![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Free Ways to Tackle Threats to Your Computer
Protect Your PC Having problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet? Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Any pc connected to the internet is a target for viruses, spyware, adware and trojan horses. You need to protect and clean your pc of these nasties which slow down your costly computer.We will show you how to do at little or no cost in this free report. Before we start here is our disclaimer:- we take no responsibility for any harm YOU may do to your computer with this information. Use it at your own risk and be sure you are confident of what you are doing before you start. It's a good idea to make a restore point before installing/uninstalling or changing anything (see below for details) Firstly Viruses, these are the most newsworthy of the baddies, and because of this most people have heard of them. They are the pc version of the Flu, or in a worse case scenario, Sars, and can kill your computer. There are new viruses released almost daily, and you need to keep up to date with Antivirus software to stop them. Fortunately there is a free program which can help you protect your pc. This is called AVG and is available at http://www.grisoft.com just follow links through the site to AVG Free Edition. Register your email address, download and install it to your pc. The program is pretty straightforward to use but make sure you keep it updated at least weekly by double clicking the AVG icon (four coloured square) in the taskbar and then clicking on update in the window, tick internet as the source and you are good to go. It will automatically update and restart the main Antivirus program. Remember prevention is better than cure though and don't open attachments in emails or even sent to you over instant messengers unless you are sure of the person sending them, even then if you have AVG installed right click the file and use the "scan with AVG" menu item to double check. Trojan Horses come next on our hitlist, mostly these are small programs which record either keystrokes or other information and try to send it back to someone to steal your details. But they can be used to take over your pc completely or partially to use your resources to send spam emails, or launch attacks on other computers on the internet, often for denail of service (DOS) attacks. Most Trojan Horses are removed by the AVG antivirus software, or if not it will alert you to its presence, and you can google http://www.google.com to find how to remove it. A good prevention measure to stop Trojans accessing the net to send their payload is to use a software firewall, again there is at least one free program you can download, called zonealarm. It will ask you wether to allow programs to access the internet or not, meaning if you get something you know you didn't install accessing the net you can tell zonealarm not to allow it. To download zonealarm, go to http://www.zonelabs.com and follow links to the download section, and then to zonealarm (they are not so prominent as the ones for the Pro version which you pay for). It is a good idea to run a firewall to stop attacks coming in from outside as well your details going out. Windows XP with Service Pack 2 installed has a built in firewall, but zonealarm is much more configurable and does a better job overall. Spyware and Adware can also be responsible for a lot of pc problems. These are often programs piggybacked onto a free download offered to help you with some other task like form filling on websites (Gator is a well known example but they are open about it). Spyware is used by less scrupulous companies and individuals to report back your surfing habits so they can send ads you're more likely to respond to. These slow down your surfing and also run in the background using your pc's power to do their dirty work. Sometimes the information sent back is even more sinister than just your browsing habits, so beware of software you download and check first. Adware is very similar although is usually contained in tracking cookies (small text files downloaded by your browser containing information to track you through a website). Often these 2 terms are used interchangably. Another nasty which falls in with these is Scumware, which is a term used to describe software which hijacks another program (usually your browser or modem dialler) and displays only content which it's maker wants you to see and often prevents you seeing anything else. The diallers reset your modems settings to dial another (usually very expensive) number rather than your ISP's one. Thankfully some thoughtful individuals have kindly donated their time to give us free programs which will release you from the grip of these fiendish programmers. Download firstly Adaware from http://www.lavasoft.de and install and run that (if it finds nothing on your pc I would be extremely surprised) secondly download Spybot Search and Destroy from http://www.safer-networking.org/en/download/index.html and install and run that too, it will pop up a dialog to say it has found adaware also on your machine, but it doesn't really mind so close it and continue. As with virus software you should use these and update them both regularly, as you can be sure the people on the darkside of the internet are updating their stuff to keep you hooked into it. Both programs have a button for downloading and installing updates automatically so there is no excuse not to do it before every scan, which we would recommend doing at least monthly and more frequently if possible. So now you are protected from viruses, trojan horses, and other pc illnesses so that's it right? Not quite, I have to say one of the most important things on your pc is your personal data, you can