<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2338859111990924672</atom:id><lastBuildDate>Fri, 30 Aug 2024 17:21:41 +0000</lastBuildDate><title>VIRUS &amp; SPYWARE</title><description>Virus and Spyware</description><link>http://virustablet.blogspot.com/</link><managingEditor>noreply@blogger.com (Meor Shukri)</managingEditor><generator>Blogger</generator><openSearch:totalResults>24</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>clean</itunes:explicit><copyright>copyright reserved</copyright><itunes:keywords>virus,spyware,antivirus,spyware,removal</itunes:keywords><itunes:summary>Free guide about virus and spyware on the net</itunes:summary><itunes:subtitle>Virus and Spyware Tip</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:author>meor</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>meor</itunes:name></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-3956802522469096887</guid><pubDate>Mon, 09 Jul 2007 02:49:00 +0000</pubDate><atom:updated>2007-07-08T19:50:17.987-07:00</atom:updated><title>Looking after your Computer</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Iona D'Souza&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;br /&gt;If you are going to work and  do a lot of browsing on the Internet, the first thing you need to learn is how  to take care of your computer.&lt;br /&gt;&lt;br /&gt;It is far better that you take the  trouble to look after your computer regularly, rather than have it freeze or  crash when you lose everything on it, at which time you’ll have to pay out a lot  to have it fixed.&lt;br /&gt;&lt;br /&gt;Here are some tips to prevent disasters:&lt;br /&gt;&lt;br /&gt;1)  Set your virus checker to update itself automatically. This way, it is always  updated with the latest protection.&lt;br /&gt;&lt;br /&gt;2) Scan your computer daily when you  finish working on it.&lt;br /&gt;&lt;br /&gt;3) If on a certain day you happen to download many  pages, software, programs, zipped files, exe files, etc., immediately after  downloading everything, scan your computer. This way, just in case a virus  existed in anything you downloaded, you will catch it in time before it infects  your entire Hard Drive.&lt;br /&gt;&lt;br /&gt;4) Use your online scanner to scan your computer  once a week.&lt;br /&gt;&lt;br /&gt;5) Use your adware/spyware checker once a week.&lt;br /&gt;&lt;br /&gt;6)  Do not open any attachments in emails from people you do not know.&lt;br /&gt;&lt;br /&gt;7) Do  not open any attachments even from people you do know, if you are not expecting  anything from them.&lt;br /&gt;&lt;br /&gt;8) A virus could replicate itself to everyone on the  address book and send itself out by email, without the owner even knowing this  has been done.&lt;br /&gt;&lt;br /&gt;9) Do not download free music on the Internet – these  free sites are always infected.&lt;br /&gt;&lt;br /&gt;10) Do not download any free games from  the Internet.&lt;br /&gt;&lt;br /&gt;11) Adult sites are particularly prone to viruses. &lt;br /&gt;&lt;br /&gt;12) Back up all your data on a daily basis. Use floppy disks, flash  drives, memory sticks, zip disks, CD-Roms, etc.&lt;br /&gt;&lt;br /&gt;13) Print out contracts,  payment forms, agreements and all legal documents and file them away in a  ring-binder.&lt;br /&gt;&lt;br /&gt;14) Try not to keep anything to do with your finances,  payment details, payment processor passwords, credit card details, etc. on your  computer.&lt;br /&gt;&lt;br /&gt;15) A hacker could easily access all these details, if they  are anywhere on your computer.&lt;br /&gt;&lt;br /&gt;Sadly, despite all these precautions your  computer might still get infected, as the people who invent these malicious  programs are getting even sneakier.&lt;br /&gt;&lt;br /&gt;When this happens, the easiest way  to rid your computer of a virus is by rebooting your computer. This is not as  difficult as it may sound, and if you learn how to do this yourself you could  save yourself hundreds of dollars in repair bills.&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/07/looking-after-your-computer.html</link><thr:total>2</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-3226244320518459109</guid><pubDate>Thu, 28 Jun 2007 14:24:00 +0000</pubDate><atom:updated>2007-06-28T07:24:38.068-07:00</atom:updated><title>5 Mac Security Tips You Can’t Live Without</title><description>by: Paulo Fretowski&lt;br /&gt;So, you’ve bought a new Macintosh, and now you may be wondering how to make it safer. There are several things that you can do which will protect your Mac from viruses and hackers. Macs are already very difficult to hack, but don’t let that fact allow you to become lenient with your security.&lt;br /&gt;&lt;br /&gt;1. Download all of the software updates available. This seems like a no-brainer, but some Mac users forget to download the newest updates. You can even set your computer to automatically download new updates. However, some dial-up users encounter trouble when trying to downloaded updates. If you are a dial-up user, the best suggestion is to leave your Mac on overnight and let it download. Apple releases many programs that fix bugs in iLife applications, and in Mac OS X. Probably the most important of these updates are the security updates. Apple periodically offers security updates for its operating systems (Panther and Tiger).&lt;br /&gt;&lt;br /&gt;2. Be careful what you download. Some people use P2P downloads for Macintosh (I.E. Poisoned). Be careful when downloading using a P2P because you do not know where the music or file is coming from. Some P2P users specifically make corrupted files to send via music downloading programs. Generally, it is a good idea to stick to iTunes, because those files are ACC Protected and offered through Apple so they certainly won’t have viruses.&lt;br /&gt;&lt;br /&gt;3. Choose the best and safest Internet Browser. Safari comes standard on all new Macs as part of iLife. However, some people do not enjoy Safari as much as others. Some say that Safari is not as safe from hackers as other browsers. Safari can also be a problem if you are going to a web page that requires a version of Internet Explorer or Netscape to view it. You can download Internet Explorer and Netscape for Mac, but again, some believe that these browsers are not as safe from hackers. Many people believe that Mozilla Firefox (my personal favorite) is the safest browser to use because of its customizable features. Firefox is available for downloading on the Macintosh.&lt;br /&gt;&lt;br /&gt;4. Don’t be afraid to buy anti-virus software. If you have to download files from the internet as part of a job or hobby, then it is probably a good idea to have some sort of anti-virus software on your Macintosh. Apple provides a wide-variety of anti-virus software that is constantly updated.&lt;br /&gt;&lt;br /&gt;5. Finally, keep an eye on those e-mail attachments and instant messages. Some hackers have programmed viruses to IM you from one of your friends’ screen names. Don’t click on any link without knowing what it is first. Most e-mail providers use virus scans automatically, but you should always be extra careful when downloading an attachment. If it is from someone you do not know, don’t trust it.&lt;br /&gt;&lt;br /&gt;Apple computers are very safe from hackers, but they can always be improved. Keeping a computer safe, and running well requires a great amount of time and energy. Just remember that if your computer is safe, your Apple experience will be much more rewarding.</description><link>http://virustablet.blogspot.com/2007/06/5-mac-security-tips-you-cant-live.html</link><thr:total>1</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-8478542185972714864</guid><pubDate>Wed, 13 Jun 2007 15:26:00 +0000</pubDate><atom:updated>2007-06-13T08:26:43.710-07:00</atom:updated><title>How to Avoid Getting Ripped-Off Online</title><description>&lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Jim Edwards&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;Online security is one of the top catch phrases these days, but hardly anybody  knows what it means and worse, most home computer users think security only  applies to corporations and online businesses.&lt;br /&gt;&lt;br /&gt;Most people think online  security means simply protecting your credit card data from fraud and theft, but  it actually goes way beyond that.&lt;br /&gt;&lt;br /&gt;The potential for mayhem and just  plain disruption of your life doesn't just mean credit card fraud - it can mean  having your identity stolen, your life disrupted and spending hours cleaning up  after an online 'vandalism' attack.&lt;br /&gt;&lt;br /&gt;You must protect yourself from  everyone from the teenage computer hacker to the organized crime syndicate using  computer worms and keystroke logging viruses.&lt;br /&gt;&lt;br /&gt;The great news is that a  number of simple techniques should protect you against the vast majority of  threats, since the evil doers will simply move on to easier pastures. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Update your anti-virus files&lt;br /&gt;&lt;br /&gt;The widespread 'Bad Trans' worm  logged keystrokes and transmitted potentially sensitive data such as credit card  and social security numbers to the 'bad guys'.&lt;br /&gt;&lt;br /&gt;Though this virus  contained a high level of criminal intent, it was easily blocked by anyone with  up-to-date anti-virus files.&lt;br /&gt;&lt;br /&gt;If you don't have anti-virus software with  current virus definitions installed, you leave the door wide open for security  problems.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Install a 'Firewall'&lt;br /&gt;&lt;br /&gt;A firewall helps prevent  unauthorized access to your computer by 'hackers'.&lt;br /&gt;&lt;br /&gt;It closes off the  entry points (called open 'ports') carried by virtually every computer connected  to the Internet.&lt;br /&gt;&lt;br /&gt;A common misconception is that firewalls are only for  people with cable or other high-speed connections.&lt;br /&gt;&lt;br /&gt;Even if you use a  dial up connection to get online, a firewall can help you detect and prevent  people from logging on to your computer, stealing files or even using your  computer to break into others!&lt;br /&gt;&lt;br /&gt;You can take a free test of your  computer's security by logging on to http://www.symantec.com/securitycheck/ and  clicking 'Find out today if you are safe'. The results may surprise you. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Use secure sites&lt;br /&gt;&lt;br /&gt;Only give sensitive data such as credit  cards, social security numbers and important passwords over a secure connection. &lt;br /&gt;&lt;br /&gt;This means the little yellow lock appears in the lower part of your  browser and nobody but the website you are connected to should be able to read  the data you send.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Change passwords often&lt;br /&gt;&lt;br /&gt;An easy way for  you to protect your sensitive data and email is to change your passwords on a  monthly basis, or even more often depending on how frequently you use computers  away from home.&lt;br /&gt;&lt;br /&gt;If you log on to your email at the library, in 'cyber  cafes' or any other remote computer then the possibility exists that computer  could have a key-stroking virus present.&lt;br /&gt;&lt;br /&gt;This means everything you type  into the computer (passwords, birthdays, social security numbers, credit cards)  could be logged and used by someone else.&lt;br /&gt;&lt;br /&gt;** Change your passwords at  lease once a month.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Though not fool-proof, these security tips  should help reduce your vulnerability and keep you safer online.</description><link>http://virustablet.blogspot.com/2007/06/how-to-avoid-getting-ripped-off-online.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-2402567049522239669</guid><pubDate>Fri, 04 May 2007 08:03:00 +0000</pubDate><atom:updated>2007-05-04T01:06:46.561-07:00</atom:updated><title>Tips For Safer Computing Online</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;BB Lee&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;br /&gt;by BB Lee (C)2004 &lt;br /&gt;&lt;br /&gt;New computer viruses threaten the unwary user everyday.  Hackers&lt;br /&gt;jeopardize your online security with invasive computer techniques to &lt;br /&gt;steal your passwords, personal information, even identity. &lt;br /&gt;&lt;br /&gt;Unscrupulous marketers bait you with free software that unleashes &lt;br /&gt;spyware, trojans, or worms, on your system.&lt;br /&gt;&lt;br /&gt;While other marketers  bombard you with popups at every turn. And&lt;br /&gt;others send unsolicited spy  emails asking you to click links to unsafe websites that install threating  software on your computer, or try to download your private information. &lt;br /&gt;&lt;br /&gt;These are only a few of the security issues involved while online. &lt;br /&gt;&lt;br /&gt;Read through the following list to arm your computer and protect  yourself against these vicious and often malicious online attacks. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;1. Install a good anti-virus software.&lt;/span&gt;&lt;br /&gt;Here's a good free  anti-virus software...&lt;br /&gt;Fr** AVG Anti-Virus......&lt;br /&gt;New - AVG Fr** Edition  is now available for all single home users&lt;br /&gt;worldwide! More detailed  information can be found in the AVG Free&lt;br /&gt;Edition License Agreement. &lt;br /&gt;Click Here To Download:&lt;br /&gt;&lt;a href="http://www.grisoft.com/us/us_dwnl_free.php"&gt;http://www.grisoft.com/us/us_dwnl_free.php&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;2. Install a personal firewall. &lt;/span&gt;&lt;br /&gt;This personal firewall is one of  the best online....&lt;br /&gt;&lt;a href="http://www.zonealarm.com"&gt;http://www.zonealarm.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;3. Install a good pop  up blocker.&lt;/span&gt;&lt;br /&gt;Google has a free pop up blocker so does Yahoo. The only  drawback&lt;br /&gt;is you will have to download and install their toolbar.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;4.  Know Privacy Policy.&lt;/span&gt;&lt;br /&gt;Read the websites privacy policy before releasing  personal information.&lt;br /&gt;Note do they share or sell your information with third  parties. If they do you might reconsider releasing your personal information. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;5. Passwords. &lt;/span&gt;&lt;br /&gt;Never use easy to guess passwords like your favorite  color, your social security number, your birthdate, words less than six  characters. Mix up passwords with combinations of numbers and symbols. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;6.Virus Warnings. &lt;/span&gt;&lt;br /&gt;Don't forward virus warnings you receive in  emails. It's not your&lt;br /&gt;job to warn others. And you might be circulating a  fake warning&lt;br /&gt;designed to scare receivers into downloading trojans or  removing&lt;br /&gt;important files on their computer.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;7. Keep It Secret.&lt;/span&gt; &lt;br /&gt;Don't give your password to anyone. Be wary of emails asking you to give out  your personal passwords for accounts online. Or emails asking you to click a  link and enter your password on the site. This site might be a fake sent by  hackers "phishing" for victims.