how to protect your PC against Spyware, malware, adware, computer virus


Protecting ur system
Forget viruses, spam and hacker attacks, Spyware is now the single largest problem facing internet users today. These nasty little rogue programmes have become so widespread and so infectious, their volume far outstrips spam and regular viruses. The spyware problem has grown to such an immense breadth and depth, we cannot even agree on what to call it.
Spyware = Malware
Most people historically call these rogue programmes Spyware. That name comes from the 1990's where nasty little programmes secretly observed and logged your web surfing habits. The spyware problem, however, has now grown into dozens of other malicious formats, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms

Because the spyware problem has mutated so much, we now describe spyware as part of a much larger category of rogue software called Malware (malicious software programmes)
At its most basic definition, malware is when insidious little software programmes covertly install themselves on your computer, and then perform secret operations without your permission. Once in place, malware programmes may do hundreds of nasty things to your computer.

Malware will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.
What does spyware/malware specifically do to my computer?
Malware will perform a variety of nasty activities, ranging from simple email advertising all the way to complex identity-theft and password-stealing.

New nasty functions are created every week by malware programmers, but the most common malware functions are:
Malware steals your personal information and address book (identity theft and keystroke-logging).
Malware floods your browser with pop-up advertising.
Malware spams your inbox with advertising email.
Malware slows down your connection.
Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.
Malware uses your computer as a secret server to broadcast pornography files.
Malware slows down or crashes your computer.
Where does spyware/malware come from?
Spyware/malware programmes are authored by clever programmers, and then delivered to your computer through covert Internet installs. Usually, malware will piggyback on innocent-looking web page components and otherwise-benign software such as game demos, MP3 players, search toolbars, software, free subscriptions, and other things you download from the web. Subscribing to online services is especially bad for getting malware. In particular, whenever you sign up for a so-called "free" service or install new software, you must accept an "end user license agreement" (EULA). The fine print of the EULA will often include the phrase "the vendor is allowed to install third-party software on your computer". Since most users don't bother to read this EULA fine print, they naively click "accept", and install malware out of sheer ignorance.
What kind of personal information does spyware/malware steal?

This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.
How Do I Protect Myself from this Modern Epidemic of Spyware/Malware?
Answer: Avoiding and destroying spyware is not instant, and it is not a one-time event like an inoculation. Instead, stopping spyware/malware is a long-term game that is exactly like cleaning dirt out of your home. You need constant vigilance, and a regular habit of cleaning malware out of your computer every week.
Note: Additionally, as an educated user, you must also adopt a "buyer beware" attitude whenever you install new software from the Net or even from CD...you need to read every end user license agreement on your screen before you click "accept".

Here is the checklist for detecting and destroying malware
Install two or three different anti-spyware programmes ("spyware cleaners") on your computer, and update their definition lists regularly. Because every anti-spyware cleaner is imperfect, it is necessary to use combinations of these programmes to catch the greatest breadth of malware. Also, the anti-spyware manufacturers regularly add new entries to their "definition" lists, just like anti-virus software. Make sure to keep your spyware cleaners updated with these lists!
Build a weekly habit of "scan and detect". Like cleaning house, this should be done every few days. At the very least, this should be done whenever you install new software. Many anti-spyware programmes can be set to automatically perform scan-and-detect nightly.
Carefully read every EULA (end user license agreement) before clicking "accept". If you see the phrase "3rd-party software may be installed", make sure to follow the software install with a spyware cleaning.
Educate yourself on the latest strains of malware. In particular, start visiting these recommended anti-spyware sites, and update yourself on the latest malicious programmes.
Save your data, and backup often! As much as it sounds like broken-record preaching, backing-up is how an intelligent user prepares for the worst. Backing up means: keep your original software CDs in a safe accessible place, constantly save copies of your important work files on CD or separate drives, and presume you will actually need them one day. This way, if you ever experience the extreme spyware circumstance of having to reformat your hard drive, you can at least recover your important work.
There you go, fellow Internet users. Your lives now have an extra complexity as you add one more cleaning habit to your weekly routine. The good news is: once you build a regular scan-and-detect habit, then spyware and malware will be reduced to a mere annoyance, and you can get back to business of enjoying the Internet! Personally, I think of it as having one more room in my house to dust and vacuum.
This Week on Gadget
Normally when thinking about portable TVs, you think about tiny screens and bulky plastic – not so in the case of Sharp’s AQUOS Freestyle line. The Sharp AQUOS televisions can display full 1080p video via a wireless base station, The 20-inch, 32-inch, 40-inch and 60-inch Freestyle TVs are designed to be moved around the house for special occasions or just for kicks. The smallest – and in this case, the most interesting – can run even without a power cable. The 20-inch HDTV includes a built-in battery. Freestyle's smallest TVs, the 20-inch and 32-inch, only offer a 1366x768 resolution.

It’s a simple concept that Sharp has paired with features that make it truly useful. A carrying handle and kickstand make it easy to move and set up, and support from Sharp’s remote hardware make it easy enough to get content to the screen from close range. The base station connects to the television via its own private WiFi connection, and can handle video from standard HDMI or RGB inputs.

The larger 32-inch, 42-inch and 60-inch models retain the low weight, handles and kickstands that make the smaller Freestyle so handy, but don’t have batteries and require the standard AC connection. It isn’t an ideal solution, since the battery is only rated for two hours – but that should be enough to find a power outlet.
Post a Comment

Blog Archive

COMPUTER-SOFTWARES HELP CENTER