Friday, September 30, 2005

How Do Wireless Networks Work?

By: John Maxim

Wireless networks work using radio waves instead of wires to
transmit data between computers. That's the simple version. If
you're curious to know what's going on in more detail, then it's
all explained in this article.

Ones and Zeros.

I'm sure you know that computers transmit data digitally, using
binary: ones and zeros. This is a way of communicating that
translates very well to radio waves, since the computer can
transmit ones and zeros as different kinds of beep. These beeps
are so fast that they're outside a human's hearing range --
radio waves that you can't hear are, in fact, all around you all
the time. That doesn't stop a computer from using them, though.

Morse Code.

The way it works is a lot like Morse code. You probably already
know that Morse code is a way of representing the alphabet so
that it can be transmitted over radio using a dot (short beep)
and a dash (long dash). It was used manually for years, and
became a great way of getting information from one place to
another with the invention of the telegraph. More importantly
for this example, though, it is a binary system, just like a
computer's ones and zeros.

You might think of wireless networking, then, as being like
Morse code for computers. You plug a combined radio receiver and
transmitter in, and the computer is able to send out its
equivalent of dots and dashes (bits, in computer-speak) to get
your data from one place to another.

All About Frequencies.

You might wonder, though, how the computer could possibly
transmit enough bits to send and receive data at the speed it
does. After all, there must be a limit on how much can be sent
in a second before it just becomes useless nonsense, right?
Well, yes, but the key to wireless networking is that it gets
around this problem.

First of all, wireless transmissions are sent at very high
frequencies, meaning that more data can be sent per second. Most
wireless connections use a frequency of 2.4 gigahertz (2.4
billion cycles per second) -- a similar frequency to mobile
phones and microwave ovens. As you might know, though, a
frequency this high means that the wavelength must be very
short, which is why wireless networking only works over a
limited area.

In addition, wireless networks make use of a technique known as
'frequency hopping'. They use dozens of frequencies in the range
they are given, and constantly switch between them. This makes
wireless networks more immune to interference from other radio
signals than they would be if they only transmitted on one
frequency.

Access Points.

The final step is when it comes to all the computers on a
network sharing Internet access. This is done using a special
piece of wireless equipment called an access point. Access
points are more expensive than wireless cards for one computer,
as they contain radios that are capable of talking to around 100
computers at the same time, and sharing out access to the
Internet between them. Dedicated access points are only really
essential for larger networks, though -- if you only have a few
computers, it is possible to use one of them as the access
point, or you could just get a wireless router.

They Understand Each Other.

That's all well and good, then, but how does wireless equipment
made by entirely different companies manage to work together
when this is all so complicated? Well, the answer is that there
are standards that all wireless devices follow. These standards
are technically called the 802.11 standards, and are set by the
IEEE (Institute of Electrical and Electronics Engineers). It is
thanks to people sticking to their standards that wireless
networking is so easy and cheap to use today.

You Don't Need to Worry.

If all this talk of frequencies has you a little worried, you
don't need to be -- wireless networking hardware and software
handles all of this automatically, without you needing to do a
thing. Don't think that you're going to have to tell one
wireless device what frequency another is using, because it's
just not going to happen, alright? Wireless networking, for all
its complicated workings, is really far more simple to use than
you'd ever expect.

About the author:
John is a world recognized expert on wireless networking and
network management. His blog can be found at
http://www.wirelessinternetonline.com.

Computer Do's and Don'ts

By: Phyllis Wasserman

Here are a few helpful pointers for your computer experience.

DON'T

Store personal information on your computer or PDA. Stored data
is always open to hackers. Consider storing passwords on CD's or
disks that you keep locked in a box or closet.

Shop on-line without being sure of two safety features. Check
the order page for the lock icon at the bottom. This way you
know the system is encrypted and your personal data if
transfered safely. The URL on the address bar should say
"https", the "s" stands for secure.

Store credit card information on a website. It may be more
convenient, but it's not safe.

Open or answer any unfamiliar e-mails. Just opening an email
with an attachment, can add a worm to your computer. If you
really think it might be from someone you know, hit reply and
ask them to identify themselves. If that doesn't work, you know
it's junk.

Fall for phishers. Phishing is a new scam. There are cyber
crooks looking for information. They ask for your credit card
numbers and social security information, phone numbers or even
email addresses. Never respond to these emails.