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;8. Primary Email Address.&lt;/span&gt;&lt;br /&gt;Don't  divulge your primary email address on unfamiliar sites. You&lt;br /&gt;might be  bombarded with unsolicited emails by marketers who&lt;br /&gt;sell your address to  third parties online.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;9. Free Accounts &lt;/span&gt;&lt;br /&gt;Set up several free email  accounts with a psuedo name to handle&lt;br /&gt;spam, when you register with  unfamiliar sites, or to use on chat and message boards.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;10. Chat Line  And Message Board Warnings.&lt;/span&gt;&lt;br /&gt;Don't release personal information on chat lines  or&lt;br /&gt;message boards. This is one way many identity thefts occur. &lt;br /&gt;&lt;br /&gt;____________________________________________________________&lt;br /&gt;&lt;br /&gt;BB  Lee is Editor of SmallBizBits News.&lt;br /&gt;Visit: http://www.smallbizbitsnews.com &lt;br /&gt;Subscribe Now! Receive A Free Ad in newsletter! &lt;br /&gt;mailto:Smallbiz-subscribe@topica.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;About the author:&lt;br /&gt;BB Lee  is Editor of SmallBizBits News.&lt;br /&gt;Visit: &lt;a class="navigation" href="http://www.smallbizbitsnews.com/" target="_blank"&gt;http://www.smallbizbitsnews.com&lt;/a&gt;&lt;br /&gt;Subscribe Now! Receive A  Free Ad in newsletter!&lt;br /&gt;mailto:Smallbiz-subscribe@topica.com &lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/05/tips-for-safer-computing-online.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-5038359070437818544</guid><pubDate>Sun, 22 Apr 2007 03:51:00 +0000</pubDate><atom:updated>2007-04-21T20:53:11.174-07:00</atom:updated><title>Internet Scams 102 -- Hijackings and Spyware</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Janette Blackwell&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;My friend Janice is afraid to go on  the Internet because of the terrible things that might happen to her. She views  a simple trip to get e-mail the way she views going alone, late at night, to a  dangerous part of town.&lt;br /&gt;&lt;br /&gt;Please . . . it’s not that bad. Though, come to  think of it, it’s ALMOST that bad: hijackers can now do things to people who  already have antivirus and anti-spyware programs. To people who have carefully  NOT clicked on scam e-mails. Some hijackers can disable your firewall, your  antivirus software, and your spyware killers. Or they can prevent antivirus and  spyware from being updated.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;But there are solutions. Here’s what you do:&lt;/span&gt; &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;HIJACKINGS&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You know you’ve been hijacked if your start page is  different and if you keep getting things you didn’t intend to get -- frequently  pornographic sites and popup ads. You change things back the way they were, but  they won’t stay changed.&lt;br /&gt;&lt;br /&gt;These nasties nabbed you through a security  hole in Microsoft Windows. If you haven’t been caught and don’t want to be,  http://www.spywareinfo.com/articles/hijacked/prevent.php says,&lt;br /&gt;&lt;br /&gt;“First  and most simply, stop using Internet Explorer. If you use either Mozilla,  Firefox or Opera, you are immune to virtually all browser hijackers.” &lt;br /&gt;&lt;br /&gt;Actually, it’s not that simple. There are ways scammers can get around  Firefox. Microsoft is also busy locking its barn doors, though I’m afraid the  horse has already been stolen.&lt;br /&gt;&lt;br /&gt;If you decide to stay with Internet  Explorer, be sure to keep it up to date, especially with what they call  “critical updates.”&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;PREVENTING ATTACKS&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The most basic and most  necessary protection, one you’ve probably installed already, is antivirus  protection. The antivirus programs upgrade constantly to protect us from the  latest viruses. Norton is the most common, and a good choice. If you prefer a  simple, uncomplicated solution, go to the site that sells Norton,  http://symantec.com/, and download all the antivirus protection you want. &lt;br /&gt;&lt;br /&gt;If you’re a thorough person, however, one who wants to learn about all  the options, go to http://antivirus.about.com/od/antivirussoftwarereviews/, and  you will learn of problems and solutions you never dreamed existed.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;WHAT  YOU GET FOR NOTHING IS NOTHING -- OR WORSE&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Unfortunately, an antivirus  program alone is not enough these days. You need ANTI-SPYWARE.&lt;br /&gt;&lt;br /&gt;Because  the latest hijackers can disable anti-spyware -- AND keep you from downloading  updates -- you want some that is really, really good. The techie who manages my  website says, “Get something that can WARD OFF attacks, not just remove them  after they’ve infected you. Once really vicious spyware is on your machine, it  may be impossible for anyone but an expert to remove it.”&lt;br /&gt;&lt;br /&gt;“But what  about all the free anti-spyware?” you ask. If you go to  http://www.apcug.net/Reports/Editorial/2004.htm, you’ll see under December 2004  an article “Beware of SCUMWARE Pretending to be Anti-Spyware” which tells one  man’s experience. Sometimes what you get for nothing is nothing. Or worse than  nothing.&lt;br /&gt;&lt;br /&gt;When my computer ran slower and slower, some parts of my  website disappeared, and question marks appeared all over my website homepage, I  yelped for help. Should have yelped sooner, but better late than never. Asked my  website manager what he uses. He uses Lavasoft’s PROFESSIONAL program of  Ad-Aware and Ad-Watch. I bought it, and it found 17 pieces of spyware (Alexas  and tracking cookies), plus a possible browser hijack attempt. (The techie said,  “That’s nothing. They found 83 pieces of spyware on mine!” But then he’s a pro.)  Ad-Aware removed all the problems except the question marks on my website home  page, http://foodandfiction.com/Entrance.html. These are probably due to the  attempted hijack. I’m stuck with them. Fortunately they don’t show on any  computer except mine.&lt;br /&gt;&lt;br /&gt;If you want to lead a simple life, come here to  http://lavasoft.com and download their PROFESSIONAL type of Ad-Aware and  Ad-Watch.&lt;br /&gt;&lt;br /&gt;If you prefer an in-depth investigation of anti-spyware, &lt;br /&gt;http://www.pcworld.com/reviews/article/0,aid,119572,00.asp can help you.  They’ve tested most of the anti-spyware out there, though I must say that  Ad-Aware’s pro version was not tested, only the pc version.&lt;br /&gt;&lt;br /&gt;Just don’t  wait until you’re in big trouble. Do something now!&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;IF YOU’VE BEEN  HIJACKED &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A good, basic article can be found by going to  http://www.apcug.net/Reports/Editorial/2004.htm. Scroll down to September 2004  and download “Help! I’ve Been Hijacked . . .”&lt;br /&gt;&lt;br /&gt;Another good article is,  “How to Remove Adware and Spyware,”  http://antivirus.about.com/od/securitytips/a/removespyware.htm.&lt;br /&gt;&lt;br /&gt;You  might also read “Invasion of the Browser Snatchers” at &lt;br /&gt;http://www.pcworld.com/news/article/0,aid,84464,tk,dn021402X,00.asp. The  article will explain how to undo the damage -- although some hijack damage can’t  be removed that easily.&lt;br /&gt;&lt;br /&gt;MORE INFORMATION&lt;br /&gt;&lt;br /&gt;Here are more good  sources of spyware information:&lt;br /&gt;&lt;br /&gt;http://www.scumware.com/ - a website  about nothing else but.&lt;br /&gt;&lt;br /&gt;http://www2.spywareinfo.com/category/news/ has  fascinating current Internet security news flashes, which you will enjoy if you  like to feel that civilization as we know it is under constant threat. &lt;br /&gt;&lt;br /&gt;About the author:&lt;br /&gt;Find the best recipe, food gift, and  healthy dieting sites in Janette Blackwell’s Delightful Food Directory, &lt;a class="navigation" href="http://delightfulfood.com/main.html" target="_blank"&gt;http://delightfulfood.com/main.html&lt;/a&gt;Or enjoy her country  cooking at Food and Fiction, &lt;a class="navigation" href="http://foodandfiction.com/Entrance.html" target="_blank"&gt;http://foodandfiction.com/Entrance.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/04/internet-scams-102-hijackings-and.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-395804293054868302</guid><pubDate>Tue, 17 Apr 2007 12:14:00 +0000</pubDate><atom:updated>2007-04-17T05:15:55.384-07:00</atom:updated><title>More Free Tools Increase Security For Your PC</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Jim Edwards&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;- by Jim Edwards&lt;br /&gt;&lt;br /&gt;(c) Jim  Edwards - All Rights reserved&lt;br /&gt;http://www.thenetreporter.com &lt;br /&gt;=====================================&lt;br /&gt;&lt;br /&gt;A recent article about  preventing hackers from breaking&lt;br /&gt;into your computer caused an overwhelming  response by&lt;br /&gt;readers.&lt;br /&gt;&lt;br /&gt;It seems everyone has an opinion about the best  software&lt;br /&gt;and advice for keeping your computer safe from viruses and &lt;br /&gt;online predators. The following will help you increase your&lt;br /&gt;online  security and usually without spending a dime!&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Zone Alarm &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Zone  Alarm offers several versions of their&lt;br /&gt;popular firewall software with  various options for&lt;br /&gt;increased security. The basic firewall software comes  free&lt;br /&gt;of charge and ranks among the most highly rated firewalls &lt;br /&gt;available. The paid version helps you to eliminate&lt;br /&gt;everything from  pop-up windows to unwanted advertising and&lt;br /&gt;also helps you track hackers back  to their source.&lt;br /&gt;&lt;br /&gt;Visit www.zonealarm.com to download your copy today, &lt;br /&gt;especially if you don't already carry a firewall on your&lt;br /&gt;system. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;The Guru Of Security&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Visit www.grc.com if you want a real "eye  opener!" Frankly,&lt;br /&gt;some of the things I saw on this website shocked me. I had &lt;br /&gt;no idea so many potential problems existed for breaches in&lt;br /&gt;your online  security.&lt;br /&gt;&lt;br /&gt;But what also shocked me was how simple most of the "fixes" &lt;br /&gt;rate for securing your computer against attack. It became&lt;br /&gt;very apparent  to me that most computer hackers don't&lt;br /&gt;exploit hardware or software  weaknesses, they actually&lt;br /&gt;exploit our ignorance about the simple steps we  should take&lt;br /&gt;to protect ourselves and others.&lt;br /&gt;&lt;br /&gt;When you visit  www.grc.com you'll see the site covers a lot&lt;br /&gt;of ground. Since you might find  it easy to get sidetracked&lt;br /&gt;with all the interesting information, make sure  to&lt;br /&gt;specifically check out the "Shields Up!" area. This section&lt;br /&gt;offers  two comprehensive tests of your Internet connection&lt;br /&gt;to check for the typical  points of entry used by hackers.&lt;br /&gt;&lt;br /&gt;The first test, "Test My Shields,"  checks the security of&lt;br /&gt;your Internet connection itself and how much system  and&lt;br /&gt;personal information others can obtain without your&lt;br /&gt;knowledge. &lt;br /&gt;&lt;br /&gt;The second test, "Probe My Ports," attempts to find open&lt;br /&gt;ports on  your computer and evaluate how and where a hacker&lt;br /&gt;could enter.&lt;br /&gt;&lt;br /&gt;Both  tests will help you spot the most common and obvious&lt;br /&gt;vulnerabilities most of  us face when connected to the&lt;br /&gt;Internet. Also to its credit (and unlike  similar sites),&lt;br /&gt;this website doesn't use these tests as a lead-in to try to &lt;br /&gt;sell you anything.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Free Anti-Virus Software &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Visit  www.grisoft.com to download a free anti-virus&lt;br /&gt;software package that rivals  anything you could buy. The&lt;br /&gt;software comes with free updates on virus  definitions&lt;br /&gt;(critical for up-to-date protection) and will even certify &lt;br /&gt;your outgoing email as virus free!&lt;br /&gt;&lt;br /&gt;I have used this software myself  and, though nothing rates&lt;br /&gt;perfect, I have found it rivals products costing  $50 or&lt;br /&gt;more. If you don't carry virus protection software on your &lt;br /&gt;computer, stop this minute and go to www.grisoft.com to&lt;br /&gt;download the  free version now.&lt;br /&gt;&lt;br /&gt;With so many resources and advice available for free,  no&lt;br /&gt;valid excuse exists for not immediately securing your&lt;br /&gt;computer  against hackers, vandals, viruses and malicious&lt;br /&gt;code.&lt;br /&gt;&lt;br /&gt;&lt;hr size="1"&gt; About the author:&lt;br /&gt;&lt;br /&gt;Jim Edwards is a syndicated newspaper columnist and the  co-&lt;br /&gt;author of an amazing new ebook that will teach you how to&lt;br /&gt;use free  articles to quickly drive thousands of targeted&lt;br /&gt;visitors to your website or  affiliate links...&lt;br /&gt;Simple "Traffic Machine" brings Thousands of NEW visitors  to&lt;br /&gt;your website for weeks, even months... without spending a&lt;br /&gt;dime on  advertising! ==&gt; &lt;a href="http://www.turnwordsintotraffic.com/"&gt;"Turn Words  Into&lt;br /&gt;Traffic"&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/04/more-free-tools-increase-security-for.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-334496620805937917</guid><pubDate>Mon, 09 Apr 2007 03:12:00 +0000</pubDate><atom:updated>2007-04-08T20:14:12.506-07:00</atom:updated><title>3 Summer Computer Tips</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Sharron Senter&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;#1 – Summer Computer Travel &lt;/span&gt;&lt;br /&gt;Holiday travelers should be on alert  when arriving home from long weekends, such as the Fourth of July, a popular  time for computer viruses to spread.&lt;br /&gt;&lt;br /&gt;Most computer users have a tendency  to turn off their computers when away on trips, which means you’re not getting  newly-released anti-virus patches or anti-spyware updates; the two most common  areas that cause computers problems. We recommend you update anti-virus and  anti-spyware scans before opening e-mail or going online after an extended  absence.&lt;br /&gt;&lt;br /&gt;We consistently see an increase in calls for virus related  problems immediately following long weekends. Avoid the problems altogether by  updating your security software before using your computer. For a free listing  of viruses, spyware threats and trends, visit:  www.VisitingGeeks.com/downloads.htm&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;#2 -- Should You Leave Your Computer  Running? &lt;/span&gt;&lt;br /&gt;One question we hear frequently is, "Should I leave my desktop  computer on or turn it off?"&lt;br /&gt;&lt;br /&gt;There are 2 schools of thought…&lt;br /&gt;Turning  it on and off numerous times during the day subjects the microcircuits to  flexing and fatigue due to change in temperatures. Over time this could lead to  a break in the circuitry and result in system failure.