It is possible that if one avoided all sources of spyware, ad-ware and virus infection that infection would be at minimal levels. Although I don't recommend using only this method as a form of fighting spyware, it can be a potentially effective mean. Used in conjunction with a virus scanning program (I recommend Avast), abstaining from visiting these web sites or using these programs will help your PC to fight off infections, infestations and slower speeds due to unneeded running processes.
The most common places where your PC will pick up spyware, ad-ware and viruses will be adult websites or websites related to security. By security, I mean websites related to computer hacking and the like. If you partake in software piracy, you will notice that many of these websites that are piracy download zones have javascripts and cookies running that download software to your computer unknowingly. They usually come in the form of cookies. If you run a good virus program while you visit these sites, your virus program will most certainly warn you to "abort the connection" or "terminate the script." This means a server-side script is running to put spyware in the form of cookies onto your hard drive.
Another good spot to accumulate spyware, especially trojans, is peer to peer file sharing software. Such programs like Bearshare, ARES, Kazaa, etc. have been known to be breeding grounds for trojan horses and keyloggers for sometime. I recommend if you decide to use these programs, you use the "lite" version of the program. Lite versions of said programs have been scaled down in memory usage and the like. They will still operate just as well as the full program, but your computer will like you better for not subjecting it to unknown dangers.
And alas, the final spot of interest would be chain mail letters with attachments. These annoying buggers are usually sent to you by friends with too much time on their hands. Some people become addicted to chain mail letters; they send out every single one they receive. These letters sometimes can have viruses in their attachments, but because the average computer user does not realize it, he or she is spreading a virus. ALSO NOTE: Chain mail letters have been known to connect pedophiles with their prey. This is because the person who receives the letter can trace it back to every single person who has read it. Notice a chain mail letter has tens, maybe hundreds of e-mail addresses upon it, and sometimes these belong to young people (as young people make up a large portion of Internet users). Use a virus scanning program that checks your incoming mail (Avast will do this), and use something like NetNanny to make sure your kids have no strange men or women talking to them on MSN messenger.
I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Currently Microsoft Business Solutions is on the way of creating... Read More
Language development computer: Computer-based method for aiding language development seems... Read More
Preventive Maintenance (PM) is defined as scheduled work done on... Read More
Spyware is software or hardware installed on a computer without... Read More
When my daughter was getting into AOL instant messaging (AIM)... Read More
A UNIX Shell is in simplest terms, a command line... Read More
In this small article we will be looking at the... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
This is a short article, written in question/answer/FAQ style to... Read More
A LOT OF UNWANTED FILES.When you uninstall an item of... Read More
Every day millions of new web documents emerge on the... Read More
I started using PIP (Picture It Publishing) Platinum 2002 right... Read More
When it comes to screenplay software each screenwriter needs to... Read More
While paper labeling CDs and DVDs may appear to be... Read More
While several preventive maintenance software manufacturers offer free trials for... Read More
With any good luck and a good amount of hard... Read More
Most people don't use Photoshop to its fullest capabilities. Here... Read More
What is a Web Database?A web database is a database... Read More
RSS (Really Simple Syndication) is a way for a site... Read More
Microsoft Business Solutions CRM is now approaching the phase of... Read More
We would like first emphasize the change in the paradigm.... Read More
Navision Software was purchased by Microsoft and now it is... Read More
1. With mapping software you can create a report that... Read More
Let's say that you have a software project that's under... Read More
OEComplete is a utility for managing the personal information of... Read More
Microsoft CRM is new player on the CRM software... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
FTP stands for "file transfer protocol". FTP is basically a... Read More
If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More
Looks like Microsoft Great Plains becomes more and more... Read More
We've all seen the ads on TV for Netzero 3G.... Read More
MS CRM is very close to document workflow automation, including... Read More
When making a decision to buy any piece of software... Read More
For those who are unclear on the differences between the... Read More
SyncUp, a file synchronizer is designed to assist the home... Read More
ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More
Are you lost in the mess of documents that get... Read More
Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More
The Software 2005 conference is now a wrap. This conference,... Read More
Do you remember that frustrating feeling when you find an... Read More
Stealing company information used to be the specialty of spies... Read More
XML parser is a software module to read documents and... Read More
Microsoft Business Solutions Great Plains serves multiple industries in the... Read More
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
Microsoft has never released a service pack for Windows98 SE,... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
Now that spyware is the single most dangerous threat to... Read More
In this small article we will be looking at the... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Every day millions of new web documents emerge on the... Read More
Microsoft CRM ? Client Relationship Management package from Microsoft Business... Read More
What is IRC?IRC is Internet Relay Chat. It is a... Read More
If you are to buy a HelpDesk & Asset Management... Read More
Our hosted solution allow you to run your own search... Read More
... Read More
During the years of our consulting practice, which comes back... Read More
Introduction: The creating of a computer program involves a number... Read More
Shareware is software that you can try before you buy;... Read More
Microsoft Business Solutions CRM and IBM Lotus Notes Domino, being... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
Homeland security, airport security, Internet security â?" these days weâ??re... Read More
Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
There are two major WYSIWYG(What You See Is What You... Read More
Remember nice and prosperous Clinton era? When you implemented innovative... Read More
Microsoft Business Solutions CRM is now approaching the phase of... Read More
Software |