use such technology.

What other things should I be concerned about when trying to keep my private information private?

Three other items come to mind when trying to keep your information private. First, you can use an encrypted connection to hide your surfing. This article does not go into detail on this, but search the web and you will find a lot of information on this. Secondly, delete cookies after each session. Third, you can configure your browser to remove JavaScript, Java, and active content. This actually leads to limitations, so you need to think about the cost/benefit of this course of action.

Anything else?

Wishing you happy and safe surfing!

...Read more!

Wednesday, August 20, 2008

Phishing For Your Identity

Who hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been “phished”.

Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.

It is not at easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.

A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.

Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.

...Read more!

Sunday, August 17, 2008

Website Security Rules of the Road

In 2004, online consumer spending was at a record $65.1 billion. More and more people are attracted to the ease of online shopping and are spending higher amounts. Unfortunately, the chances of becoming a victim of Internet fraud are also increasing. The Internet National Fraud Center Watch reported that the average loss to fraud victims for just the first six months of 2005 was $2,579. This is compared to the $895 average for all of 2004. Complaints relating to general merchandise purchases (goods never received or misrepresented) accounted for 30% of Internet fraud complaints, and auction purchases (goods never received or misrepresented) topped the list at 44%.

While many e-commerce Websites are reputable and have taken the necessary safety precautions to protect you, it never hurts to always proceed cautiously. If you are making an online purchase consider these easy steps:

1. Use only one credit card, preferably with a low credit limit, when making online purchases. Avoid using an ATM or debit card.
2. Be wary of unsolicited offers by sellers. The Internet National Fraud Information Center Watch reported that email, as a method of contact by Internet scammers was up 22% in 2004.While the offer may be legitimate, spammers like to use this tactic to side-step reputable sites that provide consumer protection for online purchases.
3. Use only reputable e-commerce websites that list a street address and telephone number in case you need to contact them directly.
4. Read the website’s privacy policy. Some websites may reserve the right to sell/give your information to a third party. Check the document to see if they allow an opportunity to “opt-out” of receiving special offers from third-party vendors or for permission to share your personal information.
5. Check for a lock symbol in the status bar at the bottom of your Web browser window. Also, do not provide your personal information if the website address doesn’t start with “https” (a sign that the site is using a secure server).
6. Choose only verified sellers. Check to see if the vendor is a verified member of a reputable third party such as the Better Business Bureau, VeriSign, or Guardian eCommerce. These third-party sites help to ensure online consumers will be protected when shopping or conducting e-commerce transactions.
7. Check that the delivery date posted is reasonable. If you have not dealt with the vendor on a regular basis, be wary of any Website that states the shipment will be delayed 20 or more days. Delivery dates of 7-10 days are more common.
8. Keep a paper trail of all online transactions. Print out a hard copy of the transaction and keep it in a file for future reference.
9. Be wary of website offers that just sound too good to be true. The Internet is littered with get rich quick scams and false advertising claims. Investigate all claims thoroughly before proceeding.
10. If you do not receive what you paid for, and the vendor will not return your emails or calls, contact your state’s Department of Consumer Affairs for further assistance.

...Read more!

Wednesday, August 13, 2008

How many spyware in your computer

How many spyware items are infecting your computer?

I just had, by mistake, a plug-in called Intelligent Explorer attach to my browser. What a nightmare! I have another article on this topic, but this brings home a point. Spyware or adware items are continually infecting computers. Most computers have no protection from them. Most frightening is the frequency of them. From the Infosec Writers web site, "According to a survey by America Online and the National Cyber Security Alliance, 91% of users questioned were familiar with the term spyware. Only 53% believed their computers were infected, but a scan found that 80% of their PCs had some type of spyware installed on them." It goes on to say, "...The average number of spyware components per computer was 93 with one computer having well over a thousand."

What is Spyware?

Butte College (www.bctv.butte.edu/support/spyware.html) offers this definition:

“The term ‘spyware’ is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience.
Spyware is generally not designed to damage your computer. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.
At present, most spyware targets only the Windows operating system (Internet Explorer).”

To be fair, spyware can be harmless, for example tracking cookies don’t do much. While such things infringe on your privacy, they don't really harm anything. Others, however, are extremely dangerous.

So what do you do about it?

