Viruses, Trojans and Spyware: Protecting yourself.
No user on the internet is safe from assault. Viruses, Trojans and Spyware can all effect your computer by placing annoying ads, tracking your credit card numbers, or even slow it down to a certain extent it is deemed no longer usable. By following through these simple steps, you can help protect yourself from the internet.
High CPU Usage: If your computer seems to be slower than usual, it is very likely that you have been infected. Background services can slow down your computer, and to check performance, enter Task Manager (Ctrl+Alt+Delete). Then, click on the processes tab. You will be able to see active processes that are running. To find what should be running on your computer, visit http://www.theeldergeek.com/services_guide.htm.
Check your level of protection: A good way to know whether you are safe or not is by using security tools. Here are some you should try out: NeWT 2.1: This is a very simple tool to use, and it scans for more than 4000 common security vulnerabilities. Download NeWT here: http://www.tenablesecurity.com/newt.htm Sumantec security check: This is a free service provided by Symantec. Simply visit here (www.sumantec.com), then select Scan for Security Risks. It will only tell you what vulnerabilities you have, but however it won't tell you how to fix them. Infinitive! Port Scanner: Our very own online port scanner! http://infinate.x10hosting.com/phport
Update Yourself: Install all the latest update possible. Service Pack 2 is a good way to start if you're running Windows XP. Enable Automatic Updates, and make sure you have the latest updates on your PC.
Safe Surfing: Due to Internet Explorer's high popularity, it is usually safe to change altogether. A common program now is known as FireFox (www.mozilla.com/products/firefox), which is fast, responsive and similar to Internet Explorer. However a major flaw with FireFox is that you will need to install additional plug-ins in order for you to view certain pages.
Make Regular Backups: Prepare for the worst. Make regular backups of your important files and store them on a type of offline storage.
Don't open suspicious links: If you are sent a link you are not sure about, do not open them, Simple. Another good way is to avoid suspicious sites altogether. Many programs too, bundle with spyware, so when you download them make sure they are stated "Freeware", nothing else.
Program Protection: Use Anti-Virus and Firewall software. McAfee is a highly recommended product over Symantec, but there are also other free anti-virus/firewall software online such as NOD32. http://www.nod32.com/
If you have been infected: Find cleaning instructions online on sites such as http://vil.nai.com. It will tell you where to locate your infection, and where to find and remove it. System Restore is also a good option on Windows XP. To use System Restore, go to Start, All Programs, Accessories, System, System Restore. Simply click a restore point and reboot.
You can also remove viruses using the programs listed under Program Protection. To remove Spyware, Spybot S&D (http://www.safer-networking.org/en/index.html) is a free yet useful tool to use.
All articles are written by Infinitive!
Infinitive! http://www.infinate.x10hosting.com You may reproduce and use this article just so long as you add a link (http://www.infinate.x10hosting.com) down at the bottom.
Infinitive! All the latest articles, tools, news, file hosting and more!
![]() |
|
![]() |
|
![]() |
|
![]() |
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Only the top spyware removers are successful at detecting and... Read More
There you are busily typing away on your PC or... Read More
The top five online scams on the Internet hit nearly... Read More
So called phishers try to catch the information about the... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Security leaks can be a big problem for any site... Read More
Spyware is software that runs on a personal computer without... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
File sharing on p2p is soaring despite the music and... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
If you have used a Windows machine for a while,... Read More
Imagine my surprise when I received a phone call from... Read More
Have been an Internet user for more than 9 years,... Read More
My first experience with a spyware BHO based infection was... Read More
Imagine this ? you open up your email box and... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Phishing is a relatively new form of online fraud that... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Much has been said on the theory of password protection... Read More
It's late. You've been scouring the web for that perfect... Read More
The money being spent online is steadily growing. With billions... Read More
Threats we ordinary Web users face online leave us no... Read More
Spyware is the most troublesome software to appear on the... Read More
Millions of people make purchases online, but many people are... Read More
Identity Theft is one of the most serious problems facing... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
You are at your computer, checking out software on EBay.... Read More
I am the victim of an internet scam. It is... Read More
Spyware is the most troublesome software to appear on the... Read More
The Internet is a vast International Network of people and... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Before you enter your name, address or any other data... Read More
A new variation of the Nigerian Scam theme ... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
A couple of years back, I paid my dues the... Read More
Threats we ordinary Web users face online leave us no... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
There is nothing more important that password security in world... Read More
I got a virus the other day, Thursday I believe... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Some months ago, before there was much publicity regarding phishing... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
As soon as almost all computer users already got used... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Watching how the traditional media covers the latest virus or... Read More
Well, this is an article I never thought I would... Read More
There has not been a time in the history of... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Spyware is software or hardware installed on a computer without... Read More
With the advent of the World Wide Web, a whole... Read More
There is no doubt that "how-to articles" have become a... Read More
Someone recently told me, "You would have to be a... Read More
As more people are logging onto the Internet everyday, Network... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Internet Security |