![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders
Can you protect your computer from all possible viruses and other invasions? The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. That's the bad news. The good news is that you can clean up and protect your computer against almost all of these undesirable intruders. The first thing you need to do is download a program called Mozilla Firefox. It's a newer and better browser than anything offered by those guys in Seattle. For one thing, hackers have been concentrating their efforts on Microsoftâ products like Internet Explorerâ and MSN Explorerâ. This makes these browsers more likely to be attacked, whereas Firefox, at least as of this writing, seems more secure. And it does offer great popup protection. Another thing you will like about Firefox is a feature called Tabs that lets you have numerous Web pages up at the same time with the ability to click back and forth between them. For example, you could have your favorite site, eBay's home page, a phone number directory, the Merriam-Webster Dictionary, and your favorite blog all loaded at the same time ? then just click amongst them as the moment moves you. Here's what you'll really like about Firefox. It's free from the Mozilla.org, which is a sort of consortium of public-minded software engineers who develop and distribute freeware (free software). Mozilla is also responsible for a great, free email program called Thunderbird. Thunderbird is a fast and efficient way to get and send email and has great spam filters. I've personally been using it for more than a month and haven't gotten a single piece of spam mail to date. Compare this with the stuff you get when you use other free email services such as MSN Hotmail. Before you install either of these programs, you will want to rid your computer of any nasty software it has fallen victim to. A good way to do this is to download another great, free program, Ad-Aware SE from Lavasoft (Lavasoft.com). This program detects and eliminates objects such as a registry invasion. The Webopedia defines your registry file as "a database used by the Windows operating system (Windows 95 and NT) to store configuration information." A registry invasion happens when a "free" program changes your registry to automatically load spyware or some undesirable program. For example, a Web site called I-Mesh allows you to download free programs, share files, and search for music and videos ? but will alter your registry file to incorporate a service called GAINâ (GAIN Publishing) that you may find very annoying. Ad-Aware will also find and eliminate known data-mining programs, aggressive advertising, parasites, and scumware, as well as selected traditional trojans, dialers, malware, browser hijackers, and tracking components. You can also find and eliminate spyware with a program called Spybot Search & Destroy. It's available free at spybot.info/en/index.html. Install this program and then click on Search & Destroy and it will scan your hard drive in a matter of moments and then show you a list of "problems" it has found. It also tells you the type of problem, for example, "registry change." Once the scan completes, all you have to do is click on a button titled "Fix selected problems." Spybot will first create a restore point (in case you delete something you wish you hadn't) and then fix all the problems that are check marked (if there is any problem you do not want fixed for some reason, just remove the checkmark next to it). Finally, there is a great anti-virus program you can also get free. It is AVG Free Anti-virus and is available at Grisoft.com. AVG will scan your hard disk, then report and eliminate any viruses found. In addition, it automatically downloads information on new viruses from time to time to help keep you protected. This automatic download service is free as well. Article by Douglas Hanna. Douglas is a retired advertising and marketing executive and long-time Denver resident. He is the webmaster of http://www.all-in-one-info.com, a free resource for information on a variety of subjects. Please visit his site to subscribe to his free newsletter, "Tips & Tricks to Save Money & Live Better."
MORE RESOURCES: Rewind and Reconnoiter: Is Climate Security Out in the Cold in the U.S. Intelligence Community? War on the Rocks Italian police increase security at Tesla dealerships after 17 cars destroyed in Rome fire The Guardian Law Firms Fear Trump Orders Could Affect Security Clearances of Lawyers Who Are Military Reservists Military.com Restaurant owner hires security guards after quadruple shooting; residents wonder if it is enough WBAL-TV DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Kirtland Security Forces Detective Trains with APD to Strengthen Investigative Skills, Partnerships afgsc.af.mil AWS achieves Cloud Security Assurance Program (CSAP) low-tier certification in AWS Seoul Region Amazon Web Services Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch Milwaukee's Brady Street businesses increase security to improve safety FOX6 News Milwaukee DOJ grant supports study of the effects of school security equipment on student outcomes George Mason University Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Space Security Sentinel Via Satellite Planning for your IAM Roles Anywhere deployment Amazon Web Services Mike Waltz’s team set up at least 20 Signal chats for national security work – report The Guardian Law firms fear Trump orders could affect security clearances of lawyers who are military reservists ABC News Oracle's masterclass in breach comms: Deny, deflect, repeat theregister.com I sent hundreds of cold emails to find a US VC firm that would hire me as an immigrant. I'm glad I ended up at a small company. Business Insider National Security Space Association's Marc Berkowitz Nominated to Serve as Assistant Secretary of Defense Space Coast Daily Waltz and staff used Gmail for government communications, officials say The Washington Post Opinion: Alaska can increase its food security without an agriculture department Anchorage Daily News Building a cybersecurity strategy that survives disruption Help Net Security NYPD boosts synagogue security ahead of Passover as anti-Jewish crimes 'jump off the page' New York Post New allegations against the White House’s Waltz suggest Signal chat scandal isn’t over MSNBC News Israel's security is America's security. Americans should not ignore that - opinion The Jerusalem Post Apple security chief acquitted, mistrial for ex-undersheriff in Santa Clara County gun permit bribery case The Mercury News Opinion: Trump’s casual response to his administration’s security lapse Chattanooga Times Free Press HPD, Homeland Security bust multiple game rooms FOX 26 Houston Charges Filed Against Former PUSD Security Guard Pasadena Now CyberQP Releases Groundbreaking Zero Trust Helpdesk Security Platform to Eliminate Standing Privileges Yahoo Finance New security system coming to Alaska’s Capitol building Your Alaska Link Glencoe based Security Bank & Trust Co. expands reach in Minnesota McLeod County Chronicle National security implications of tariff announcement LiveNOW from FOX ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch Parliament speaker Stefanchuk blocks Poroshenko’s US trip to international security conference, party says The Kyiv Independent Security by Design Requires Organizational Commitment BankInfoSecurity Security forces report 80% drop in Ramadan terror attacks, after West Bank crackdown The Times of Israel Women in Security: Alice DiSanto, VP of Marketing, Autonomous Solutions Inc. Security Sales & Integration ISC West 2025 Show Floor Spotlight: PROMETHEUS Security Info Watch Security firm Brinks Home sells Lancaster city location LancasterOnline Coral Gables commissioner raises concerns for security of elected officials NBC 6 South Florida Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles When will your Social Security benefits arrive in April? See 2025 payment schedule Democrat and Chronicle Kratos Defense & Security Solutions (NasdaqGS:KTOS) Breaks Ground On New Hypersonic Facility Yahoo Finance Secure Passage and Sunflower Labs take security to the skies with autonomous drone integration Police1 Contrast Security Debuts 'Channel-First' Strategy Channel Futures Why Active Directory’s 25-Year Legacy Is a Security Issue BankInfoSecurity Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed theregister.com Marlink New Cyber Company to Meet Customer Demand for Security & Compliance - The Maritime Executive Marlink New Cyber Company to Meet Customer Demand for Security & Compliance The Maritime Executive Diversus Health adds new Security-Widefield location FOX21 News Colorado Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight |
![]() |
![]() |
![]() |
RELATED ARTICLES
Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. 40 Million People Hacked - YOU as Identity Theft Victim Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Spyware is Not Like a Nosy Neighbor Remember the television show about the nosy neighbor Mrs. Kravitzalways peeking out her window or over the fence, sometimes evenknocking on the door just to find out what was going on in herneighborhood? If you don't wait a month or so and the DVD orthe movie will be out. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. Identity Theft Article - A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. ![]() |
home | site map |
© 2006 |