No spyware program seems to do everything, but there are a lot of goods solutions out there that can help. Here is a list of some of the top Spyware tools to look at:

1) Try Ad-Aware 6.0 Professional from LavaSoft (there is also a free version with less functionality)

2) Spybot Search & Destroy from PepiMK Software

3) Xoftspy form Pareto Logic

5) Spyware Guard from Javacool Software is a free program

4) Pest Patrol (now part of Computer Associates by acquisition)

5) McAfee Anti-Spyware

One thing is for certain: you do need to take spyware seriously. For some reason, too many people out there think anti-virus solutions are the end-all solution. They are not.

And, when all else fails?

Finally, as drastic as it seems, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.

...Read more!

Saturday, August 9, 2008

Free Spyware Adware Remover

Computers need routine maintenance as well as systems checks in order to be in good condition at all times. This can be done by getting the proper software or sending the unit to the shop.

If the individual notices that the computer is not performing as well as before, proper action must be done immediately before everything shuts down. Aside from the potential threat of a virus that can destroy the operating system and the hard drive, another concern should be the spyware and the adware that comes when a website is visited.

Spyware and adware programs can be purchased in the store. With the development of e-commerce, software companies have made it possible to get these things online and have it downloaded in an instant into the computer.

Is there one software program better than the other? Some will say this brand while others will say another depending on how user-friendly and effective it has performed in the past. Here are the top 5 that are free for the person to use so the user should be the judge.

1. McAfee has been in the business of providing security solutions since 1987. The software programs it offers can take care of viruses, spyware, adware and any other threats all in just one package.

Among the different software companies in the industry, this firm does not allow free trials but those who have used it and are still doing so today are satisfied with its products and services.

2. Another leader in the industry is Symantec. This company started 5 years earlier than McAfee and offers customers various versions of its products. Those who are skeptic about the adware and spyware software it has can download the software and try it for 30 days. Those who amazed can then buy the program to continue enjoying its services.

3. Microsoft is one of the biggest software companies in the world. Aside from offering to customer’s operating systems, it also has adware spyware remover, which can be downloaded for free into the computer.

4. The fourth company on the list is not as big as the other three players but is still able to hold its head up high in the market. The program is called Spybot Search and Destroy. From the name itself, the individual can already tell what it can do as well as prevent new threats from ever popping up in the future.

5. Lastly, is Adaware, which also has various versions for personal and commercial use. Those who will just use it to keep the computer safe at home can download the adware spyware remover program for free. If this will be used by a company to protect its assets, a fee will be charged to keep the system running.

The person does not have to be a computer expert to be able to protect everything inside the computer because there are adware spyware remover programs available.

Once it is downloaded and installed, the individual does not have to worry because the software will check the computer carefully as well as receive updates so new threats can be caught before it can do any damage making one sleep peacefully at night. It is up to the customer whether to pay for the system or simply get one that is free.

...Read more!

Friday, July 4, 2008

Free Download Internet Security Software

Internet Security Software: Free Downloads To Secure Your PC


The internet is considered as the information superhighway where you can gather the information you need for school and work. In fact, the internet is so useful that people have begun to use it for businesses.

The internet can even be a great way to entertain yourself with downloadable movies, comics and music. Another benefit the internet gives is that you can do your shopping for your clothes and groceries right in the comforts of your own home. You no longer need to go out to the supermarket or to the mall to buy the things you need. All you need to do is log in to an online shopping website and purchase the items you need.

Unfortunately, useful as the internet may be, it also has its dangers. Since more and more people are purchasing goods and services in the internet, it also paved the way for new kinds of criminals. These criminals will try and get your financial and personal information and use it to steal money from you without you knowing about it until it’s too late.

These people develop programs or softwares that can invade your personal computer silently and will start gathering information for the developer. With these programs, they will have access to your files and know every key you type in your keyboard and every click of your mouse. Sometimes, these programs simply destroy the files inside your computer.

Here are the different programs cyber criminals use to destroy your files, or obtain your personal information:

• Spyware
• Adware
• Viruses
• Spam emails

In order to protect yourself and your PC from the different malicious software circulating the internet, you have to purchase a kind of internet security software. However, since there is a lot of security software available in the internet, you will be confused on which one you should purchase.

This is why there are trial periods for softwares in order for you to determine which software is better. Trial or demo versions of the different internet security software are free and can be downloaded instantly from the company’s website. You can download it for free, install it in your computer, and test it if it would be worth your time and money to purchase the full version of the software.

However, these demo versions can only protect your personal computer at a limited time only. After the trial period expires, the software will be locked and you will need to purchase the full version of the software in order to use it again.

Some trial versions have full capabilities while others have only limited capabilities. These free software versions can also be very useful. You can try and use these versions until you find the internet security software you want. Think of it as a temporary fix until you find the right software.

