A New Era of Computer Security

Computer security for most can be described in 2 words, firewall and antivirus.

Until recently could one install a firewall and an antivirus program and feel quite secure. The risk of something "bad" succeeding with infecting your computer or a hacker to breach your firewall was not likely.

This as internet was filled with computer completely without protection. Easier to attack or infect the completely open computer then fight all installed counter measurements. The viruses spread quickly and if you had protection, you where protected.

The new era has come.

But look around. Read about all new versions of spam control software, software firewalls, antivirus software and similar products.

Of course are they still a good protection against all the normal threats on internet, but the new main focus is the protection they offer against new threats.

Yes, they actually all try to come up with more and more cleaver ways of protecting you from threats not even present!

And how can they do this?

The answer is quite simple.

Most attacks and viruses use variations of known methods to attack or infect. And the new technologies that are being invented all search for "how things are done" instead of "exactly this or that".

How to find viruses.

The old way, a known virus can be found by using a signature, a known piece of code inside.

The new way, now they look for known actions certain viruses use to accomplish an infection or spreading.

How to recognize an attack.

The old way. Someone connecting to your computer in any way at all (stop them).

The new way, someone connecting via this protocol, to this port, more then 3 times per second and so on.

A couple of examples.

Norton Antivirus 2005 ? has, Internet Worm Protection. Panda Antivirus ? has, Trueprevent.

Other companies will follow and this will expand into other areas like firewalls and spam protection.

What's in it for you?

New protection will catch more virus, more attacks but they will most probably require more configuration from your side as well as a better understanding of how they work. And as always, a more complex system is more likely to give you problems.

So here you are, probably a bit more secure and with a bit more technical problems.

Kenth "The Designer" Nasstrom is the founder of The Designed Software Series. His software can be found at http://www.kndata.com and he also owns http://www.free-newslettertemplates.com as well as http://www.costa-rican-information.com

In The News:


pen paper and inkwell


cat break through


Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Online Cell Phone Scams and Spam

They're out there. Individuals trying to make a quick buck... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More