Use obvious passwords. Don't use anything connected to your
social security number. Don't use combinations of numbers and
letters. Don't use anything with your mother's maiden name or
your birth date.

DO

Use virus and spyware protection.

Without virus and spyware protection your computer is an open
door to hackers and virus spreaders. Norton and McAfee use the
most up-to-date anti-virus protection available. Always get
their security updates every 2 weeks.

Completely erase your hard drive, if you throw away or give away
your old computer. There are free downloadable programs to scrub
the system before you give or throw it away. Try Sure Delete by
(www.wizard-industries.com) and CodeTek's Safeshred Free for
Macs.

Use only one credit card on the internet

This way if your information falls into the wrong hands you can
cancel it. Always use a different credit card out in the "real
world."

And to be sure you are not a victim of identity theft, get a
copy (every year) of your credit report from all 3 major credit
bureaus.

Equifax (800-685-1111) www.equifax.com

Experian (888-397-3742) www.experian.com

Trans-Union (800-916-8800 www.transunion.com







About the author:
Affiliate marketer and accomplished gourmet cook. Visit my
websites: www.earlybirdspecials.info www.phyllisrecipes.com
www.medicineestore.com www.happypettips.com

Thursday, September 29, 2005

Catching Spyware to Avoid Identity Theft

by: Mitch Johnson
Arming your computer against spyware is an important move to make to protect your personal security and private information. Statistics on the number of identity theft victims continue to rise as do the number of computers being infected with spyware. Some numbers have shown nine out of ten computers are affected by spyware, many on computer whose users are unaware of the infection. Identity theft and spyware are connected in that spyware has become a common method for intruders to gather your personal information and bank numbers so they can commit identity theft.
Spyware installs itself or comes installed with freeware and shareware programs. Once embedded in your computer it tracks your internet and software usages, records sent and received email and instant messages and logs keystrokes to identify passwords and credit card numbers. The information is sent out to advertisers or other intruders who will use it to bombard your computer with ads or at worst steal and use your accounts.
You will often lose complete control over your computer once spyware has been installed. The spyware can cause browser crashes and other unauthorized changes in your computer. The unwanted pop up ads that result from spyware can cause the computer to work slower and possible destroy some programs from being able to run. Spyware specific tools are needed to rid of and protect against spyware because normal anti-virus software is not designed to detect spyware, as it is unique from viruses. Spyware programs should also be able to detect adware, a similar application that runs on your computer by sending a constant stream of pop ups. Adware can be dangerous to the proper functioning of your computer.
About The Author
Mitch Johnson is a successful freelance author that writes regularly for http://www.spyware-removal-made-easy.com/, a site that focuses exclusively on spyware removal software, as well as tips on how to prevent spyware from popping up on your computer. This site articles on has spyware guard, http://www.spyware-removal-made-easy.com/spyware_guard.htm as well as spyware scanner, http://www.spyware-removal-made-easy.com/spyware_scanner.htm.

Wednesday, September 28, 2005

Protect Your Computer And Your Personal Information From Spyware

By: Ryan Larson

Spyware is a broad term used for certain types of software that
are downloaded onto your computer without your knowledge.
Malware has become a phrase that is used when describing spyware
and adware.

Spyware is placed on your computer in order to track your
internet surfing habits. It knows every site you visit and every
page on that site. Spyware also collects your personal
information through software that tracks your actual keystrokes.
If you fill in a form to make a purchase all your personal
information, including name, address and credit card information
can be tracked. The potential abuse of spyware tracking is also
being discussed in some businesses that store secure
information, such as credit card numbers or even medical records.

Adware is another type of spyware. It doesn't work by tracking
your information as spyware does, but what it can do is actually
change your browser settings without your consent. It can cause
pop up ads to show on your computer. It can even place a new
toolbar on your computer. Most people are unaware they even have
any type of adware installed on their computer until their
computer starts to slow down.

The spyware business is a billion dollar a year industry with
people getting very rich selling the information they steal
about you. There is a case currently in court in the State of
New York against a spyware company. The outcome of this legal
case will hopefully mean the end of secretly placed spyware.

In order to not fall prey to these types of malwares there are
steps you can take. First, don't download freebies. A lot of
services that are offered to you as "free" such as free music
downloads are free per say, but the price you pay is allowing
them to place spyware software or adware targeted advertisements
on your computer. Read any agreements about the software very
carefully before you download it.