So, if you are looking for a way to protect your computer from malicious software at least temporarily, you can try out the free versions of internet security software until you find the software that is right for your computer. You have to find the software that offer full capabilities against the growing threat in the internet today. It should be able to fight off viruses, spyware, adware, spam emails, and hackers.

With the right kind of software, you will be sure that you can surf the internet without worrying about the different malicious software circulating the internet today.

...Read more!

Monday, June 30, 2008

Internet Security Software Review

Reviews for Internet Security Software: Know All About the Different Internet Security Software Available


It is a fact that more and more people are using the internet to purchase the items they need in their everyday lives. Some people even shop for their groceries online to save travel time. There are also people who prefer paying their utility bills over the internet.

Since more and more people are using the internet to purchase goods and services, there are also increasing numbers of people who also wants to take advantage of the internet to make money illegally. Cyber criminals are a new breed of criminals that steals money from people through the use of the internet. They develop softwares that enables them to know about your personal and financial information. This software is called spyware.

Some develops viruses to make money out of it by simultaneously selling a program that get rids of the virus. Others are pure hackers who develop viruses just for the sake of fun in destroying other people’s computer files.

Because of this growing threat, it is now recommended that people should install internet security software in their personal computers. This particular software can fight viruses, prevent spyware from invading your computer, and it can also prevent a hacker from taking control of your computer.

It is recommended that you should at least have all the protection features in just one software since the programming of the different malicious software in the internet is very different from one another. Viruses and spyware are very different; therefore, antivirus software will not be effective in protecting your computer against spyware.

There are different kinds of internet security software available in the market today. Because of this, it would be very difficult for you to choose which internet security software you should purchase. Since all of the companies claim that they are the best in the business, it can be very confusing for you in choosing which software is really the best.

In order for you to at least have an idea on which software is the best, you have to take a look at the software review in order to know about the different opinions of different people who have used the software before. Of course, the more people who say positive things about the software, the more likely the internet security software is one of the best software available that offers optimum protection against malicious software and hackers popping out of the internet everyday.

Reviews are an important part of purchasing anything. With a review, you can strengthen your opinion and your decision in whether you want to buy the software or not. It is important to read the user reviews for internet security software in order to know if the particular brand of the software is really worth your money.

Reading user reviews is like getting to know the software better. Besides, who else would have better knowledge about the software than the people who have used the software before? With a user review, you will know about the different capabilities of the software and know about the pros and cons.

So, if you are confused on which internet security software you should purchase, you should consider reading the user reviews in order to get an idea on which one you should buy.

...Read more!

Saturday, June 28, 2008

ZoneAlarm Internet Security

Keeping Evil Away From Your PC with ZoneAlarm Internet Security Suite


When you surf the internet or download files from it, there is a chance that someone may be watching your every move in your computer. Every key you press in your keyboard and every click of the mouse are recorded without you knowing about it. It could be anyone, and it could be someone from halfway around the world who has invaded your computer with a particular software called spyware.

Spywares may look harmless but what if you use your computer for purchasing goods over the internet? You will be typing your credit card information and personal information in order to purchase something over the internet. The thought of someone using your account without you knowing about it can make you cringe.

Today, the use of internet is getting more and more popular. Not only is the internet a great tool for communication, but it is also a tool where you can purchase goods and services right in the comforts of your own home. By just opening an online credit card account, you will be able to purchase anything you want over the internet.

However, there is a kind of software that can invade your computer and record your financial and personal information. This information will be recorded and sent to the spyware developer somewhere in the world and use this information to commit identity theft.

In order to prevent this, you have to purchase a kind of software that will be able to protect your computer against malicious software circulating around the internet today. Viruses, spyware, adware and other malicious software can be very dangerous.

One kind of software that has a good reputation is called the ZoneAlarm Internet Security Suite. ZoneAlarm Internet Security Suite is developed by Zone Labs and is a very effective security system for your PC. It can effectively ward off different malicious softwares existing in the internet today.

Here are some of the features that you can take advantage of with ZoneAlarm Internet Security Suite:

• Firewall – This program intercepts any incoming threats from hackers and viruses.

• Antivirus – This program scans files and email attachments for known computer viruses, Trojan horses, and worms and effectively cleans or deletes the files.

• Identity Theft Protection – This program secures your personal and financial information in your PC. Therefore, preventing your personal information and financial information from getting stolen.

