Security Information |
|
How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances
Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. This article will show you how to protect yourself against harmful spyware / adware, as well as how to remove current infections, and how to protect yourself from viruses, hackers and other general "malware". The first thing you can do, if you're an Internet Explorer user, is consider making a switch to the Mozilla Firefox web browser. Firefox can do everything that Internet Explorer can do, and much, much more. Plus it is almost completely spyware "proof", and is much more stable and secure than Internet Explorer. You can go to getfirefox.com for more information. Next, you'll want to keep your computer up-to-date. To do so, you'll want to download all available updates from windowsupdate.microsoft.com (if you use Firefox, you will need to fire up IE to do this since Microsoft doesn't like people to use other browsers, so they have "banned" Firefox from accessing Windows updates). Now that you've got a secure browser and have Windows up to date, it's time to talk about the anti-spyware software. The following is a list of the top three players in the free anti-spyware software game: Spybot Search & Destroy Lavasoft's Ad-Aware Microsoft's Newly Released Anti-Spyware Take all of the programs that you have chosen to use, download, and install them. Then, one at a time, update each program, run them, and remove anything that they found. This should effectively remove any active spyware or adware on your system. Now that you have spyware removed, you'll need hacker and virus protection.To keep hackers out, you will need to install a solid firewall. You can either use the old built in with Windows XP, or download a third-party one. To activate Windows XP's built in firewall, follow these easy steps: Click the Start button, and open up the Control Panel. Open "Network Connections" (or "Network and Internet Connections", then "Network Connections" if you're using the category view). If you're using broadband, or another form of connection through a LAN, right click on Local Area Connection (or the appropriate network connection), and select Properties. Click on the advanced tab, and click on Settings. Select "On", and don't select "Don't allow exceptions". Click OK on all windows to close. If you would like to download a third-party firewall, Kerio Technologies has a great personal firewall that you can use. It can be found at kerio.com/kpf_home.html. Grisoft offers a great freeware antivirus program called AVG Free. It is a great alternative to the common commercial antivirus software designed to milk you for more cash with their "update subscription" fees. Updates to AVG are 100% free, forever. AVG can be downloaded from grisoft.com. To keep your system completely secure, be sure to scan for viruses, spyware and check for Windows updates every week or so. By taking these simple steps, your computer is now many times more secure and less likely to leak out personal information or get a malware infection. Ryan Bauer is a computer geek who writes tutorials for his computer optimization website and runs a computer optimization and support forum.
MORE RESOURCES: Homeland Security Department to Release New A.I. Guidance The New York Times Officials detail increased D.C. security for certification, inauguration The Washington Post U.S. ambassador bashes Mexico’s security efforts. Mexico’s president pushes back - Los Angeles Times Opinion | Trump’s national security wrecking crew The Washington Post ‘Never trust, always verify’: The zero trust approach to network security United States Army Brief altercation between fans mars France-Israel soccer match despite heavy security The Associated Press St. Francis Seraph hires security guards for Christmas, Nativity display visitors as crowds still plague area WCPO 9 Cincinnati Video: How The Fortinet Security Fabric Is Combatting Cybersecurity Threats And Talent Shortage Channel Insider The Fastest Airport Security Line You Don’t Know About The Wall Street Journal The campus will be closed to anyone who is not a student, faculty or staff member. WVTM13 Birmingham Do Titans QB, Coach Have Job Security? Sports Illustrated Tuskegee president releases security updates following shooting WIAT - CBS42.com Homeland Security Department releases framework for using AI in critical infrastructure The Associated Press The UN cybercrime convention threatens security research. The US should do something about it CyberScoop France draws with Israel in high-security operation to reach Nations League quarterfinals with Italy The Associated Press Endpoint Security from BlackBerry BlackBerry Tuskegee University Shifts Security, Facilities Leadership Tuskegee University 3rd Annual U.S.-Mexico Defense and Security Roundtable smallwarsjournal Ambridge Area School District makes security changes CBS Pittsburgh France-Israel Soccer Match is Overshadowed by Amsterdam Attack The New York Times Akamai: 84% of security professionals experienced an API security incident in the past year SecurityInfoWatch ‘We’re just a target’: Pickleball players call for more security Camas Washougal Post Record ESA opens registration for 2024 Town Hall Broadcast SecurityInfoWatch Tom Homan, Trump’s ‘Border Czar,’ on Border Security The New York Times Trump’s National Security Team Keeps Getting More Extreme The New Republic Linn County’s Food for Health pilot program aims to improve food security, support local economy KEZI TV South Florida campus security officer arrested after attempting to meet minor for sex WPBF West Palm Beach New infosec products of the week: November 15, 2024 Help Net Security Trump names Florida’s Rep. Mike Waltz as national security adviser Nebraska Examiner Mexican Officials Arrest Top Security Official in Mayor’s Beheading The New York Times Silverfort Buys Rezonate to Fortify Identity Security Muscle BankInfoSecurity.com Rand Paul Will Continue His COVID-19 Investigations From Atop the Senate Homeland Security Committee Reason NIST report on hardware security risks reveals 98 failure scenarios Help Net Security Lamar CISD invests in safety, security amid rapid growth Community Impact Trump Picks Kristi Noem for Homeland Security Secretary The New York Times 11/14/24 National Security and Korean News and Commentary smallwarsjournal Microsoft Patch Tuesday, November 2024 Edition Krebs on Security Mexico’s ‘hugs, not bullets’ security strategy has failed, says US Ambassador Ken Salazar Mexico News Daily Security guard turned gunman: Christopher Farrell's fatal rampage in downtown San Diego - CBS News 8 Who Is Michael Waltz, Trump’s Pick to Be National Security Adviser? The New York Times Federal officials warn Boston churches to increase security after wave of arson attacks CatholicVote org Arizona governor pledges work with Trump to secure the border Arizona's Family ASIS, International Protective Security Board Sign Memorandum of Understanding Security Sales & Integration |
RELATED ARTICLES
Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. Backup and Save your business! There you are busily typing away on your PC or yourLaptop, and all of a sudden the strangest thing happens.The screen goes black, extinquished like a candle in thewind. Firewalls: What They Are And Why You MUST Have One! A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. Dont be a Dork - Protect Yourself There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc. Check Out That Privacy Policy Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. Is Spyware Watching You? Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton). Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. |
home | site map |
© 2006 |