Do You Text Chat (IM) Online?

Written by Dee Scrip

By Dee Scrip © All rights reserved.

IM (Instant Messaging) - man, we thought we had it made inrepparttar shade when we stumbled over this unique way to communicate! Outside of talking person-to-person onrepparttar 105410 phone, IM wasrepparttar 105411 next best thing. Texting talk was endless and cost was nonexistent. Well, those wererepparttar 105412 good old days of yore – you know, those days of glorious innocence.

Just as we were getting oh so comfortable, happily IMing away to each other, then camerepparttar 105413 cloak-and-dagger entrance ofrepparttar 105414 treacherous “IM villains”. With their ominous arrival,repparttar 105415 party abruptly ended. It seemed like overnight, our instant messaging (IM) turned into instant mercenaries, andrepparttar 105416 carnage was strewn all overrepparttar 105417 Internet.

First, it was one by one, thenrepparttar 105418 numbers increased and starting growing exponentially, as friends began receiving, and inadvertently sending, viruses, worms, and Trojan horses. Then it went from bad to worse, as report after report surfaced describingrepparttar 105419 grisly results of innocent victims losing their identity because these villains had accessed their personal and confidential information. Truly this wasrepparttar 105420 darkest of times for all IMer friends – regardless ofrepparttar 105421 IM service we were texting on.

How could this have happened? And more importantly, how can we protect ourselves?

Well, I found out that these villainous hackers had accessed a nifty little program originally designed to benefit us, and twisted it to intercept our conversations traveling acrossrepparttar 105422 internet. They now have a profitable tool to use that intercepts our data packets and sends us a virus, and duplicates it by sendingrepparttar 105423 same ugly bug to everyone on our Buddy List.

Once a hacker has gained access to our Buddy List, they trick our friends into thinking WE, (a trusted source), are sending them a file to download. Then when our friends innocently downloadrepparttar 105424 file, these villains can then access their computers as well, and userepparttar 105425 personal and confidential information gathered to line their own pockets. How it affected businesses whose employees used IM to communicate…well, I will just let your imagination take over from there…becauserepparttar 105426 hackers let theirs dorepparttar 105427 same.

A lot of us were thinking that we had nothing to worry about because we had anti-virus software on our computers, and that providedrepparttar 105428 protection we needed. Wrong!

Anti-virus software is not designed to protect our data packets traveling acrossrepparttar 105429 internet. There are still no anti-virus applications that directly monitor IM traffic. This is due torepparttar 105430 difficulty in finding IM traffic as it is often embedded inside http packets. And what is worse yet is that Forrester’s, Root stated that “In 2005 and 2006, we expect IM to get hit with some serious attacks…”

Secure Your PC In 7 Steps And Only Using Free Software While Not Missing The One Critical Piece Of Free Software That's Been Overlooked By Many.

Written by rogel dias

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work When You Switch Your Pc On ? I Can And I Do It On A Pro-active Basis.

Surfing Means More And More To Stay Invisible, To Be Clean From The Inside And To Prevent Installment Of Malicious Software (So Preventing Unwanted Communication From Inside To Outside And From Outside To Inside).

How do you stay invisible while surfing? Of course by installing a firewall. How do I get one free? That'srepparttar easy point.

You like to stay invisible. But are you? And how do you know? You could do a test from someone out there trying to get in. But who can you trust?

Suppose you are doing a test. Do you obtain objective and reliable information about your PC-vulnerability (for free)?

Now even if you stay invisible, you will visit websites leaving cookies in your PC and you will download software. By doing so you will get spyware, viruses, ...

How can you detect them and delete them? That's alsorepparttar 105409 easy point: you have to install an anti-virus program and anti-spyware programs. Research onrepparttar 105410 internet makes it clear that you need 2 anti-spyware programs. Why 2? Because a great fish may be caught byrepparttar 105411 net but a small fish can swim throughrepparttar 105412 holes. Using 2 makesrepparttar 105413 holes smaller. What are those 2 free programs you have to download?

Can you prevent spyware to install on your PC? Maybe, maybe not. There is one free software that might prevent it (but not with 100% guarantee).

And even then you need an additional freeware program to prevent a piranha to install itself on your PC (just enabling itself to start up whenever you switch your PC on). This freeware program is overlooked by many and gives you an additional feeling of relief and security. It gives you also a hint whether some new downloaded software is good or bad (and thus giving yourepparttar 105414 chance to delete it anyway before it becomes too malicious).

Cont'd on page 2 ==> © 2005
Terms of Use