A New Era of Computer Security

Computer security for most can be described in 2 words, firewall and antivirus.

Until recently could one install a firewall and an antivirus program and feel quite secure. The risk of something "bad" succeeding with infecting your computer or a hacker to breach your firewall was not likely.

This as internet was filled with computer completely without protection. Easier to attack or infect the completely open computer then fight all installed counter measurements. The viruses spread quickly and if you had protection, you where protected.

The new era has come.

But look around. Read about all new versions of spam control software, software firewalls, antivirus software and similar products.

Of course are they still a good protection against all the normal threats on internet, but the new main focus is the protection they offer against new threats.

Yes, they actually all try to come up with more and more cleaver ways of protecting you from threats not even present!

And how can they do this?

The answer is quite simple.

Most attacks and viruses use variations of known methods to attack or infect. And the new technologies that are being invented all search for "how things are done" instead of "exactly this or that".

How to find viruses.

The old way, a known virus can be found by using a signature, a known piece of code inside.

The new way, now they look for known actions certain viruses use to accomplish an infection or spreading.

How to recognize an attack.

The old way. Someone connecting to your computer in any way at all (stop them).

The new way, someone connecting via this protocol, to this port, more then 3 times per second and so on.

A couple of examples.

Norton Antivirus 2005 ? has, Internet Worm Protection. Panda Antivirus ? has, Trueprevent.

Other companies will follow and this will expand into other areas like firewalls and spam protection.

What's in it for you?

New protection will catch more virus, more attacks but they will most probably require more configuration from your side as well as a better understanding of how they work. And as always, a more complex system is more likely to give you problems.

So here you are, probably a bit more secure and with a bit more technical problems.

Kenth "The Designer" Nasstrom is the founder of The Designed Software Series. His software can be found at http://www.kndata.com and he also owns http://www.free-newslettertemplates.com as well as http://www.costa-rican-information.com

In The News:


pen paper and inkwell


cat break through


How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

I Spy...Something Terribly Wrong (In Your Computer)

This really chapped my lips...I recently bought a new computer.... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More