Computer security for most can be described in 2 words, firewall and antivirus.
Until recently could one install a firewall and an antivirus program and feel quite secure. The risk of something "bad" succeeding with infecting your computer or a hacker to breach your firewall was not likely.
This as internet was filled with computer completely without protection. Easier to attack or infect the completely open computer then fight all installed counter measurements. The viruses spread quickly and if you had protection, you where protected.
The new era has come.
But look around. Read about all new versions of spam control software, software firewalls, antivirus software and similar products.
Of course are they still a good protection against all the normal threats on internet, but the new main focus is the protection they offer against new threats.
Yes, they actually all try to come up with more and more cleaver ways of protecting you from threats not even present!
And how can they do this?
The answer is quite simple.
Most attacks and viruses use variations of known methods to attack or infect. And the new technologies that are being invented all search for "how things are done" instead of "exactly this or that".
How to find viruses.
The old way, a known virus can be found by using a signature, a known piece of code inside.
The new way, now they look for known actions certain viruses use to accomplish an infection or spreading.
How to recognize an attack.
The old way. Someone connecting to your computer in any way at all (stop them).
The new way, someone connecting via this protocol, to this port, more then 3 times per second and so on.
A couple of examples.
Norton Antivirus 2005 ? has, Internet Worm Protection. Panda Antivirus ? has, Trueprevent.
Other companies will follow and this will expand into other areas like firewalls and spam protection.
What's in it for you?
New protection will catch more virus, more attacks but they will most probably require more configuration from your side as well as a better understanding of how they work. And as always, a more complex system is more likely to give you problems.
So here you are, probably a bit more secure and with a bit more technical problems.
Kenth "The Designer" Nasstrom is the founder of The Designed Software Series. His software can be found at http://www.kndata.com and he also owns http://www.free-newslettertemplates.com as well as http://www.costa-rican-information.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Identity Theft is one of the most serious problems facing... Read More
Do you sometimes notice your computer running slower. Is your... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
If you have used a Windows machine for a while,... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
As more people are logging onto the Internet everyday, Network... Read More
Nowadays more and more people are using a computer. A... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
If you use emails actively in your communication, you must... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
A friend called me one day and asked if I... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Before you enter your name, address or any other data... Read More
Spyware is the most troublesome software to appear on the... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Phishing is the act of some individual sending an email... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Threats we ordinary Web users face online leave us no... Read More
There are ways to insure security though. You can get... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
They're out there. Individuals trying to make a quick buck... Read More
There are several basic concepts to keep in mind when... Read More
Huge number of spyware software applications are available in the... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
In the past I've never really paid much attention to... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Well, if that would have been said to me by... Read More
While clicking from site to site on the internet you... Read More
There are folks out there who use their powers for... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Fishing on the Internet has come a long way. However,... Read More
Before you enter your name, address or any other data... Read More
Long gone are the days that we could feel secure... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Computer infections can be broken up into 4 main categories... Read More
Identity Theft is one of the most serious problems facing... Read More
Spyware and adware are becoming major problems for online surfers... Read More
You'd better learn news from media, not from emails, security... Read More
Shopping for horse gifts or other gift items on the... Read More
If spyware were a person and he set himself up... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Security leaks can be a big problem for any site... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
There is no doubt that "how-to articles" have become a... Read More
As soon as almost all computer users already got used... Read More
P C. owners are constantly at risk from attacks by... Read More
Imagine my surprise when I received a phone call from... Read More
By browsing a web page, you could infect your computer... Read More
Microsoft routinely releases new security updates, many of which are... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Have you ever bought a product or service from the... Read More
You may not realize it, but as you are surfing... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
In recent days, I was one of the unfortunate persons... Read More
If you use the internet, you have probably been infected... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Internet Security |