Run an anti spyware software program often along with your virus
protection software. Generally spyware and adware are designed
to be difficult to remove from you computer and they leave
behind "ticklers" which reinstall the software.

About the author:
This article courtesy of http://www.adware-eliminator-guide.com

What Is Adware?

By: Tim Henry

Adware is one of many "malwares" or malicious software programs
that are unknowingly installed on your computer when you visit
online sites and download freebies. When you use share files or
visit sites with free downloads of wallpaper, videos, or music,
some of these sites will send along adware software with your
download.

These malwares are a rapidly growing threat to all computer
systems. It is estimated that in the first three months of 2005
over 80% of computer users had some type of malware software
program running on their computer, without their knowledge.

Although it is much less a threat to your computer and
information than spyware is, what adware will do is cause pop up
banners and advertisements to appear on your computer. These
advertisements are displayed on your computer no matter what
program you might be using. What the people who place this type
of nuisance software on you computer say is that adware
advertising helps them to recover costs and allows them to offer
you those freebies you want.

What you want to do to stop adware from appearing on your
computer is to first run an anti-adware program. Run this
program on demand regularly. Along with an anti-adware software
program run your regular computer virus scan on demand also.

Check the security level on your computer. You security level
setting should be at least medium to help protect you from
unwanted downloads.

Do not download free files from the internet, period. When
downloading any software read the end-user license agreement.
Some of these agreements will state that when you download their
software you are also agreeing to accept a downloaded spyware
that may be placed on your computer at the same time.

Be aware of threats to your computer, and your personal
information.

About the author:
This article courtesy of http://www.adware-eliminator-guide.net

Tuesday, September 27, 2005

What Is Spyware?

By: Mark Freeman

Spyware is a rapidly spreading online threat to your computer.
It is estimated that in the first three months of 2005 over 80%
of computer users had a computer unknowingly infected with
spyware. You may have unintentionally downloaded spyware on your
computer when you visited a site and downloaded software you
wanted, or, when you downloaded that cute cartoon e mail program
from your friend.

What spyware does is allow someone to observe your computer use
and track your behavior on the computer. Some of these programs
are keystroke loggers, adware and so-called system monitors.
Generally those that maliciously install spyware software on
your computer are being paid by a third party for the
information they gain from tracking you and hundreds of
thousands like you. It's said that spyware is a billion dollar
industry, one that isn't going away anytime soon.

A lawsuit was recently filed in New York against a Los Angeles
company called Intermix Media. The lawsuit is based upon the
State of New York's General Business Law which prohibits false
advertising and deceptive business practices and laws against
trespass. A successful lawsuit against Intermix Media could
spell doomsday to the spyware industry. Until then, you need to
know what to do to protect your computer from spyware.

Once on your computer spyware can be very hard to remove. At
it's best spyware will cause your computer to slow down. At its'
worst spyware can change settings on your computer and display
advertising you don't want.

There are many anti-spyware programs available on the market
today. You should perform an on demand scan of your computer on
a regular basis. It is suggested that you re-boot your computer
after the initial scan and then re-scan to make sure that there
are no "ticklers" left behind on your computer. These ticklers
are designed to reinstall spyware. Don't forget to run your
regular anti virus software on a regular basis.

Beware of free downloads of any type of files, music, video,
free wall paper, etc. These can have hidden spyware.

About the author:
This article courtesy of http://www.adware-stopper.net

Insure Your Information - Backup Software

By: Joe Light

There are so many ways to lose precious data stored on your hard
disk - power loss or power surge, overheating, electrostatic
discharge, virus attack, software failure, etc. Are you still
thinking your data is safe? Don't! Backup! Backup early, backup
frequently.

ABF Outlook Express Backup

ABF Outlook Express Backup is a backup and synchronization tool
for the popular Outlook Express mail client. It allows you to
backup and restore your messages, address book, settings, mail
and news accounts, message rules, blocked senders lists,
signatures, and even your favorites. All backup functions can be
processed either separately or together. The user can choose the
identity to save or restore data. ABF OE Backup allows you to
backup data on the one computer and restore to another. This
feature makes ABF Outlook Express Backup not just a backup
program but also an ideal and perfectly functional
synchronization tool. This program is easy to use and has a
simplified user interface, very useful for beginners. The user
interface is multilingual.