&lt;br /&gt;&lt;br /&gt;Leaving the  computer on all the time puts excess wear on the mechanical components (the hard  drive spindle motor and cooling fans).&lt;br /&gt;&lt;br /&gt;Best compromise. First user in  the morning turns it on; last user turns it off.&lt;br /&gt;&lt;br /&gt;We leave our desktops  on all the time allowing for scheduled utility tasks to run during overnight  hours. We also restart the systems (to flush the RAM and reset the operating  system) on a regular basis and routinely remove the case covers to clean out any  dust that may have accumulated, especially around the fans and screens. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;#3 -- Stop Popups! &lt;/span&gt;&lt;br /&gt;Never click inside the window of a popup.  Instead, close it by clicking on the X in the upper right corner. Many people  are fooled into installing spyware applications by popups that promise to clean  their system. If you receive a message saying it can help, assume it’s spyware  and don’t click!&lt;br /&gt;&lt;br /&gt;About the author:&lt;br /&gt;&lt;br /&gt;Sharron Senter is co-founder of &lt;a class="navigation" href="http://www.visitinggeeks.com/" target="_blank"&gt;http://www.VisitingGeeks.com&lt;/a&gt;- an on site computer repair,  security and networking company serving north of Boston, Southern NH and Maine.  Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and  securing and making computers perform faster. Learn more about Sharron at &lt;a class="navigation" href="http://www.sharronsenter.com/" target="_blank"&gt;http://www.SharronSenter.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/04/3-summer-computer-tips.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-3496650513072244499</guid><pubDate>Wed, 04 Apr 2007 05:34:00 +0000</pubDate><atom:updated>2007-04-03T22:41:08.263-07:00</atom:updated><title>How To Take Care Of Your Laptop Computer</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Joe Chianese&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;As the proud owner of a laptop  computer, you'll want to keep&lt;br /&gt;your machine in the best possible condition.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiqY0VwR3O-NjFnnUeTSX1wor6aWIJ7Zf8YLGa9VTDZFg85hmusQsQnzpuDPBBM73WFnspt-jsnpasueMQjeErLxnmeY5A3l4N_LqAsybCR-OP5SitjdnzX6pCS0AsFWBbOdN4c_jlGnq2/s1600-h/lp.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiqY0VwR3O-NjFnnUeTSX1wor6aWIJ7Zf8YLGa9VTDZFg85hmusQsQnzpuDPBBM73WFnspt-jsnpasueMQjeErLxnmeY5A3l4N_LqAsybCR-OP5SitjdnzX6pCS0AsFWBbOdN4c_jlGnq2/s320/lp.jpg" alt="" id="BLOGGER_PHOTO_ID_5049443675858802642" border="0" /&gt;&lt;/a&gt;&lt;span class="style2"&gt;Aside from cleaning your screen and dusting the keyboard,&lt;/span&gt;&lt;br /&gt;&lt;span class="style2"&gt;however,  you'll need to take a few extra steps to maintain&lt;br /&gt;your laptop's health:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Play it cool &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A laptop computer generates a lot of heat,  especially when&lt;br /&gt;running the latest high-powered software. Too much heat and&lt;br /&gt;you risk damaging the internal circuitry.&lt;br /&gt;&lt;br /&gt;Always try to keep your  laptop in a well-ventilated, cool&lt;br /&gt;environment. And ensure you don't block  the fan grills on&lt;br /&gt;the sides, back, or bottom of the machine at any time.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Handle the screen carefully &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Avoid touching or playing with  your LCD screen.&lt;br /&gt;&lt;br /&gt;Yes, it might be fun to watch the waves generated by  your&lt;br /&gt;finger against the screen, but LCD displays are fragile&lt;br /&gt;devices  that must be cared for.&lt;br /&gt;&lt;br /&gt;Take care when cleaning the screen too, and use  only&lt;br /&gt;approved cleaning materials.&lt;br /&gt;&lt;br /&gt;You won't want to pay the money  for screen repairs or, even&lt;br /&gt;worse - a new machine entirely.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Don't  drop it&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Whatever you do, don't drop your laptop computer! Keep it&lt;br /&gt;safe inside of a carrying case when moving around or&lt;br /&gt;traveling.&lt;br /&gt;&lt;br /&gt;Don't leave it on the edge of a table or on an unstable&lt;br /&gt;support of  some kind. One ill fated drop to the floor could&lt;br /&gt;spell death for your mobile  office.&lt;br /&gt;&lt;br /&gt;Try to make sure the rubber feet underneath are in good&lt;br /&gt;condition and are still attached. This will prevent the&lt;br /&gt;device from  sliding around accidentally.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Be careful with those drinks...  &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you need to have a drink while working or playing, be&lt;br /&gt;careful not  to spill it.&lt;br /&gt;&lt;br /&gt;Your laptop computer could suffer the consequences from  just&lt;br /&gt;a few drops of liquid poured in the right places.&lt;br /&gt;&lt;br /&gt;While you  probably do eat and drink around it regardless,&lt;br /&gt;you will want to  occasionally wipe down the edges, the&lt;br /&gt;keyboard, the touchpad, and maybe even  wipe down the screen&lt;br /&gt;to keep any dirt from accumulating.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Just say  no to viruses&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Security wise, make sure you obtain an anti-virus program.&lt;br /&gt;&lt;br /&gt;Secondly, keep it updated!&lt;br /&gt;&lt;br /&gt;Buying an anti-virus one month and  not updating it for the&lt;br /&gt;next six really negates it purpose. Your laptop  computer&lt;br /&gt;could be exposed to hundreds and thousands of new viruses&lt;br /&gt;every  month if you don't update your virus definitions.&lt;br /&gt;&lt;br /&gt;Most anti-virus  programs have automatic update methods,&lt;br /&gt;eliminating the need for you to have  to remember to do it&lt;br /&gt;manually.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Avoid Popups &lt;/span&gt;&lt;br /&gt;Pop-ups are  particularly annoying on a laptop computer.&lt;br /&gt;Trying to close a bunch of  windows without a regular mouse&lt;br /&gt;can be a nuisance.&lt;br /&gt;&lt;br /&gt;You'll want a  pop-up blocker, such as the Google Toolbar&lt;br /&gt;(located at  http://tools.google.com), to prevent these pop-&lt;br /&gt;up ads.&lt;br /&gt;&lt;br /&gt;Many  intrusive forms of advertising, and even some viruses,&lt;br /&gt;can install software  on your machine by using various forms&lt;br /&gt;of pop-ups. It's best to get yourself  a blocker and avoid&lt;br /&gt;the situation entirely.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Use a firewall&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Always utilize a firewall on your Internet or network-&lt;br /&gt;enabled  laptop computer. Even if you use Windows XP's built-&lt;br /&gt;in firewall (or  purchase one from such companies as Norton),&lt;br /&gt;your security will greatly  benefit from it.&lt;br /&gt;&lt;br /&gt;Blocking out all the unnecessary ports and closing all  the&lt;br /&gt;loopholes will prevent a hacker or virus from freely&lt;br /&gt;entering your  hard drive.&lt;br /&gt;&lt;br /&gt;So there you go. Combine all of the above tactics and help&lt;br /&gt;your laptop enjoy a happier and healthier lifestyle!&lt;br /&gt;&lt;br /&gt;About the  author:&lt;br /&gt;Joe Chianese is a technical writer and frequent contributor to  HowToBuyALaptop.com For advice on how to find the right laptop computer for you,  visit: &lt;a class="navigation" href="http://howtobuyalaptop.com/" target="_blank"&gt;http://HowToBuyALaptop.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/04/how-to-take-care-of-your-laptop.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiqY0VwR3O-NjFnnUeTSX1wor6aWIJ7Zf8YLGa9VTDZFg85hmusQsQnzpuDPBBM73WFnspt-jsnpasueMQjeErLxnmeY5A3l4N_LqAsybCR-OP5SitjdnzX6pCS0AsFWBbOdN4c_jlGnq2/s72-c/lp.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-1636707766451904506</guid><pubDate>Sun, 01 Apr 2007 07:20:00 +0000</pubDate><atom:updated>2007-04-01T00:22:40.324-07:00</atom:updated><title>Protection for your computer system - Painless and free !</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;John Roberts&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Painless (and FREE) P.C. Protection&lt;/span&gt; &lt;br /&gt;&lt;br /&gt;Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The  Internet is a veritable minefield of things that can invade your PC and affect  it’s Security and Performance.&lt;br /&gt;You can do something about it and you can do  it FREE, using some or all of the following programs and tips. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Anti-Virus protection.&lt;/span&gt;&lt;span style="color: rgb(255, 102, 0);"&gt; &lt;/span&gt;&lt;br /&gt;One of the best Free programs for this is  AntiVir Personal Edition Anti-Virus software. Download it from: &lt;br /&gt;http://www.free-av.com&lt;br /&gt;Install on your PC and leave it running to block  any incoming bugs or viruses! It can also be used to scan your system for any  previous invasions, but be patient, this takes about 15 minutes to complete.  Worth running periodically, to check all is ok.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;FireWalls and Broadband.  &lt;/span&gt;&lt;br /&gt;If you are on Broadband, consider using Firewall software. Most good ISP’s  now supply free. (eg AOL). If yours doesn’t, you can get a reasonably good Free  personal firewall system from ‘ZoneAlarm’ at http://www.zonelabs.com .&lt;br /&gt;Tip –  DON’T leave your PC connected to the Internet when you are not using it! Reduce  the chance of something loading while you are not monitoring things ! &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;SpyBot finders and Ad blockers. &lt;/span&gt;&lt;br /&gt;Various programs available on the  web, both ‘Paid’ and ‘Free’. You can get good results from using 2 Free packages  that are available. These are ‘SpyBot Search &amp; Destroy’ and ‘Ad-Aware’.  Downloads available at&lt;br /&gt;http://www.lavasoft.de for AD-Aware &lt;br /&gt;http://www.safer-networking.org for SpyBot&lt;br /&gt;Using both of these packages  ensures that, you get with one, any ‘bots’ that the other one misses. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Suspect you have a virus ? &lt;/span&gt;&lt;br /&gt;If you think you already have a virus, a  good Free tool for checking and killing them is McAfee Stinger. Free download  at:&lt;br /&gt;http://us.mcafee.com/virusInfo/default.asp?id=stinger&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="color: rgb(255, 102, 0);"&gt;Some  General Tips&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;Get in the habit of , every time you disconnect from the web,  deleting ALL files from the following folders:&lt;br /&gt;C:/WINDOWS/Cookies &lt;br /&gt;C:/WINDOWS/Temporary Internet&lt;br /&gt;&lt;br /&gt;Beware ‘Boys Toys’ and ‘Freebies’!  Think, if someone wants to spread a bug, get tracking software onto your PC etc,  the best place for them to do it is places where you go to get ‘freebies’ to  download! The above sites are normally ‘ad free’, but be aware that if you  download porn, free music, free games, free software, there is often a ‘price’  to pay. Always use the above programs after visiting ANY of these sorts of  sites!&lt;br /&gt;&lt;br /&gt;&lt;hr size="1"&gt; About the author:&lt;br /&gt;&lt;br /&gt;John Roberts ia a freelance Training Consultant and  Director of JayrConsulting Ltd &lt;a class="navigation" href="http://www.jayrconsulting.co.uk/" target="_blank"&gt;http://www.jayrconsulting.co.uk&lt;/a&gt;John is an active member of  TrainerBase at http://www.trainerbase.co.uk and is always open to discuss any  training related issues&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/04/protection-for-your-computer-system.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-9037610105272810954</guid><pubDate>Wed, 28 Mar 2007 00:23:00 +0000</pubDate><atom:updated>2007-03-27T17:28:37.475-07:00</atom:updated><title>Basic Steps To Optimize Your Internet Security</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Popescu Alexandru&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;After seeing many people complain  about their weak Internet security I decided to write down some things that will  help you for your Internet security.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;First, here are some tips to make  windows safer :&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;For basic security and update patches&lt;/span&gt; install Service  Pack 2 for Windows XP or Service Pack 4 for Windows 2000.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Once a month  use Windows Update&lt;/span&gt; so you can get the latest pacthes.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;When you download  software&lt;/span&gt; from the Internet make sure you download it from the original website. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Always run anti Trojan and anti virus software.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Even if you  don't use it you have to make your Internet Explorer as safe as possible. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;When you access the Internet&lt;/span&gt; you are browsing the web using a browser  such as Internet Explorer.The Internet Explorer contains several security  vulnerabilities. You should make it as safe as possible or switch your default  browser to an alternative. You will have to set some options from the Manage  Add-Ons in the Internet Options. You will see a list of add-ons that can be  activated or deactivated. If you see any unusual entries just deactivate them so  you can be sure you don't have a trojan/worm.&lt;br /&gt;&lt;br /&gt;Under &lt;span style="font-weight: bold;"&gt;Internet Options&lt;/span&gt;  -&gt; &lt;span style="font-weight: bold;"&gt;Security&lt;/span&gt; -&gt; &lt;span style="font-weight: bold;"&gt;Internet&lt;/span&gt; -&gt; you will see the &lt;span style="font-weight: bold;"&gt;Edit Level&lt;/span&gt;.You should set  it to high in order to disable most of the security threats.&lt;br /&gt;&lt;br /&gt;Your Web  Browser should be ok now. Let's see what we have to do from our email point of  view.&lt;br /&gt;&lt;br /&gt;Because it's built-in in their Windows system lots of users like  to use Outlook Express for emailing. But it's a fact that it contains many  security vulnerabilities so I advise you to use alternatives. If you use a web  based Email (you can browse your email with your web browser) you can delete  viruses even if you don't download them to your PC.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Make sure you have  installed an Anti Virus for 100% virus protection&lt;/span&gt;. One that I've found to be  very good and never disappointed me is the AVG Anti virus. If you take the time  to regularly update it you will be safe enough with it.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Lots of people  install Firewalls&lt;/span&gt; because they belive their Internet security will be higher. I  personaly disagree. If you do not know how to best configure it, and you have to  know much about the tech behind it to do so, it will just make your PC slow and  software not working.You can just use the Windows XP SP2 firewall for basic  security.