How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to employ software, along with our intelligence, to prevent viruses and spyware. To put this article into proper perspective, we'll use Medieval defense tactics.

This is accomplished by 3 methods. First, a firewall... 'The Castle Moat' so to speak. A firewall can't see inside your computer beforehand though, so if any viruses or spyware were present before the firewall was installed then its of no use. Of course, its extremely good at preventing new attacks.

Second, a anti-virus program.... 'The Castle Drawbridge! They will not provide much help with spyware, but good virus protection is as desirable as one of Avaris's dreams! One drawback can be the updates, of course.If you've just updated Wednesday night and a virus hits the next day, then you may not be protected till next Wednesday night, and by then it may be too late. If you're smart, you will have signed up for email alerts with the provider, or even better, you'll have a anti-virus program that has a real time update feature. I get the tingles when I see that little pop-up saying a update is available and click here. Its downloaded ,installed, and updated in about 20 seconds! A new virus or Trojan or God forbid, a new keylogger can hit the internet and spread in a matter of days, and I'm sure this must make the definition writers lives a living hell. I have great admiration for them as they could have been wealthy doctors, but they have chosen to help us... the end users. (moment of silence here)

Last, we have anti-spyware programs,'The Flaming oil'! (my favorite). Their update features are like the anti-virus programs, so you have to be as vigilant with this method of defense too as you would be with the others. I've heard there are people out there that don't even know when their updates run, or even if its configured to do so! I refuse to believe this sordid rumor!

So you've got your defenses set up, you're looking good. But the best defense is a good offense, attack! That's what some organizations do. They prowl the net looking for websites that harbor drive-by downloads, URL Re-Directing and such. When they find them, they shut them down, or report them so effective protection can be manufactured. These people have my sincere thanks for what they do. With identity theft on the rise and Websense reporting that the average computer has 28 items of Spyware on it, we need all the help we can get. Oh sure, you're saying not my computer ! Well, lets discuss those little boxes that you click "I Agree" to when you download something. Do you read the entire statement? This is one way spyware has become so rampant, because so many downloads have extra software included in them. These can be harmful to your computers well being. KeyLoggers, popups, adware, malware...

Need I go on?

So my idea is that we need these shining knights from the castle to journey forth on a quest. They will be little robots or spiders like the search engines use. They will be given absolute power over harmful programs they find. They will be like Gort in the movie "The Day the Earth Stood Still".

Dell recently reported that 12% of their calls were for spyware damage, Microsoft says half of their reports of system crashes are caused by spyware. These calls cost these companies millions of dollars in revenue, which they then pass the costs of onto us, the consumers.

Who knows, if viruses and spyware ever get controlled, the average computer may only cost a dollar!

About the Author: Doug Woodall has a web site at http://www.spywarebiz.com There he provides free information and recommended products to combat Spyware.

His Website is recognized by Learning Fountain and ISafe Doug's Articles have earned him Trusted Author Status at ImpactArticles.com He is a member of the IWA (International Webmasters Association) Article edited for proper content by Wendy McCallum Permission to copy ok as long as about author info remains with article.

Copyright 2005 SpywareBiz

In The News:


pen paper and inkwell


cat break through


If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More