Is Your Computer Sick
Viruses and spyware usually show up on your computer one of two ways.
Either they invade your system with a frontal assault like the Huns attacking the Romans, or they sneak in a back door like a cat burglar.
Either way, once a virus or piece of spyware gets on your system, getting it off can rate harder than curing a severe case of trench foot!
Viruses, malicious programs designed to disrupt normal computing, and spyware, programs intended to literally "spy" on your activities, can enter your computer a number of ways.
Most commonly they enter your system through an email attachment, by sharing files with an infected computer by disk, as a "ride along" with a 3rd party program you install, or through a "back door" port in your computer.
Regardless of how they get on your system, once in place, they cause no end of headaches and frustration.
The following represent typical signs you may suffer from infection by a virus or piece of spyware.
Your computer starts acting oddly by doing things it never did previously.
Your modem starts trying to dial out to the Internet without you initiating a surfing session.
You notice that files start disappearing, the system stalls, runs slowly, or even crashes frequently.
Your computer takes progressively longer to boot up every time you start it or you notice that your available hard drive space has disappeared. Strange popup windows appear, even when youre not surfing the web, or you delete a program and it "magically" reappears next time you boot the system.
If you suspect you a virus or a piece of spyware has invaded your computer, follow these steps to first identify and then delete the offending code:
Step 1 - Back up your important files, but remember to scan these files for viruses before reinstalling to avoid accidentally re-infecting your system.
Step 2 - Update your anti-virus definitions and perform a scan of your hard drive.
If you dont carry virus protection, or you suspect your anti-virus software got corrupted somehow, then log on to www.pandasoftware.com and use the free Panda Active Scan service to check your hard drive for viruses.
Follow the instructions for quarantining and removing the offending files.
Step 3 - Scan your hard drive with an adware, scumware, or spyware detection and removal tool like Adaware www.lavasoft.de/support/download/ or Spybot http://spybot.safer-networking.de/.
Step 4 - In many cases, when the virus or spyware program gets installed with a free utility or game you download from the Web, you must usually uninstall the utility or game to finally get rid of the problem once and for all.
Step 5 - Avoid re-infection by keeping your anti-virus and firewall up-to-date at all times.
As a last resort, if you run into a program you simply cant get rid of, but can figure out the offending files name, do a search for the file name on Google.com. Often you will find youre not the first victim and may get valuable advice for cleaning up your system.
However, be very careful of the information you find and think twice before modifying any system files.
How to Backup Your Computer Files
As I write this, it’s early December, and try as I might, I can’t remember what my new year’s resolution was last time around. One thing I can say with near hundred percent certainty is that whatever it was, I failed to keep it. Maybe you’re the same. Maybe you resolved to quit smoking, lose weight, or read more. We all make promises with ourselves, then fail to keep those promises. Worst of all, those promises might be exactly what we need most. Consider this: When was the last time you backed up your computer files Last month Last year Never
With the advent of Service Pack 2 for Windows XP operating system, Microsoft have really made the forums hum.
Tops In Toolbars
Most internet marketers are aware of, and probably use, the Google Toolbar. After all, it has been the only indicator of Googles PageRank number that has been assigned to a given web page. Whether the number is accurate, important, or even updated any more is a matter of debate on the marketing forums. But the only feature that was really worthwhile for more casual surfers, other than being able to use the Google search box directly, was the popup window blocker feature, which oddly enough, is the least favorite feature of many an internet marketer. But for many surfers now, the Yahoo Toolbar may well be a better choice. A 3 megabyte download for computers running Windows 98 or higher and Internet Explorer 5.0 or higher, the Yahoo Toolbar not only offers greater interactivity with Yahoo and My Yahoo, but now offers some benefits for your PC as well.
Ten Steps To A Well Optimized Website - Step 10: The Extras
Welcome to part ten in this search engine positioning series. Over the past nine weeks we have covered the nine fundamental steps to a proper search engine positioning campaign. From choosing keywords and writing content to optimizing your pages and building quality links we have covered the required steps to attaining solid rankings that will last. In part ten we will cover the extras.
Beware of the Newest Activity Online… Phishing.
No. I’m not talking here about the outdoor activity enjoyed by many. And no again; I did not misspell it. Phishing is the name given to the latest online scam where millions of unwary Americans are getting their identities stolen.
