Protecting ur system
Forget viruses, spam and hacker attacks, Spyware is now the single
largest problem facing internet users today. These nasty little rogue
programmes have become so widespread and so infectious, their volume far
outstrips spam and regular viruses. The spyware problem has grown to
such an immense breadth and depth, we cannot even agree on what to call
it.
Spyware = Malware
Most people historically call these rogue programmes Spyware. That name comes from the 1990's where nasty little programmes secretly observed and logged your web surfing habits. The spyware problem, however, has now grown into dozens of other malicious formats, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms
Because the spyware problem has mutated so much, we now describe spyware as part of a much larger category of rogue software called Malware (malicious software programmes)
Most people historically call these rogue programmes Spyware. That name comes from the 1990's where nasty little programmes secretly observed and logged your web surfing habits. The spyware problem, however, has now grown into dozens of other malicious formats, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms
Because the spyware problem has mutated so much, we now describe spyware as part of a much larger category of rogue software called Malware (malicious software programmes)
At its most basic definition, malware is when insidious little software
programmes covertly install themselves on your computer, and then
perform secret operations without your permission. Once in place,
malware programmes may do hundreds of nasty things to your computer.
Malware will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.
Malware will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.
What does spyware/malware specifically do to my computer?
Malware will perform a variety of nasty activities, ranging from simple
email advertising all the way to complex identity-theft and
password-stealing.
New nasty functions are created every week by malware programmers, but the most common malware functions are:
Malware steals your personal information and address book (identity theft and keystroke-logging).
Malware floods your browser with pop-up advertising.
Malware spams your inbox with advertising email.
Malware slows down your connection.
Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.
Malware uses your computer as a secret server to broadcast pornography files.
Malware slows down or crashes your computer.
New nasty functions are created every week by malware programmers, but the most common malware functions are:
Malware steals your personal information and address book (identity theft and keystroke-logging).
Malware floods your browser with pop-up advertising.
Malware spams your inbox with advertising email.
Malware slows down your connection.
Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.
Malware uses your computer as a secret server to broadcast pornography files.
Malware slows down or crashes your computer.
Where does spyware/malware come from?
Spyware/malware programmes are authored by clever programmers, and then
delivered to your computer through covert Internet installs. Usually,
malware will piggyback on innocent-looking web page components and
otherwise-benign software such as game demos, MP3 players, search
toolbars, software, free subscriptions, and other things you download
from the web. Subscribing to online services is especially bad for
getting malware. In particular, whenever you sign up for a so-called
"free" service or install new software, you must accept an "end user
license agreement" (EULA). The fine print of the EULA will often include
the phrase "the vendor is allowed to install third-party software on
your computer". Since most users don't bother to read this EULA fine
print, they naively click "accept", and install malware out of sheer
ignorance.
What kind of personal information does spyware/malware steal?
This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.
This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.
How Do I Protect Myself from this Modern Epidemic of Spyware/Malware?
Answer: Avoiding and destroying spyware is not instant, and it is not a
one-time event like an inoculation. Instead, stopping spyware/malware
is a long-term game that is exactly like cleaning dirt out of your home.
You need constant vigilance, and a regular habit of cleaning malware
out of your computer every week.
Note: Additionally, as an educated user, you must also adopt a "buyer
beware" attitude whenever you install new software from the Net or even
from CD...you need to read every end user license agreement on your
screen before you click "accept".
Here is the checklist for detecting and destroying malware
Here is the checklist for detecting and destroying malware
Install two or three different anti-spyware programmes ("spyware
cleaners") on your computer, and update their definition lists
regularly. Because every anti-spyware cleaner is imperfect, it is
necessary to use combinations of these programmes to catch the greatest
breadth of malware. Also, the anti-spyware manufacturers regularly add
new entries to their "definition" lists, just like anti-virus software.
Make sure to keep your spyware cleaners updated with these lists!
Build a weekly habit of "scan and detect". Like cleaning house, this
should be done every few days. At the very least, this should be done
whenever you install new software. Many anti-spyware programmes can be
set to automatically perform scan-and-detect nightly.
Carefully read every EULA (end user license agreement) before clicking
"accept". If you see the phrase "3rd-party software may be installed",
make sure to follow the software install with a spyware cleaning.
Educate yourself on the latest strains of malware. In particular, start
visiting these recommended anti-spyware sites, and update yourself on
the latest malicious programmes.
Save your data, and backup often! As much as it sounds like
broken-record preaching, backing-up is how an intelligent user prepares
for the worst. Backing up means: keep your original software CDs in a
safe accessible place, constantly save copies of your important work
files on CD or separate drives, and presume you will actually need them
one day. This way, if you ever experience the extreme spyware
circumstance of having to reformat your hard drive, you can at least
recover your important work.
There you go, fellow Internet users. Your lives now have an extra
complexity as you add one more cleaning habit to your weekly routine.
The good news is: once you build a regular scan-and-detect habit, then
spyware and malware will be reduced to a mere annoyance, and you can get
back to business of enjoying the Internet! Personally, I think of it as
having one more room in my house to dust and vacuum.
This Week on Gadget
Normally when thinking about portable TVs, you think about tiny screens and bulky plastic – not so in the case of Sharp’s AQUOS Freestyle line. The Sharp AQUOS televisions can display full 1080p video via a wireless base station, The 20-inch, 32-inch, 40-inch and 60-inch Freestyle TVs are designed to be moved around the house for special occasions or just for kicks. The smallest – and in this case, the most interesting – can run even without a power cable. The 20-inch HDTV includes a built-in battery. Freestyle's smallest TVs, the 20-inch and 32-inch, only offer a 1366x768 resolution.
Normally when thinking about portable TVs, you think about tiny screens and bulky plastic – not so in the case of Sharp’s AQUOS Freestyle line. The Sharp AQUOS televisions can display full 1080p video via a wireless base station, The 20-inch, 32-inch, 40-inch and 60-inch Freestyle TVs are designed to be moved around the house for special occasions or just for kicks. The smallest – and in this case, the most interesting – can run even without a power cable. The 20-inch HDTV includes a built-in battery. Freestyle's smallest TVs, the 20-inch and 32-inch, only offer a 1366x768 resolution.
It’s a simple concept that Sharp has paired with features that make it truly useful. A carrying handle and kickstand make it easy to move and set up, and support from Sharp’s remote hardware make it easy enough to get content to the screen from close range. The base station connects to the television via its own private WiFi connection, and can handle video from standard HDMI or RGB inputs.
The larger 32-inch, 42-inch and 60-inch models retain the low weight, handles and kickstands that make the smaller Freestyle so handy, but don’t have batteries and require the standard AC connection. It isn’t an ideal solution, since the battery is only rated for two hours – but that should be enough to find a power outlet.
No comments:
Post a Comment