• Anti Spyware – This program will block and remove spyware software in your computer. This is an additional protection against identity thieves.

• Spy Site Blocking – Spyware get into your PC by visiting spyware distribution websites. This feature will prevent you from ever visiting website that distributes spyware through downloadable files.

With the different security that ZoneAlarm can provide, you will definitely get your personal and financial information secured as well as get your PC protected from malicious software circulating the internet today.

This particular internet security software is also very easy to use.

So, if you are considering protecting your computer against malicious software, such as computer viruses, spyware, adware and others, you should consider purchasing ZoneAlarm Internet Security Suite by Zone Labs. This software will effectively protect your PC from the malicious software circulating the internet today.

With ZoneAlarm Internet Security, you will definitely sleep more comfortably with the thought of having security for your personal computer.

...Read more!

Monday, June 9, 2008

Free Spyware Adware Remover

Computers need routine maintenance as well as systems checks in order to be in good condition at all times. This can be done by getting the proper software or sending the unit to the shop.

If the individual notices that the computer is not performing as well as before, proper action must be done immediately before everything shuts down. Aside from the potential threat of a virus that can destroy the operating system and the hard drive, another concern should be the spyware and the adware that comes when a website is visited.

Spyware and adware programs can be purchased in the store. With the development of e-commerce, software companies have made it possible to get these things online and have it downloaded in an instant into the computer.

Is there one software program better than the other? Some will say this brand while others will say another depending on how user-friendly and effective it has performed in the past. Here are the top 5 that are free for the person to use so the user should be the judge.

1. McAfee has been in the business of providing security solutions since 1987. The software programs it offers can take care of viruses, spyware, adware and any other threats all in just one package.

Among the different software companies in the industry, this firm does not allow free trials but those who have used it and are still doing so today are satisfied with its products and services.

2. Another leader in the industry is Symantec. This company started 5 years earlier than McAfee and offers customers various versions of its products. Those who are skeptic about the adware and spyware software it has can download the software and try it for 30 days. Those who amazed can then buy the program to continue enjoying its services.

3. Microsoft is one of the biggest software companies in the world. Aside from offering to customer’s operating systems, it also has adware spyware remover, which can be downloaded for free into the computer.

4. The fourth company on the list is not as big as the other three players but is still able to hold its head up high in the market. The program is called Spybot Search and Destroy. From the name itself, the individual can already tell what it can do as well as prevent new threats from ever popping up in the future.

5. Lastly, is Adaware, which also has various versions for personal and commercial use. Those who will just use it to keep the computer safe at home can download the adware spyware remover program for free. If this will be used by a company to protect its assets, a fee will be charged to keep the system running.

The person does not have to be a computer expert to be able to protect everything inside the computer because there are adware spyware remover programs available.

Once it is downloaded and installed, the individual does not have to worry because the software will check the computer carefully as well as receive updates so new threats can be caught before it can do any damage making one sleep peacefully at night. It is up to the customer whether to pay for the system or simply get one that is free.

...Read more!

Tuesday, June 3, 2008

Removal Adware Spyware

Why is there a need for a download adware spyware removal?

It is such a hassle to find personal computers crashing especially if you know that all the care have been given to prevent such a catastrophic event from happening. By all care means every bit of ounce that the information technology department can do they are instructed to do so. The system starts off clean with passwords needed to be able to open and use the personal computer so that not just anyone can access it.

What follows then are that the programs essential to the business and the owner are uploaded and these said programs are double checked to see if they do not have any bogus programs attached to them before they are installed. Even internet usage is limited just to assure non-entry of any programs or any sort of connection that can bring in problems to the existing system.

This may mean that only company email systems and networks can be opened while non-essentials like messengers or online shared programs cannot be uploaded which is actually good for offices so the company is sure that employees are working whenever they are in the office. In reality, it cannot be avoided for employees to use office personal computers to chat or to download files or songs not related to office duties.

Having said that, it is now time to turn your attention to one of the enemies of the cyber industry these days and that is spyware. Spyware came into advent as a result of the booming internet slash computer industry. For of course there will always be those people who will take advantage of something positive and ride on it in a negative manner.

Sometimes the negative becomes so popular that more and more people will choose to take part in these bad actions. The evil genius behind spyware is a traitor to all its victims who totally unaware of its existence that is not until it messes up a seemingly functional system. There is nothing right at all with collecting information about users without their consent and that wrong thing is what spyware is all about. It is an invasion of privacy in the first place and a totally destructive tool next but then again it is proliferating.

