SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror." With that attitude, I praise their skills only for the mere sake of not wanting them to defile mine, or my business.

I am talking about hackers, crackers, phreakers, and those pesky buggers that throttle our lives daily with Spam, new Trojans, e-mail containing viruses, and worms. And what about pop-ups? How many people do you know that like them? Do they benefit your business, or merely slow down your production?

Did you install that "My Search" or "HotBar" toolbar on purpose?" Did you know that there are programs on your PC that direct advertisements to your screen? Purify your system and live free within your private network.

SPYWARE

Based on where you go while browsing the World Wide Web, companies collect information and direct advertisements to your computer in accordance with the material that you peruse. That kind of programming is called Spyware. And it scares me! Not that I have anything to hide "Big Brother." And to think 1984 was 20 years ago.

Spyware is put in your computer to secretly gather information about you and relay it to advertisers or other interested parties. Spyware can get in your computer as a software virus or as the result of installing a new program. Spyware is often installed as an addition to free software you downloaded from the Internet (like Kazaa, shhhh?)

Not to forget ADWARE?

You must have agreed to the download and installation. That is the only difference. Read the fine print next time you install an application. You will be surprised by what you have agreed to.

I serviced a small office recently that had so much junk programming on their systems that their users literally could not work on them. As soon as they turned on their computer, they were flooded with pop-ups and their e-mail was drenched with spam. They were desperate. A good hour per PC, and they were back in operation. But when it comes to e-mail, enough Spam can permanently ruin an account.

SPAM, eggs, spam and more spam

Spammers typically send a piece of e-mail to a distribution list in the millions, expecting that only a tiny number of readers will respond to their offer. Please do not respond! Like the telemarketers that call every night during dinner, do we like this stuff people? I wonder, do the people who send Spam ever get Spam?

Are you tired of these problems yet? There are ways to minimize the pain.

RULES

Number 1: Do not use peer-to-peer file sharing applications at work. Kazaa, Morpheus, BearShare? They will only get your computer in trouble.

Number 2: Stay far away from Internet Browser enhancing toolbars. Less is more. And regardless of what they tell you, they do sell your information to advertisers.

Number 3: Never sign up for anything with your business e-mail address. If you do, read the small print. You are probably agreeing to have your address distributed to various marketing companies, which as a result, will get you Spammed.

TO CONCLUDE

There are many more basic guidelines to follow, and if done so, you will have cleared another minefield in keeping your business productive. Cleanse your systems regularly. If you don't know how, hire someone to show you. A simple, low cost maintenance plan will save you a bundle of hassle and pave the way to network reliability.

All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com. Greg Richburg a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. for wed design adn hosting, and KlickCommerce for Internet Marketing Strategies. Please visit http://www.klickcommerce.com/.

In The News:


pen paper and inkwell


cat break through


Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More