WinBackup 2.0 Standard

Awarded Best Backup Software by Computer Shopper and termed
"exceptionally simple to use" by PC World, WinBackup 2.0
Standard is now the obvious choice for home and small office
users. Being one of the most efficient and reliable backup
solutions available WinBackup 2.0 Standard will help you save
both time and money.



WinBackup 2.0 Standard, the fastest backup and recovery software
on the market, allows you to secure all your valuable data
within minutes. Featuring a Windows-familiar and intuitive
graphical user interface, WinBackup 2.0 Standard makes it
extremely easy to set up and run regular backups in your
existing environment. With shortcuts to over a 100 of the most
popular applications, WinBackup 2.0 Standard makes it possible
to easily and quickly backup emails, address books, bookmarks,
digital images, financial documents and other records at the
click of a button. Home and small office users can rely
completely on WinBackup 2.0 Standard for full data consistency
and integrity without compromising superior performance.



Acronis True Image 8.0

The complete disk imaging, system disk backup, and bare metal
restore for workstations and home PCs



Acronis True Image allows to create an exact disk backup image
for complete system backup and disk cloning providing the most
comprehensive data protection.



The disk backup file contains the exact copy of a hard disk,
including all the computer data, operating system, and
programs.



After a system crash you can restore the entire system or simply
replace lost files and folders from your disk backup.



Based on the exclusive Acronis Drive Snapshot disk imaging
technology, Acronis True Image allows to create an online system
disk backup without reboot to keep the system productive. The
product provides the fastest bare metal restore dramatically
reducing a downtime and your IT costs.



For the complete server disk imaging, system disk backup, and
bare metal restore see Acronis True Image Server



Key features:

* Online system disk backup and instant
bare metal system restore
* Restore individual files and
folders
* Integrated compression and password protection

* Disk imaging and disk cloning
* Incremental disk backup
and disk backup image verification
* Acronis Secure Zone and
Acronis Startup Recovery Manager



CompuApps Renaissance 2006 SE

Renaissance is a simple yet powerful Backup application that
provides user the peace of mind by its ease of use, comfort and
security, with optional verification. Renaissance enables
selection of data with a quick and easy to use wizards.
Comprehensive scheduling options allow the user to do backups at
idle time, thus making the backup a painless and interference
free process.



Protects servers, business-critical applications, desktops, and
notebooks

Easy to set up and manage

Fast, reliable, secure backups

Smart restores with unparalleled accuracy Backup to hard disks
and removable disks

Simplifies media management



Major Functions

Dual Backup & Protection

Zero-Touch Backup

Value Pick

Find Files







Software Oasis Backup Utility

COMPLETE PC BACKUP SOLUTION


Quickly and easily create scheduled or instant backups of your
sensitive data with the Software OasisВ® Backup UtilityTM.
Just set up the software, schedule your backup and the utility
will automatically begin protecting your data. Ease of use is
the key to the Software Oasis Backup Utility. An intuitive
graphical user interface makes creating backups a breeze.


CREATE YOUR BACKUP STRATEGY


Now you can check one more item off of your list of things to
remember. Just set it up once and the Software Oasis Backup
Utility will automatically begin creating your daily or periodic
backups. The utility provides you with the option to create an
instant backup as well.


REMOVABLE MEDIA BACKUPS


Backup your files to any removable media or drive including IDE,
SCSI, parallel or USB backup devices. The Software Oasis Backup
Utility works with all popular devices including IomegaВ®
Zip drives, DAT drives, Flash drives, Travan drives and more.


DISK TO DISK BACKUPS


With the dropping costs of hard drives, it is becoming more cost
effective to backup your data direct to disk. Just choose your
source and destination drive and schedule your backup with the
Software Oasis Backup Utility.


COMPRESS YOUR BACKUPS


The Software Oasis Backup Utility can create a full backup as
well as an optional zip backup. By compressing your data and
documents, you can easily archive your data or transport it from
one computer to another.


SECURE YOUR SENSITIVE BACKUP DATA


The Software Oasis Backup Utility gives you the option to
include a unique password for the zip backup files that you
create. Now you can easily and securely transport your sensitive
data. Password protection provides advanced security for the
sensitive information inside your zip file.


