One day, you suddenly realize that your computer started to work noticeably slower than it used to. You decide to run de-fragmentation of your hard drive and add more virtual memory to the system. No luck! May be, it's probably some viruses, you reckon turning on your virus scanning software. Even after running the anti-virus program you notice that the problem won't resolve. Not understanding what's happening frustrated you pick up the phone. It's time to call your tech-support. Sounds familiar? You are not alone! Each day, thousands of users are facing similar problems caused by malicious software called Spyware. According to Dell technical support, nowadays 12 percent of their support calls involve problems related to some kinds of Spyware. Microsoft reports that fifty percent of all computer crushes are caused by Spyware, viruses and Trojans.
What is a Spyware?
Spyware ? also named Malware or Adware ? are malicious software programs, which most of the time get installed on your computer without your knowledge. These programs are capable of doing many outrageous, sinister things to your computer such as changing computer settings, tracking your online behavior, monitoring and controlling your computer, recording your keystrokes, displaying unwanted advertisement and reporting needed information back to the person behind it.
The main types of Spyware are:
Key loggers: This type of Spyware copies everything you type to a file and send it to the hacker. The more sophisticated type, which is used for identity theft, copies the information you provide when you are connected to a secure website.
Browser hijacker: It modifies browser settings without your permission. This Spyware is capable of changing your start page, search page, search tool bar and redirect your url to specific pages.
Email redirector: Surreptitiously copies all your incoming and outgoing emails and sends to the hacker.
Dialers: This spyware install themselves to your dial-up settings and dials numbers without your knowledge, often to out of country numbers.
Collectware: The purpose of this Spyware is to track your surfing habit and transmitting the statistical data to the hacker. This information later gets sold to advertisement companies.
Adware: This Spyware downloads all sorts of banner advertisements every time you take some action such as typing a word on your search tool.
Why my antivirus program does not block a Spyware?
Although, Spyware uses same tactics like "Trojan" virus, technically it is not a virus. A virus is a program written to create trouble or possibly harm your computer system. Viruses are capable of replicate, evolve and cause severe damages to your computer files, registry or even hardware. Spyware, on the other hand, does not harm your computer intentionally. Any nuisance like system slow down is the collateral damage, which occurs while the Spyware serves its mission of monitoring your activities and making unwanted changes to your user experience.
People rarely read the fine prints of the user agreements while downloading a file, a program, a game or other free stuffs from the Internet. Unethical sites use this to their advantage and add tiny Spyware with the file you are downloading.
The anti-virus programs can not be sure, whether this program is installed deliberately by you or it's a malicious Spyware. This makes identifying and blocking a Spyware difficult for an Anti-virus program. However, things are started to change! Major anti-virus companies are planning to integrate anti-spyware programs to their existing products very soon.
How did I get infected with a Spyware?
There are numerous ways how you might end up with having a Spyware on your system.
- When you download and install programs, games, smilies, pictures, screensavers from dubious sites, there is a big chance that you might install a sneaky Spyware along the way.
- Some websites and pop-up windows try to download and install Spyware while you are there. According a recent analysis of sex-based websites, up to 80 percent of these sites are now being used to upload Spyware, worms and Trojans to unsuspecting visitors.
- Some add-ons to you browser that is supposed to enhance your browser experience may secretively install Spyware.
- The most cynical method of infecting you with Spyware is when you receive a sudden pop-up ad, which claims that your computer is contaminated and you have to run certain program to cure your system. If you are credulous enough to run this program, it just installs a Spyware instead of eliminating any.
How to fight back?
If you carefully follow the instructions outlined below, your chances of getting infected with Spyware are pretty slim.
Update your Windows Allow your version of Windows to update it automatically. Ensure that you have all the latest security patches installed.
Use Firefox as your default browser Since Internet Explorer is the main target for many Spyware, you will be better of with Mozilla Firefox. Moreover, it is a better browser than IE in many aspects.
Be extremely careful with your downloads Try not to download anything from a unknown site. If you still feel like getting a shareware or freeware program check it out on one of these online Spyware database. Spychecker (http://www.spychecker.com/) is one such service, and Camtech 2000's Spy Chaser (http://camtech2000.net/Pages/SpyChaser.html) is a nifty downloadable database of nearly 1000 spyware-infested programs.
