How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to employ software, along with our intelligence, to prevent viruses and spyware. To put this article into proper perspective, we'll use Medieval defense tactics.

This is accomplished by 3 methods. First, a firewall... 'The Castle Moat' so to speak. A firewall can't see inside your computer beforehand though, so if any viruses or spyware were present before the firewall was installed then its of no use. Of course, its extremely good at preventing new attacks.

Second, a anti-virus program.... 'The Castle Drawbridge! They will not provide much help with spyware, but good virus protection is as desirable as one of Avaris's dreams! One drawback can be the updates, of course.If you've just updated Wednesday night and a virus hits the next day, then you may not be protected till next Wednesday night, and by then it may be too late. If you're smart, you will have signed up for email alerts with the provider, or even better, you'll have a anti-virus program that has a real time update feature. I get the tingles when I see that little pop-up saying a update is available and click here. Its downloaded ,installed, and updated in about 20 seconds! A new virus or Trojan or God forbid, a new keylogger can hit the internet and spread in a matter of days, and I'm sure this must make the definition writers lives a living hell. I have great admiration for them as they could have been wealthy doctors, but they have chosen to help us... the end users. (moment of silence here)

Last, we have anti-spyware programs,'The Flaming oil'! (my favorite). Their update features are like the anti-virus programs, so you have to be as vigilant with this method of defense too as you would be with the others. I've heard there are people out there that don't even know when their updates run, or even if its configured to do so! I refuse to believe this sordid rumor!

So you've got your defenses set up, you're looking good. But the best defense is a good offense, attack! That's what some organizations do. They prowl the net looking for websites that harbor drive-by downloads, URL Re-Directing and such. When they find them, they shut them down, or report them so effective protection can be manufactured. These people have my sincere thanks for what they do. With identity theft on the rise and Websense reporting that the average computer has 28 items of Spyware on it, we need all the help we can get. Oh sure, you're saying not my computer ! Well, lets discuss those little boxes that you click "I Agree" to when you download something. Do you read the entire statement? This is one way spyware has become so rampant, because so many downloads have extra software included in them. These can be harmful to your computers well being. KeyLoggers, popups, adware, malware...

Need I go on?

So my idea is that we need these shining knights from the castle to journey forth on a quest. They will be little robots or spiders like the search engines use. They will be given absolute power over harmful programs they find. They will be like Gort in the movie "The Day the Earth Stood Still".

Dell recently reported that 12% of their calls were for spyware damage, Microsoft says half of their reports of system crashes are caused by spyware. These calls cost these companies millions of dollars in revenue, which they then pass the costs of onto us, the consumers.

Who knows, if viruses and spyware ever get controlled, the average computer may only cost a dollar!

About the Author: Doug Woodall has a web site at http://www.spywarebiz.com There he provides free information and recommended products to combat Spyware.

His Website is recognized by Learning Fountain and ISafe Doug's Articles have earned him Trusted Author Status at ImpactArticles.com He is a member of the IWA (International Webmasters Association) Article edited for proper content by Wendy McCallum Permission to copy ok as long as about author info remains with article.

Copyright 2005 SpywareBiz

In The News:


pen paper and inkwell


cat break through


Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

What Can Be Done About Spyware And Adware

Having a good Spyware eliminator on your computer is vital... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More