UNIVERSAL SUPPORT AND COMPATIBILITY


The Software Oasis Backup Utility is designed to work with
MicrosoftВ® Windows XP, 2000, 98, ME and NT.



For More Information And Free Download:

CompuApps Renaissance 2006 SE

http://www.lightsparkle.com/product_page.php?product_id=157.

Malware Or Spyware

By: Ryan Larson

Malware is a new term used to describe malicious "mal" software
"ware" that has no other purpose other than to destroy or
disrupt a computer. Spyware and adware are considered to be
malware.

There is only one reason for spyware to be put on your computer,
and that's to make money, and no, not money for you. When you
download those funny and comical files that your friends e
mailed to you, free video or music files, free wallpaper, etc.
spyware usually comes attached. The spyware industry is a
billion dollar industry. There are people getting very rich
selling the information they track about you and hundreds of
thousands just like you.

Adware is a software program that also is attached with free
downloads of many kinds. What adware does is cause pop ups on
your computer, even when you're done with the initial site you
visited. That means that anytime you're on your computer,
surfing, checking e mail, or even working, annoying pop ups will
appear.

There are ways for your to protect your computer. The first is
for you to perform an on demand scan of your computer on a
regular basis with anti spyware software. It is suggested that
you re-boot your computer after the initial scan and then
re-scan to make sure that there are no "ticklers" left behind on
your computer. These ticklers are designed to reinstall spyware.
Don't forget to run your regular anti virus software on a
regular basis.

Next, stay away from free downloads. Don't open up unsolicited e
mail from anyone. Delete it from your server without opening it.

It seems wrong that people can do this to you, and it is. It
would be nice if it was against the law too. Well, someday it
might be. There is a case in court in the State of New York
right now. The State is suing a Los Angeles based company called
Intermix Media for placing unwanted spyware on computers. If the
State of New York is successful it could be the end of spyware.

About the author:
This article courtesy of http://www.adware-remover-guide.net

Monday, September 26, 2005

Protect your Computer and Internet Privacy

Author: Alex Marias

Article:
Is a known fact that every time you open a browser to view a web
page, order something online, or read your email in a web based
viewer that information is stored on your computer for later
use. Whether you are viewing the weather online, reading sports,
catching up on the latest world news or viewing something a
little more private, all that information is stored in your
computer. Windows operating systems store all this material in
what are called Temporary Internet Files or cache. Web pages may
store bits of information about who you are when you visit web
sites in files called cookies on your computer. Your web browser
will store a list of web sites you've visited and places you've
gone in a history file in your computer. Even if you are not
online, programs will store histories of the files you've
opened, played, or viewed.

Generally there might not be any reason to worry about all these
files in your computer, but what if you sell your computer and
all that information is left for someone else to see. Maybe
friends and relatives visit and use your computer and you dont
want everyone to know what files you are running on your
computer. Then you are going to want to know how to delete these
files.

Even if you are not worried about privacy on your computer, you
may be surprised to realize how much hard drive space all this
information takes up. If you are running out of drive space, you
may want to delete these files.

How can I delete these files?

For Internet Explorer 5 and above, you can follow these
directions to clear out temporary files and delete cookies.

1) Open Internet Explorer and click on Tools 2) Click on
Internet Options 3) On the General Tab, in the middle of the
screen, click on Delete Files 4) You may also want to check the
box "Delete all offline content" 5) Click on OK and wait for the
hourglass icon to stop after it deletes the temporary internet
files 6) You can now click on Delete Cookies and click OK to
delete cookies that websites have placed on your hard drive.

To clear the Internet History in IE:

1) Open Internet Explorer and click on Tools 2) Click on
Internet Options 3) On the General Tab, in the middle of the
screen, click on Clear History 4) Click OK

To clean up other temporary files on your computer in Windows 98
or higher:

1) Click Start, Programs (or All Programs), Accessories, System
Tools, Disk Cleanup 2) Choose the correct drive usually C:\ 3)
Check the boxes in the list and delete the files

This deleting method is only good if you want to free space,
because normal file deletion only removes a file's directory
entry, and leaves the data contained in the file on your hard
drive, which can be easily recovered by any average computer
user using a undelete utility. If you delete cookies or if you
delete history using conventional methods anyone can recover
them! Even after a hard drive format, files can be recovered
using expensive hardware and software which use forensic latency
track analysis algorithms.