Use an Anti-Spyware application Download and install one of the following anti-spyware programs: Ad-aware (http://www.lavasoftusa.com/software/adaware/), Spybot (http://www.safer-networking.org/en/spybotsd/index.html) and Microsoft AntiSpyware. Although, Microsoft's Anti-Spyware
(http://www.microsoft.com/athome/security/spyware/software/default.mspx) is still at beta stage, I am using it and very happy with its performance.
Get a Firewall If you are using Windows XP with Service Pack 2, you are probably fine! In other cases, if your computer is connected to the Internet directly you should get a firewall and install it. Zone alarm
(http://www.zonelabs.com/store/content/home.jsp) is a great firewall you can download for free.
A recently conducted survey of the Top Network Security threats in 2005 reveals that two-thirds of IT managers and administrators believe that Spyware will be the number one threat to network security. So don't take any chance! Make sure that you are protected!
Nowshade Kabir is the founder, primary developer and present CEO of Rusbiz.com. A Ph. D. in Information Technology, he has wide experience in Business Consulting, International Trade and Web Marketing. Rusbiz is a Global B2B Emarketplace with solutions to start and run online business. You can contact him at mailto:nowshade[at]rusbiz.com http://ezine.rusbiz.com
MS CRM is very close to document workflow automation, including... Read More
IBM Lotus Notes with Domino email server is traditional document... Read More
Microsoft CRM and IBM Lotus Notes Domino seem to be... Read More
Learning how to program software seems like a daunting task... Read More
What is Snort?Snort is an open source network intrusion detection... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
In order to meet regulatory and corporate compliance requirements reporting... Read More
Words we choose to describe things and phenomena often show... Read More
The first topic we are going to discuss... Read More
Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More
Lotus Domino/Notes ? Microsoft Great Plains tandem as ERP with... Read More
Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More
In linux, one of great commands for finding out information... Read More
Microsoft Business Solutions is emerging as very attractive vendor for... Read More
In our opinion, traditional approach when you select ERP/MRP system... Read More
Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More
Microsoft Retail Management System serves retail single store as well... Read More
Mike Dunville* had a decision to make. As the new... Read More
Every day millions of new web documents emerge on the... Read More
Microsoft Business Solutions Great Plains is very popular ERP/MRP applications... Read More
Microsoft Business Solutions ? Great Plains is designed to meet... Read More
Microsoft Great Plains is now standard mid-market ERP application, serving... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
One of the main reasons business owners and entrepreneurs use... Read More
When making a decision to buy any piece of software... Read More
All your software is stored on a hard-drive. But how... Read More
There are certain pluses and minuses in both cases and... Read More
Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More
Logistics automation is often considered as barcoding extension to Sales... Read More
Lotus Notes Domino is very efficient in electronic document workflow... Read More
Around the same time Microsoft made its move with .Net... Read More
If you've been using MySQL database to store your important... Read More
Finding the best spyware removers to detect and remove spyware... Read More
Best Software Act! is very popular CRM for small and... Read More
I like my software simple. If it's too complex or... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
If you've been using MySQL database to store your important... Read More
Microsoft Business Solutions Great Plains has I'd say end user... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
Document Manager and Version HistoryIn previous articles I have discussed... Read More
Shareware is software that you can try before you buy;... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
There are several kinds of software piracy. The bottom line... Read More
In the early days of the personal computer, we're talking... Read More
We will base our prognosis on our Microsoft Business Solutions... Read More
SOFTWARE PIRACY We regularly hear reports... Read More
There are so many different programs that clutter up your... Read More
In this short FAQ style article we would like to... Read More
In our case ? we serve Microsoft Business Solutions ERP... Read More
Microsoft Great Plains as ERP and Microsoft CRM as... Read More
I started using PIP (Picture It Publishing) Platinum 2002 right... Read More
Since Version 8.0 Microsoft Business Solutions Great Plains & Great... Read More
Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More
Great Plains Integration Manager scripting and translation - overview for... Read More
When Great Plains Software introduced the first graphical accounting application... Read More
IBM Lotus Domino or Microsoft Exchange?The severe competition continues for... Read More
Midsize business or non-profit organization should decide if one-vendor solution... Read More
GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More
If you have Microsoft Great Plains as main accounting and... Read More
When it comes to running an office, the SOHO entrepreneur... Read More
If your company has regional and worldwide operations, you might... Read More
I have always regretted how Microsoft price gouges and rips... Read More
The Software 2005 conference is now a wrap. This conference,... Read More
All of us know that Microsoft bought former Great Plains... Read More
There are certain pluses and minuses in both cases and... Read More
TCO (Total Cost Ownership) is the buzzword in... Read More
Software |