A New Era of Computer Security

Computer security for most can be described in 2 words, firewall and antivirus.

Until recently could one install a firewall and an antivirus program and feel quite secure. The risk of something "bad" succeeding with infecting your computer or a hacker to breach your firewall was not likely.

This as internet was filled with computer completely without protection. Easier to attack or infect the completely open computer then fight all installed counter measurements. The viruses spread quickly and if you had protection, you where protected.

The new era has come.

But look around. Read about all new versions of spam control software, software firewalls, antivirus software and similar products.

Of course are they still a good protection against all the normal threats on internet, but the new main focus is the protection they offer against new threats.

Yes, they actually all try to come up with more and more cleaver ways of protecting you from threats not even present!

And how can they do this?

The answer is quite simple.

Most attacks and viruses use variations of known methods to attack or infect. And the new technologies that are being invented all search for "how things are done" instead of "exactly this or that".

How to find viruses.

The old way, a known virus can be found by using a signature, a known piece of code inside.

The new way, now they look for known actions certain viruses use to accomplish an infection or spreading.

How to recognize an attack.

The old way. Someone connecting to your computer in any way at all (stop them).

The new way, someone connecting via this protocol, to this port, more then 3 times per second and so on.

A couple of examples.

Norton Antivirus 2005 ? has, Internet Worm Protection. Panda Antivirus ? has, Trueprevent.

Other companies will follow and this will expand into other areas like firewalls and spam protection.

What's in it for you?

New protection will catch more virus, more attacks but they will most probably require more configuration from your side as well as a better understanding of how they work. And as always, a more complex system is more likely to give you problems.

So here you are, probably a bit more secure and with a bit more technical problems.

Kenth "The Designer" Nasstrom is the founder of The Designed Software Series. His software can be found at http://www.kndata.com and he also owns http://www.free-newslettertemplates.com as well as http://www.costa-rican-information.com

In The News:


pen paper and inkwell


cat break through


How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Detect Spyware Online

You can detect spyware online using free spyware cleaners and... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom As a network... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More