Antivirus Software

Written by Mike Ber

Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discoveredrepparttar need to have a computer at home. Atrepparttar 143261 same timerepparttar 143262 number of Internet surfers increased. This is a good thing because people are realizingrepparttar 143263 advantages offered byrepparttar 143264 world of technology. As soon as they discover this, they start using computers andrepparttar 143265 Internet more and more, but atrepparttar 143266 same time not consideringrepparttar 143267 threats that are coming in from all sides. They should know that if you don’t protect yourself, nobody will. These threats are now coming from everywhere and they are growing in number and complexity. First threats of this kind wererepparttar 143268 viruses. At first, viruses were not that harmful. They were designed to perform a simple task, like flashing a single message ontorepparttar 143269 user's computer screen. Alsorepparttar 143270 spread rate was slow, because not many people were connected torepparttar 143271 Internet. But nowrepparttar 143272 majority of viruses are programs intentionally written to obstruct with, or harm other programs or computer systems. And they are spreading very fast.

Many companies and people have had a lot of troubles because of these viruses. And sorepparttar 143273 need for antivirus software was born. At first one very simple antivirus appeared and this was enough. Now, asrepparttar 143274 threat is growing antivirus software are becoming a lot more complex. Some of them have also included a firewall so to better protectrepparttar 143275 users. In order to increaserepparttar 143276 competition, other antivirus software producers have also come up with a wonderful idea: to offer free scan online. This was a big help for people that are frequently using a computer mostly for their personal use, meaning it is not attached to a network and usesrepparttar 143277 Internet only from time to time. Now, they don’t have to spend a lot of money to buy antivirus software that will be used very rarely.

Most of these antivirus programs have to be bought in order for you to use them at their full capacity. Also you haverepparttar 143278 option to test a so called “free trial version”. These trial versions include all or most ofrepparttar 143279 software’s features, and are available to be checked out byrepparttar 143280 user for a short period of time, usually 30 days. After these 30 days,repparttar 143281 program can no longer be used. Other antivirus software producers use another method; they offer a free trial version that you can keep forever. But it is not fully operational, meaning some ofrepparttar 143282 options ofrepparttar 143283 program cannot be used as they are not activated. After you have tried a program and you consider it is fit for your need, then you’ll have to buy it to protect your computer at its full capacity.

Lately, viruses are mostly spread through e-mails because this isrepparttar 143284 most common use ofrepparttar 143285 Internet. Also, e-mail viruses are easier to develop. E-mail viruses make use ofrepparttar 143286 ability of having macros or scripts implanted in word documents, spreadsheets, HTML pages, and are programmed to run whenrepparttar 143287 document is opened. But how does an e-mail virus works? When an e-mail with an infected document or program is received,repparttar 143288 user unknowingly opens a document/program, which in turn executes a code to openrepparttar 143289 e-mail directory and to send a copy of itself as an e-mail attachment to a certain number of addresses. Some ofrepparttar 143290 recipients ofrepparttar 143291 e-mail open its attachment andrepparttar 143292 process repeats itself.

This is whererepparttar 143293 antivirus program comes in. This program is set to check all incoming and outgoing messages and their attachments. If an e-mail is detected to have a document or program infected with a virusrepparttar 143294 program offers several possibilities to deal withrepparttar 143295 threat: deleterepparttar 143296 e-mail, put it in quarantine or try to disinfect it. Most ofrepparttar 143297 times, these choices are left torepparttar 143298 user’s decision. It is up torepparttar 143299 user to setrepparttar 143300 program in such manner to best fit his needs. But not all viruses are coming by e-mail. A few of them use security errors inrepparttar 143301 operating system or your Internet browser to be launched automatically. But if you keep your antivirus and allrepparttar 143302 other programs updated, there will be a small chance of being infected via this route.

Spyware Definitions List

Written by Gary Gresham

The adware and spyware definitions list is very long. Butrepparttar definitions listed below arerepparttar 143226 most common ones. This is a glossary of spyware facts and terms so you'll know what these malicious programs are and what they can do to your computer. Adware Adware components are generally installed along with a shareware or freeware programs you download. The adware developer creates pop up windows that generate advertisement revenue for them. Most adware components are actually installed with consent fromrepparttar 143227 user. This happens because most people never readrepparttar 143228 end-user license agreement that comes with software. Spyware Spyware is most often installed bundled with freeware or shareware, much like adware. Spyware programs gather and transmit sensitive and personal information about your online behavior to an unknown party. The data is collected without you even knowing it happened. Byrepparttar 143229 time you discover it,repparttar 143230 damage is done andrepparttar 143231 hacker is long gone. Browser Hijackers Browser hijackers are innocently installed as helpful browser toolbars. They can alter your browser settings and can change your default home page to point to a site that generates revenue forrepparttar 143232 hijacker. Trojan Horse Programs Trojan horse programs sneak into your system and run without you realizing it similar to spyware. Programmers use these programs for any number of malicious uses and not one of them you would approve of. The good thing is Trojan horse programs do not duplicate themselves.

Cont'd on page 2 ==> © 2005
Terms of Use