Computer security for most can be described in 2 words, firewall and antivirus.
Until recently could one install a firewall and an antivirus program and feel quite secure. The risk of something "bad" succeeding with infecting your computer or a hacker to breach your firewall was not likely.
This as internet was filled with computer completely without protection. Easier to attack or infect the completely open computer then fight all installed counter measurements. The viruses spread quickly and if you had protection, you where protected.
The new era has come.
But look around. Read about all new versions of spam control software, software firewalls, antivirus software and similar products.
Of course are they still a good protection against all the normal threats on internet, but the new main focus is the protection they offer against new threats.
Yes, they actually all try to come up with more and more cleaver ways of protecting you from threats not even present!
And how can they do this?
The answer is quite simple.
Most attacks and viruses use variations of known methods to attack or infect. And the new technologies that are being invented all search for "how things are done" instead of "exactly this or that".
How to find viruses.
The old way, a known virus can be found by using a signature, a known piece of code inside.
The new way, now they look for known actions certain viruses use to accomplish an infection or spreading.
How to recognize an attack.
The old way. Someone connecting to your computer in any way at all (stop them).
The new way, someone connecting via this protocol, to this port, more then 3 times per second and so on.
A couple of examples.
Norton Antivirus 2005 ? has, Internet Worm Protection. Panda Antivirus ? has, Trueprevent.
Other companies will follow and this will expand into other areas like firewalls and spam protection.
What's in it for you?
New protection will catch more virus, more attacks but they will most probably require more configuration from your side as well as a better understanding of how they work. And as always, a more complex system is more likely to give you problems.
So here you are, probably a bit more secure and with a bit more technical problems.
Kenth "The Designer" Nasstrom is the founder of The Designed Software Series. His software can be found at http://www.kndata.com and he also owns http://www.free-newslettertemplates.com as well as http://www.costa-rican-information.com
Identity Theft and Your Personal Information Identity theft is... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Security leaks can be a big problem for any site... Read More
The money being spent online is steadily growing. With billions... Read More
Ok, ok, I know you've seen them. All those pop... Read More
The Threat10 years ago you could probably have run no... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Well, this is an article I never thought I would... Read More
Nowadays more and more people are using a computer. A... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Imagine this ? you open up your email box and... Read More
A couple of days ago, I was searching for a... Read More
History and BackgroundThe virus was one of the first ever... Read More
Since its birth, the Internet has grown and expanded to... Read More
First of all we need to get some terms stated.... Read More
Imagine my surprise when I received a phone call from... Read More
There has not been a time in the history of... Read More
Every now and then you can read about a new... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
You and I are a lot alike. We are both... Read More
You can detect spyware online using free spyware cleaners and... Read More
During the release of a new software product specialized to... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Threats we ordinary Web users face online leave us no... Read More
First I would like to stress I am condoning the... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
While clicking from site to site on the internet you... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Have you ever had to call Symantec or McAfee to... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
The average computer is packed with hidden software that can... Read More
So you want to know who your kids are chatting... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
As more people are logging onto the Internet everyday, Network... Read More
First of all we need to get some terms stated.... Read More
There you are busily typing away on your PC or... Read More
A couple of days ago, I was searching for a... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
The first thing people think about when defending their computers... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Before we start, I want to make it clear that... Read More
If you are a parent, as am I, I think... Read More
Before you enter your name, address or any other data... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Some months ago, before there was much publicity regarding phishing... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Have you ever had to call Symantec or McAfee to... Read More
So called phishers try to catch the information about the... Read More
Afraid that someone is monitoring your PC or installed a... Read More
If you know what is the 'Fishing' then it's very... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
As the number of people using the Internet as an... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Over £5 billion pounds was spent on online shopping in... Read More
A friend called me one day and asked if I... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
If you constantly deal with bank or electronic accounts, it... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Have you ever bought a product or service from the... Read More
You and I are a lot alike. We are both... Read More
Long gone are the days that we could feel secure... Read More
Internet Security |