Viruses, Trojans, and Spyware - Oh My!
Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!"
Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it's a full time job, even when I'm not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily.
The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you're not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I've burnt bread and I've tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time.
You must be wondering what my point is. Yes, removing a virus or building a computer isn't really that hard of a task?if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let's take a look at the following scenario.
James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn't done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup?
The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn't fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn't want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn't have seemed very significant.
Nine times out of ten an infected computer does require a re-format and re-install. I don't say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer.
Eric Graves is a Senior Computer Technician at ARCH Computing Services. His computer knowledge and interpersonal skills have helped the company to grow at a remarkable rate. He's currently completing his BS in IT Management, and will go on to complete his Master Degree in Information Systems Security. He is also currently the administrator for the Mutagenix forums, a Slackware based Live CD.
Germany is jeopardising the security of the West The Telegraph
Amazon, Microsoft, Google step up cloud computing security - The Washington Post - The Washington Post
Amazon, Microsoft, Google step up cloud computing security - The Washington Post The Washington Post
China sends security chief to Germany for key talks as it eyes close cooperation - South China Morning Post
China sends security chief to Germany for key talks as it eyes close cooperation South China Morning Post
Ransomed.vc group claims hack on 'all of Sony systems' Cyber Security Connect
Burkina security agencies foil coup attempt against junta leaders Punch Newspapers
What Does Secure by Design Actually Mean? tripwire.com
TSA tips on traveling with pets through a security checkpoint at ... - Transportation Security Administration
TSA tips on traveling with pets through a security checkpoint at ... Transportation Security Administration
Can emerging tech fill the cyber security skills gap? | Cyber Security Hub Cyber Security Hub
National Security Leaders Making an Impact in 2023 Executive Gov
Secretary Mayorkas and Secretary Blinken Announce Designation ... Homeland Security
JPS Hears Recommendations On Safety, Security Enhancements ... Jamestown Post Journal
Moving up: A security officer in the Department of Public Safety is ... Temple University News
Burkina Faso’s junta says its intelligence and security services have foiled a coup attempt - ABC News
Burkina Faso’s junta says its intelligence and security services have foiled a coup attempt ABC News
TSA participating in local Idaho Falls job fair Agency recruiting ... - Transportation Security Administration
TSA participating in local Idaho Falls job fair Agency recruiting ... Transportation Security Administration
Vikings vow to solve their ball security problem, whether by special drills or lineup changes - CBS News
Vikings vow to solve their ball security problem, whether by special drills or lineup changes CBS News
Data-driven cyber: empowering government security with... - NCSC ... - National Cyber Security Centre
Data-driven cyber: empowering government security with... - NCSC ... National Cyber Security Centre
The Future of Homeland Security: Addressing the Rise of Terrorism ... - United States Institute of Peace
The Future of Homeland Security: Addressing the Rise of Terrorism ... United States Institute of Peace
Remarks by Ambassador Linda Thomas-Greenfield at a UN Security ... - United States Mission to the United Nations
Remarks by Ambassador Linda Thomas-Greenfield at a UN Security ... United States Mission to the United Nations
Democratic Republic of the Congo: Briefing and Consultations ... Security Council Report
Real Security | Olney Enterprise Olney Enterprise
Sexual Crimes Increased From 2021 to 2022, Annual Security ... - Cornell University The Cornell Daily Sun
Sexual Crimes Increased From 2021 to 2022, Annual Security ... Cornell University The Cornell Daily Sun
Gallego Secures Over $2 Million in Emergency Border Funding from ... Congressman Ruben Gallego
NCAM Seminar: Drone Security and Applications North Carolina A&T
New U.S.-Poland Foreign Military Financing Direct Loan Agreement ... Department of State
Security guard shot after argument at South Fulton bar FOX 5 Atlanta
Former Massachusetts government leader joins law firm as Director of National Security & Resiliency - Boston 25 News
Former Massachusetts government leader joins law firm as Director of National Security & Resiliency Boston 25 News
Resolution to allow security to carry a gun at Parma schools to be ... News 5 Cleveland WEWS
Commodity vs. Security: What's the Difference? Investopedia
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Security Think Tank: To encrypt or not to encrypt, that is the question ComputerWeekly.com
Austin Lauds Mozambique's Leadership on Regional Security > U.S Department of Defense
The NCS4 Publishes Industry Research Report on Spectator ... - The University of Southern Mississippi
The NCS4 Publishes Industry Research Report on Spectator ... The University of Southern Mississippi
GOP senators rail against Biden administration's handling of border security amid spending talks: 'Bulls---' - Fox News
GOP senators rail against Biden administration's handling of border security amid spending talks: 'Bulls---' Fox News
Early Edition: September 28, 2023 Just Security
YOUR GOVERNMENT: Cherriots to hear annual report on bus ... Salem Reporter
Secretary Antony J. Blinken At the Addressing the Urgent Security ... Department of State
Statement by National Security Council Spokesperson Adrienne ... The White House
Stabbing prompts additional security measures at Stall High School Live 5 News WCSC
Scammers find way to bypass new security features on credit cards WGAL Susquehanna Valley Pa.
Restaurant owners near Oriole Park call for increased security amid surge in burglaries - Fox Baltimore
Restaurant owners near Oriole Park call for increased security amid surge in burglaries Fox Baltimore
Best Dividend Stocks: British Giant GSK Offers Yield, Security For ... Investor's Business Daily
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger.
A New Era of Computer Security
Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure.
How to Get Rid of New Sobig.F Virus?
As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak.
Adware and Spyware: The Problems and Their Solutions
The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection.
How to Manage Your Username and Password The Easy and Secure Way
Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid.
Phishing and Pharming: Dangerous Scams
As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming.
Wells Fargo Report Phishing Scam
First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information.
40 Million People Hacked - YOU as Identity Theft Victim
Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information.
Remove Rogue Desktop Icons Created By Spyware
If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1.
Burning Bridges is Bad, But Firewalls are Good
When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker.
Phishing - Identity Theft & Credit Card Fraud
What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information.
Steganography - The Art Of Deception & Concealment
The Message Must Get Through-----------------------------The year is 300A.D.
Spyware Programs Are Out To Get You!
The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year.
Parental Control - Dangers To Your Child Online & Internet Child Safety Tips
Did you know..
How to Know Whether an Email is a Fake or Not
A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too.
A Personal Experience with Identity Theft
Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania.
Is the Internet Insecure Because of You?
Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure.
Arming Yourself Against Spyware
While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware.
6 Ways To Prevent Identity Theft
These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9.
Cybercriminals Trick: Targeted Trojan-Containing Emails
Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago.
|home | site map|