This really chapped my lips...
I recently bought a new computer. Mine was getting old, had lost its whistle, and the few remaining bells didn't ding a nicely as they had in the past. Yep, it was time for a new state-of-the art dream machine with CD burner. DVD player, a bazillion gigabyte drive and more RAM than Rambo has. I whipped out my trusty credit card and told my local CompUSA to ring it up.
Well, needless to say I was enthralled. Blazing speed, working whistles, and bells that were more like the Big Ben gong! I could tear through spreadsheets with one CD/ROM tied behind my back. One day, about three months later, my Son came home form college. having heard all about my new pride and joy, he sat down behind the keyboard and fired that puppy up. He put it through its paces for about 30 minutes and then turned and said "It's nice Dad, but I thought it would be faster". HE THOUGHT IT WOULD BE FASTER? What was he, crazy? This box was so hot that it came with it's own fire department.
Then he started poking around the hard drive. "Dad", he said "You need an exterminator. Your PC is infested." "Infested with what, bugs?". "Nope", he said "Spyware". "Spy What?". "Spyware", he replied. And then he explained.
Even thought I had a good virus prevention utility installed, it didn't protect me against Spyware. Spyware, it seeks, are nasty little programs that get downloaded in similar fashion to the way a virus does. It can be attached to an email, or even one of those new talking E-Cards. it can hide in one of those "Click Here to close this window" boxes, or in any of seemingly a hundred other secret ways.
There are essentially two types of Spyware. The less dangerous type either causes lots of ads to pop up every time you go on the Internet, or records your shopping and surfing habits in order to report them back to Big Brother somewhere. Of course, these steal your PC's clock cycles, and cause your hard drive to get bloated, which ends up slowing your entire system down. The problem is, the loss of speed is gradual and you don't even know it's happening until Mr. Big Shot college kid comes along and tells you that your PC is slow.
OK, that's bad enough. But then, there is the second kind of Spyware. used by real spies, or at least the kind that want to steal your credit card and personal information so they can clean out your bank accounts and assume your identity. You know, the scary stuff that you're starting to hear about more and more.
So, what should I do? Did I need to reformat my hard drive? I hoped not because THAT was no walk in the park. Fortunately my college geek was up on the subject and took me to a site that specialized in safely removing Spyware. We downloaded and installed it in just a few minutes and then fired it up. Holey Schmolie, I was infested. After about 25 minutes of chunking and plunking, the software pronounced me fit and clean. Well, at least my PC was. We rebooted and Boom! All of the speed and performance that had gradually been lost slammed right back into life. Even my Son was impressed.
Folks, this Spyware is serious stuff. You can't afford to be wiped out by some cyber terrorist half way across the world. protect your PC, and your identity. You probably already are infested. There's only one way to know for sure, you need to check it out for yourself.
Steve Robichaud and Andrew Wroblewski have been involved in online sales and marketing since 1996. For more information on finding and removing Spyware from your PC, visit: http://spyware.pcwash.com
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Security leaks can be a big problem for any site... Read More
Can you protect your computer from all possible viruses and... Read More
There are ways to insure security though. You can get... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
If you use emails actively in your communication, you must... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Imagine my surprise when I received a phone call from... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
If you are wondering how to fight spyware for safe... Read More
Working from home has its advantages, including no commute, a... Read More
The Internet is a vast International Network of people and... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
You'd better learn news from media, not from emails, security... Read More
This is not some new fangled techno-speak, it is a... Read More
This is the second in a series of articles highlighting... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Identity Theft is one of the most serious problems facing... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
In a word, no - an email message has always... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
The average computer is packed with hidden software that can... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
When the Internet first came about, it was realized it... Read More
As soon as almost all computer users already got used... Read More
Spyware is the most troublesome software to appear on the... Read More
Nowadays more and more people are using a computer. A... Read More
When it comes to reporting Internet scams most of us... Read More
If you use the internet, you have probably been infected... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
A week or so ago, I received an inquiry from... Read More
Internet scams and frauds are on the rise! The quantity... Read More
If you know what is the 'Fishing' then it's very... Read More
The average computer is packed with hidden software that can... Read More
While clicking from site to site on the internet you... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
There is no doubt that "how-to articles" have become a... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
With the advent of the World Wide Web, a whole... Read More
Millions of people make purchases online, but many people are... Read More
Can you protect your computer from all possible viruses and... Read More
In 1997, I decided after 15 years as a practicing... Read More
Sooner or later everyone with an email account will receive... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Have been an Internet user for more than 9 years,... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
A little bit of time invested into learning about internet... Read More
The Message Must Get Through The year is 300A.D.,... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
First I would like to stress I am condoning the... Read More
We all get the odd virus now and then, but... Read More
Working from home has its advantages, including no commute, a... Read More
So you want to know who your kids are chatting... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Have you ever bought a product or service from the... Read More
History and BackgroundThe virus was one of the first ever... Read More
There are folks out there who use their powers for... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Well, if that would have been said to me by... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Today the internet is a mine field of malicious code... Read More
Internet Security |