![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders
Can you protect your computer from all possible viruses and other invasions? The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. That's the bad news. The good news is that you can clean up and protect your computer against almost all of these undesirable intruders. The first thing you need to do is download a program called Mozilla Firefox. It's a newer and better browser than anything offered by those guys in Seattle. For one thing, hackers have been concentrating their efforts on Microsoftâ products like Internet Explorerâ and MSN Explorerâ. This makes these browsers more likely to be attacked, whereas Firefox, at least as of this writing, seems more secure. And it does offer great popup protection. Another thing you will like about Firefox is a feature called Tabs that lets you have numerous Web pages up at the same time with the ability to click back and forth between them. For example, you could have your favorite site, eBay's home page, a phone number directory, the Merriam-Webster Dictionary, and your favorite blog all loaded at the same time ? then just click amongst them as the moment moves you. Here's what you'll really like about Firefox. It's free from the Mozilla.org, which is a sort of consortium of public-minded software engineers who develop and distribute freeware (free software). Mozilla is also responsible for a great, free email program called Thunderbird. Thunderbird is a fast and efficient way to get and send email and has great spam filters. I've personally been using it for more than a month and haven't gotten a single piece of spam mail to date. Compare this with the stuff you get when you use other free email services such as MSN Hotmail. Before you install either of these programs, you will want to rid your computer of any nasty software it has fallen victim to. A good way to do this is to download another great, free program, Ad-Aware SE from Lavasoft (Lavasoft.com). This program detects and eliminates objects such as a registry invasion. The Webopedia defines your registry file as "a database used by the Windows operating system (Windows 95 and NT) to store configuration information." A registry invasion happens when a "free" program changes your registry to automatically load spyware or some undesirable program. For example, a Web site called I-Mesh allows you to download free programs, share files, and search for music and videos ? but will alter your registry file to incorporate a service called GAINâ (GAIN Publishing) that you may find very annoying. Ad-Aware will also find and eliminate known data-mining programs, aggressive advertising, parasites, and scumware, as well as selected traditional trojans, dialers, malware, browser hijackers, and tracking components. You can also find and eliminate spyware with a program called Spybot Search & Destroy. It's available free at spybot.info/en/index.html. Install this program and then click on Search & Destroy and it will scan your hard drive in a matter of moments and then show you a list of "problems" it has found. It also tells you the type of problem, for example, "registry change." Once the scan completes, all you have to do is click on a button titled "Fix selected problems." Spybot will first create a restore point (in case you delete something you wish you hadn't) and then fix all the problems that are check marked (if there is any problem you do not want fixed for some reason, just remove the checkmark next to it). Finally, there is a great anti-virus program you can also get free. It is AVG Free Anti-virus and is available at Grisoft.com. AVG will scan your hard disk, then report and eliminate any viruses found. In addition, it automatically downloads information on new viruses from time to time to help keep you protected. This automatic download service is free as well. Article by Douglas Hanna. Douglas is a retired advertising and marketing executive and long-time Denver resident. He is the webmaster of http://www.all-in-one-info.com, a free resource for information on a variety of subjects. Please visit his site to subscribe to his free newsletter, "Tips & Tricks to Save Money & Live Better."
MORE RESOURCES: Tallahassee hospital cancels procedures, diverts EMS after IT security issue Tallahassee Democrat Security guard shocked with Taser after macing Lauderhill Police officer during traffic stop WSVN 7News | Miami News, Weather, Sports | Fort Lauderdale Biden Administration Announces Additional Security Assistance for ... Department of Defense President Biden Announces Appointments to the President’s ... The White House Texas Senate leaders signal intent to spend big on border security The Texas Tribune CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection CVA reports data security breach involving some patient information Alabama's News Leader Leveraging K-9 capabilities within security Security Magazine Mitigating security risks with an evolving workforce Security Magazine Burlington police: Mayor condemns police's private security contract Burlington Free Press DHS Expands Abraham Accords to Cybersecurity Homeland Security School security: Local schools get $7.6 million for safety upgrades Dayton Daily News IBM Security GM on Seeing a Target Through the Hacker's Eyes BankInfoSecurity.com Claude ISD applying for more funding to support security abc7amarillo.com Memphis Police Chief Trained With Israel Security Forces The Intercept Jeetu Patel on Having a Consistent Design at Cisco Security BankInfoSecurity.com Williamsport security guard allegedly chokeholds boy PAHomePage.com Air Force sees national security threat in Chinese-owned corn mill Successful Farming Security guard accused of killing man during fight at grocery store will not face charges Fox Baltimore Market Map: Information security guards against economic threats PitchBook News & Analysis Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security Smaller krewes, ready to roll despite security setbacks, hopeful for ... FOX 8 Local First Video security cameras that help ensure compliance Security Magazine DMPS parents call for more security after two guns found in high schools in two weeks KCCI Des Moines Basketball games add extra security after multiple lockdowns in Wake County during the week WRAL News Street Talk: Ferris partners with National Security Agency Grand Rapids Business Journal SRPD, cannabis companies gather to hash out security concerns ... The Santa Rosa Press Democrat The forgotten Black woman who invented the video home security ... The Washington Post Security Think Tank: In 2023, we need a new way to cultivate better habits ComputerWeekly.com USENIX Security ’22 – Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati – ‘Transferring Adv... Security Boulevard Idaho Falls security camera catches burglar - Local News 8 LocalNews8.com DHS Announces Process Enhancements for Supporting Labor ... Homeland Security DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense |
![]() |
![]() |
![]() |
RELATED ARTICLES
What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,.. Everything You Need To Know About Spyware and Malware You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. Top 10 tips for Safe Internet Shopping Over £5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Breaking Into Your PC: News... You'd better learn news from media, not from emails, security experts warn us users again.Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow. Spy Scanners - Don't Compromise your Privacy Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. ![]() |
home | site map |
© 2006 |