Adware is sort of a spyware spin off wherein online advertisements pop up from out of nowhere and no matter what you press in that dialog box will trigger something to be downloaded into your system without you even knowing you instigated the whole process. There is no way to get out of this sad reality but hopefully the culprits can be tracked down so at least steps can be taken to curb their doings.

What makes the situation worse is that some of these illegal operations are actually tied to legal companies who provide legal programs. Sure there are downloadable adware spyware removals but even these adware spyware removal programs are not one hundred percent effective. Maybe there is one out there that can be very effective but there are so many claiming to be adware spyware removal programs but are con spywares as well.

It is then advisable for everyone concerned to carefully research before finally deciding on what adware spyware removal program to use and once you find the right one stick to that for it is rare to find an adware spyware removal that really works.

...Read more!

Thursday, May 29, 2008

Adware and Spyware

Knowing the basics of Adware and Spyware

People think that there is actually no difference between a spyware and an adware. Spyware is just a web term used to refer to an advertising supported software, which is otherwise known as adware. These are the pop-up ads that often come out whenever we open a website or download a shareware software. But according to some web experts, spyware is much much more.

Supporters of spyware and adware say that though it can be pretty annoying at times especially if you are really in a hurry, both do give consumers huge benefits. Because the product ads generate income for developers of shareware software, consumers can get them for free. Developers are in turn paid for their work. Of course, if you don’t want to be bothered by the constant pop-ups, you can always pay the licensing fee or the regular fee for the software. If you want it for free, you just have to sacrifice through the spyware.

There is however another downside to it. Spyware, from the name given to it, is actually used as a tracking device in your computer system. These tracking devices will look into your surfing habits, your chatting logs and even the number of times you open your email. If designed or programmed the right way, it can discover just about everything else in your system.
And because the program runs in the background, there is no way that a person can control the kind of information that he or she sends out.

These kinds of programs were actually originally used by parents or people in the business sector who wish to track down and put on record web activity. It is actually beneficial but not when people are not aware that they are being tracked down. This is often the case when people download software over the Internet. As mentioned before, it is used by companies to advertise their products and in turn help the developers of software keep their costs down so that they can afford to offer their programs for free.

Although privacy issues indeed come into play, there is nothing illegal about it. In fact, its use is prevalent all over the World Wide Web. There are however some areas that people who value their privacy will object to. Because of this, people are given the option to refuse the software.

There is really no way that one can avoid adware and spyware as these programs are packaged with the software that you will be downloading from the Internet. The most that you can do is to avoid downloading from the internet and to refuse any file downloads that you did not personally authorize. It is also good to only view websites that have a good reputation or those that have anti-spyware and adware programs installed in their pages.

...Read more!

Wednesday, May 21, 2008

Beware Spyware

Spyware and Adware are not only an ever increasing nuisance for computer users everywhere, but also a booming industry. According to Webroot Software, Inc., the distribution of online advertisements through spyware and adware has become a $2 billion industry.

The aggressive advertising and spying tactics demonstrated by some of these programs, require an equally aggressive response from a seasoned eradicator. Sunbelt Software is such a company. A leader in Anti-Spyware, Anti-Spam, Network Security and System Management tools, they gave consistently remained on the cutting-edge of anti-spyware programming since 1994.

One of their more notable software applications is CounterSpy 1.5. CounterSpy is designed to detect and remove spyware that is already in your computer system. Additionally, it provides real-time protection while preventing browser hijacking and changes to your computer’s Registry.

Other notable features include:

¨ Detection and Removal of Tracking Cookies – while it is true that applications like Microsoft AntiSpyware Beta are free, they do not include the ability to detect and remove tracking cookies like CounterSpy does.

¨ History Cleaner - erases any traceable trails left on your computer as you surf the Internet.

¨ Secure File Eraser - a powerful deletion tool that can completely eliminate all files you want removed from your computer including images, music, movies and applications.

¨ PC Explorer - allows you a look into files and areas that are normally inconvenient to access, such as your startup programs, browser helper objects, and ActiveX programs that are being downloaded or used.

¨ Support for Older Operating Systems – includes Windows 98SE, Windows ME, and Windows NT.

...Read more!

Friday, May 16, 2008

Spam Buster

Spam. Nobody likes it. Nobody wants it. No, we aren’t talking about the canned meat, but those unsolicited, unwanted, irrelevant, or even inappropriate messages that hit our email in mass quantities. While most mailboxes have some type of spam filtering software built into their system, they never seem to do a very good job of catching what you want them to catch, and letting through what you want them to let through. Therefore, it becomes increasingly important to turn to some type of additional spam filtering product. One such filtering system, designed for Outlook and Outlook Express users, is receiving rave reviews for its superior detection and low rate of false positives (i.e,. what you want to get through does).