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;All this tips should make your PC safer&lt;/span&gt;. I browse the Internet  every single day for some time now and they worked great for me. I haven't met a  virus/worm for some time now.&lt;br /&gt;&lt;hr size="1"&gt; About the author:&lt;br /&gt;&lt;br /&gt;DSW Distribution Ltd has all you need for your internet  security: mcafee antivirus, norton antivirus 2005, microsft office 2003 standard  edition, panda antivirus, windows xp and many more ...Visit us at &lt;a class="navigation" href="http://www.dswtrade.com/" target="_blank"&gt;http://www.dswtrade.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/basic-steps-to-optimize-your-internet.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-5217105074714648329</guid><pubDate>Sun, 25 Mar 2007 03:43:00 +0000</pubDate><atom:updated>2007-03-24T20:44:59.491-07:00</atom:updated><title>Internet Security Basics 101</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Niall Roche&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;The explosive growth of the Internet  has meant that thousands of people are today experiencing the joys of being  online for the first time. With growth there always comes pain. Be it your  growing pains as a child or the growth and development of this part of our  culture called the Internet.&lt;br /&gt;&lt;br /&gt;Firstly we need to quickly explain what the  Internet is and where it came from. The Internet is the offspring of a military  project called Arpanet. Arpanet was designed to provide reliable communication  during global nuclear war. A vast network of interconnected computers was set up  all over the world to allow the various branches of US and NATO forces to  communicate with each other.&lt;br /&gt;&lt;br /&gt;Nuclear war never came (thankfully) and the  world was left with a massive network of computers all connected together with  nothing to do. Colleges and universities started to use these computers for  sharing research internationally. From there it grew and spread outside colleges  to local homes and businesses. The World Wide Web was born and its father was a  guy called Tim Berners Lee.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;When you're connected to the Internet  you're sharing a vast network with hundreds of millions of other users. This  shared network provides resources that 15 years ago were never thought possible.  Unfortunately when something is shared its open to abuse. On the Internet this  abuse comes from hackers and virus creators. Their sole intent is to cause chaos  and/or harm to your computer system and millions of other computer systems all  over the world.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;How do you combat this? You need an Internet  security system. This might sound complicated but your Internet security system  will be quite straigtforward being comprised of just 2 - 3 Internet security  products. We'll look at each of these products in more detail now: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;AntiVirus Software&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The first and most critical element of  your Internet security system is antivirus software. If you don't have  up-to-date antivirus software on your PC you're asking for trouble. 300 new  viruses appear each month and if you're not constantly protecting your system  against this threat your computer will become infected with at least one virus -  it's only a matter of time.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Antivirus software scans your PC for  signatures of a virus. A virus signature is the unique part of that virus. It  can be a a file name, how the virus behaves or the size of the virus file  itself. Good antivirus software will find viruses that haven't yet infected your  PC and eliminate the ones that have.&lt;br /&gt;&lt;br /&gt;Antivirus software can only protect  your computer from viruses trying to infect it via email, CD-Rom, floppy disk,  Word documents or other types of computer files. Antivirus software alone will  not keep your computer 100% safe. You also need to use firewall software. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Firewall Software&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The use of firewall software by home  computer users is a relatively new occurence. All Internet connections are a two  way process. Data must be sent and received by your computer. This data is sent  through something called ports. These are not physical things rather aspects of  the way your computer communicates online.&lt;br /&gt;&lt;br /&gt;Firewall software watches  these ports to make sure that only safe communication is happening between your  computer and other computers online. If it sees something dangerous happening it  blocks that port on your computer to make sure your computer stays safe from the  person who is trying to hack into your system.&lt;br /&gt;&lt;br /&gt;An easier way to  understand a firewall would be to picture your computer as an apartment complex.  At the front door of this complex there is a security guard. Every person who  enters the complex must pass this security guard. If the security guard  recognizes the person entering as a resident he allows them to pass without  saying anything. If, however, the person entering the complex is unknown to him  then he will stop that person and ask for identification. If they have no  business being at the apartment complex he escorts them from the building. &lt;br /&gt;&lt;br /&gt;If you are not currently using firewall software your computer will get  hacked into - that's a guarantee.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;PopUP Blocker&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You can get  a good popup blocker at no cost. An easy way to do this is to install either the  Google or Yahoo toolbar. Both of these come with popup blockers built in. Popups  are not necessarily dangerous but are a nuisance and using either of these  toolbars will make your life that bit easier.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;A simple rule for  practicing online security is: "If in doubt then don't". If you don't recognize  the file, the email address, the website or if your gut feeling says "no" then  don't click that button.&lt;br /&gt;&lt;br /&gt;About the author:&lt;br /&gt;This article was submitted  courtesy of the Spyware &amp;amp; Malware Guide. This site is dedicated to &lt;a href="http://www.spyware-malware-guide.com/"&gt;spyware removal&lt;/a&gt; and just  generally helping users keep their PCs spyware free.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/internet-security-basics-101.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-450303647103553592</guid><pubDate>Sat, 24 Mar 2007 01:24:00 +0000</pubDate><atom:updated>2007-03-23T18:25:22.045-07:00</atom:updated><title>Do The Media Spread Computer Viruses?</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Joel Walsh&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;Summary: Could the mass media hype  about computer viruses actually make the problem worse?&lt;br /&gt;&lt;br /&gt;If you believe  what you hear in the media, there are an awful lot of viruses going around. No,  I'm not talking about the make-you-sick kind of virus, though they get plenty of  airtime, too. I'm talking about the kind of virus that enters via your internet  connection rather than your nasal passages.&lt;br /&gt;&lt;br /&gt;What the mainstream media  often don't tell you--at least, in most radio and television newscasts and in  the crucial headlines and opening paragraphs of newspaper articles-- is that  many of these "viruses" are not viruses at all.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;What Computer Viruses  Really Are &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The main reason the mainstream media always are in alarm over  viruses is that they tend to call any malicious computer program a virus. In  reality, there are at least eleven distinct types of malicious software, or  malware, commonly affecting computers today. The most common of these are worms,  Trojans, and spyware.&lt;br /&gt;&lt;br /&gt;So, what's the difference between computer viruses  and the other types of malware? The difference is that computer viruses are just  about the only ones that regularly shut down computers and cause other obvious  damage. The most common of the other kinds of malware--worms, Trojans, and  spyware--are usually only detectable with a special scan.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;The Real  Danger of Computer Viruses &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If the other types of malware are so  unobtrusive that they can only be detected with a special scan, then what's to  worry about? For starters, these programs are called malicious for a reason:  they are designed to cause some kind of damage, if not to your computer, then to  someone else's.&lt;br /&gt;&lt;br /&gt;Worms are most famously used to damage, destroy, or  disrupt other computer networks than the one on which the host computer is  located. For instance, worms have been used by website owners to shut down rival  websites by sending overwhelming numbers of requests to the computer that hosts  that website. Worms have also been used to send out viruses to other computers,  often without infecting the host machine--after all, what would it benefit the  worm to shut down its host computer?&lt;br /&gt;&lt;br /&gt;Trojans, in turn, are often used to  insert worms and other malware on your computer, even if the Trojan itself does  no damage.&lt;br /&gt;&lt;br /&gt;But even if you don't care what happens to anyone else, you  should still be concerned about one kind of malware: spyware, a kind of malware  that, true to its name, collects data from your computer and sends it back to a  remote host.&lt;br /&gt;&lt;br /&gt;Most spyware is only interested in monitoring your internet  usage so it can tell other programs, called adware, what advertising to popup on  your computer. However, there are criminal spyware programs that steal financial  data, or perform a thorough identity theft. Don't think you have personal or  financial data on your computer? Some spyware programs contain a keylogger,  which is a program that copies whatever you type, usually in order to snatch  passwords. Even if you keep no financial information on your computer, if you  ever buy anything over the web, the keylogger would allow its owner to buy stuff  using the same information you typed in to buy stuff yourself.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Why Blame  the Media? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Given the danger of all these different types of malware,  isn't it a good thing that the mass media are becoming hysterical about it? And  can't they be forgiven the sloppy reporting of calling Trojans, worms, spyware,  and other malware "viruses"?&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;No, no, no. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This is a classic case  of bad reporting doing more damage than no reporting at all. In this case, the  damage bad reporting has done is to promote a common myth that goes something  like this: "The only malicious software is a virus. Viruses damage your  computer. Therefore, if my computer is working OK, my computer has no malicious  software. I only need to scan my computer for problems when there is a sign of  problems."&lt;br /&gt;&lt;br /&gt;Thanks to this myth, many people complacently let their  antivirus software go months out of date, not wanting to be bothered with  scheduling an automatic update. Just as bad, many people don't have any extra  software to combat the other types of malware that may not be covered by  antivirus software.&lt;br /&gt;&lt;br /&gt;In fact, it's not uncommon for people who have found  malware on their computers after a scan to say, "but I never had malware on my  computer before!" But how would they have known if they had never scanned! &lt;br /&gt;&lt;br /&gt;Until the biggest mainstream media--and especially television--start  educating the public about the need to have their computers automatically  scanned at least daily, the world will continue to have major, drawn-out  problems with malware that could have been wiped out as soon as soon as the  anti-malware software makers discovered it.&lt;br /&gt;&lt;br /&gt;And until that day, the  mainstream media will have many more opportunities to run hysterical stories  about "viruses," thereby forcing them to sell more newspapers and broadcast to  even larger audiences of people who suck at the information trough yet somehow  never become full.&lt;br /&gt;&lt;br /&gt;About the author:&lt;br /&gt;Joel Walsh writes on all types  of malware for spyware-refuge.com: &lt;a class="navigation" href="http://www.spyware-refuge.com/?" target="_blank"&gt;http://www.spyware-refuge.com?&lt;/a&gt;adware spyware program [Publish  this article on your website! Requirement: live link for above URL/web address  w/ link text/anchor text: "adware spyware program" OR leave this bracketed  message intact.]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/do-media-spread-computer-viruses.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-441546839956654919</guid><pubDate>Thu, 22 Mar 2007 02:25:00 +0000</pubDate><atom:updated>2007-03-21T19:34:43.028-07:00</atom:updated><title>Is Your Computer Sick?</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="color: rgb(251, 112, 20);font-family:Times New Roman;font-size:100%;"  &gt;Jim Edwards&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;© Jim Edwards - All Rights reserved&lt;br /&gt;http://www.thenetreporter.com&lt;br /&gt;-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Viruses and spyware&lt;/span&gt; usually show up on your computer one of two  ways.&lt;br /&gt;&lt;/span&gt;&lt;div style="text-align: right;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;span class="style2"&gt;Either they invade your system with a frontal assault like&lt;br /&gt;the  Huns attacking the Romans, or they sneak in a back door&lt;br /&gt;like a cat burglar.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class="style2"&gt;Either way, once a virus or piece of spyware gets on your&lt;br /&gt;system,  getting it off can rate harder than curing a severe&lt;br /&gt;case of trench foot!&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF1Pn1XW22PF_CHJkdEDfJu8MyEaQxMGXkQRpuJA0kNzptN7FA-shTlIedS6BLhP0gJnf7VRzEY_r0Qr0jkq4zqRB_Tw7Tz-FL67PoqF3t4khlqKGrGB6E1k12X0W0qMWPKsWwkkS3Eqkl/s1600-h/compsick.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF1Pn1XW22PF_CHJkdEDfJu8MyEaQxMGXkQRpuJA0kNzptN7FA-shTlIedS6BLhP0gJnf7VRzEY_r0Qr0jkq4zqRB_Tw7Tz-FL67PoqF3t4khlqKGrGB6E1k12X0W0qMWPKsWwkkS3Eqkl/s320/compsick.jpg" alt="" id="BLOGGER_PHOTO_ID_5044571055410077506" border="0" /&gt;&lt;/a&gt;&lt;span class="style2"&gt;&lt;span style="font-weight: bold;"&gt;Viruses, malicious programs&lt;/span&gt; designed to disrupt normal&lt;br /&gt;computing,  and spyware, programs intended to literally "spy"&lt;br /&gt;on your activities, can  enter your computer a number of&lt;br /&gt;ways.&lt;br /&gt;&lt;br /&gt;Most commonly they enter your  system through an &lt;span style="font-weight: bold;"&gt;email &lt;/span&gt; &lt;span style="font-weight: bold;"&gt;attachment&lt;/span&gt;, by &lt;span style="font-weight: bold;"&gt;sharing files&lt;/span&gt; with an infected  computer by disk, as a "ride along" with a 3rd party program you install, or through a "back door" port in your computer.