How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to employ software, along with our intelligence, to prevent viruses and spyware. To put this article into proper perspective, we'll use Medieval defense tactics.

This is accomplished by 3 methods. First, a firewall... 'The Castle Moat' so to speak. A firewall can't see inside your computer beforehand though, so if any viruses or spyware were present before the firewall was installed then its of no use. Of course, its extremely good at preventing new attacks.

Second, a anti-virus program.... 'The Castle Drawbridge! They will not provide much help with spyware, but good virus protection is as desirable as one of Avaris's dreams! One drawback can be the updates, of course.If you've just updated Wednesday night and a virus hits the next day, then you may not be protected till next Wednesday night, and by then it may be too late. If you're smart, you will have signed up for email alerts with the provider, or even better, you'll have a anti-virus program that has a real time update feature. I get the tingles when I see that little pop-up saying a update is available and click here. Its downloaded ,installed, and updated in about 20 seconds! A new virus or Trojan or God forbid, a new keylogger can hit the internet and spread in a matter of days, and I'm sure this must make the definition writers lives a living hell. I have great admiration for them as they could have been wealthy doctors, but they have chosen to help us... the end users. (moment of silence here)

Last, we have anti-spyware programs,'The Flaming oil'! (my favorite). Their update features are like the anti-virus programs, so you have to be as vigilant with this method of defense too as you would be with the others. I've heard there are people out there that don't even know when their updates run, or even if its configured to do so! I refuse to believe this sordid rumor!

So you've got your defenses set up, you're looking good. But the best defense is a good offense, attack! That's what some organizations do. They prowl the net looking for websites that harbor drive-by downloads, URL Re-Directing and such. When they find them, they shut them down, or report them so effective protection can be manufactured. These people have my sincere thanks for what they do. With identity theft on the rise and Websense reporting that the average computer has 28 items of Spyware on it, we need all the help we can get. Oh sure, you're saying not my computer ! Well, lets discuss those little boxes that you click "I Agree" to when you download something. Do you read the entire statement? This is one way spyware has become so rampant, because so many downloads have extra software included in them. These can be harmful to your computers well being. KeyLoggers, popups, adware, malware...

Need I go on?

So my idea is that we need these shining knights from the castle to journey forth on a quest. They will be little robots or spiders like the search engines use. They will be given absolute power over harmful programs they find. They will be like Gort in the movie "The Day the Earth Stood Still".

Dell recently reported that 12% of their calls were for spyware damage, Microsoft says half of their reports of system crashes are caused by spyware. These calls cost these companies millions of dollars in revenue, which they then pass the costs of onto us, the consumers.

Who knows, if viruses and spyware ever get controlled, the average computer may only cost a dollar!

About the Author: Doug Woodall has a web site at http://www.spywarebiz.com There he provides free information and recommended products to combat Spyware.

His Website is recognized by Learning Fountain and ISafe Doug's Articles have earned him Trusted Author Status at ImpactArticles.com He is a member of the IWA (International Webmasters Association) Article edited for proper content by Wendy McCallum Permission to copy ok as long as about author info remains with article.

Copyright 2005 SpywareBiz

In The News:


pen paper and inkwell


cat break through


A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft Human beings are pretty... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More