domingo, 25 de maio de 2008

Spyware-Malware 101: Understanding the Secret Digital War of the Internet

From Paul Gil,
Your Guide to Internet for Beginners.


How Rogue Software Hurts Us All


1) What is “Spyware”?

Forget viruses, spam and hacker attacks..."spyware" is now the single largest problem facing internet users today. These nasty little rogue programs have become so widespread and so infectious, their volume far outstrips spam and regular viruses. The spyware problem has grown to such an immense breadth and depth, we cannot even agree on what to call it.


2) Spyware = 'Malware'
Most people historically call these rogue programs "spyware".

That name comes from the 1990's where nasty little programs secretly observed and logged your web surfing habits. The spyware problem, however, has now grown into dozens of other malicious formats, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms
Because the spyware problem has mutated so much, we now describe spyware as part of a much larger category of rogue software called "malware" (malicious software programs). At its most basic definition, malware is when insidious little software programs covertly install themselves on your computer, and then perform secret operations without your permission. Once in place, malware programs may do hundreds of nasty things to your computer. Malware will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.

3) What does Spyware/Malware specifically do to my computer?


Malware will perform a variety of nasty activities, ranging from simple email advertising all the way to complex identity-theft and password-stealing. New nasty functions are created every week by malware programmers, but the most common malware functions are:


1. Malware steals your personal information and address book (identity theft and keystroke-logging).
2. Malware floods your browser with pop-up advertising.
3. Malware spams your inbox with advertising email.

4. Malware slows down your connection.

5. Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.

6. Malware uses your computer as a secret server to broadcast pornography files.

7. Malware slows down or crashes your computer.


4) Where does Spyware/Malware come from?


Spyware/malware programs are authored by clever programmers, and then delivered to your computer through covert Internet installs. Usually, malware will piggyback on innocent-looking web page components and otherwise-benign software such as game demos, MP3 players, search toolbars, software, free subscriptions, and other things you download from the web. Subscribing to online services is especially bad for getting malware. In particular, whenever you sign up for a so-called "free" service or install new software, you must accept an "end user license agreement" (EULA). The fine print of the EULA will often include the phrase "the vendor is allowed to install third-party software on your computer". Since most users don't bother to read this EULA fine print, they naively click "accept", and install malware out of sheer ignorance.


5) What kind of personal information does Spyware/Malware steal?

This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.

*** From: http://netforbeginners.about.com/od/antivirusantispyware/a/malware101.htm

terça-feira, 20 de maio de 2008

The 2008 Malware War: How to Clean Out the Enemy

From Paul Gil,
Your Guide to
Internet for Beginners.

How Do I Protect Myself from this 2008 Epidemic of Spyware/Malware?


Answer: Avoiding and destroying spyware is not instant, and it is not a one-time event like an inoculation. Instead, stopping spyware/malware is a long-term game that is exactly like cleaning dirt out of your home. You need constant vigilance, and a regular habit of cleaning malware out of your computer every week.


Note: Additionally, as an educated user, you must also adopt a "buyer beware" attitude whenever you install new software from the Net or even from CD...you need to read every end user license agreement on your screen before you click "accept".


Here is the checklist for detecting and destroying malware


1. Install two or three different anti-spyware programs ("spyware cleaners") on your computer, and update their definition lists regularly. Because every anti-spyware cleaner is imperfect, it is necessary to use combinations of these programs to catch the greatest breadth of malware.


Also, the anti-spyware manufacturers regularly add new entries to their "definition" lists, just like anti-virus software. Make sure to keep your spyware cleaners updated with these lists!

2. Build a weekly habit of "scan and detect". Like cleaning house, this should be done every few days. At the very least, this should be done whenever you install new software. Many anti-spyware programs can be set to automatically perform scan-and-detect nightly.

3. Carefully read every EULA (end user license agreement) before clicking "accept". If you see the phrase "3rd-party software may be installed", make sure to follow the software install with a spyware cleaning.


4. Educate yourself on the latest strains of malware. In particular, start visiting these recommended anti-spyware sites, and update yourself on the latest malicious programs.


*
Antivirus/Antispyware at About
*
Network Security at About
*
PestPatrol.com database
*
Spywareguide.com
*
SpywareWarrior.com
*
SurferBeware.com
*
Cexx.org

5. Save your data, and backup often! As much as it sounds like broken-record preaching, backing-up is how an intelligent user prepares for the worst. Backing up means: keep your original software CDs in a safe accessible place, constantly save copies of your important work files on CD or separate drives, and presume you will actually need them one day. This way, if you ever experience the extreme spyware circumstance of having to reformat your hard drive, you can at least recover your important work.


There you go, fellow Internet users. Your lives now have an extra complexity as you add one more cleaning habit to your weekly routine. The good news is: once you build a regular scan-and-detect habit, then spyware and malware will be reduced to a mere annoyance, and you can get back to business of enjoying the internet! Personally, I think of it as having one more room in my house to dust and vacuum.
Keep the faith, fellow webbies... the internet is too important to let these malware programmers win!


*** From: http://netforbeginners.about.com/od/antivirusantispyware/a/malware101_2.htm

quinta-feira, 15 de maio de 2008

The Top 5 Anti-Spyware Programs, 2008

From Paul Gil,
Your Guide to
Internet for Beginners.



