Spyware - Scourge of the new Millenium

Written by Niall Roche


Spyware isrepparttar virtual plague ofrepparttar 118687 new Millenium. You no longer have to receive emails with viruses in them or even click on dangerous links on websites. Simply surfingrepparttar 118688 web can now leave you wide open torepparttar 118689 scourge of spyware. You may also hear spyware referred to as malware.

What is spyware? Spyware is when a program is placed on your PC without your consent. The most common way for this to happen is when you install a separate application such as a file sharing program or free download utility on your computer. The program you install also places some "extra" programs on your PC. These extra programs perform tasks from recording what websites you visit to popping up ads on your screen. More worrying arerepparttar 118690 spyware programs that record everything you type on your keyboard. That's right. Your most private instant messages, emails and chat room discussions can easily be stored and transmitted without your approval. Scary stuff!

Are there different types of spyware? There are many different classifications of spyware butrepparttar 118691 following arerepparttar 118692 most dangerous types:

Adware The most common type of spyware. These are small programs which sit on your computer waiting for you to go online. Oncerepparttar 118693 adware detects that you're connected torepparttar 118694 Internet it starts sending you popup, popover and popunder ads for anything from airline tickets to porn site membership. Not only that but information on your viewing habits is then sold on to marketing companies who will then send you more junk email and popup ads than you ever thought possible.

Browser Hijacker These are just plain annoying. These install themselves on your computer and change your default homepage and search engine to something else. Every time you start your web browser it will bring you to a page filled with ads, porn or other unwanted material. This interrupts your web browsing and is intensely annoying. Most browser hijackers are also data miners. A data mining program reports your web browsing habits to a central database. This information is then sold on to marketing companies.

Keyboard Logger These programs are designed for one thing - theft. When you log in to your online banking these can record your PIN number. When you check your private email account these programs can record your password. Keyboard loggers are potentially one ofrepparttar 118695 most damaging pieces of spyware because ofrepparttar 118696 potential financial dangers and theft of personal information.

Internet Security Basics 101

Written by Niall Roche


The explosive growth ofrepparttar Internet has meant that thousands of people are today experiencingrepparttar 118686 joys of being online forrepparttar 118687 first time. With growth there always comes pain. Be it your growing pains as a child orrepparttar 118688 growth and development of this part of our culture calledrepparttar 118689 Internet.

Firstly we need to quickly explain whatrepparttar 118690 Internet is and where it came from. The Internet isrepparttar 118691 offspring of a military project called Arpanet. Arpanet was designed to provide reliable communication during global nuclear war. A vast network of interconnected computers was set up all overrepparttar 118692 world to allowrepparttar 118693 various branches of US and NATO forces to communicate with each other.

Nuclear war never came (thankfully) andrepparttar 118694 world was left with a massive network of computers all connected together with nothing to do. Colleges and universities started to use these computers for sharing research internationally. From there it grew and spread outside colleges to local homes and businesses. The World Wide Web was born and its father was a guy called Tim Berners Lee.

When you're connected torepparttar 118695 Internet you're sharing a vast network with hundreds of millions of other users. This shared network provides resources that 15 years ago were never thought possible. Unfortunately when something is shared its open to abuse. Onrepparttar 118696 Internet this abuse comes from hackers and virus creators. Their sole intent is to cause chaos and/or harm to your computer system and millions of other computer systems all overrepparttar 118697 world.

How do you combat this? You need an Internet security system. This might sound complicated but your Internet security system will be quite straigtforward being comprised of just 2 - 3 Internet security products. We'll look at each of these products in more detail now:

AntiVirus Software The first and most critical element of your Internet security system is antivirus software. If you don't have up-to-date antivirus software on your PC you're asking for trouble. 300 new viruses appear each month and if you're not constantly protecting your system against this threat your computer will become infected with at least one virus -it's only a matter of time.

Antivirus software scans your PC for signatures of a virus. A virus signature isrepparttar 118698 unique part of that virus. It can be a a file name, howrepparttar 118699 virus behaves orrepparttar 118700 size ofrepparttar 118701 virus file itself. Good antivirus software will find viruses that haven't yet infected your PC and eliminaterepparttar 118702 ones that have.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use