&lt;br /&gt;&lt;br /&gt;Regardless  of how they get on your system, once in place,&lt;br /&gt;they cause no end of  headaches and frustration.&lt;br /&gt;&lt;br /&gt;The following represent typical signs you may  suffer from&lt;br /&gt;infection by a virus or piece of spyware.&lt;br /&gt;&lt;br /&gt;Your computer  &lt;span style="font-weight: bold;"&gt;starts acting oddly&lt;/span&gt; by doing things it never&lt;br /&gt;did previously.&lt;br /&gt;&lt;br /&gt;Your  &lt;span style="font-weight: bold;"&gt;modem starts trying to dial out&lt;/span&gt; to the Internet without&lt;br /&gt;you initiating a  surfing session.&lt;br /&gt;&lt;br /&gt;You notice that &lt;span style="font-weight: bold;"&gt;files start disappearing&lt;/span&gt;, the system  stalls,&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;runs slowly&lt;/span&gt;, or even crashes frequently.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Your computer takes  progressively longer to boot&lt;/span&gt; up every&lt;br /&gt;time you start it or you notice that  your available hard&lt;br /&gt;drive space has disappeared. Strange popup windows  appear,&lt;br /&gt;even when you're not surfing the web, or you delete a&lt;br /&gt;program  and it "magically" reappears next time you boot the&lt;br /&gt;system.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;If you  suspect you a virus or a piece of spyware has invaded &lt;/span&gt; &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;your computer, follow  these steps to first identify and then &lt;/span&gt; &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;delete the offending code:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Step 1&lt;/span&gt; - Back up your important files, but remember to scan&lt;br /&gt;these  files for viruses before reinstalling to avoid&lt;br /&gt;accidentally re-infecting  your system.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Step 2&lt;/span&gt; - Update your anti-virus definitions and perform a&lt;br /&gt;scan of your hard drive.&lt;br /&gt;&lt;br /&gt;If you don't carry virus protection, or you  suspect your&lt;br /&gt;anti-virus software got corrupted somehow, then log on to&lt;br /&gt;www.pandasoftware.com and use the free Panda Active Scan&lt;br /&gt;service to  check your hard drive for viruses.&lt;br /&gt;&lt;br /&gt;Follow the instructions for  quarantining and removing the&lt;br /&gt;offending files.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Step 3&lt;/span&gt; - Scan your  hard drive with an adware, scumware, or&lt;br /&gt;spyware detection and removal tool  like Adaware&lt;br /&gt;www.lavasoft.de/support/download/ or Spybot&lt;br /&gt;http://spybot.safer-networking.de/.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 102, 0); font-weight: bold;"&gt;Step 4&lt;/span&gt; - In many cases, when the  virus or spyware program&lt;br /&gt;gets installed with a free utility or game you  download from&lt;br /&gt;the Web, you must usually uninstall the utility or game to&lt;br /&gt;finally get rid of the problem once and for all.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Step 5&lt;/span&gt; - Avoid  re-infection by keeping your anti-virus and&lt;br /&gt;firewall up-to-date at all  times.&lt;br /&gt;&lt;br /&gt;As a last resort, if you run into a program you simply can't&lt;br /&gt;get rid of, but can figure out the offending file's name, do&lt;br /&gt;a search  for the file name on Google.com. Often you will&lt;br /&gt;find you're not the first  victim and may get valuable advice&lt;br /&gt;for cleaning up your system.&lt;br /&gt;&lt;br /&gt;However, be very careful of the information you find and&lt;br /&gt;think twice  before modifying any system files.&lt;br /&gt;&lt;br /&gt;About the author:&lt;br /&gt;Jim Edwards is a  syndicated newspaper columnist and the&lt;br /&gt;co-author of an amazing new ebook  that will teach you how&lt;br /&gt;to use fr^e articles to quickly drive thousands of  targeted&lt;br /&gt;visitors to your website or affiliate links...&lt;br /&gt;&lt;br /&gt;Simple  "Traffic Machine" brings Thousands of NEW visitors to&lt;br /&gt;your website for  weeks, even months... without spending a&lt;br /&gt;dime on advertising! ==&gt; &lt;a class="navigation" href="http://www.turnwordsintotraffic.com/" target="_blank"&gt;http://www.turnwordsintotraffic.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/is-your-computer-sick.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF1Pn1XW22PF_CHJkdEDfJu8MyEaQxMGXkQRpuJA0kNzptN7FA-shTlIedS6BLhP0gJnf7VRzEY_r0Qr0jkq4zqRB_Tw7Tz-FL67PoqF3t4khlqKGrGB6E1k12X0W0qMWPKsWwkkS3Eqkl/s72-c/compsick.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-727735209454448917</guid><pubDate>Wed, 21 Mar 2007 03:47:00 +0000</pubDate><atom:updated>2007-03-20T20:55:16.068-07:00</atom:updated><title>Does Your PC Have Worms?</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Joel Walsh&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;Worms aren't just for dogs anymore.  Find out how to inoculate your computer against these nasty parasites.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;What Are Worms? &lt;/span&gt;&lt;/span&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaYrPhzwfQaOKmbdfxzaF-BsRGKXns70zjlMxF3gLmoNFpQeChPMycz1qYQninsvUfOtj_lPVGxYwvVqNBOo-agQhyafrS1HqDDLT54RthawyZJWs5qJ8WyzXnl7hQZTR_Td92jeCVWArd/s1600-h/virus.jpg"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 138px; height: 103px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaYrPhzwfQaOKmbdfxzaF-BsRGKXns70zjlMxF3gLmoNFpQeChPMycz1qYQninsvUfOtj_lPVGxYwvVqNBOo-agQhyafrS1HqDDLT54RthawyZJWs5qJ8WyzXnl7hQZTR_Td92jeCVWArd/s320/virus.jpg" alt="" id="BLOGGER_PHOTO_ID_5044221174489243442" border="0" /&gt;&lt;/a&gt;&lt;span class="style2"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="style2"&gt;Worms are descended from viruses and are even  nastier. Just as ever stronger doses of pesticide breed ever more resilient  locusts, better and better anti-spyware software bred ever more devious viruses.&lt;br /&gt;&lt;/span&gt;&lt;div style="text-align: right;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;span class="style2"&gt;Finally, some virus designers stopped having their creations infect and  take over files the way real viruses infect and take over cells. Instead, they  created programs that could stand on their own and cause plenty of trouble  without the help of any other software applications. Just worms are independent  organisms that can infect a host directly, so do computer worms infect computers  directly.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;What Do Worms Do? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Worm designers are often even more  sinister than virus designers, since worm designers are not just vandals. Worm  designers often use their creations to achieve specific goals:&lt;br /&gt;&lt;br /&gt;•  &lt;span style="font-weight: bold;"&gt;Backdoor creation&lt;/span&gt;. Worms often try to set up another kind of malware, a  backdoor. A backdoor is a hidden opening in your network connection that lets  the worm send data out and take data in. Practically speaking, the data it's  sending out are often spam emails, and the data it takes in are instructions on  spam emails to send.&lt;br /&gt;&lt;br /&gt;• &lt;span style="font-weight: bold;"&gt;Denial of service attack&lt;/span&gt;. Some worm designers  really are vandals rather than profit-hungry con artists sending spam. But their  vandalism can be more targeted. They use worms to send out numerous requests to  remote computers, such as web servers, in order to overwhelm them and therefore  shut them down. This is called a denial of service attack.&lt;br /&gt;&lt;br /&gt;• &lt;span style="font-weight: bold;"&gt;Spyware,  Trojan, adware, and virus installation&lt;/span&gt;. Worms are often used simply to unleash  other forms of malware on a computer that might otherwise block them.&lt;br /&gt;&lt;br /&gt;•  &lt;span style="font-weight: bold;"&gt;Information theft and fraud&lt;/span&gt;.Worms can multitask in order to set up spyware that  gathers sensitive information--often financial information--and then set up  backdoors, Trojans, viruses, or dialers to disseminate the stolen data.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;How Do Worms End Up on a PC? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Worms enter PCs just as viruses,  spyware and other malware do: any way they can! Some favorite points of entry  for worms:&lt;br /&gt;&lt;br /&gt;• &lt;span style="font-weight: bold; color: rgb(0, 0, 0);"&gt;Websites can actually download software&lt;/span&gt; to your computer  without you realizing it. This software includes not only worms, but also  spyware, adware, viruses, and other malware. These malware programs find their  way into websites either by the deliberate design of the site owner or because  hackers have installed the software on the website's server.&lt;br /&gt;&lt;br /&gt;•  &lt;span style="font-weight: bold; color: rgb(0, 0, 0);"&gt;Peer-to-peer file-sharing&lt;/span&gt; networkscontain many nice-enough-looking files that  are really worms. One of the sneakiest disguises is a filename that indicates  the spyware is really a video of a beautiful actress.&lt;br /&gt;&lt;br /&gt;• &lt;span style="font-weight: bold; color: rgb(0, 0, 0);"&gt;Email&lt;/span&gt;, the  favored route of viruses, can still be exploited by Spyware. But since new email  programs usually block the automatic opening of file attachments, this is less  of a problem than it used to be.&lt;br /&gt;&lt;br /&gt;• &lt;span style="font-weight: bold; color: rgb(0, 0, 0);"&gt;Any internet connection&lt;/span&gt; inevitably  lets data flow both in and out, and so is vulnerable to attacks by worms.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;How Do You Get Rid of Worms? &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There's really only one good way to  make sure your computer is rid of worms: scan it with multiple antivirus and  anti-spyware programs using a full-system scan. Worms are tricky, so anything  less than a full-system scan might let them escape. Worse, with new worms coming  out all the time, some antivirus and anti-spyware packages may not even know  about a new worm until after its wreaking havoc on your machine. That's why you  should try using more than one antivirus program and more than one anti-spyware  program to increase your odds of successfully detecting the malware.&lt;br /&gt;&lt;br /&gt;Don't have more than one anti-spyware and antivirus software? You'd  better start downloading. After all, worms won't take excuses.&lt;br /&gt;&lt;br /&gt;About the  author:&lt;br /&gt;Joel Walsh writes for &lt;a class="navigation" href="http://www.spyware-refuge.com/" target="_blank"&gt;http://www.spyware-refuge.com&lt;/a&gt;about worm removal &lt;a class="navigation" href="http://www.spyware-refuge.com/?" target="_blank"&gt;http://www.spyware-refuge.com?&lt;/a&gt;spyware anti virus [Publish this  article on your website! Requirement: live link for above URL/web address w/  link text/anchor text: "spyware anti virus" OR leave this bracketed message  intact.]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/does-your-pc-have-worms.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaYrPhzwfQaOKmbdfxzaF-BsRGKXns70zjlMxF3gLmoNFpQeChPMycz1qYQninsvUfOtj_lPVGxYwvVqNBOo-agQhyafrS1HqDDLT54RthawyZJWs5qJ8WyzXnl7hQZTR_Td92jeCVWArd/s72-c/virus.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-32606612224403844</guid><pubDate>Tue, 20 Mar 2007 02:37:00 +0000</pubDate><atom:updated>2007-03-19T19:41:48.590-07:00</atom:updated><title>Malware Quiz</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="color: rgb(251, 112, 20);font-family:Times New Roman;font-size:100%;"  &gt;Joel Walsh&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;Most people who think they know all  about &lt;span style="font-weight: bold;"&gt;spyware, Trojans, viruses, and other malware&lt;/span&gt; really don't. Take this quiz  to make sure you know who your enemies are.&lt;br /&gt;&lt;br /&gt;This quiz tests your  knowledge of five of the most common kinds of malware, the software you don't  want on your computer: Trojan, worm, virus, spyware, and adware. Keep in mind  that there are at least seven other kinds of malware we know about.&lt;br /&gt;&lt;br /&gt;The  answers are located at the end of the quiz.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;1. Which of the following is  most likely to make your computer stop working?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c.  Virus&lt;br /&gt;d. Spyware&lt;br /&gt;e. Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;2. Which of the following is not a  stand-alone program?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c. Virus&lt;br /&gt;d. Spyware&lt;br /&gt;e. Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;3. Which of the following is most likely to send spam  emails from your computer?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c. Virus&lt;br /&gt;d. Spyware&lt;br /&gt;e. Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;4. Which of the following is lest likely to be detected  with standard antivirus software?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c. Virus&lt;br /&gt;d.  Spyware&lt;br /&gt;e. Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;5. Which of the following is most likely to come  with other malware?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c. Virus&lt;br /&gt;d. Spyware&lt;br /&gt;e.  Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;6. Which of the following is bundled with the peer-to-peer  file-sharing software, Kazaa?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c. Virus&lt;br /&gt;d.  Spyware&lt;br /&gt;e. Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;7. Which of the following is most likely to  install a "backdoor" internet connection?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c. Virus&lt;br /&gt;d. Spyware&lt;br /&gt;e. Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;8. Which of the following is most likely to  be involved in a denial-of-service attack?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c.  Virus&lt;br /&gt;d. Spyware&lt;br /&gt;e. Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;9. Which of the following is the only  malware publicly documented as having been employed by the FBI to bring a  suspect to trial?&lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c. Virus&lt;br /&gt;d. Spyware&lt;br /&gt;e.  Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;10. Which of the following is most likely to steal your identity? &lt;/span&gt;&lt;br /&gt;a. Trojan&lt;br /&gt;b. Worm&lt;br /&gt;c. Virus&lt;br /&gt;d. Spyware&lt;br /&gt;e. Adware&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Answers:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;c&lt;/span&gt;. virus. Trojans, worms, spyware, and adware all  depend on your computer staying up and running. They use your computer's  resources to accomplish whatever their designer intended, such as sending  emails, displaying advertising, or stealing information from your computer.  Viruses, however, are usually created by vandals who just want to damage as many  computers as possible.&lt;br /&gt;&lt;br /&gt;2. