Today,on most internet user's computers, we have the ability to employ software, along with our intelligence, to prevent viruses and spyware. To put this article into proper perspective, we'll use Medieval defense tactics.
This is accomplished by 3 methods. First, a firewall... 'The Castle Moat' so to speak. A firewall can't see inside your computer beforehand though, so if any viruses or spyware were present before the firewall was installed then its of no use. Of course, its extremely good at preventing new attacks.
Second, a anti-virus program.... 'The Castle Drawbridge! They will not provide much help with spyware, but good virus protection is as desirable as one of Avaris's dreams! One drawback can be the updates, of course.If you've just updated Wednesday night and a virus hits the next day, then you may not be protected till next Wednesday night, and by then it may be too late. If you're smart, you will have signed up for email alerts with the provider, or even better, you'll have a anti-virus program that has a real time update feature. I get the tingles when I see that little pop-up saying a update is available and click here. Its downloaded ,installed, and updated in about 20 seconds! A new virus or Trojan or God forbid, a new keylogger can hit the internet and spread in a matter of days, and I'm sure this must make the definition writers lives a living hell. I have great admiration for them as they could have been wealthy doctors, but they have chosen to help us... the end users. (moment of silence here)
Last, we have anti-spyware programs,'The Flaming oil'! (my favorite). Their update features are like the anti-virus programs, so you have to be as vigilant with this method of defense too as you would be with the others. I've heard there are people out there that don't even know when their updates run, or even if its configured to do so! I refuse to believe this sordid rumor!
So you've got your defenses set up, you're looking good. But the best defense is a good offense, attack! That's what some organizations do. They prowl the net looking for websites that harbor drive-by downloads, URL Re-Directing and such. When they find them, they shut them down, or report them so effective protection can be manufactured. These people have my sincere thanks for what they do. With identity theft on the rise and Websense reporting that the average computer has 28 items of Spyware on it, we need all the help we can get. Oh sure, you're saying not my computer ! Well, lets discuss those little boxes that you click "I Agree" to when you download something. Do you read the entire statement? This is one way spyware has become so rampant, because so many downloads have extra software included in them. These can be harmful to your computers well being. KeyLoggers, popups, adware, malware...
Need I go on?
So my idea is that we need these shining knights from the castle to journey forth on a quest. They will be little robots or spiders like the search engines use. They will be given absolute power over harmful programs they find. They will be like Gort in the movie "The Day the Earth Stood Still".
Dell recently reported that 12% of their calls were for spyware damage, Microsoft says half of their reports of system crashes are caused by spyware. These calls cost these companies millions of dollars in revenue, which they then pass the costs of onto us, the consumers.
Who knows, if viruses and spyware ever get controlled, the average computer may only cost a dollar!
About the Author: Doug Woodall has a web site at http://www.spywarebiz.com There he provides free information and recommended products to combat Spyware.
His Website is recognized by Learning Fountain and ISafe Doug's Articles have earned him Trusted Author Status at ImpactArticles.com He is a member of the IWA (International Webmasters Association) Article edited for proper content by Wendy McCallum Permission to copy ok as long as about author info remains with article.
Copyright 2005 SpywareBiz
![]() |
|
![]() |
|
![]() |
|
![]() |
Some months ago, before there was much publicity regarding phishing... Read More
Have you ever had to call Symantec or McAfee to... Read More
Afraid that someone is monitoring your PC or installed a... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Spyware is the most troublesome software to appear on the... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
You and I are a lot alike. We are both... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
As more people are logging onto the Internet everyday, Network... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
As you know, this time the virus under the name... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
These six ways to prevent identity theft offer you valuable... Read More
If you are wondering how to fight spyware for safe... Read More
With the Internet entering our lives in such an explosive... Read More
Viruses are, however, not the only malicious software programs out... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Shopping for horse gifts or other gift items on the... Read More
Today the internet is a mine field of malicious code... Read More
Someone recently told me, "You would have to be a... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
The average computer is packed with hidden software that can... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
In 1997, I decided after 15 years as a practicing... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
There is no doubt that "how-to articles" have become a... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
These six ways to prevent identity theft offer you valuable... Read More
Computer infections can be broken up into 4 main categories... Read More
Have been an Internet user for more than 9 years,... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Ok, you've got a computer, and you get online. You... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
There you are busily typing away on your PC or... Read More
The Threat10 years ago you could probably have run no... Read More
Have you ever bought a product or service from the... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
P C. owners are constantly at risk from attacks by... Read More
Ok, ok, I know you've seen them. All those pop... Read More
If you know what is the 'Fishing' then it's very... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Despite the current wave of identity theft and corporate security... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Today the internet is a mine field of malicious code... Read More
If you have used a Windows machine for a while,... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
When the Internet first came about, it was realized it... Read More
File sharing on p2p is soaring despite the music and... Read More
Internet Security |