Viruses, Trojans, and Spyware - Oh My!
Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!"
Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it's a full time job, even when I'm not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily.
The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you're not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I've burnt bread and I've tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time.
You must be wondering what my point is. Yes, removing a virus or building a computer isn't really that hard of a task?if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let's take a look at the following scenario.
James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn't done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup?
The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn't fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn't want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn't have seemed very significant.
Nine times out of ten an infected computer does require a re-format and re-install. I don't say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer.
Eric Graves is a Senior Computer Technician at ARCH Computing Services. His computer knowledge and interpersonal skills have helped the company to grow at a remarkable rate. He's currently completing his BS in IT Management, and will go on to complete his Master Degree in Information Systems Security. He is also currently the administrator for the Mutagenix forums, a Slackware based Live CD.
Wellsville man stages "protest" over school security in front of secondary school - THE WELLSVILLE SUN
Wellsville man stages "protest" over school security in front of secondary school THE WELLSVILLE SUN
ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation - SecurityWeek
ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation SecurityWeek
Security camera captures the moment a tornado hit a high school FOX 8 Local First
Breaking silence, GOP lawmakers lament overhaul’s security ramifications for Israel - The Times of Israel
Breaking silence, GOP lawmakers lament overhaul’s security ramifications for Israel The Times of Israel
Executive Order on Prohibition on Use by the United States ... The White House
What Is Security as a Service? MUO - MakeUseOf
Lumen Technologies hit with 2 separate security incidents Cybersecurity Dive
Homeland Security Chief Mayorkas calls Ted Cruz’s comments ... The Texas Tribune
GPT-4 kicks AI security risks into higher gear VentureBeat
Hunger and Malnutrition Threaten U.S. National Security, Report Says Drovers Magazine
Remarks at a UN Security Council High-Level Debate on ... - United States Mission to the United Nations
Remarks at a UN Security Council High-Level Debate on ... United States Mission to the United Nations
NY Law Firm Pays $200K Over Healthcare Data Security Failures HealthITSecurity
Security equipment taken in package theft - Oak Park Wednesday Journal
Apple Issues Urgent Security Update for Older iOS and iPadOS ... The Hacker News
Commerce Department Outlines Proposed National Security ... US Department of Commerce
Why cybersecurity risks matter - and how to raise security World Economic Forum
Homeland Security warns about scam in Kansas City area WDAF FOX4 Kansas City
Security experts discusses training practices to prepare for mass shootings - Western Massachusetts News
Security experts discusses training practices to prepare for mass shootings Western Massachusetts News
New World Bank Report: With Inclusion and Accountability, Water ... World Bank Group
Murray, Shaheen, 36 Colleagues Write to Pentagon Underscoring ... Senator Patty Murray
908th Security Forces Squadron partakes in specialized skills training 908aw.afrc.af.mil
ViVE 2023: How to tackle data privacy, security talent vacancies FierceHealthcare
Rising Rate of Drug Shortages Is Framed as a National Security Threat The New York Times
Microsoft pushes OOB security updates for Windows Snipping tool flaw BleepingComputer
ANALogic Machines Slow Down Airport Security, Have Worst Name ... View from the Wing
Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner
Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security
Shoplifter bites off security guard’s earlobe in Tigard Fox 12 Oregon
TSA issues new cybersecurity requirements for airport and aircraft ... - Transportation Security Administration
TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration
FACT SHEET: President Biden’s Budget Strengthens Border ... The White House
Frustration mounts, questions raised over possible cyber-security breach at five Louisiana schools - NOLA.com
Frustration mounts, questions raised over possible cyber-security breach at five Louisiana schools NOLA.com
The Case for a Security Guarantee for Ukraine Foreign Affairs Magazine
FACT SHEET: Biden-Harris Administration Announces National ... The White House
Biden Administration Announces Additional Security Assistance for ... Department of Defense
TikTok Pushed by U.S. to Resolve National Security Concerns The New York Times
Dope Security nabs $16M led by GV to build out secure web gateways designed to work on endpoints, not in the cloud - TechCrunch
Dope Security nabs $16M led by GV to build out secure web gateways designed to work on endpoints, not in the cloud TechCrunch
President Biden Joins DHS To Recognize Twenty Years of Progress ... Homeland Security
After Denver school shooting, an outcry erupts over security The Associated Press
Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security
Topeka senator calls for security as frustrations flare at Kansas anti ... - The Topeka Capital-Journal
Topeka senator calls for security as frustrations flare at Kansas anti ... The Topeka Capital-Journal
TikTok CEO's Message to Washington: A Sale Won't Solve Security ... The Wall Street Journal
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger.
A New Era of Computer Security
Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure.
How to Get Rid of New Sobig.F Virus?
As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak.
Adware and Spyware: The Problems and Their Solutions
The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection.
How to Manage Your Username and Password The Easy and Secure Way
Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid.
Phishing and Pharming: Dangerous Scams
As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming.
Wells Fargo Report Phishing Scam
First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information.
40 Million People Hacked - YOU as Identity Theft Victim
Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information.
Remove Rogue Desktop Icons Created By Spyware
If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1.
Burning Bridges is Bad, But Firewalls are Good
When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker.
Phishing - Identity Theft & Credit Card Fraud
What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information.
Steganography - The Art Of Deception & Concealment
The Message Must Get Through-----------------------------The year is 300A.D.
Spyware Programs Are Out To Get You!
The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year.
Parental Control - Dangers To Your Child Online & Internet Child Safety Tips
Did you know..
How to Know Whether an Email is a Fake or Not
A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too.
A Personal Experience with Identity Theft
Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania.
Is the Internet Insecure Because of You?
Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure.
Arming Yourself Against Spyware
While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware.
6 Ways To Prevent Identity Theft
These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9.
Cybercriminals Trick: Targeted Trojan-Containing Emails
Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago.
|home | site map|