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;c&lt;/span&gt;. virus. Viruses are not stand-alone  programs. Just as biological viruses must take over the cells of their host in  order to function and reproduce; computer viruses must take over one or more  files of the computer on which they are stored. Trojans, worms, spyware, and  adware are all stand-alone programs that can run without the help of another  application, though they often come bundled with other applications as a decoy,  or with other malware.&lt;br /&gt;&lt;br /&gt;3. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;b&lt;/span&gt;. worm. Worms are stand-alone programs that  are often used to send spam emails, or emails containing viruses. Trojans often  contain worms which are then installed for the purpose of sending spam emails,  but the worms are what actually send the emails.&lt;br /&gt;&lt;br /&gt;4. &lt;span style="color: rgb(255, 102, 0); font-weight: bold;"&gt;e&lt;/span&gt;. adware. In the  strictest sense, adware is rarely patently illegal or destructive, and so  antivirus software makers have traditionally avoided treating it as malware.  Adware designers are usually large advertising companies with hundreds of  millions of dollars, and they take care to insert end-user licensing agreements  (EULA) that supposedly mean that the software is installed with permission.  Also, adware will not usually do anything more destructive than show  advertising. Nonetheless, adware can quickly multiply on a computer, hogging  system resources and causing a computer to slow down or even malfunction. That's  why most anti-spyware software makers target adware as well.&lt;br /&gt;&lt;br /&gt;5. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;a&lt;/span&gt;.  Trojan. By definition, Trojans bear other malware within them, just as the  mythical wooden worse bore Greek warriors. The malware can be viruses, worms,  spyware, or adware.&lt;br /&gt;&lt;br /&gt;6. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;e&lt;/span&gt;. adware, though d. spyware, is also correct.  Kazaa's developers, Sharman Networks, make most of their money from the  advertising shown by the included adware. The adware typically runs even when  the Kazaa software is not in use. Sharman Networks has adamantly denied that the  adware that comes with Kazaa is spyware, since, like most adware, it comes with  an end-user license agreement that says the user grants permission for the  software to be installed. In reality, few Kazaa users, until recently, were  aware of just how much adware was being installed on their machines (as much as  a dozen or more). Plus, the adware does monitor your internet usage, and so is  spyware in the strictest sense.&lt;br /&gt;&lt;br /&gt;7. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;b&lt;/span&gt;. worm. Worms most commonly install  a "backdoor" internet connection in order to send out data (for instance, spam  emails or requests to remote servers) undetected.&lt;br /&gt;&lt;br /&gt;8. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;b&lt;/span&gt;. worm. Worms,  which most commonly install a "backdoor" internet connection on the host  computer, are perfect for sending out the millions of server requests needed to  achieve a denial-of-service attack. A denial-of-service attack is when a server  is maliciously sent so many hits that it is overwhelmed and cannot continue to  operate.&lt;br /&gt;&lt;br /&gt;9. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;a&lt;/span&gt;. Trojan. The Trojan "Magic Lantern" was famously used to  install monitoring software on the computer of a suspect who was later brought  to trial partly on the strength of the evidence gathered.&lt;br /&gt;&lt;br /&gt;10. &lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;e&lt;/span&gt;.  Spyware. Spyware is malware that collects information from your computer and  sends it to another remote machine, so by definition any software that steals  your identity is spyware. However, spyware is often installed on your computer  by a Trojan, or sent to you by another computer infected with a worm, so other  kinds of malware pose an indirect threat of identity theft as well.&lt;br /&gt;&lt;br /&gt;About the author:&lt;br /&gt;Joel Walsh writes for spyware-refuge.com about  spyware, viruses, Trojans, adware, worms, and other malware: &lt;a class="navigation" href="http://www.spyware-refuge.com/?" target="_blank"&gt;http://www.spyware-refuge.com?&lt;/a&gt;Computer Viruses[Publish this  article on your website! Requirement: live link for above URL/web address w/  link text/anchor text: "Computer Viruses" OR leave this bracketed message  intact.]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=""&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/malware-quiz.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-2291110713134600752</guid><pubDate>Mon, 19 Mar 2007 05:47:00 +0000</pubDate><atom:updated>2007-03-18T22:49:38.742-07:00</atom:updated><title>Different Types of Computer Infection!</title><description>When you listen to the news, you hear about many different forms of electronic  infection. The most common are:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Viruses&lt;/span&gt; - A virus is a small piece of  software that piggybacks on real programs. For example, a virus might attach  itself to a program such as a spreadsheet program. Each time the spreadsheet  program runs, the virus runs, too, and it has the chance to reproduce (by  attaching to other programs) or wreak havoc.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;E-mail viruses&lt;/span&gt; - An e-mail  virus moves around in e-mail messages, and usually replicates itself by  automatically mailing itself to dozens of people in the victim's e-mail address  book.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Worms&lt;/span&gt; - A worm is a small piece of software that uses computer  networks and security holes to replicate itself. A copy of the worm scans the  network for another machine that has a specific security hole. It copies itself  to the new machine using the security hole, and then starts replicating from  there, as well.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Trojan horses&lt;/span&gt; - A Trojan horse is simply a computer  program. The program claims to do one thing (it may claim to be a game) but  instead does damage when you run it (it may erase your hard disk). Trojan horses  have no way to replicate automatically.&lt;br /&gt;&lt;br /&gt;&lt;hr size="1"&gt; About the author:&lt;br /&gt;&lt;br /&gt;&lt;a class="navigation" href="http://www.a1-sypware-4u.info/" target="_blank"&gt;http://www.a1-sypware-4u.info/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt;</description><link>http://virustablet.blogspot.com/2007/03/different-types-of-computer-infection.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-5143708723135939534</guid><pubDate>Sun, 18 Mar 2007 04:23:00 +0000</pubDate><atom:updated>2007-03-17T21:26:20.659-07:00</atom:updated><title>Why Do I Need Anti Virus Software For My PC?</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Angie Noack&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;If you’ve recently purchased&lt;/span&gt; a  computer, or are just learning about using email and the internet, you may have  heard about computer viruses and anti-virus software. You may be wondering if  this is something that you should be concerned about, and if so, what you should  do about it. This article will attempt to answer these questions for you. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;First, you may be wondering&lt;/span&gt; just what a computer virus is. Basically a  computer virus is one of many types of small programs that install themselves on  your computer without your consent. Usually they enter your program through an  email, or while you are browsing a website.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 102, 0); font-weight: bold;"&gt;When these programs run&lt;/span&gt;,  usually without you knowing, they can cause all types of problems with your  computer. Some viruses can be mildly annoying, slowing down your computer as  they use your computer’s resources for another purpose. Others can be very  dangerous, collecting your personal information and sending it to another party,  or damaging your hard-drive.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;True to their name, viruses are&lt;/span&gt; able to use  your internet connection and email program and send themselves to the computers  of other people you know, spreading themselves just like a contagious disease. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Because of this&lt;/span&gt;, just like the health of your body, when it comes to  computer viruses, an ounce of prevention is worth a pound of cure. It is much  easier to prevent viruses from entering your computer than it is to get rid of  them and cure your computer once it becomes infected. This is why Anti-Virus  software is important.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Once you realize that&lt;/span&gt; you need anti-virus  software installed and running on your computer, you’ll have to choose which one  to purchase and install. This can be a complicated process, but here are some  tips to make it a bit easier.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;First, check your computer&lt;/span&gt; to see if it  came with anti-virus software. Many new computers are shipped with anti-virus  programs already to go on them, you just need to turn them on. Check your  instruction manual to see if this is the case with your computer.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Check  with the vendor&lt;/span&gt;. If you purchased your computer from a local retailer, check  with them to see what anti-virus program they recommend. They should be more  than willing to help you and may even be able to provide you with a discount  since you purchased a computer from them.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Once you have your anti-virus  installed and running&lt;/span&gt; on your computer, be sure to contact the software’s  support if you have any questions. It is also important to keep your software  updated. Many of these programs will automatically update themselves when you  are online. This is very important since new viruses are always appearing and  you want to make sure your computer is protected.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;About the  author:&lt;/span&gt;&lt;br /&gt;Angie Noack is a business strategist with a sharp edge for  technology. With her unique ability to combine these two skills, she's able to  help businesses save time and increase profits. You can find her online at &lt;a class="navigation" href="http://softwaresoftwaresystems.com/" target="_blank"&gt;http://softwaresoftwaresystems.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/why-do-i-need-anti-virus-software-for.html</link><thr:total>2</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-8656772131521803213</guid><pubDate>Sat, 17 Mar 2007 03:15:00 +0000</pubDate><atom:updated>2007-03-16T20:18:09.479-07:00</atom:updated><title>Keeping it Clean: Virus Removal Basics</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;John Lenaghan&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;The day you learn your computer is  infected with a virus or spyware is a lonely yet aggravating day. You’ll be  angry that you fell victim, and may feel helpless because of your lack of  knowledge about virus removal or pc repair. But don’t worry - you’re not alone!  Unfortunately, you’re actually part of a club of tens of thousands of people who  feel the same way every day!&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(0, 0, 0);"&gt;According to AVG&lt;/span&gt;, virus protection usually  doesn’t detect adware or spyware both of which can wreak havoc on a computer.  Thousands of people each day are infected with malicious programs! Worry no  longer and stop feeling helpless because this guide is a basic computer virus  repair guide that will help you identify and remove viruses and malware. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Are You Running Antivirus Software?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you already have virus  software perform an update for the latest version and then run a system scan. If  you do not have such software, &lt;span style="font-weight: bold;"&gt;download a free copy of AVG virus&lt;/span&gt; protection at  http://www.grisoft.com/doc/40/lng/us/tpl/tpl01. This will give you free real  time virus protection, email scanning and virus removal tools.&lt;br /&gt;&lt;br /&gt;Next,  &lt;span style="font-weight: bold;"&gt;download and run Ad-Aware to remove spyware&lt;/span&gt;, adware, and other troublesome  programs http://www.lavasoftusa.com/software/adaware/. Then download SpyBot  Search &amp; Destroy http://www.safer-networking.org/en/download/index.html. By  using Ad-Aware and SpyBot you will have excellent protection against files that  are often missed by virus protection.&lt;br /&gt;&lt;br /&gt;To check for and eliminate browser  hijackers, &lt;span style="font-weight: bold;"&gt;download and run CWShredder&lt;/span&gt; at  http://www.intermute.com/spysubtract/cwshredder_download.html.&lt;br /&gt;&lt;br /&gt;With the  above programs simply run a scan and follow the prompts to remove any infected  files or unwanted programs. Once that is done, upgrade your operating system, or  download any needed patches, then reboot your computer.&lt;br /&gt;&lt;br /&gt;These steps  won’t solve every problem, but they will fix a large percentage of the things  that cause your computer to act up.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;About the author:&lt;/span&gt;&lt;br /&gt;John Lenaghan  writes about solving computer problems for the &lt;a href="http://www.computer-help-squad.com/"&gt;Computer Help Squad&lt;/a&gt; website, where  he provides valuable tips and advice about &lt;a href="http://www.computer-help-squad.com/internet-security.html"&gt;internet  security&lt;/a&gt;, &lt;a href="http://www.computer-help-squad.com/computer-upgrades.html"&gt;computer  upgrades&lt;/a&gt; and other computer related topics.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/keeping-it-clean-virus-removal-basics.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-2259298386627175463</guid><pubDate>Thu, 15 Mar 2007 05:04:00 +0000</pubDate><atom:updated>2007-03-14T22:07:07.908-07:00</atom:updated><title>9 Steps to Protect your MS Windows System from Viruses</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Evgeny Kovalenko&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;Nowadays as the Internet and other  networks are greatly developed computer viruses are distributed rapidly and  intensively. Everyday several new viruses capable to damage considerably your  computer system arise. Anti-virus specialists work hardly to make updates their  software against new viruses as soon as possible. The viruses can get inside  computer in different ways. That is why there is no simple method to protect  system. Only series of measures can give you reliable protection from the  infection. Below are 9 steps to protect MS Windows based PC system from viruses. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;1. Make regular backups. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It should be said that there is no  absolutely safe way of protection. Virus creators regularly find holes in new  computer products to use them for infection of computer systems. Some dangerous  viruses can considerably damage data files or even erase entire file system.  