There are several good utilities such as Privacy
Guard

About the author:
Alexandru Marias is an IT student maintaining software sites such
as: www.downloadsplaza.com , www.fungamesplaza.com and
www.bluedownloads.com

The Spy Who Robbed Me: What You Need To Know About Spyware

By: Sean Felker

With the exception of those who are competing in reality TV
shows, who wants to be watched? Who wants to be seen in their
most vulnerable and private moments? Who wants to be deprived of
his privacy and his freedom to keep things for himself?

Most importantly, who wants to jeopardize his security by
unwittingly exposing the things he should be keeping a secret to
someone who's watching from afar?

Before you start thinking that we're referring to a psychopathic
voyeur who is observing you from the building adjacent to your
house, let us clarify that we're going to discuss about spyware.
Yes. Spyware: a program which has been the bane to Internet
users for the past three years.

Spyware is one of those things that were invented for a good
purpose, but was eventually exploited in time. Spyware was
originally meant as a tool that would allow you to monitor the
usage of your PC terminal while you're away from the keyboard so
that you can prevent illegal access to the same.

Eventually, it found other borderline uses, like catching a
cheating spouse or significant other, prying on your daughter's
liaisons, and watching over your children's Internet activities
from a remote computer.

From pure to gray to black, spyware has now become a backdoor to
high technology security protocols. It does this without hacking
any system, rather, by deluding a user into unwittingly
installing the spyware program on his PC.

From there, the program would work invisibly, sending key logs,
or log files of the characters you have punched on your
keyboard, to someone else on a remote terminal. This is why
spyware is also called as a key logger program.

Eventually, spyware evolved into more damaging forms. Today, you
would have invisible scripts redirecting you to certain websites
which you have not chosen to view, or pop-ups that keep
sprouting left and right even if you're viewing a pop-up free
website.

This has led the Anti-Spyware Coalition, a group of industry
giants who are adversely affected by this digital malady as
well, to define spyware as something that "impairs users control
over material changes that affect their user experience, privacy
or system security; use of their system resources, including
what programs are installed on their computers; or collection,
use and distribution of their personal or otherwise sensitive
information."

The security risks posed by spyware programs cannot be ignored.
Imagine engaging in an online transaction wherein you send your
credit card details in a secured network, only to stand losing
such details once you log off as your key logs would be sent to
someone else. Also, personal details can also be stolen,
resulting into a greater risk for your actual safety.

But it is the violation of your rights that is the biggest
issue. With spyware, your freedom of choice and to feel secure
about your personal effects is deprived of you. This has no room
in a civilized society.

Indeed, spyware is a modern day disease that should be curbed.
It now comes in a variety of forms aside from the aforementioned
key loggers:

ADWARE - is an invisible program that sends specific
banners for you to see. It may sound innocent, but this program
actually compels your PC to send personal details to the mother
source so that the latter may know which ads to display.

HIJACKERS - these are programs that take control of your
browsers, opening up pages which you do not choose to view.

MALWARE - these are programs which are not spyware per se,
but operate under the same principle. They are persistent
scripts that don't seem to stop until your data are destroyed.
Examples of these programs are Trojans and worm viruses.

There are a lot of free tools in the World Wide Web that would
allow you to rid your computer of these malicious programs.
Sometimes, however, the process of cleaning up results in the
loss of valuable files.

The maxim "an ounce of prevention is worth more than a pound of
cure" seems to be the best policy against spyware. Always update
your anti-virus system, so that spyware may not be allowed to
incubate in your hard drive.



About the author:
Sean Felker is the publisher of the very successful and popular
Work at Home and Making Money on the Internet blog: Visit him
here:

http://making-money-online.blogspot.com



Sunday, September 25, 2005

Digital Espionage : Spyware

By: Brandon Burke

Is your computer acting strangely? Do you try to go to a web
site and your browser takes you somewhere else? Do you have a
toolbar on your browser that you do not want, and have no idea
how to get rid of? Got pop-ups? If so your computer may be
infected with spyware.

Spyware is software that installs itself to your computer
(usually without permission or with its permissions buried deep
in an end-user agreement). It then proceeds to track your
surfing habits and transmit the information to third parties.
Spyware can also cause other irritating things to happen, such
as browser redirection, system slow down, and pop-ups.

