Computer security for most can be described in 2 words, firewall and antivirus.
Until recently could one install a firewall and an antivirus program and feel quite secure. The risk of something "bad" succeeding with infecting your computer or a hacker to breach your firewall was not likely.
This as internet was filled with computer completely without protection. Easier to attack or infect the completely open computer then fight all installed counter measurements. The viruses spread quickly and if you had protection, you where protected.
The new era has come.
But look around. Read about all new versions of spam control software, software firewalls, antivirus software and similar products.
Of course are they still a good protection against all the normal threats on internet, but the new main focus is the protection they offer against new threats.
Yes, they actually all try to come up with more and more cleaver ways of protecting you from threats not even present!
And how can they do this?
The answer is quite simple.
Most attacks and viruses use variations of known methods to attack or infect. And the new technologies that are being invented all search for "how things are done" instead of "exactly this or that".
How to find viruses.
The old way, a known virus can be found by using a signature, a known piece of code inside.
The new way, now they look for known actions certain viruses use to accomplish an infection or spreading.
How to recognize an attack.
The old way. Someone connecting to your computer in any way at all (stop them).
The new way, someone connecting via this protocol, to this port, more then 3 times per second and so on.
A couple of examples.
Norton Antivirus 2005 ? has, Internet Worm Protection. Panda Antivirus ? has, Trueprevent.
Other companies will follow and this will expand into other areas like firewalls and spam protection.
What's in it for you?
New protection will catch more virus, more attacks but they will most probably require more configuration from your side as well as a better understanding of how they work. And as always, a more complex system is more likely to give you problems.
So here you are, probably a bit more secure and with a bit more technical problems.
Kenth "The Designer" Nasstrom is the founder of The Designed Software Series. His software can be found at http://www.kndata.com and he also owns http://www.free-newslettertemplates.com as well as http://www.costa-rican-information.com
Spyware/adware is a new major concern for PC users everywhere.... Read More
Have you ever bought a product or service from the... Read More
First of all we need to get some terms stated.... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Millions of people make purchases online, but many people are... Read More
The top five online scams on the Internet hit nearly... Read More
Having a good Spyware eliminator on your computer is vital... Read More
When we think of adware, what comes to mind are... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
There you are busily typing away on your PC or... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Paypal is a great site and is used by many... Read More
This is the second in a series of articles highlighting... Read More
Spyware is software that runs on a personal computer without... Read More
File sharing on p2p is soaring despite the music and... Read More
I got a virus the other day, Thursday I believe... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
A little bit of time invested into learning about internet... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Only the top spyware removers are successful at detecting and... Read More
When the Internet first came about, it was realized it... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
P C. owners are constantly at risk from attacks by... Read More
My first experience with a spyware BHO based infection was... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
So called phishers try to catch the information about the... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Have you ever had to call Symantec or McAfee to... Read More
I got a virus the other day, Thursday I believe... Read More
If spyware were a person and he set himself up... Read More
This is the second in a series of articles highlighting... Read More
Every day millions of people go online to find information,... Read More
File sharing on p2p is soaring despite the music and... Read More
A friend called me one day and asked if I... Read More
Spyware is the most troublesome software to appear on the... Read More
When it comes to reporting Internet scams most of us... Read More
While clicking from site to site on the internet you... Read More
Spyware is software or hardware installed on a computer without... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Do you really have to know how feeds work? Not... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
There is no doubt that "how-to articles" have become a... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Over £5 billion pounds was spent on online shopping in... Read More
You are at your computer, checking out software on EBay.... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Nobody wants to pay to remove spyware. At the very... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
This is the second in a series of articles highlighting... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Much has been said on the theory of password protection... Read More
This really chapped my lips...I recently bought a new computer.... Read More
When the Internet first came about, it was realized it... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Paypal is a great site and is used by many... Read More
The money being spent online is steadily growing. With billions... Read More
Internet Security |