It is possible that if one avoided all sources of spyware, ad-ware and virus infection that infection would be at minimal levels. Although I don't recommend using only this method as a form of fighting spyware, it can be a potentially effective mean. Used in conjunction with a virus scanning program (I recommend Avast), abstaining from visiting these web sites or using these programs will help your PC to fight off infections, infestations and slower speeds due to unneeded running processes.
The most common places where your PC will pick up spyware, ad-ware and viruses will be adult websites or websites related to security. By security, I mean websites related to computer hacking and the like. If you partake in software piracy, you will notice that many of these websites that are piracy download zones have javascripts and cookies running that download software to your computer unknowingly. They usually come in the form of cookies. If you run a good virus program while you visit these sites, your virus program will most certainly warn you to "abort the connection" or "terminate the script." This means a server-side script is running to put spyware in the form of cookies onto your hard drive.
Another good spot to accumulate spyware, especially trojans, is peer to peer file sharing software. Such programs like Bearshare, ARES, Kazaa, etc. have been known to be breeding grounds for trojan horses and keyloggers for sometime. I recommend if you decide to use these programs, you use the "lite" version of the program. Lite versions of said programs have been scaled down in memory usage and the like. They will still operate just as well as the full program, but your computer will like you better for not subjecting it to unknown dangers.
And alas, the final spot of interest would be chain mail letters with attachments. These annoying buggers are usually sent to you by friends with too much time on their hands. Some people become addicted to chain mail letters; they send out every single one they receive. These letters sometimes can have viruses in their attachments, but because the average computer user does not realize it, he or she is spreading a virus. ALSO NOTE: Chain mail letters have been known to connect pedophiles with their prey. This is because the person who receives the letter can trace it back to every single person who has read it. Notice a chain mail letter has tens, maybe hundreds of e-mail addresses upon it, and sometimes these belong to young people (as young people make up a large portion of Internet users). Use a virus scanning program that checks your incoming mail (Avast will do this), and use something like NetNanny to make sure your kids have no strange men or women talking to them on MSN messenger.
I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
Now that spyware is the single most dangerous threat to... Read More
Imagine something that follows you home and sets itself up... Read More
The term "document management" and "paperless office" is the subject... Read More
1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More
C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More
Now there are Three Steps To Heaven Just listen and... Read More
Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More
Microsoft Great Plains as ERP and Microsoft CRM as... Read More
If someone entered your home, uninvited and installed numerous cameras... Read More
Stealing company information used to be the specialty of spies... Read More
Whether you have used Microsoft Word for years, have just... Read More
Every day millions of new web documents emerge on the... Read More
Combining Microsoft Business Solutions Great Plains ERP with non-Microsoft Business... Read More
Microsoft Business Solutions Great Plains has many years of successful... Read More
Intro This concise article will tell you in plain English... Read More
eStore Advantage allows front-office applications to communicate with back-office business... Read More
We've all seen the ads on TV for Netzero 3G.... Read More
Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More
IBM Lotus Domino or Microsoft Exchange?The severe competition continues for... Read More
For a windows user like me, just can watch with... Read More
If you have Microsoft Great Plains as main accounting and... Read More
Innovative Maintenance Systems (IMS) is one company that offers solutions... Read More
Remember back in the days where screensavers were the coolest... Read More
1. What determines the software price? Is it Per Seat... Read More
So, you've bought a new Macintosh, and now you may... Read More
Is Photoshop CS2 worth the upgrade? You bet it is!... Read More
Microsoft PowerPoint has dramatically changed the way in which academic... Read More
Adobe Photoshop is one of the world's leading graphics editing... Read More
Microsoft Business Solutions Great Plains, Solomon, Navision, Axapta, Microsoft CRM... Read More
This article illustrates the best practices to improve the performance... Read More
Having from five to ten and more favorite screensavers is... Read More
We are in a transition phase in the Managerial Administration... Read More
IntroductionPHP can be used for a lot of different things,... Read More
An operating system (abbreviated OS) is essentially the path through... Read More
Does Microsoft care for WebmastersIt's always been a problem with... Read More
Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More
If someone entered your home, uninvited and installed numerous cameras... Read More
If you are in a business that passes documents around... Read More
Cyberspace has opened up a new frontier with exciting possibilities... Read More
Google Inc. has launched a new software package that allows... Read More
Passwords protect your most sensitive personal, financial and business information.... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
There are several kinds of software piracy. The bottom line... Read More
If you company is small or mid-size special products or... Read More
Microsoft CRM is winning market share step-by-step from such the... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
We were recently faced with a decision: either to let... Read More
Microsoft CRM is relatively new player on the now becoming... Read More
ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More
Best Software Act! is very popular CRM for small and... Read More
SAP Inc., a global leader in client/server enterprise application software... Read More
Although statistics often is blamed for various deadly sins --... Read More
2005 ? Back to the Future.What does the future hold?... Read More
Many Webmasters have never bothered to view their website's server... Read More
ERP Consulting industry is on the way to serve clients... Read More
Are you a database professional? Do you work with a... Read More
While Ukraine is becoming a new popular IT outsourcing destination,... Read More
Whether you need to close a sale, gather end-user feedback,... Read More
IntroductionDuring the early years of our modern computer era, very... Read More
Microsoft Great Plains might be considered as ERP platform to... Read More
Microsoft CRM is CRM answer from Microsoft Business Solutions.The whole... Read More
Stealing company information used to be the specialty of spies... Read More
It's no secret that software companies operate in a very... Read More
Vince Lombardi once said that, "The achievements of an organization... Read More
There is many things more frustrating than surfing a website... Read More
Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More
Software |