Stopping spyware (“malware”) is more than a one-time inoculation, folks.

This is about a weekly habit of cleaning "nasty dust bunnies" from your personal computer. In much the same way you clean your home with your favorite broom and your favorite cleaning solvents, you will also need good tools to clean spyware out of your PC.

Here is our suggestion list. After collating the opinions of several About readers and the About writing staff, we believe that these five anti-spyware tools (aka "spyware killers") will give you maximum value for your money.

Editor’s Comment: as good as these following tools are, they are also imperfect. In particular, these tools vary in their detection algorithms and their signature/definition vocabularies. Accordingly, we suggest you use two or three of these anti-spyware programs as a combination defense.

* Number 5:
Spybot Search & Destroy

Cost: Free

About.com Rating: 3.5 stars out of 5

Editor’s comment: While Spybot is known for catching less than 95% of common infections, there are two big reasons why you want to use this product. Firstly: the SDHelper and TeaTimer functions do help significantly in keeping downloaded spyware from actually rooting itself onto your drive. Secondly: the price is perfect. If you install Spybot as part of a multi-program defense, then definitely try this product.

* Number 4:
Microsoft Windows Defender

Cost: Free

About.com Rating: 4 stars out of 5

Editor’s comment: Somewhat more thorough than Spybot, this new free offering from Microsoft is worth trying. Included in Windows Vista or downloadable from the link above, Microsoft Defender will work well as part of a combination defense, perhaps with Spybot.


* Number 3:
Lavasoft’s Ad-Aware SE, Personal Edition

Cost: Free

About.com Rating: 4.5 stars out of 5

Editor’s comment: Lavasoft has been the benchmark spyware-defense tool for years. Their Ad-Aware product has won the trust of millions of users. Although it doesn’t have the nifty shredding and email opt-out lists of Spybot, Ad-Aware does perform realtime protection, and it auto updates its definition lists to remain current. Up until 2006, combining Spybot and Ad-Aware was the smartest (and the cheapest) way to defend your compute against spyware. Things are different now, because Number 1 below has set the high bar even higher for 2007.


* Number 2:
Navarre Webroot Spy Sweeper

Cost: Free to try, approximately $39 to buy

About.com Rating: 4.5 stars out of 5

Editor’s comment: Achieving 100% detection of spyware toolbars in recent About tests, Spy Sweeper was also effective in shutting down nearly 85% of active malware processes. This would go well as a three-way combination with Spybot and Lavasoft.


* Number 1:
Mcafee Virus Scan and Anti Spyware

Cost: Approximately $39.99 for antivirus and anti-spyware combined

About.com Rating: 4.5 stars out of 5

Editor’s comment: In recent About.com tests, Macafee managed to detect 100% of all spyware infection, and it also shut down nearly 99% of spyware processes running in memory. While you cannot purchase Macafee anti-spyware without also purchasing their antivirus, the bundle is absolutely worth it at $39.99. If you are willing to spend money on your spyware and virus defense, then Macafee and Web Root are the two choices we recommend to everyone. If you are looking to save yourself a few dollars, then Lavasoft/Defender/Spybot can make for a good no-cost combination defense.

*** From: http://netforbeginners.about.com/od/antivirusantispyware/a/anti_malware07.htm

sábado, 10 de maio de 2008

MP3 Search Engine- Music Zoom

The Music Zoom is an MP3 Music Seach engine and offers users a search of their favorite music. With a large database, the Music Zoom is the best choice for you to find songs.

quinta-feira, 8 de maio de 2008

Web-articles

What is Web-articles?

Web-articles currently has 1300 more free and offers the user a large directory of articles on a wide range of subjects, among subjects such as information about Windows XP, Windows Vista related articles and Human Body.

Articles Web directory is focused to deliver the best and most essential articles online results, providing useful advice and information.

If you have an unpublished article or tutorial, free
submit your piece to us.

I paid something to access read the articles?

Access to articles is done for free, If you want to find a tutorial by keywords, all you have to do is a quick search in our directory. Just use the search option available at the top-right side of the page. The website search is powered by Web-articles. Or, if you want to read specific Windows XP tutorial, just point to it. The newest articles and tutorials are shown first in the list. To access the last ones, browse the pages 2, 3, 4 ... at the bottom. Also, you may browse articles alphabetically ordered.

How do I submit my articles?

The article can be submitted in a simple, quick and easy, just follow the rules, and not send the same article so doubled, the whole article must go through assessment by the team of Web-articles before entering the air and other rules are easy to meet. For more details: Visit: http://www.web-articles.info/e-submit-articles.html.

I'm still in doubt what do I do?

Should you have any question? Should you have any news tips, comments, suggestions, and corrections for us? Then use the form below to contact us and one of our representatives will respond to your enquiry (visit: http://www.web-articles.info/e-contact.html).

Thank you and good reading.

segunda-feira, 5 de maio de 2008

Candle Store

Candle Store offers the customer made from soy candles, which burn cleaner so that competitors. Altogether are 73 different scents! If the customer does not find her favorite scent is only to contact. The prices of candles cost between 3 and 21 dollars.

domingo, 4 de maio de 2008

WELCOME!

Welcome! The best products and offers of all Internet are here. Thank you:)