Protect Yourself with a Porn Filter
The harmful affects of pornography use and addiction are well documented by science. As with most things in life, prevention is the most effective way to avoid ever having a problem with pornography.
The Year of Spyware
In retrospect, the year 2004 made significant milestones that will forever change the future of internet spyware related issues. Various spyware issues were addressed and a fast growing market evolved around spyware.
Is Your Web Browser Putting You At Risk
Its free, it comes with Windows and its used by approximately 94% of the Internet population. It also poses an unacceptable security risk. What am I talking about If you guessed Internet Explorer, youre right on the money. So, is your web browser putting you at risk If youre one of the 94% using Internet Explorer, the answer is a definite *yes*. By my math, quite a few people require critical information for protection.
What Does The Year Of The Rooster Have In Store For The Digital World
Roosters are supposedly deep thinkers—capable of handling any challenge, they are outspoken, aggressive, talented, and courageous.
Rogue Dialers - The Nets Latest Scamola!
If recent news stories concerning worms, trojans and security exploits within Microsofts Internet Explorer, left you feeling vulnerable, this will leave you terrified. PCs the world over are already being hit by a new breed of trojan type software called Rogue Dialers. More malevolent than most ordinary spyware, Rogue Dialers actually hijack the computers modem and then uses it to dial-up a premium rate telephone number, racking up huge telephone charges. Many Dialers operate whilst the victim is actively surfing the Net by dropping the current connection and then performing an automatic reconnection via a premium rate number. Most scary of all are the Dialers which connect themselves to a premium rate number while the victim is away from their machine, achieving this by detecting long periods of inactivity.
How To Stop Spyware From Infecting Your System
Spyware is becoming more and more of a problem. When I visit a cusomters site and inspect the computers I always find some kind of spyware on the system. I know that many people have been unaware of spyware, but hopefully now that the word is spreading that people will be more aware of the problem and setup a good defense. I get a get calls or questions to the effect of "Why is my computer running so slow I just bought the computer recently". Most of the time this is because of spyware. Spyware programs will load on boot up and take up your computer memory that will reduce your performance. I will go over my typical setup to prevent and battle spyware. This system works if all of the current spyware has been removed properly. I will leave that to another article.
Arm Yourself Against Snoops With Spyware Counterintelligence
Spyware is the cyber-equivalent of a peeping Tom. No one would think of sitting by while someone hide in the bushes watching their every move, so why do so many allow spyware snoops to moniter them online In some cases the answer is simple. They may not even know that they are being watched.
How To Stop Spam
Special Report: How to Stop Spam
Why Use Antivirus Software
This is a really simple question to answer – you need to use antivirus software to protect your own computer, and to prevent your computer from being used to pass on infections to other machines without your knowledge. If you use the internet and you don’t take precautions, you’re going to get infected. And you’ll infect others, including those you care about most like your friends, family, and business contacts because their information is in your email address book and other files on your computer.
Learn Simple Strategies That Will Stop Spammers From Bombarding Your Inbox!
Spam filter is the solution that most people resort when they try to steam the flood of junk mails and spam.
6 Essential Steps to Protect Your Computer On the Internet For Free
Recently one of my friends asked me to check out if his computer was infected by virus. He suspected because occasionally the computer was shut down automatically when connected to internet. My first thought was the Sasser worm 60 seconds auto count-down. As he uses Windows 98 second edition with IE5, the virus must be a Sasser variant.
Is Your Computer Sick
Viruses and spyware usually show up on your computer one of two ways.
How To Choose A Fire Wall Software Program
In the real world a "fire wall" is a fireproof wall that is built to stop the spread of fire from one part of a building to others. In the Internet world a firewall has a similar purpose in that it stops the spread of harmful viruses and attacks from entering your home or office network.
The End of Spyware
The US House of Representatives has recently passed the "Spy Act" - or to give it its full title - the Securely Protect Yourself Against Cyber Trespass Act. This aims to prevent software companies from installing spyware on users PCs without their knowledge, and anyone found guilty of breaching the act faces a fine of up to $3 million.
Are You Well Protected
Winter…the official start of the cold and flu season. Though, technically speaking, things got started a little early. Close to a million computers, mostly home PC users, have been infected.
|home | site map|