Cloudmark Desktop, formerly known as SpamNet and SafetyBar, uses a unique community-based filtering process. This community-based filtering system relies on users to report any new spam. Within minutes of a spammer being reported, they are placed on a blacklist. At that point, no other member will receive that particular spam. Cloudmark also applies the same basic process to phishing email scams.

What is interesting is how Cloudmark creates a digital reputation model of reporting spam. Each user starts with a neutral reputation. A user’s reputation will rise if they are among the first to identify undesirable content. On the flip side of the coin, a user’s reputation falls when they falsely reports spam. The result is a system that is automated, highly scalable and resistant to tampering.

An added bonus is that because the software doesn’t depend upon the user to configure its settings, it installs in minutes and is easy to use. Cloudmark blocks over 98% of spam from reaching your inbox and boasts over one million users worldwide.

...Read more!

Saturday, May 10, 2008

Trojan Horse

Trojan Horse….Greek Myth or Computer Nemesis?

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. One of the most dangerous examples of a Trojan is a program that promises to rid your computer of viruses but instead introduces viruses into your computer.

The Trojan can be tricky. Who hasn’t been online and had an advertisement pop up claiming to be able to rid your computer of some nasty virus? Or, even more frightening, you receive an email that claims to be alerting you to a new virus that can threaten your computer. The sender promises to quickly eradicate, or protect, your computer from viruses if you simply download their “free”, attached software into your computer. You may be skeptical but the software looks legitimate and the company sounds reputable. You proceed to take them up on their offer and download the software. In doing so, you have just potentially exposed yourself to a massive headache and your computer to a laundry list of ailments.

When a Trojan is activated, numerous things can happen. Some Trojans are more annoying than malicious. Some of the less annoying Trojans may choose to change your desktop settings or add silly desktop icons. The more serious Trojans can erase or overwrite data on your computer, corrupt files, spread other malware such as viruses, spy on the user of a computer and secretly report data like browsing habits to other people, log keystrokes to steal information such as passwords and credit card numbers, phish for bank account details (which can be used for criminal activities), and even install a backdoor into your computer system so that they can come and go as they please.

To increase your odds of not encountering a Trojan, follow these guidelines.

1. Remain diligent
Trojans can infect your computer through rogue websites, instant messaging, and emails with attachments. Do not download anything into your computer unless you are 100 percent sure of its sender or source.

2. Ensure that your operating system is always up-to-date. If you are running a Microsoft Windows operating system, this is essential.

3. Install reliable anti-virus software. It is also important that you download any updates frequently to catch all new Trojan Horses, viruses, and worms. Be sure that the anti-virus program that you choose can also scan e-mails and files downloaded through the internet.

4. Consider installing a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular operating system updates and reliable anti-virus software, it can provide additional security and protection for your computer.

Nothing can guarantee the security of your computer 100 percent. However, you can continue to improve your computer's security and decrease the possibility of infection by consistently following these guidelines.

...Read more!

Tuesday, May 6, 2008

What are Intrusion Detection Systems

What are Intrusion Detection Systems?

Intrusion Detection System (IDS) are a necessary part of any strategy for enterprise security. What are Intrusion Detection systems? CERIAS, The Center for Education and Research in Information Assurance and Security, defines it this way:

"The purpose of an intrusion detection system (or IDS) is to detect unauthorized access or misuse of a computer system. Intrusion detection systems are kind of like burglar alarms for computers. They sound alarms and sometimes even take corrective action when an intruder or abuser is detected. Many different intrusion detection systems have been developed but the detection schemes generally fall into one of two categories, anomaly detection or misuse detection. Anomaly detectors look for behavior that deviates from normal system use. Misuse detectors look for behavior that matches a known attack scenario. A great deal of time and effort has been invested in intrusion detection, and this list provides links to many sites that discuss some of these efforts"(http://www.cerias.purdue.edu/about/history/coast_resources/intrusion_detection/)

There is a sub-category of intrusion detection systems called network intrusion detection systems (NIDS). These systems monitors packets on the network wire and looks for suspicious activity. Network intrusion detection systems can monitor many computers at a time over a network, while other intrusion detection systems may monitor only one.

Who is breaking into your system?