Make regular backups of your data files to separate file storage device. It can  be separate hard drive, flash card, compact disc or another file storage device  which you choose. To ease the procedure you can use some automatic backup  software. And be ready if the system will die because of virus infection. &lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;2. Be ready to reinstall your system if it dies because of viruses.  &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Get distributives of your operation system and distributives of software  which you use and keep them together, for instance, on a set of CDs not far away  from you. In this case if virus infection will cause unrecoverable system  failure you can rapidly reinstall your working medium.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 102, 0); font-weight: bold;"&gt;3. Protect your  network connection with Firewall. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Firewall is a software which blocks  suspicious potentially dangerous connections to preventing viruses from network  to penetrate into your system. Windows XP system has quit simple but reliable  built-in firewall. You can enable it as follows. 1) in Control Panel,  double-click Networking and Internet Connections, and then click Network  Connections. 2) Right-click the connection on which you would like to enable  firewall, and then click Properties. 3) On the Advanced tab, check the option to  Protect my computer and network.&lt;br /&gt;&lt;br /&gt;If you need more flexible control of  connections with network you can get and install more advanced firewall software  like Norton Personal Firewall or Outpost Firewall. If you use this software you  have ability to permit or to block particular connections and to monitor network  activity.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;4. Use antivirus software. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Install antivirus software  which will scan your system searching and erasing viruses on a regular basis.  Leaders in antivirus software products for Windows systems are Norton Antivirus,  McAfee, Kaspersky Anti-Virus and PC-cilin.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;5. Regularly update operating  system. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Windows XP has built-in automatic update service. It regularly  contacts Microsoft server to find updates and notifies you if updates are ready  to be installed. Updates are important because hackers regularly find holes in  operating system which are often used by virus creators.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;6. Don't  install and don't run suspicious software. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Check new programs which you are  going to install with anti-virus software. Don't download software from  suspicious websites. To download software always seek website of software  creator or official distributor. Do not open applications received by email from  unknown persons.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;7. Limit access to your computer. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Protect enter to  system with password.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;8. If you use Internet Explorer, consider moving  to another browser. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As IE is the most distributed browser today virus  creators actively use defects in its security system to infect computers.  Infection may arise if you will visit webpage which contains invisible harmful  code. You are more safe if you use less known browser only because virus  creators do not pay much attention to it. Major IE competitors Firefox and Opera  browsers provide now the same comfortable interface and range of services for  working on the Web.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;9. Use spam protection. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Viruses are often  distributed via email. Switch on spam filters in your email box to block spam  receiving. If you need assistance with using of the filters you can ask your  email service provider.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;About the author:&lt;/span&gt;&lt;br /&gt;Evgeny Kovalenko is the  Editor of &lt;a href="http://free-software-shareware-downloads.com/"&gt;FSSD computer  software directory&lt;/a&gt; with free submission service for software developers and  distributors.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/9-steps-to-protect-your-ms-windows.html</link><thr:total>2</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-2791702050037285962</guid><pubDate>Wed, 14 Mar 2007 06:43:00 +0000</pubDate><atom:updated>2007-03-13T23:46:07.021-07:00</atom:updated><title>All About Computer Viruses</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Kara Glover&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;br /&gt;Feel Free to reprint this  article in newsletters and on websites, with resource box included. If you use  this article, please send a brief message to let me know where it appeared:  kara333@earthlink.net&lt;br /&gt;&lt;br /&gt;Word Count = 1,500&lt;br /&gt;Word Wrapped to 60  characters per line&lt;br /&gt;URL: http://www.karathecomputertutor.com&lt;br /&gt;Author  photo: http://www.karathecomputertutor.com&lt;br /&gt;Date of copyright: November 2004 &lt;br /&gt;&lt;br /&gt;All About Computer Viruses&lt;br /&gt;by Kara Glover&lt;br /&gt;kara333@earthlink.net &lt;br /&gt;&lt;br /&gt;Your computer is as slow as molasses. Your mouse freezes every 15  minutes, and that Microsoft Word program just won’t seem to open.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;You  might have a virus. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Just what exactly is a virus? What kind is in your  computer? How did it get there? How is it spreading and wreaking such havoc? And  why is it bothering with your computer anyway?&lt;br /&gt;&lt;br /&gt;Viruses are pieces of  programming code that make copies of themselves, or replicate, inside your  computer without asking your explicit written permission to do so. Forget  getting your permission down on paper. Viruses don’t bother to seek your  permission at all! Very invasive.&lt;br /&gt;&lt;br /&gt;In comparison, there are pieces of  code that might replicate inside your computer, say something your IT guy thinks  you need. But the code spreads, perhaps throughout your office network, with  your consent (or at least your IT guy’s consent). These types of replicating  code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a  research arm of anti-virus software-maker McAfee Inc.&lt;br /&gt;&lt;br /&gt;In this article,  though, we’re not talking about the good guys, or the agents. We’ll be talking  about the bad guys, the viruses.&lt;br /&gt;&lt;br /&gt;A long, long time ago in computer  years, like five, most viruses were comprised of a similar breed. They entered  your computer perhaps through an email attachment or a floppy disk (remember  those?). Then they attached themselves to one of your files, say your Microsoft  Word program.&lt;br /&gt;&lt;br /&gt;When you opened your Microsoft Word program, the virus  replicated and attached itself to other files. These could be other random files  on your hard drive, the files furthest away from your Microsoft Word program, or  other files, depending on how the virus writer wanted the virus to behave. &lt;br /&gt;&lt;br /&gt;This virus code could contain hundreds or thousands of instructions.  When it replicates it inserts those instructions, into the files it infects,  said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of  anti-virus software-maker Symantec. Corp.&lt;br /&gt;&lt;br /&gt;Because so many other types of  viruses exist now, the kind just described is called a classic virus. Classic  viruses still exist but they’re not quite as prevalent as they used to be.  (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.) &lt;br /&gt;&lt;br /&gt;These days, in the modern era, viruses are known to spread through  vulnerabilities in web browsers, files shared over the internet, emails  themselves, and computer networks.&lt;br /&gt;&lt;br /&gt;As far as web browsers are concerned,  Microsoft’s Internet Explorer takes most of the heat for spreading viruses  because it’s used by more people for web surfing than any other browser. &lt;br /&gt;&lt;br /&gt;Nevertheless, “Any web browser potentially has vulnerabilities,”  Nachenberg said.&lt;br /&gt;&lt;br /&gt;For instance, let’s say you go to a website in IE you  have every reason to think is safe, Nachenberg said.&lt;br /&gt;&lt;br /&gt;But unfortunately  it isn’t. It has virus code hidden in its background that IE isn’t protecting  you from. While you’re looking at the site, the virus is downloaded onto your  computer, he said. That’s one way of catching a nasty virus.&lt;br /&gt;&lt;br /&gt;During the  past two years, another prevalent way to catch a virus has been through  downloads computer users share with one another, mostly on music sharing sites,  Kuo said. On Limewire or Kazaa, for instance, teenagers or other music  enthusiasts might think they’re downloading that latest Justin Timberlake song,  when in reality they’re downloading a virus straight into their computer. It’s  easy for a virus writer to put a download with a virus on one of these sites  because everyone’s sharing with everyone else anyway.&lt;br /&gt;&lt;br /&gt;Here’s one you  might not have thought of. If you use Outlook or Outlook Express to send and  receive email, do you have a preview pane below your list of emails that shows  the contents of the email you have highlighted? If so, you may be putting  yourself at risk.&lt;br /&gt;&lt;br /&gt;Some viruses, though a small percentage according to  Nachenberg, are inserted straight into emails themselves.&lt;br /&gt;&lt;br /&gt;Forget opening  the attachment. All you have to do is view the email to potentially get a virus,  Kuo added. For instance, have you ever opened or viewed an email that states  it’s “loading”? Well, once everything is “loaded,” a virus in the email might  just load onto your computer.&lt;br /&gt;&lt;br /&gt;So if I were you, I’d click on View on the  toolbar in your Outlook or Outlook Express and close the preview pane. (You have  to click on View and then Layout in Outlook Express.)&lt;br /&gt;&lt;br /&gt;On a network at  work? You could get a virus that way. Worms are viruses that come into your  computer via networks, Kuo said. They travel from machine to machine and,  unlike, the classic viruses, they attack the machine itself rather than  individual files.&lt;br /&gt;&lt;br /&gt;Worms sit in your working memory, or RAM, Nachenberg  said.&lt;br /&gt;&lt;br /&gt;OK, so we’ve talked about how the viruses get into a computer. How  do they cause so much damage once they’re there?&lt;br /&gt;&lt;br /&gt;Let’s say you’ve caught  a classic virus, one that replicates and attacks various files on your computer.  Let’s go back to the example of the virus that initially infects your Microsoft  Word program.&lt;br /&gt;&lt;br /&gt;Well, it might eventually cause that program to crash,  Nachenberg said. It also might cause damage to your computer as it looks for new  targets to infect.&lt;br /&gt;This process of infecting targets and looking for new  ones could eventually use up your computer’s ability to function, he said. &lt;br /&gt;&lt;br /&gt;Often the destruction a virus causes is pegged to a certain event or  date and time, called a trigger. For instance, a virus could be programmed to  lay dormant until January 28. When that date rolls around, though, it may be  programmed to do something as innocuous but annoying as splash popups on your  screen, or something as severe as reformat your computer’s hard drive,  Nachenberg said.&lt;br /&gt;&lt;br /&gt;There are other potential reasons, though, for a virus  to cause your computer to be acting slow or in weird ways. And that leads us to  a new segment – the reason virus writers would want to waste their time creating  viruses in the first place.&lt;br /&gt;&lt;br /&gt;The majority of viruses are still written by  teenagers looking for some notoriety, Nachenberg said. But a growing segment of  the virus-writing population has other intentions in mind.&lt;br /&gt;&lt;br /&gt;For these  other intentions, we first need to explain the “backdoor” concept.&lt;br /&gt;&lt;br /&gt;The  sole purpose of some viruses is to create a vulnerability in your computer. Once  it creates this hole of sorts, or backdoor, it signals home to mama or dada  virus writer (kind of like in E.T.). Once the virus writer receives the signal,  they can use and abuse your computer to their own likings.&lt;br /&gt;&lt;br /&gt;Trojans are  sometimes used to open backdoors. In fact that is usually their sole purpose,  Kuo said.&lt;br /&gt;&lt;br /&gt;Trojans are pieces of code you might download onto your  computer, say, from a newsgroup. As in the Trojan War they are named after, they  are usually disguised as innocuous pieces of code. But Trojans aren’t considered  viruses because they don’t replicate.&lt;br /&gt;&lt;br /&gt;Now back to the real viruses.  Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up  infecting a thousand machines. But he doesn’t want the feds on his case. So he  instructs the viruses on the various machines to send their signals, not of  course to his computer, but to a place that can’t be traced. Hotmail email  happens to be an example of one such place, Kuo said.&lt;br /&gt;&lt;br /&gt;OK, so the virus  writers now control these computers. What will they use them for?&lt;br /&gt;One use is  to send spam. Once that backdoor is open, they bounce spam off of those  computers and send it to other machines, Nachenberg said.&lt;br /&gt;&lt;br /&gt;That’s right.  Some spam you have in your email right now may have been originally sent to  other innocent computers before it came to yours so that it could remain in  disguise. If the authorities could track down the original senders of spam, they  could crack down on spam itself. Spam senders don’t want that.&lt;br /&gt;&lt;br /&gt;Ever  heard of phishing emails? Those are the ones that purport to be from your  internet service provider or bank. They typically request some information from  you, like your credit card number. The problem is, they’re NOT from your  internet service provider or your bank. They’re from evil people after your  credit card number! Well, these emails are often sent the same way spam is sent,  by sending them via innocent computers.&lt;br /&gt;&lt;br /&gt;Of course makers of anti-virus  software use a variety of methods to combat the onslaught of viruses. Norton,  for instance, uses signature scanning, Nachenberg said.&lt;br /&gt;&lt;br /&gt;Signature  scanning is similar to the process of looking for DNA fingerprints, he said.  Norton examines programming code to find what viruses are made of. It adds those  bad instructions it finds to its large database of other bad code. Then it uses  this vast database to seek out and match the code in it with similar code in  your computer. When it finds such virus code, it lets you know!&lt;br /&gt;&lt;br /&gt;©2004 by  Kara Glover&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;About  the author:&lt;/span&gt;&lt;br /&gt;Kara Glover is a Computer Tutor and Troubleshooter.