Fortunately there are several handy programs to get rid of
spyware. The most notable are Spybot Search and Destroy,
Lavasoft Ad-aware SE, and most recently Microsoft Antispyware.
These programs usually do a very good job of removing spyware
from an infected computer. However, it is a good idea to run a
combination of these programs as one may catch something that
another has missed.

There is a small catch in the spyware information industry.
Typically people who are giving you information about
spyware/malware are doing so in order to get you to purchase
their own company's product. Although their intentions may seem
to be clear and fair, they may be misleading the consumer into a
belief that their computer is more protected than it really is.
As with all spyware/malware/antivirus products, the companies
want you to believe that their product is the end-all, be-all
solution to your problems. There are a few failures in that
summation though: Not all products are created equally, not all
products can catch ALL variants, and not all products are worthy
of an install.

In the end, the answer is entirely in the hands of the end
user to choose a product. My advice to the end-user is to not
choose a product based on fear or lack of knowledge. True, the
companies that are advertising to you know more about
spyware/malware than you do... but they are also slanting their
views to direct you towards their product over the competitor.

About the author:
Brandon Burke is the Director of Network Operations and Security
for an outsource technical support company (GTC, Inc.) based
solely in the United States. For more information on GTC visit
http://www.ygtc.com . For more helpful tips visit
http://www.ygtc.com/newsletter/ .

Tuesday, September 20, 2005

Reclaim Your PC from the Internet Spies

By: Jason Frovich

Most Internet users recognize the need of protecting their
computers against viruses, as the vast majority of us sooner or
later become painfully aware of these nasty little programs when
they shut down our PC, spam our mailbox or delete our
files.Viruses are, however, not the only malicious software
programs out there. The newest addition to the evil software
family is the so called Spywares and a good anti-virus program
or firewall is not enough to safeguard against these clever
programs.

Spywares are known by many names such as adware, trojans,
malware, browser hijackers etc. The thing they all have in
common is that they will transmit your personal information to
companies and individuals who have an interest in knowing about
your surfing habits, online purchases, credit worthiness,
interests, web searchs, chats, birth date and even your credit
card number. The list goes on and on, since Spywares are
constructed by promotional companies who need to know as much as
possible about the online consumers to target them effectively.
By ewes dropping on you online, these companies hope to be more
successful when sending out promotional materials.

Spyware usually enter your PC by piggybacking on other software
downloads. Every time you use downloaded or otherwise shared
files, including Freeware, Shareware or p2p sharing programs,
you stand the risk of unknowingly infecting your computer with
Spyware. Even confirmed virus free music files, films and
computer programs can have Spyware stowaways. Once inside your
computer, they will hide, monitor all your actions and promptly
start telling your secrets to anyone willing to listen.

Contrary to most viruses the Spywares actually make an effort
not to be observed. Since they won¡¯t cause obvious harm such as
deleting important files or shutting down your computer, they
can thrive in your PC for years without you noticing, sending
out massive amounts of information about all your online habits.

At a first glance, you might find this annoying but essentially
harmless. Why not let the companies send me promotional material
about things I am actually interested in? Spyware is however far
from harmless, since the infiltration by Spyware not only let
the companies know about your latest online search, but also
much more private matters such as credit card details, online
purchases of medicine and your private e- mail correspondence
with family, friends and business partners. There are even
examples of how this massive gathering of personal information
has led to an overall loss of privacy and stolen identities. In
the computerized world of today it is not hard to imagine the
amount of damage and personal suffering the fraudulent use of a
persons¡¯ identity can cause.

It is obvious to anyone that we must start combating the Spyware
programs, but the best way of doing this is not to panic and
pull the plug on your PC, never go online again and keep five
feet away from all Freeware. There is a much better solution:
http://www.supportcave.com %%

About the author:
Supportcave.com offers new and enhanced Free Spyware
Removal
Software. Not only will these programs effectively
check and clean your computer from Spyware, once installed they
will also shield your computer from future Spyware intrusions
and browser hijacks - before the malevolent software even have a
chance to enter you PC!

Friday, September 16, 2005

Do The Media Spread Computer Viruses?

Here's an interesting article about the media. Specifically asking the question does media hype encourage spreading computer viruses. Check it out.


Do The Media Spread Computer Viruses?

By: Joel Walsh

Summary: Could the mass media hype about computer viruses
actually make the problem worse?

