This really chapped my lips...
I recently bought a new computer. Mine was getting old, had lost its whistle, and the few remaining bells didn't ding a nicely as they had in the past. Yep, it was time for a new state-of-the art dream machine with CD burner. DVD player, a bazillion gigabyte drive and more RAM than Rambo has. I whipped out my trusty credit card and told my local CompUSA to ring it up.
Well, needless to say I was enthralled. Blazing speed, working whistles, and bells that were more like the Big Ben gong! I could tear through spreadsheets with one CD/ROM tied behind my back. One day, about three months later, my Son came home form college. having heard all about my new pride and joy, he sat down behind the keyboard and fired that puppy up. He put it through its paces for about 30 minutes and then turned and said "It's nice Dad, but I thought it would be faster". HE THOUGHT IT WOULD BE FASTER? What was he, crazy? This box was so hot that it came with it's own fire department.
Then he started poking around the hard drive. "Dad", he said "You need an exterminator. Your PC is infested." "Infested with what, bugs?". "Nope", he said "Spyware". "Spy What?". "Spyware", he replied. And then he explained.
Even thought I had a good virus prevention utility installed, it didn't protect me against Spyware. Spyware, it seeks, are nasty little programs that get downloaded in similar fashion to the way a virus does. It can be attached to an email, or even one of those new talking E-Cards. it can hide in one of those "Click Here to close this window" boxes, or in any of seemingly a hundred other secret ways.
There are essentially two types of Spyware. The less dangerous type either causes lots of ads to pop up every time you go on the Internet, or records your shopping and surfing habits in order to report them back to Big Brother somewhere. Of course, these steal your PC's clock cycles, and cause your hard drive to get bloated, which ends up slowing your entire system down. The problem is, the loss of speed is gradual and you don't even know it's happening until Mr. Big Shot college kid comes along and tells you that your PC is slow.
OK, that's bad enough. But then, there is the second kind of Spyware. used by real spies, or at least the kind that want to steal your credit card and personal information so they can clean out your bank accounts and assume your identity. You know, the scary stuff that you're starting to hear about more and more.
So, what should I do? Did I need to reformat my hard drive? I hoped not because THAT was no walk in the park. Fortunately my college geek was up on the subject and took me to a site that specialized in safely removing Spyware. We downloaded and installed it in just a few minutes and then fired it up. Holey Schmolie, I was infested. After about 25 minutes of chunking and plunking, the software pronounced me fit and clean. Well, at least my PC was. We rebooted and Boom! All of the speed and performance that had gradually been lost slammed right back into life. Even my Son was impressed.
Folks, this Spyware is serious stuff. You can't afford to be wiped out by some cyber terrorist half way across the world. protect your PC, and your identity. You probably already are infested. There's only one way to know for sure, you need to check it out for yourself.
Steve Robichaud and Andrew Wroblewski have been involved in online sales and marketing since 1996. For more information on finding and removing Spyware from your PC, visit: http://spyware.pcwash.com
![]() |
|
![]() |
|
![]() |
|
![]() |
In the past I've never really paid much attention to... Read More
Business on the internet is getting down right shameless. This... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Having a good Spyware eliminator on your computer is vital... Read More
In recent days, I was one of the unfortunate persons... Read More
No longer are viruses the only threat on the internet.... Read More
Do you sometimes notice your computer running slower. Is your... Read More
The top five online scams on the Internet hit nearly... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Have you ever bought a product or service from the... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
At this point, if you've got the whole "turning the... Read More
They're out there. Individuals trying to make a quick buck... Read More
The average computer is packed with hidden software that can... Read More
My first experience with a spyware BHO based infection was... Read More
There are folks out there who use their powers for... Read More
Credit card fraud is a growing problem for online businesses... Read More
We all know that it's dangerous to use the same... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
With the Internet entering our lives in such an explosive... Read More
To blog or not to blog? Well, why not? Lots... Read More
Well, this is an article I never thought I would... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
When surfing the Internet you probably take your anonymity for... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Viruses are, however, not the only malicious software programs out... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Since its birth, the Internet has grown and expanded to... Read More
In today's times spyware is a very serious issue and... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Watching how the traditional media covers the latest virus or... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
As more people are logging onto the Internet everyday, Network... Read More
This is the second in a series of articles highlighting... Read More
If spyware were a person and he set himself up... Read More
Let us take the example of scrambling an egg. First,... Read More
Long gone are the days that we could feel secure... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
If you run any type of Internet business, Adware and... Read More
Do you really have to know how feeds work? Not... Read More
We all know that it's dangerous to use the same... Read More
A couple of years back, I paid my dues the... Read More
This is not some new fangled techno-speak, it is a... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Internet scams and frauds are on the rise! The quantity... Read More
I am the victim of an internet scam. It is... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Before we start, I want to make it clear that... Read More
The average computer is packed with hidden software that can... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
P C. owners are constantly at risk from attacks by... Read More
In a word, no - an email message has always... Read More
By browsing a web page, you could infect your computer... Read More
Whether we like it or not, we are all living... Read More
As you know, this time the virus under the name... Read More
When we think of adware, what comes to mind are... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Internet Security |