One common misconception of software hackers is that it is usually people outside your network who break into your systems and cause mayhem. The reality, especially for corporate workers, is that insiders can and usually do cause the majority of security breaches. Insiders often impersonate people with more privileges then themselves to gain access to sensitive information.

How do intruders break into your system?

The simplest and easiest way to break in is to let someone have physical access to a system. Despite the best of efforts, it is often impossible to stop someone once they have physical access to a machine. Also, if someone has an account on a system already, at a low permission level, another way to break in is to use tricks of the trade to be granted higher-level privileges through holes in your system. Finally, there are many ways to gain access to systems even if one is working remotely. Remote intrusion techniques have become harder and more complex to fight.


How does one stop intrusions?


There are several Freeware/shareware Intrusion Detection Systems as well as commercial intrusion detection systems.

Open Source Intrusion Detection Systems

Below are a few of the open source intrusion detection systems:

AIDE (http://sourceforge.net/projects/aide) Self-described as "AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more. There are other free replacements available so why build a new one? All the other replacements do not achieve the level of Tripwire. And I wanted a program that would exceed the limitations of Tripwire."

File System Saint (http://sourceforge.net/projects/fss) - Self-described as, "File System Saint is a lightweight host-based intrusion detection system with primary focus on speed and ease of use."


Snort (www.snort.org) Self-described as "Snort® is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry."

...Read more!

Wednesday, April 30, 2008

Beware Internet Explorer Plug-Ins

Just what is Intelligent Explorer? For your safety, you really need to know

I recently hit, by mistake, what I thought was an Explorer upgrade option.
It turned out to be a pop-up appearing legitimate but really was not. It uploaded a product called Intelligent Explorer on my machine. What a nightmare!

I did some research on the web and found messages like this one from a BullGuard Antivirus Forum,

"PLEASE HELP!!! I HAVE A SPYWARE, TROJAN AND HIJACKER ON MY COMPUTER. I HAVE RUN BULLGUARD, CWSHREDDER AND AD-AWARE. ALL HAVE PICKED UP THE VIRUSES AND SAID THAT THEY HAVE BEEN MOVED/REMOVED BUT WHEN I LOG ONTO THE INTERNET THAT DAMN INTELLIGENT EXPLORER TOOLBAR IS SHOWING"

Another message from spywareinfo Forum goes something like this:

"Hey I'm having issues with something called Internet explorer toolbar - Intelligent explorer. I can’t find a way to remove it from my comp and I really don’t want to reinstall windows. I've used spybot, ad-ware, and cw shredder but nothing seems to work."

It appears that Intelligent Explorer allows other software to be downloaded to your machine and this is where the problem occurs. What is even more remarkable is that by downloading Intelligent Explorer, their license grants them the right to install software add-ins on your computer at their will. Take a look at what the software license for Intelligent Explore says (go to http://www.ieplugin.com/terms.html to read it all):

"You grant to us the right, exercisable by us until you uninstall the Software or this agreement is otherwise terminated, to provide to you the Service of downloading and causing to be displayed advertising material on your computer, through ‘pop-up’ or other display while you use your browser. You acknowledge and agree that installation of the Software may automatically modify toolbars and other settings of your browser. By installing the Software you agree to such modifications."

The company, IBC incorporated, is incorporated in Belize. I really can't believe this license!

One end user found highly objectionable pop-up advertisements generated by this software bundled with Intelligent Explorer in the form of extreme pornography.

I have yet to break this.

Intelligent Explorer is a plug-in, which can create a new home page, as well as start up and endless loop of pop-ups. You can remove the view bar, but then starting up Internet Explorer will cause it to reappear. I asked some friends to help, and no one could tell me what to do.

This is what I did:

I bought a copy of a program called XoftSpy and it removed the software. It took two scans and a reboot to do it. This is not an advertisement for this product. They advertised it was free, which it was to run, but then I had to buy it to actually fix anything. It cost me $40 and I am sure that there are freeware products out there as well, but that is what ended the nightmare for me. Other spyware products I have seen out there include spybot, NoAdware, Spyware Eliminator, Pal Spyware Remover, and Spyware C.O.P.

Let the buyer beware!

...Read more!

Saturday, April 19, 2008

Protection You Can Afford

There are numerous ways you can lose the information on your computer. Your child decides to play Chopin on your keyboard, a power surge, lightening, a virus, or even simple equipment failure. Therefore, backing up the contents of your hard drive is an absolute MUST. By regularly making backup copies of your files and storing them in a separate location, you can typically get some, if not all, of your information back in the event your computer crashes.