If you believe what you hear in the media, there are an awful
lot of viruses going around. No, I'm not talking about the
make-you-sick kind of virus, though they get plenty of airtime,
too. I'm talking about the kind of virus that enters via your
internet connection rather than your nasal passages.

What the mainstream media often don't tell you--at least, in
most radio and television newscasts and in the crucial headlines
and opening paragraphs of newspaper articles-- is that many of
these "viruses" are not viruses at all.

What Computer Viruses Really Are

The main reason the mainstream media always are in alarm over
viruses is that they tend to call any malicious computer program
a virus. In reality, there are at least eleven distinct types of
malicious software, or malware, commonly affecting computers
today. The most common of these are worms, Trojans, and spyware.

So, what's the difference between computer viruses and the other
types of malware? The difference is that computer viruses are
just about the only ones that regularly shut down computers and
cause other obvious damage. The most common of the other kinds
of malware--worms, Trojans, and spyware--are usually only
detectable with a special scan.

The Real Danger of Computer Viruses

If the other types of malware are so unobtrusive that they can
only be detected with a special scan, then what's to worry
about? For starters, these programs are called malicious for a
reason: they are designed to cause some kind of damage, if not
to your computer, then to someone else's.

Worms are most famously used to damage, destroy, or disrupt
other computer networks than the one on which the host computer
is located. For instance, worms have been used by website owners
to shut down rival websites by sending overwhelming numbers of
requests to the computer that hosts that website. Worms have
also been used to send out viruses to other computers, often
without infecting the host machine--after all, what would it
benefit the worm to shut down its host computer?

Trojans, in turn, are often used to insert worms and other
malware on your computer, even if the Trojan itself does no
damage.

But even if you don't care what happens to anyone else, you
should still be concerned about one kind of malware: spyware, a
kind of malware that, true to its name, collects data from your
computer and sends it back to a remote host.

Most spyware is only interested in monitoring your internet
usage so it can tell other programs, called adware, what
advertising to popup on your computer. However, there are
criminal spyware programs that steal financial data, or perform
a thorough identity theft. Don't think you have personal or
financial data on your computer? Some spyware programs contain a
keylogger, which is a program that copies whatever you type,
usually in order to snatch passwords. Even if you keep no
financial information on your computer, if you ever buy anything
over the web, the keylogger would allow its owner to buy stuff
using the same information you typed in to buy stuff yourself.

Why Blame the Media?

Given the danger of all these different types of malware, isn't
it a good thing that the mass media are becoming hysterical
about it? And can't they be forgiven the sloppy reporting of
calling Trojans, worms, spyware, and other malware "viruses"?

No, no, no.

This is a classic case of bad reporting doing more damage than
no reporting at all. In this case, the damage bad reporting has
done is to promote a common myth that goes something like this:
"The only malicious software is a virus. Viruses damage your
computer. Therefore, if my computer is working OK, my computer
has no malicious software. I only need to scan my computer for
problems when there is a sign of problems."

Thanks to this myth, many people complacently let their
antivirus software go months out of date, not wanting to be
bothered with scheduling an automatic update. Just as bad, many
people don't have any extra software to combat the other types
of malware that may not be covered by antivirus software.

In fact, it's not uncommon for people who have found malware on
their computers after a scan to say, "but I never had malware on
my computer before!" But how would they have known if they had
never scanned!

Until the biggest mainstream media--and especially
television--start educating the public about the need to have
their computers automatically scanned at least daily, the world
will continue to have major, drawn-out problems with malware
that could have been wiped out as soon as soon as the
anti-malware software makers discovered it.

And until that day, the mainstream media will have many more
opportunities to run hysterical stories about "viruses," thereby
forcing them to sell more newspapers and broadcast to even
larger audiences of people who suck at the information trough
yet somehow never become full.

About the author:
Joel Walsh writes on all types of malware for
spyware-refuge.com:
http://www.spyware-refuge.com?%20adware%20spyware%20program

Friday, September 09, 2005

New iPod nano

The New iPod nano: Everything you love about iPod... only smaller!
Meet Apple's new iPod nano, the latest addition to the iPod family. Impossibly small, the iPod nano holds up to 1,000 songs and starts at just $199! Buy it now from the official iPod store, and get free shipping and free laser engraving. Please note that the iPod nano is replacing the iPod mini.

ipod_nano_180x150