Security Information |
|
Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders
Can you protect your computer from all possible viruses and other invasions? The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. That's the bad news. The good news is that you can clean up and protect your computer against almost all of these undesirable intruders. The first thing you need to do is download a program called Mozilla Firefox. It's a newer and better browser than anything offered by those guys in Seattle. For one thing, hackers have been concentrating their efforts on Microsoftâ products like Internet Explorerâ and MSN Explorerâ. This makes these browsers more likely to be attacked, whereas Firefox, at least as of this writing, seems more secure. And it does offer great popup protection. Another thing you will like about Firefox is a feature called Tabs that lets you have numerous Web pages up at the same time with the ability to click back and forth between them. For example, you could have your favorite site, eBay's home page, a phone number directory, the Merriam-Webster Dictionary, and your favorite blog all loaded at the same time ? then just click amongst them as the moment moves you. Here's what you'll really like about Firefox. It's free from the Mozilla.org, which is a sort of consortium of public-minded software engineers who develop and distribute freeware (free software). Mozilla is also responsible for a great, free email program called Thunderbird. Thunderbird is a fast and efficient way to get and send email and has great spam filters. I've personally been using it for more than a month and haven't gotten a single piece of spam mail to date. Compare this with the stuff you get when you use other free email services such as MSN Hotmail. Before you install either of these programs, you will want to rid your computer of any nasty software it has fallen victim to. A good way to do this is to download another great, free program, Ad-Aware SE from Lavasoft (Lavasoft.com). This program detects and eliminates objects such as a registry invasion. The Webopedia defines your registry file as "a database used by the Windows operating system (Windows 95 and NT) to store configuration information." A registry invasion happens when a "free" program changes your registry to automatically load spyware or some undesirable program. For example, a Web site called I-Mesh allows you to download free programs, share files, and search for music and videos ? but will alter your registry file to incorporate a service called GAINâ (GAIN Publishing) that you may find very annoying. Ad-Aware will also find and eliminate known data-mining programs, aggressive advertising, parasites, and scumware, as well as selected traditional trojans, dialers, malware, browser hijackers, and tracking components. You can also find and eliminate spyware with a program called Spybot Search & Destroy. It's available free at spybot.info/en/index.html. Install this program and then click on Search & Destroy and it will scan your hard drive in a matter of moments and then show you a list of "problems" it has found. It also tells you the type of problem, for example, "registry change." Once the scan completes, all you have to do is click on a button titled "Fix selected problems." Spybot will first create a restore point (in case you delete something you wish you hadn't) and then fix all the problems that are check marked (if there is any problem you do not want fixed for some reason, just remove the checkmark next to it). Finally, there is a great anti-virus program you can also get free. It is AVG Free Anti-virus and is available at Grisoft.com. AVG will scan your hard disk, then report and eliminate any viruses found. In addition, it automatically downloads information on new viruses from time to time to help keep you protected. This automatic download service is free as well. Article by Douglas Hanna. Douglas is a retired advertising and marketing executive and long-time Denver resident. He is the webmaster of http://www.all-in-one-info.com, a free resource for information on a variety of subjects. Please visit his site to subscribe to his free newsletter, "Tips & Tricks to Save Money & Live Better."
MORE RESOURCES: Homeland Security Department to Release New A.I. Guidance The New York Times Officials detail increased D.C. security for certification, inauguration The Washington Post Nuclear power for military bases will increase our national security Breaking Defense U.S. ambassador bashes Mexico’s security efforts. Mexico’s president pushes back Los Angeles Times Homeland Security Department releases framework for using AI in critical infrastructure The Associated Press New 'spectral fingerprint' atlas of satellites aims to improve space security University of Arizona News Opinion | Trump’s national security wrecking crew The Washington Post Brief altercation between fans mars France-Israel soccer match despite heavy security The Associated Press St. Francis Seraph hires security guards for Christmas, Nativity display visitors as crowds still plague area WCPO 9 Cincinnati Trump’s National Security Team Keeps Getting More Extreme The New Republic Video: How The Fortinet Security Fabric Is Combatting Cybersecurity Threats And Talent Shortage Channel Insider The Fastest Airport Security Line You Don’t Know About The Wall Street Journal The campus will be closed to anyone who is not a student, faculty or staff member. WVTM13 Birmingham Tuskegee president releases security updates following shooting WIAT - CBS42.com Do Titans QB, Coach Have Job Security? Sports Illustrated Inside The 2024 Security Benchmark Report Security Magazine Your favorite security leadership podcasts Security Magazine The UN cybercrime convention threatens security research. The US should do something about it CyberScoop 3rd Annual U.S.-Mexico Defense and Security Roundtable smallwarsjournal France draws with Israel in high-security operation to reach Nations League quarterfinals with Italy The Associated Press Endpoint Security from BlackBerry BlackBerry Tuskegee University Shifts Security, Facilities Leadership Tuskegee University An Interview With the Target & Home Depot Hacker Krebs on Security Akamai: 84% of security professionals experienced an API security incident in the past year SecurityInfoWatch ESA opens registration for 2024 Town Hall Broadcast SecurityInfoWatch ‘We’re just a target’: Pickleball players call for more security - Camas Washougal Post Record ‘We’re just a target’: Pickleball players call for more security Camas Washougal Post Record Trump names Florida’s Rep. Mike Waltz as national security adviser Nebraska Examiner Mexican Officials Arrest Top Security Official in Mayor’s Beheading The New York Times New infosec products of the week: November 15, 2024 Help Net Security Linn County’s Food for Health pilot program aims to improve food security, support local economy KEZI TV Tom Homan, Trump’s ‘Border Czar,’ on Border Security The New York Times South Florida campus security officer arrested after attempting to meet minor for sex WPBF West Palm Beach Microsoft Patch Tuesday, November 2024 Edition Krebs on Security Silverfort Buys Rezonate to Fortify Identity Security Muscle BankInfoSecurity.com Trump Picks Kristi Noem for Homeland Security Secretary The New York Times Rand Paul Will Continue His COVID-19 Investigations From Atop the Senate Homeland Security Committee Reason NIST report on hardware security risks reveals 98 failure scenarios Help Net Security Lamar CISD invests in safety, security amid rapid growth Community Impact Mexico’s ‘hugs, not bullets’ security strategy has failed, says US Ambassador Ken Salazar Mexico News Daily Who Is Michael Waltz, Trump’s Pick to Be National Security Adviser? The New York Times |
RELATED ARTICLES
Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. 40 Million People Hacked - YOU as Identity Theft Victim Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Spyware is Not Like a Nosy Neighbor Remember the television show about the nosy neighbor Mrs. Kravitzalways peeking out her window or over the fence, sometimes evenknocking on the door just to find out what was going on in herneighborhood? If you don't wait a month or so and the DVD orthe movie will be out. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. Identity Theft Article - A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. |
home | site map |
© 2006 |