&lt;br /&gt;You can  find her articles and tutorials on topics such as&lt;br /&gt;Microsoft Word®, Excel®,  and PowerPoint® on her website: &lt;a class="navigation" href="http://www.karathecomputertutor.com/" target="_blank"&gt;http://www.karathecomputertutor.com&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/all-about-computer-viruses.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-6479389506182720746</guid><pubDate>Tue, 13 Mar 2007 14:23:00 +0000</pubDate><atom:updated>2007-03-13T07:24:57.030-07:00</atom:updated><title>Malware And Antivirus Software</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Joel Walsh&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;br /&gt;&lt;span style="color: rgb(255, 0, 0); font-weight: bold;"&gt;Warning&lt;/span&gt;: most antivirus programs  will not protect you against all forms of malignant software (often called  "malware") on their own. Find out how to protect yourself.&lt;br /&gt;&lt;br /&gt;Sure, your  antivirus software will protect you against viruses. It will probably even do a  good job against worms. But what Trojans, exploits, backdoors, spyware and the  dozen other nasty software parasites?&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Malware and Antivirus Software: a  History&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The war on computer viruses has led to an arms race between the  designers of antivirus software and the designers of viruses (you didn't think  viruses just created themselves did you?). Some years ago, virus designers  responded to ever more successful antivirus software by creating the descendents  of viruses, worms, which did not infect files but rather installed themselves  directly on the hard drive, making them harder to detect.&lt;br /&gt;&lt;br /&gt;The arms race  has since led to a total of at least eleven distinct types of what is now called  malware, a neologism meaning bad (as in malignant rather than shoddy) software.  According to Wikipedia, these eleven types of malware are:&lt;br /&gt;&lt;br /&gt;1. Virus &lt;br /&gt;2. Worm&lt;br /&gt;3. Wabbit&lt;br /&gt;4. Trojan&lt;br /&gt;5. Backdoor&lt;br /&gt;6. Spyware&lt;br /&gt;7.  Exploit&lt;br /&gt;8. Rootkit&lt;br /&gt;9. Key Logger&lt;br /&gt;10. Dialer&lt;br /&gt;11. URL injection &lt;br /&gt;&lt;br /&gt;There's a twelfth kind of malware: adware, which Wikipedia considers  simply to be a subset of spyware.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Why Antivirus Software Isn't Enough  for Malware&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As you can see, makers of antivirus software have their work  cut out for them if they're going to keep every instance of malware off your  system. As a result, antivirus software makers have often had to pick their  battles. Adware, whose makers often claim they are doing nothing illegal or even  questionable, often gets treated more lightly.&lt;br /&gt;&lt;br /&gt;Even when antivirus  software makers do come out with a product that fights all twelve or so kinds of  malware, responding to each new instance of malware to come on the market isn't  easy. First the malware has to be identified, which means someone's computer,  and probably tens of thousands of computers, will be infected first. Then, the  malware has to be dissected. Then a removal program and a filter must both be  written. Then the removal program and filter must be tested to make sure they  work, and that they don't interfere with any other functions of the antivirus  software or the computer itself. When a fix for the virus is out, it then has to  be loaded into an antivirus software update and transmitted to every single  computer worldwide that has the antivirus software installed.&lt;br /&gt;&lt;br /&gt;The speed  with which antivirus software makers are able to deliver updates for newly  discovered malware would impress even Santa Claus. Yet there's still a crucial  window of one to a few days between when the new malware has reached a critical  mass of thousands of computers, and when the update is released. If your  antivirus software is not set to check for updates automatically every hour or  so, that window opens even wider.&lt;br /&gt;&lt;br /&gt;Practically speaking, then, you're  better off having more than one line of defense against malware. Even if two  different anti-malware programs utilize the exact same database, there might be  a crucial difference in the speed of getting updates. It makes sense to back up  your antivirus software with anti-spyware software. When you consider that  dedicated anti-spyware software developers make protection against the non-virus  forms of malware their stock-in-trade, you can see why anti-spyware software is  so essential. In fact, you should strongly consider having two anti-spyware  programs running on your computer at all times, since the gap in updates between  two anti-spyware programs can be even longer than for two antivirus programs. &lt;br /&gt;&lt;br /&gt;After all, with a dozen kinds of malware out there, shouldn't you at  least have two pieces of software to fight them?&lt;br /&gt;&lt;br /&gt;About the  author:&lt;br /&gt;Joel Walsh writes for &lt;a class="navigation" href="http://www.spyware-refuge.com/" target="_blank"&gt;http://www.spyware-refuge.com&lt;/a&gt;on how to remove spyware: &lt;a class="navigation" href="http://www.spyware-refuge.com/?" target="_blank"&gt;http://www.spyware-refuge.com?&lt;/a&gt;spyware adware blocker [Publish  this article on your website! Requirement: live link for above URL/web address  w/ link text/anchor text: "spyware adware blocker" OR leave this bracketed  message intact.]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/malware-and-antivirus-software.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-6055189057639666194</guid><pubDate>Tue, 13 Mar 2007 14:18:00 +0000</pubDate><atom:updated>2007-03-13T07:21:32.916-07:00</atom:updated><title>Virus Prevention and Removal</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Ashish Jain&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;A virus is a piece of code&lt;/span&gt; that gets  loaded onto your computer without your knowledge and runs against your wishes.  The first known occurrence of viruses goes back to 1987 when the ARPANET was  infected by one.&lt;br /&gt;&lt;br /&gt;One common misnomer among people is that you can &lt;span style="font-weight: bold; font-style: italic;"&gt;infect  your computer just by opening an email and reading its text&lt;/span&gt;. That is not  possible; it is usually the files attached to the email that contain the virus.  The most common file types are ".SCR" ".VBS" ", ".PIF"&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Prevention is  better than a cure&lt;/span&gt;: Here are some tips to make sure that your computer does not  get infected.&lt;br /&gt;&lt;br /&gt;* Get a good Anti-Virus software like Norton Anti-Virus,  MacAfee, PC Cillin etc.&lt;br /&gt;* Keep your anti virus software updated by  downloading new virus definitions regularly. Most Anti-Virus software comes with  the feature of updating virus definitions.&lt;br /&gt;* Keep your windows operating  system updated by regularly downloading new updates from the Internet. Windows  O/S's have a lot of security loopholes and bugs that can be easily exploited by  worms and viruses.&lt;br /&gt;* Make sure the anti virus scans the file each time  before its opened.&lt;br /&gt;* Floppy disks and removable media are a good source of  viruses; always scan them before accessing files on them.&lt;br /&gt;* Never open email  attachments from sources that are unknown or suspicious.&lt;br /&gt;* Do not open  emails that have questionable subject lines.&lt;br /&gt;* When in doubt about a file,  don't open it.&lt;br /&gt;* Even with the best of precautions bad things can still  happen. Backup all your data and important files.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(0, 0, 0);"&gt;Even after taking  all these precautions if your computer does get infected, then here are a few  things that you can do:&lt;/span&gt;&lt;span style="color: rgb(0, 0, 0);"&gt; &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Online clearing tools&lt;/span&gt; - are a good source of  trying to clean out the virus, there are many Anti-Virus websites that offer  free online virus detection and removal services.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Removal tools&lt;/span&gt; - If you  have an Anti-Virus software then you can go to the website of that software and  download removal tools designed specifically for the virus. However, you must  find out the name of the virus that infects your PC beforehand.&lt;br /&gt;&lt;br /&gt;If you  have a backup of all your important files, you can also consider formatting your  hard disk.&lt;br /&gt;&lt;br /&gt;About the author:&lt;br /&gt;Ashish Jain&lt;br /&gt;M6.Net&lt;br /&gt;&lt;a class="navigation" href="http://www.m6.net/" target="_blank"&gt;http://www.m6.net&lt;/a&gt;&lt;br /&gt;Ashish is an integral member of the  M6.Net Web Helpers team.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/virus-prevention-and-removal.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-469506238806455704</guid><pubDate>Tue, 13 Mar 2007 14:15:00 +0000</pubDate><atom:updated>2007-03-13T07:17:20.846-07:00</atom:updated><title>How a computer virus works!</title><description>&lt;table height="114" width="99%"&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td align="left" height="19"&gt; &lt;div align="justify"&gt;&lt;span class="style2"&gt;by: &lt;span style="font-family:Times New Roman;font-size:100%;color:#fb7014;"&gt;Silent One&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt; &lt;tr&gt; &lt;td align="left" height="12"&gt;&lt;span class="style2"&gt;&lt;br /&gt;Computer viruses are  mysterious and grab our attention. On the one hand, viruses show us how  vulnerable we are. A properly engineered virus can have an amazing effect on the  worldwide Internet. On the other hand, they show how sophisticated and  interconnected human beings have become.&lt;br /&gt;&lt;br /&gt;For example, the thing making big  news right now is the Mydoom worm, which experts estimate infected approximately  a quarter-million computers in a single day (Times Online). Back in March 1999,  the Melissa virus was so powerful that it forced Microsoft and a number of other  very large companies to completely turn off their e-mail systems until the virus  could be contained. The ILOVEYOU virus in 2000 had a similarly devastating  effect. That's pretty impressive when you consider that the Melissa and ILOVEYOU  viruses are incredibly simple.&lt;br /&gt;&lt;br /&gt;In this article, we will discuss viruses  -- both "traditional" viruses and the newer e-mail viruses -- so that you can  learn how they work and also understand how to protect yourself. Viruses in  general are on the wane, but occasionally a person finds a new way to create  one, and that's when they make the news.&lt;br /&gt;&lt;hr size="1"&gt; About the author:&lt;br /&gt;&lt;br /&gt;&lt;a class="navigation" href="http://www.a1-sypware-4u.info/" target="_blank"&gt;http://www.a1-sypware-4u.info/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:-2;"&gt;Circulated by &lt;a href="http://www.article-emporium.com/"&gt;Article  Emporium&lt;/a&gt;&lt;/span&gt; &lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>http://virustablet.blogspot.com/2007/03/how-computer-virus-works.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2338859111990924672.post-7622671834585232652</guid><pubDate>Tue, 13 Mar 2007 14:03:00 +0000</pubDate><atom:updated>2007-03-13T07:14:10.438-07:00</atom:updated><title>Top 10 Ways To Protect Yourself From Computer Viruses</title><description>by: &lt;span style="color: rgb(255, 102, 0);"&gt;&lt;b class="author"&gt;Jim Faller&lt;/b&gt;&lt;/span&gt;  &lt;p&gt;As more and more people are becoming comfortable using their computers at  school, home or in the office it’s only a matter of time before they encounter a  computer virus. Here are our top 10 steps to protect you from computer viruses.  &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Use a high quality anti-virus program&lt;/span&gt;. There are many different anti-virus  computers programs on the market some of them are better than others. Look to  reputable computer magazines or websites for ratings to help you find the one  that matches your needs. &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Always use your anti-virus software.&lt;/span&gt; Make sure your anti-virus software is  always turned on and scanning, incoming and outgoing email messages, and any  software programs you run. &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Keep your antivirus programs up to date&lt;/span&gt;. Most programs come with a yearly  subscription make sure you take advantage of the updates. More advanced programs  allow you to schedule updates or full system scans for “off hours” like 2AM when  you aren’t likely to be using your computer. &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Keep your computer up to date.&lt;/span&gt; From time to time operating systems fall  victim to security holes or issue updates. Make sure you check periodically to  make sure you are running stable up to date versions of your software. &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Backup your data regularly&lt;/span&gt;. Most windows computer users keep their documents  in the “My documents” folder. This makes it easy to back up all of your  important documents. Make weekly or monthly copies to CD or USB drives. &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;If you use floppy disks or USB drives&lt;/span&gt; on public computers like your school  computer lab, Kinko’s, or even digital photo printing store make sure you scan  them for viruses. Public computers are notorious for not being up to date and  properly protected. &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Be wary of email attachments&lt;/span&gt;. Treat any email attachment as potentially  dangerous. Never open attachments from people you weren’t expecting. Also be  careful of attachments from people you know but weren’t expecting. Many computer  viruses replicate themselves by reading the contacts from an infected computer.  &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Use text email if possible&lt;/span&gt;. While HTML email is prettier and allows you more  control over formatting it also can carry computer viruses. If you use text  based email the only way to get a virus is by opening an attachment. &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Use downloaded freeware and shareware files&lt;/span&gt; or software with caution. Try to  download them from popular reputable sources that scan the programs before they  are uploaded. To make sure you are safe scan the program before you install it  on your computer. &lt;/p&gt; &lt;p&gt;&lt;span style="font-weight: bold; color: rgb(255, 102, 0);"&gt;Be wary of links in IM or instant messaging software&lt;/span&gt;. Don’t accept  invitations from people you don’t know and never click a link from someone you  don’t trust, they can easily redirect you to another website that will try to  install a virus on your computer system. &lt;/p&gt; &lt;p&gt;© &lt;a href="http://computers.6ln.com/" target="new"&gt;Computers.6ln.com&lt;/a&gt;, All  Rights Reserved. &lt;/p&gt;</description><link>http://virustablet.blogspot.com/2007/03/top-10-ways-to-protect-yourself-from.html</link><thr:total>0</thr:total><author>noreply@blogger.com (meor)</author></item></channel></rss>