Most Common Ways to Accumulate Spyware (where It is Downloaded to Your PC)

It is possible that if one avoided all sources of spyware, ad-ware and virus infection that infection would be at minimal levels. Although I don't recommend using only this method as a form of fighting spyware, it can be a potentially effective mean. Used in conjunction with a virus scanning program (I recommend Avast), abstaining from visiting these web sites or using these programs will help your PC to fight off infections, infestations and slower speeds due to unneeded running processes.

The most common places where your PC will pick up spyware, ad-ware and viruses will be adult websites or websites related to security. By security, I mean websites related to computer hacking and the like. If you partake in software piracy, you will notice that many of these websites that are piracy download zones have javascripts and cookies running that download software to your computer unknowingly. They usually come in the form of cookies. If you run a good virus program while you visit these sites, your virus program will most certainly warn you to "abort the connection" or "terminate the script." This means a server-side script is running to put spyware in the form of cookies onto your hard drive.

Another good spot to accumulate spyware, especially trojans, is peer to peer file sharing software. Such programs like Bearshare, ARES, Kazaa, etc. have been known to be breeding grounds for trojan horses and keyloggers for sometime. I recommend if you decide to use these programs, you use the "lite" version of the program. Lite versions of said programs have been scaled down in memory usage and the like. They will still operate just as well as the full program, but your computer will like you better for not subjecting it to unknown dangers.

And alas, the final spot of interest would be chain mail letters with attachments. These annoying buggers are usually sent to you by friends with too much time on their hands. Some people become addicted to chain mail letters; they send out every single one they receive. These letters sometimes can have viruses in their attachments, but because the average computer user does not realize it, he or she is spreading a virus. ALSO NOTE: Chain mail letters have been known to connect pedophiles with their prey. This is because the person who receives the letter can trace it back to every single person who has read it. Notice a chain mail letter has tens, maybe hundreds of e-mail addresses upon it, and sometimes these belong to young people (as young people make up a large portion of Internet users). Use a virus scanning program that checks your incoming mail (Avast will do this), and use something like NetNanny to make sure your kids have no strange men or women talking to them on MSN messenger.

I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com

In The News:


pen paper and inkwell


cat break through


Brand Your Websites URL With a Favicon

Have you ever noticed that when you look at your... Read More

Looking for an Alternative to Microsoft Office? You Should Be!

Now is the time to look at an alternative to... Read More

Linux Secrets

The first thing that you will notice about Linux Red... Read More

Marketing Your WinRunner Team

It won't matter how effective your WinRunner Team is if... Read More

Microsoft Great Plains POP: Purchase Order Processing ? Overview For Consultants

Great Plains Purchase Order Processing (POP) module makes up one-third... Read More

Industry Experts Answer the One Million-dollar Question - Why Genie Backup Manager?

Many reasons made GBM a unanimous choice for experts, one... Read More

Dashboard Widgets for Windows

For a windows user like me, just can watch with... Read More

Spyware Protection: A Must for Any Home Computer

Now that spyware is the single most dangerous threat to... Read More

Call Alert Notifications - Free Answering Machine Software for PCs

If you're online using a dialup Internet connection, you'll probably... Read More

Groupware: Answers the 5 Questions of Document Collaboration

Every organization which creates collaborative documents, whether they are budgets,... Read More

How to Choose the Right Accounting Software for Your Business

With any good luck and a good amount of hard... Read More

Microsoft Great Plains: Dexterity vs. eConnect ? FAQ

Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics/eEnterprise... Read More

OSI Layers Model

IntroductionDuring the early years of our modern computer era, very... Read More

XML Parser and Their Types

XML parser is a software module to read documents and... Read More

eCommerce development for Microsoft Great Plains: tools and highlights for programmer

Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More

Microsoft Great Plains Middle East - Arabic Language Support

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

Cisco Certification: Introduction To ISDN, Part IV

In part III of this ISDN primer, we learned that... Read More

A Simple Guide To Wikis

A wiki is an editable text-based website. But you don't... Read More

Explore the Internet in a Whole New Way

For a long time now Microsoft's Internet Explorer has ruled... Read More

10 Things You Can Do With Photoshop CS2 That You Couldnt Do Before Now

Is Photoshop CS2 worth the upgrade? You bet it is!... Read More

Spyware, What is it?

Spyware, what it is and what it does. Basically, spyware... Read More

Introduction To ISDN, Part II

In the previous ISDN article, we looked at how and... Read More

Programming Language Migration Path

While I was preparing some personal background information for a... Read More

Dreamweaver vs FrontPage

There are two major WYSIWYG(What You See Is What You... Read More

Dig Out That Worm

Internet worms. Is your PC infected?If your computer has become... Read More

CRM and Customer Life Cycle

Customer Relationship Management or CRM is a combination of enterprise... Read More

Examining the Substance of Studio MX

To all web designers out there, this article is for... Read More

Three Steps To Windows Safety Heaven

Now there are Three Steps To Heaven Just listen and... Read More

Outlook... Not Just for Email! Using Your Outlook Calendar

Microsoft Outlook is one of the most widely used software... Read More

Business Planning Software

Once a business idea is selected, it is highly recommended... Read More

COSMIC: A Small Improvement on the Symons Method

The COSMIC FP (function point) software quality metric, is no... Read More

Groupware: What Works the Way Businesses Do?

GroupwareThe internet is full of 1.5 million to 7 million... Read More

Computer Phones ? Facts and Fallacies

The stakes are high when considering security, privacy, and savings,... Read More