How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to employ software, along with our intelligence, to prevent viruses and spyware. To put this article into proper perspective, we'll use Medieval defense tactics.

This is accomplished by 3 methods. First, a firewall... 'The Castle Moat' so to speak. A firewall can't see inside your computer beforehand though, so if any viruses or spyware were present before the firewall was installed then its of no use. Of course, its extremely good at preventing new attacks.

Second, a anti-virus program.... 'The Castle Drawbridge! They will not provide much help with spyware, but good virus protection is as desirable as one of Avaris's dreams! One drawback can be the updates, of course.If you've just updated Wednesday night and a virus hits the next day, then you may not be protected till next Wednesday night, and by then it may be too late. If you're smart, you will have signed up for email alerts with the provider, or even better, you'll have a anti-virus program that has a real time update feature. I get the tingles when I see that little pop-up saying a update is available and click here. Its downloaded ,installed, and updated in about 20 seconds! A new virus or Trojan or God forbid, a new keylogger can hit the internet and spread in a matter of days, and I'm sure this must make the definition writers lives a living hell. I have great admiration for them as they could have been wealthy doctors, but they have chosen to help us... the end users. (moment of silence here)

Last, we have anti-spyware programs,'The Flaming oil'! (my favorite). Their update features are like the anti-virus programs, so you have to be as vigilant with this method of defense too as you would be with the others. I've heard there are people out there that don't even know when their updates run, or even if its configured to do so! I refuse to believe this sordid rumor!

So you've got your defenses set up, you're looking good. But the best defense is a good offense, attack! That's what some organizations do. They prowl the net looking for websites that harbor drive-by downloads, URL Re-Directing and such. When they find them, they shut them down, or report them so effective protection can be manufactured. These people have my sincere thanks for what they do. With identity theft on the rise and Websense reporting that the average computer has 28 items of Spyware on it, we need all the help we can get. Oh sure, you're saying not my computer ! Well, lets discuss those little boxes that you click "I Agree" to when you download something. Do you read the entire statement? This is one way spyware has become so rampant, because so many downloads have extra software included in them. These can be harmful to your computers well being. KeyLoggers, popups, adware, malware...

Need I go on?

So my idea is that we need these shining knights from the castle to journey forth on a quest. They will be little robots or spiders like the search engines use. They will be given absolute power over harmful programs they find. They will be like Gort in the movie "The Day the Earth Stood Still".

Dell recently reported that 12% of their calls were for spyware damage, Microsoft says half of their reports of system crashes are caused by spyware. These calls cost these companies millions of dollars in revenue, which they then pass the costs of onto us, the consumers.

Who knows, if viruses and spyware ever get controlled, the average computer may only cost a dollar!

About the Author: Doug Woodall has a web site at http://www.spywarebiz.com There he provides free information and recommended products to combat Spyware.

His Website is recognized by Learning Fountain and ISafe Doug's Articles have earned him Trusted Author Status at ImpactArticles.com He is a member of the IWA (International Webmasters Association) Article edited for proper content by Wendy McCallum Permission to copy ok as long as about author info remains with article.

Copyright 2005 SpywareBiz

In The News:


pen paper and inkwell


cat break through


Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

3 Things You Must Know About Spyware

1)Spyware is on your system. Like it or not, statistically... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

IPv6 - Next Step In IP Security

IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc.

Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft Human beings are pretty... Read More