How Safe is Your Success? Part 4 of 8

Written by Bill Hely


"How Safe is Your Success" is a series of eight articles. Each article addresses a different aspect of a universal problem which is of particular importance to those who do business on-line. Most Internet users are at least aware there are dangers "out there", but few appreciaterepparttar real extent of those dangers,repparttar 103505 possible (even likely) consequences, orrepparttar 103506 best, most practical and least expensive means of countering them. This series is intended to at least provide some useful awareness ofrepparttar 103507 situation.

-------------------------

Part 4 - Adware and Spyware

In Part 3 of this series I stressedrepparttar 103508 importance of having an anti-virus package installed on your PC, andrepparttar 103509 extreme importance of keeping it current with updates fromrepparttar 103510 publisher ofrepparttar 103511 package. Unfortunately, many people who do appreciaterepparttar 103512 need for such precautions fail to make an important distinction — one which leaves them exposed to threats they mistakenly believe they are protected against.

You see, while a good anti-virus program can detect and deal with many variations onrepparttar 103513 virus/trojan/worm theme, it can't handle all variations. An anti-virus program is a good start, but you can't stop there. Into your defensive line-up you must add a few more specialized scanner-type programs to catch some ofrepparttar 103514 threatsrepparttar 103515 anti-virus program can't handle.

It is beyondrepparttar 103516 scope of this short article to delve intorepparttar 103517 differences between virus, trojan, worm, adware and spyware — nor is an understanding ofrepparttar 103518 characteristics of each necessary in order to effectively combat them. Forrepparttar 103519 more curious reader, my security Bible "The Hacker’s Nightmare" deals with all threat types in some detail. It is however necessary to appreciate that:

(a) All variations are extremely prevalent; (b) There are differences between each type of threat; (c) There can be further (sometimes significant) variations within each category; (d) There is no single antidote that will protect you against all ofrepparttar 103520 above.

You may recall from Part 3 that, forrepparttar 103521 average home and small business computer, I generally recommend againstrepparttar 103522 all-in-one security suites that purport to protect you from a multiplicity of threats, so in that context point (d) above is a valid observation. For my reasons for that recommendation please refer torepparttar 103523 previous part in this series.

Don’t worry! The fact that we need several somewhat similar programs in our arsenal isn't going to impactrepparttar 103524 bank balance to any significant degree. As I pointed out inrepparttar 103525 previous article, many ofrepparttar 103526 very best solutions in this threat category are quite free. That's even more fortunate than it at first seems. Whilerepparttar 103527 programs I use and recommend are extremely effective, they aren't perfect. Sometimes you need to install two competing programs ofrepparttar 103528 same type, because often one will catch intrusions thatrepparttar 103529 other won't, and vice versa. These programs are invariably quite small and don't place any significant load onrepparttar 103530 computer, sorepparttar 103531 extra protection is very worthwhile. A good example of this multi-application recommendation is adware/spyware detection.

While it has it's quirks and it does look a bit rough, in my opinionrepparttar 103532 most effective software solution of all against adware & spyware is a product called Spybot-S&D (S&D stands for "Search & Destroy") from PepiMK Software. Spybot is free to both commercial and home users.

Spybot's main competitor is Ad-Aware from LavaSoft. While Ad-aware is a commercial product, there is a very adequate Personal version that is free for non-commercial use. Implementrepparttar 103533 free version on your home PC. For your office/business computers LavaSoft offers several packages, full details of which you can get from their website.

How Safe is Your Success? Part 2 of 8

Written by Bill Hely


"How Safe is Your Success" is a series of eight articles. Each article addresses a different aspect of a universal problem which is of particular importance to those who do business on-line. Most Internet users are at least aware there are dangers "out there", but few appreciaterepparttar real extent of those dangers,repparttar 103504 possible (even likely) consequences, orrepparttar 103505 best, most practical and least expensive means of countering them. This series is intended to at least provide some useful awareness ofrepparttar 103506 situation.

-------------------------

Part 2 – Shoring Up Your Browser

In Part 1 of this series I gave you some "homework" reading. If you followed up on that recommendation you have already had a glimpse of some ofrepparttar 103507 things we'll discuss in this part. If you didn't do so back then, I urge you to read that article before continuing: http://hackersnightmare.com/FreeContent/Browser_Wars.pdf

Now, there simply isn’trepparttar 103508 space available here to get intorepparttar 103509 specifics ofrepparttar 103510 various browser brands and versions so, where specifics are at all necessary, I'm going to restrict this article to Microsoft's Internet Explorer. Despiterepparttar 103511 inroads made by competitors such as Mozilla Firefox, Internet Explorer is stillrepparttar 103512 choice (even if by default) of 90% ofrepparttar 103513 worlds Internet-using population. No matter whose survey figures you choose to believe, it's somewhere around that number. Even so, whilerepparttar 103514 fine detail may differ,repparttar 103515 general warnings and recommendations herein apply to all browser brands.

As computer programs become more and more complex,repparttar 103516 likelihood of errors somewhere inrepparttar 103517 thousands – even millions – of lines of programming code becomes so high as to be almost guaranteed. Obviously it is thus essential that there be some way to correct any errors that may be discovered afterrepparttar 103518 program has been released. The method of doing so is referred to as "applying patches and/or updates". Broadly speaking, we can say that patches fix "broken things", while updates add new functionality. In either case it is usually a simple process of downloading a small corrective file and running it to applyrepparttar 103519 fix/update torepparttar 103520 main browser program.

Unfortunately, if they think about it at all, millions of browser usersrepparttar 103521 world over takerepparttar 103522 position "if it works, why mess with it?". Their browser gets them aroundrepparttar 103523 Internet and that's all they want of it. But they are giving no thought to what is happening behindrepparttar 103524 scenes; to what advantage is being taken ofrepparttar 103525 "broken things" they haven't bothered to patch.

A great example ofrepparttar 103526 dangers of such complacency can be found in a short article from USA Today that is actually more to do with firewalls (which we will look at in Part 7 of this series). I urge you to read this article now, paying particular attention torepparttar 103527 fact thatrepparttar 103528 malicious exploits mentioned were all targeted at, and made possible by, known flaws in Internet Explorer – flaws for which a patch was available but had not been applied. Please do read this article before continuing: http://hackersnightmare.com/FreeContent/Other/HoneyPots.pdf

Patches were available to plugrepparttar 103529 holes that were exploited byrepparttar 103530 MS Blaster and Sasser worms (as described inrepparttar 103531 above article) even before those attacks took place. It wasrepparttar 103532 sheer number of unpatched Internet Explorer installations globally that allowed those very costly and near-catastrophic attacks to take place at all. Instead of going off with a bang that was heard aroundrepparttar 103533 world and echoed in allrepparttar 103534 mainstream media, they should have resulted in nothing more than a fizzle.

Internet users who don't patch their Windows Operating System and browser regularly are doomed to get infected. If you have an always-on broadband connection, then make that a guarantee. The really insidious thing about all this is that you often will not even know that someone or some thing has squirreled away inside your computers. Only if you are lucky will you be alerted by "strange things" happening or some sort of obvious problem. But be aware an infection can be more akin to a slow cancer – invisible but "deadly" to your safety, your security and possibly to your bank account. Your files can be altered and your precious data browsed by strangers without your knowing anything about it.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use