re-install Windows, Office and all the other programs on your computer from the cd's, but your prized pictures, your kids half written essay for that all important exam or your wifes recipes handed down from generation to generation carefully typed out and saved can't be. Back it up. NOW. Onto cd's if you have a cd writer or if not get one installed or use floppy discs. But for the sake of your sanity BACK IT UP. And finally some tips to keep your pc running at its optimum. Before making any changes to your pc or programs, it's a good idea to make a restore point by going to Start, then accessories on the start menu, then clicking System tools and finally the system restore icon. Follow the prompts and create a restore point to return to if it all goes wrong. Sometimes a slow pc is just the result of too many programs running, close down those you're not using, obvious but often overlooked. If you're anything like most pc users you have a bundle of programs start when your computer does, and sitting in the task tray at the right of the start menu. You can close these down manually but if you don't use them at all then why not remove them? If you may want them but not everytime you start up you can go to start, then click RUN and in the text box type "msconfig" without the quotes. Don't worry now this looks daunting but all you need to do is click the tab at the right marked "Startup" and there is a list of all those programs which run as soon windows starts, now apply a little caution and lookup (http://www.google.com again comes to your aid) any you don't recognise. Now those you're sure you don't need running at startup untick the box. Next time you start windows will put up a box to tell you you've disabled some things, as long as your pc works ok now, tick the box to not show it again. If you took of something you need or want back run msconfig again, and retick the box in the startup tab again, next time you restart it will return. My last tip is to run defrag monthly, go to start, accessories, system tools and run defrag, this can often speed up a slowing pc as it makes all the files on your hard drive quicker to access. Douglas Titchmarsh runs several websites, and blogs including http://www.cashinonline.info
MORE RESOURCES:
Tallahassee hospital cancels procedures, diverts EMS after IT security issue Tallahassee Democrat Band of Barbers, Judges and Security Guards Uses Soviet-Era Guns to Repel Russian Drones The Wall Street Journal Air Force warns Chinese company's North Dakota mill would be 'significant' national security threat Fox News President Biden Announces Appointments to the President’s ... The White House Deputy Secretary Sherman's Meeting with Poland's National ... Department of State CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection Biden Administration Announces Additional Security Assistance for ... Department of Defense Texas Senate leaders signal intent to spend big on border security The Texas Tribune Electronic pollbook security raises concerns going into 2024 Chattanooga Times Free Press FAA Closes Three U.S. Airports Over National Security Risk Travel Market Report US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security DREAM THEATER's Concert In Oulu, Finland Canceled For ... BLABBERMOUTH.NET Iran’s Security Forces ‘Systematically’ Targeting Protesters’ Faces ایران اینترنشنال Security Tight as North Macedonia, Bulgaria Honor National Hero Voice of America - VOA News Downtown bars under new security guidelines following fatal ... The Turlock Journal Viral ‘security guard’ dancer brings back moves for basketball season WATE 6 On Your Side Palestinian leaders ‘rebuff' pressure to resume security coordination The Jerusalem Post Air Force sees national security threat in Chinese-owned corn mill Successful Farming Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security Gigamon names Chaim Mazal as CSO Help Net Security Barely Dressed Woman Meanders Through Security At The Miami ... View from the Wing Memphis Police Chief Trained With Israel Security Forces The Intercept Attacks on Electrical Substations Raise Alarm The New York Times Letters: Recruiting security volunteers could be quite useful, St. Paul and Minneapolis St. Paul Pioneer Press Turkey slams West for security warnings 'harming' tourism The Associated Press - en Español Hong Kong's largest national security trial to begin Monday as 47 ... Hong Kong Free Press Williamsport security guard allegedly chokeholds boy PAHomePage.com Transportation Security Administration confiscates 8th firearm at Reagan National Airport this year Washington Times Joint Statement of the 2023 U.S.–Japan Security Consultative ... Department of Defense Teen arrested on suspicion of killing security guard at party in Muscoy San Bernardino County Sun SRPD, cannabis companies gather to hash out security concerns ... The Santa Rosa Press Democrat Security guard shocked with Taser after macing Lauderhill Police officer during traffic stop WSVN 7News | Miami News, Weather, Sports | Fort Lauderdale DHS Announces Process Enhancements for Supporting Labor ... Homeland Security More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense |
![]() |
![]() |
![]() |
RELATED ARTICLES
Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. Breaking Into Your PC: News... You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Spyware, What It Is, What It Does, And How To Stop It Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer. Steganography - The Art Of Deception & Concealment The Message Must Get Through-----------------------------The year is 300A.D. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. Is Spyware Watching You? Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton). Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. ![]() |
home | site map |
© 2006 |