Viruses, Trojans and Spyware: Protecting yourself.
No user on the internet is safe from assault. Viruses, Trojans and Spyware can all effect your computer by placing annoying ads, tracking your credit card numbers, or even slow it down to a certain extent it is deemed no longer usable. By following through these simple steps, you can help protect yourself from the internet.
High CPU Usage: If your computer seems to be slower than usual, it is very likely that you have been infected. Background services can slow down your computer, and to check performance, enter Task Manager (Ctrl+Alt+Delete). Then, click on the processes tab. You will be able to see active processes that are running. To find what should be running on your computer, visit http://www.theeldergeek.com/services_guide.htm.
Check your level of protection: A good way to know whether you are safe or not is by using security tools. Here are some you should try out: NeWT 2.1: This is a very simple tool to use, and it scans for more than 4000 common security vulnerabilities. Download NeWT here: http://www.tenablesecurity.com/newt.htm Sumantec security check: This is a free service provided by Symantec. Simply visit here (www.sumantec.com), then select Scan for Security Risks. It will only tell you what vulnerabilities you have, but however it won't tell you how to fix them. Infinitive! Port Scanner: Our very own online port scanner! http://infinate.x10hosting.com/phport
Update Yourself: Install all the latest update possible. Service Pack 2 is a good way to start if you're running Windows XP. Enable Automatic Updates, and make sure you have the latest updates on your PC.
Safe Surfing: Due to Internet Explorer's high popularity, it is usually safe to change altogether. A common program now is known as FireFox (www.mozilla.com/products/firefox), which is fast, responsive and similar to Internet Explorer. However a major flaw with FireFox is that you will need to install additional plug-ins in order for you to view certain pages.
Make Regular Backups: Prepare for the worst. Make regular backups of your important files and store them on a type of offline storage.
Don't open suspicious links: If you are sent a link you are not sure about, do not open them, Simple. Another good way is to avoid suspicious sites altogether. Many programs too, bundle with spyware, so when you download them make sure they are stated "Freeware", nothing else.
Program Protection: Use Anti-Virus and Firewall software. McAfee is a highly recommended product over Symantec, but there are also other free anti-virus/firewall software online such as NOD32. http://www.nod32.com/
If you have been infected: Find cleaning instructions online on sites such as http://vil.nai.com. It will tell you where to locate your infection, and where to find and remove it. System Restore is also a good option on Windows XP. To use System Restore, go to Start, All Programs, Accessories, System, System Restore. Simply click a restore point and reboot.
You can also remove viruses using the programs listed under Program Protection. To remove Spyware, Spybot S&D (http://www.safer-networking.org/en/index.html) is a free yet useful tool to use.
All articles are written by Infinitive!
Infinitive! http://www.infinate.x10hosting.com You may reproduce and use this article just so long as you add a link (http://www.infinate.x10hosting.com) down at the bottom.
Infinitive! All the latest articles, tools, news, file hosting and more!
Scams involving email continue to plague consumers across America, indeed... Read More
Identity theft rates one of the fastest growing crimes in... Read More
When it comes to a secure website and passwords it... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Threats we ordinary Web users face online leave us no... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Have you ever had to call Symantec or McAfee to... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Paypal is a great site and is used by many... Read More
It's late. You've been scouring the web for that perfect... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
If you have used a Windows machine for a while,... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
A friend called me one day and asked if I... Read More
In the past I've never really paid much attention to... Read More
P C. owners are constantly at risk from attacks by... Read More
Millions of people make purchases online, but many people are... Read More
The money being spent online is steadily growing. With billions... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Huge number of spyware software applications are available in the... Read More
History and BackgroundThe virus was one of the first ever... Read More
These six ways to prevent identity theft offer you valuable... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Well, if that would have been said to me by... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Phishing is a relatively new form of online fraud that... Read More
History and BackgroundThe virus was one of the first ever... Read More
Every now and then you can read about a new... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Do you really have to know how feeds work? Not... Read More
Whether we like it or not, we are all living... Read More
I got a virus the other day, Thursday I believe... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Before you enter your name, address or any other data... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Working from home has its advantages, including no commute, a... Read More
The average computer is packed with hidden software that can... Read More
Paypal is a great site and is used by many... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
There you are busily typing away on your PC or... Read More
As you know, this time the virus under the name... Read More
Nowadays more and more people are using a computer. A... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
We all get the odd virus now and then, but... Read More
When it comes to reporting Internet scams most of us... Read More
File sharing on p2p is soaring despite the music and... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Internet Security |