While a regular backup to floppy, CD, or zip drive will save your files, wouldn’t it be great if you could create an exact copy (a drive image) of your hard disk? That means backups of all your files, programs, and user settings. This would definitely save you time when it came to reloading. Acronis may be able to help.

Acronis True Image is a robust disk-imaging utility software that copies the entire contents of your hard drive including data and operating system files, personalized settings, and more, onto another disk or disk partition. Its layout is easy to use and navigate. It also includes wizards which can walk you through both backing up and restoring your computer. Highlighted features include:

· Secure Zone — allows you to save data to a special hidden partition located on your hard drive which would eliminate the need to purchase an extra hard drive.

· PC Cloning — you can upgrade to a new system disk without needing to reinstall the operating system and applications, or configure user settings.

· Acronis Snap Restore - lightening-speed restore of your PC from an image. You can start working in seconds while your system is still being restored.

Acronis provides a free test-drive of its product and a 30-day money back guarantee. When you are ready to purchase, you can either download for $49.99, or if you so desire, order a boxed version for $59.99. With Acronis True Image Home, you can rest easy that your family pictures, personal documents, tax returns, resumes, and other important information will not be lost forever.

...Read more!

Friday, March 28, 2008

Fighting Spam

How prevalent is Spam? According to Scott McAdams, OMA Public Affairs and Communications Department (www.oma.org):

“Studies show unsolicited or “junk” e-mail, known as spam, accounts for roughly half of all e-mail messages received. Although once regarded as little more than a nuisance, the prevalence of spam has increased to the point where many users have begun to express a general lack of confidence in the effectiveness of e-mail transmissions, and increased concern over the spread of computer viruses via unsolicited messages.”

In 2003, President Bush signed the “Can Spam” bill, in December of 2003 which is the first national standards around bulk unsolicited commercial e-mail. The bill, approved by the Senate by a vote of 97 to 0, prohibits senders of unsolicited commercial e-mail from using false return addresses to disguise their identity (spoofing) and the use of dictionaries to generate such mailers. In addition, it prohibits the use of misleading subject lines and requires that emails include and opt-out mechanism. The legislation also prohibits senders from harvesting addresses off Web sites. Violations constitute a misdemeanor crime subject to up to one year in jail.

One major point that needs to be discussed about this: spam is now coming from other countries in ever-greater numbers. These emails are harder to fight, because they come from outside our country’s laws and regulations. Because the Internet opens borders and thinks globally, these laws are fine and good, but do not stop the problem.

So what do you do about this?
Her are the top 5 Rules to do to protect from spam.

Number 1: Do what you can to avoid having your email address out on the net.
There are products called “spam spiders” that search the Internet for email addresses to send email to. If you are interested, do a search on “spam spider” and you will be amazed at what you get back. Interestingly, there is a site, WebPoison.org, which is an open source project geared to fight Internet "spambots" and "spam spiders", by giving them bogus HTML web pages, which contain bogus email addresses
A couple suggestions for you: a) use form emails, which can hide addresses or also b) use addresses like sales@company.com instead of your full address to help battle the problem. c) There are also programs that encode your email, like jsGuard, which encodes your email address on web pages so that while spam spiders find it difficult or impossible to read your email address.

Number 2: Get spam blocking software. There are many programs out there for this. (go to www.cloudmark.com or www.mailwasher.net for example). You may also buy a professional version. Whatever you do, get the software. It will save you time. The software is not foolproof, but they really do help. You usually have to do some manual set up to block certain types of email.

Number 3: Use the multiple email address approach.
There are a lot of free email addresses to be had. If you must subscribe to newsletters, then have a “back-up” email address. It would be like giving your sell phone number to your best friends and the business number to everyone else.

Number 4: Attachments from people you don’t know are BAD, BAD, BAD.
A common problem with spam is that they have attachments and attachments can have viruses. Corporations often have filters that don’t let such things pass to you. Personal email is far more “open country” for spamers. General rule of thumb: if you do not know who is sending you something, DO NOT OPEN THE ATTACHMENT. Secondly, look for services that offer filtering. Firewall vendors offer this type of service as well.

Number 5: Email services now have “bulk-mail” baskets. If what you use currently does not support this, think about moving to a new vender. The concept is simple. If you know someone, they can send you emails. If you don’t know them, put them in the bulk email pile and then “choose” to allow them into your circle. Spam Blocking software has this concept as well, but having extra layers seems critical these days, so it is worth looking into.

...Read more!