Most Common Ways to Accumulate Spyware (where It is Downloaded to Your PC)

It is possible that if one avoided all sources of spyware, ad-ware and virus infection that infection would be at minimal levels. Although I don't recommend using only this method as a form of fighting spyware, it can be a potentially effective mean. Used in conjunction with a virus scanning program (I recommend Avast), abstaining from visiting these web sites or using these programs will help your PC to fight off infections, infestations and slower speeds due to unneeded running processes.

The most common places where your PC will pick up spyware, ad-ware and viruses will be adult websites or websites related to security. By security, I mean websites related to computer hacking and the like. If you partake in software piracy, you will notice that many of these websites that are piracy download zones have javascripts and cookies running that download software to your computer unknowingly. They usually come in the form of cookies. If you run a good virus program while you visit these sites, your virus program will most certainly warn you to "abort the connection" or "terminate the script." This means a server-side script is running to put spyware in the form of cookies onto your hard drive.

Another good spot to accumulate spyware, especially trojans, is peer to peer file sharing software. Such programs like Bearshare, ARES, Kazaa, etc. have been known to be breeding grounds for trojan horses and keyloggers for sometime. I recommend if you decide to use these programs, you use the "lite" version of the program. Lite versions of said programs have been scaled down in memory usage and the like. They will still operate just as well as the full program, but your computer will like you better for not subjecting it to unknown dangers.

And alas, the final spot of interest would be chain mail letters with attachments. These annoying buggers are usually sent to you by friends with too much time on their hands. Some people become addicted to chain mail letters; they send out every single one they receive. These letters sometimes can have viruses in their attachments, but because the average computer user does not realize it, he or she is spreading a virus. ALSO NOTE: Chain mail letters have been known to connect pedophiles with their prey. This is because the person who receives the letter can trace it back to every single person who has read it. Notice a chain mail letter has tens, maybe hundreds of e-mail addresses upon it, and sometimes these belong to young people (as young people make up a large portion of Internet users). Use a virus scanning program that checks your incoming mail (Avast will do this), and use something like NetNanny to make sure your kids have no strange men or women talking to them on MSN messenger.

I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com

In The News:


pen paper and inkwell


cat break through


Cross-Platform Custom Software Development & Integration ? IT Strategy for Large Corporation

Microsoft Business Solutions products: Great Plains, MS CRM, Navision, Axapta,... Read More

Upgrading Great Plains Dexterity Customization ? switching to new technologies: SQL, Crystal, eConne

1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More

Alien Intruders!

You probably didn't casually invite, or extend a formal attendance... Read More

Microsoft Small Business Manager eCommerce ? Overview

Microsoft Business Solutions Small Business Manager is scaled down Great... Read More

Easy Guide to RAID Recovery

What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More

Microsoft CRM Implementation for Large Corporation ? overview

Microsoft Business Solutions CRM is now approaching the phase of... Read More

An Introduction to .NET Framework

.Net Framework is a platform or development environment to seamlessly... Read More

Accounts Payable: A Powerful Document Management and Workflow Solution

Accounts payable is just one area of office management where... Read More

Free Software: How Not To Get More Than You Bargained For!

I completed an experiment recently. I wanted to find out... Read More

Linux ? Keyboard Or Mouse

Just stress testing one of the latest Linux distributions. Been... Read More

Unwanted Files

A LOT OF UNWANTED FILES.When you uninstall an item of... Read More

How To Identify, Cure and Prevent Spyware/Adware Infections

Just when you thought you were Web savvy, one more... Read More

DVD Burning Tips

CD and DVD replication is a process that works by... Read More

Perfectly New Database Query Tool - Foxy SQL Pro Released

Are you a database professional? Do you work with a... Read More

Do You Want Your Own Fully Programmable ERP? - Part 1

We are in a transition phase in the Managerial Administration... Read More

OLAP, An Alternative Technology Over Spreadsheets

Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More

ERP Implementation: Success Factors

As seeing large number of implementations ? in our case... Read More

Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL ? Development Options

Microsoft bought Navision, Denmark based software development company, along with... Read More

Microsoft Great Plains international implementation ? USA / Mexico ? overview for consultant

Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More

SQL Administrator Skills Required to Support Microsoft Great Plains

Microsoft Great Plains is becoming more and more popular and... Read More

5 Time-Saving Tips in Microsoft Word

Whether you have used Microsoft Word for years, have just... Read More

Document Templates Give You The Perfect Framework For Your Documents

When it comes to running an office, the SOHO entrepreneur... Read More

Configure Windows Indexing Service for Performance

The Windows Indexing Service provides you with the ability to... Read More

Microsoft Great Plains: Manufacturing or Bill of Materials - Overview for IT Specialist

Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More

Your Computer May Be Infected, Heres How To Check (NOT about virus)

NOTE: Please take time to read on - it may... Read More

How to Evaluate Staffing Software

If you are in the market for new staffing software,... Read More

netstat - Linux Command to Display Networking Information

In linux, one of great commands for finding out information... Read More

Know-how in Microsoft Publisher

For those who still don't know, Microsoft Publisher helps computer... Read More

Troubleshoot Windows with Task Manager

Task Manager is a Windows system utility that displays thetasks... Read More

Benefits of Integrating Online Chat Software with CRM

Customer Relationship Management (CRM) is a strategy and processes used... Read More

Integrating Microsoft Great Plains Accounting/ERP: RMS, CRM, eCommerce, Lotus Domino ? overview

Microsoft Business Solutions Great Plains has substantial market share among... Read More

Reloading Windows XP

If you have been running Windows XP for a couple... Read More

The Importance of Timely Timesheets

Whether you are a small consultancy firm, a medium sized... Read More