Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and other invasions?

The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties.

That's the bad news.

The good news is that you can clean up and protect your computer against almost all of these undesirable intruders.

The first thing you need to do is download a program called Mozilla Firefox. It's a newer and better browser than anything offered by those guys in Seattle. For one thing, hackers have been concentrating their efforts on Microsoftâ products like Internet Explorerâ and MSN Explorerâ. This makes these browsers more likely to be attacked, whereas Firefox, at least as of this writing, seems more secure. And it does offer great popup protection.

Another thing you will like about Firefox is a feature called Tabs that lets you have numerous Web pages up at the same time with the ability to click back and forth between them. For example, you could have your favorite site, eBay's home page, a phone number directory, the Merriam-Webster Dictionary, and your favorite blog all loaded at the same time ? then just click amongst them as the moment moves you.

Here's what you'll really like about Firefox. It's free from the Mozilla.org, which is a sort of consortium of public-minded software engineers who develop and distribute freeware (free software). Mozilla is also responsible for a great, free email program called Thunderbird.

Thunderbird is a fast and efficient way to get and send email and has great spam filters. I've personally been using it for more than a month and haven't gotten a single piece of spam mail to date. Compare this with the stuff you get when you use other free email services such as MSN Hotmail.

Before you install either of these programs, you will want to rid your computer of any nasty software it has fallen victim to. A good way to do this is to download another great, free program, Ad-Aware SE from Lavasoft (Lavasoft.com). This program detects and eliminates objects such as a registry invasion. The Webopedia defines your registry file as "a database used by the Windows operating system (Windows 95 and NT) to store configuration information." A registry invasion happens when a "free" program changes your registry to automatically load spyware or some undesirable program. For example, a Web site called I-Mesh allows you to download free programs, share files, and search for music and videos ? but will alter your registry file to incorporate a service called GAINâ (GAIN Publishing) that you may find very annoying.

Ad-Aware will also find and eliminate known data-mining programs, aggressive advertising, parasites, and scumware, as well as selected traditional trojans, dialers, malware, browser hijackers, and tracking components.

You can also find and eliminate spyware with a program called Spybot Search & Destroy. It's available free at spybot.info/en/index.html. Install this program and then click on Search & Destroy and it will scan your hard drive in a matter of moments and then show you a list of "problems" it has found. It also tells you the type of problem, for example, "registry change."

Once the scan completes, all you have to do is click on a button titled "Fix selected problems." Spybot will first create a restore point (in case you delete something you wish you hadn't) and then fix all the problems that are check marked (if there is any problem you do not want fixed for some reason, just remove the checkmark next to it).

Finally, there is a great anti-virus program you can also get free. It is AVG Free Anti-virus and is available at Grisoft.com. AVG will scan your hard disk, then report and eliminate any viruses found. In addition, it automatically downloads information on new viruses from time to time to help keep you protected. This automatic download service is free as well.

Article by Douglas Hanna. Douglas is a retired advertising and marketing executive and long-time Denver resident. He is the webmaster of http://www.all-in-one-info.com, a free resource for information on a variety of subjects. Please visit his site to subscribe to his free newsletter, "Tips & Tricks to Save Money & Live Better."

In The News:


pen paper and inkwell


cat break through


Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More