27.9.09

Spyware Programs Are Out To Get You




by: Lawrence Andrews
The average computer is packed with hidden software that can secretly spy on online habits.

The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year.



There are currently over 38,000 spyware and adware programs that are infecting innocent Internet users such as yourself through downloadable games, music, screensavers, pictures, pop-ups, emails, and the list goes on and on. Spyware and Adware can cause your PC to run extremely slow and even crash, and allow hackers and advertising companies to invade your privacy whenever they wish.



What Is Spyware?

Spyware is a broad term for programs that collects information from your computer without your knowledge or consent. Spyware is a software program that transmits a unique code to identify you (for tracking purposes) without your knowledge or consent. The programs collects or transmits information about your computer use, or other habits without your knowledge or consent.




This internet pest which is better known as spyware installs itself on your computer without your knowledge or consent. It performs other unwholesome duties, and continue to reinstalling itself no matter how many times you remove it.



Spyware!

It has become so pervasive that lawmakers in the US are looking into ways to prevent or regulate it. The Spy Audit by EarthLink reflects the results of scans involving over one million computers between January and March. It uncovered more than 29.5 million examples of spyware.



Why should I be concerned about spyware or adware?
Passwords, credit card details and other personal information could end up in the wrong hands.
Your computer could get unwanted viruses, worms or even Trojan.


You would receive unwanted emails.


Your computer could be used by malicious operators to do damage not only your own computer, but to other computer users too.



How did I get spyware on my computer and how do I eliminate it?

It usually happens when you visit a web site, and are prompted to download something that is said to be "necessary" to view or use features of that web site. Also, you might want or download a program that has some nice features, but also installs program code that can send information out without your knowledge.




"By tracking and publicizing the growth of spyware, we can better educate consumers of its risks and encourage them to take steps to protect themselves and their families while online," said Christine Stevenson of Webroot, which conducted the scans.




People concerned about what might be lurking on their machine can download software such as the popular ZoneAlarm Pro, Pest Patrol, and Spybot to disinfect their computer.



About the author:

Lawrence Andrews is a software developer, consultant and author of numerous books. Visit his site for more information at http://www.traffic-o-matic.com
Data Recovery Tips, please visit us,  and Computer Virus Tips, read here
 
Related Posts :


Spyware and Adware – Are You Protected ?



by: Clyde Dennis
Spyware is without doubt the most prevalent threat to online computer privacy and security. 
 
Exactly what is Spyware?
Spyware applications are programs and files that hide on your PC's hard drive without your direct knowledge. They allow hackers and advertising companies to track your every move, both online and even when you work offline. 
 
Tracking the websites you visit, the items that you buy online, the emails you send and receive, your Instant Message dialog, and worst of all they can even record your credit card number, personal identification numbers, and all of your passwords. 
 
If you use dial-up to connect to the Internet then spyware can be used to bill 900 numbers to your telephone bill. 
 
Spyware allows hackers to take control of your browser and alter your computer system files.
These computer parasites slow down your Internet connection by inundating you with unwanted Spyware pop-up ads. 
 
This is just a short list of the harm that Spyware can cause.
Note: Spyware and Adware cannot be detected by anti-virus and firewall software. 
 
Some Disturbing Facts About Spyware:
· Spyware infects 91% of all computers. That equates to an alarming 9 out of 10 computers!
· 27.3 million Americans have been victims of identity theft in the last five years, including 9.91 million people or 4.6% of the population in the last year alone. 
 
Keep reading to learn how to keep from becoming a victim of Identity Theft. 
 
Have you noticed your computer running slower than ever?
The reason for that may have to do with online advertisers adding Spyware, or Adware to your computer without your knowledge. 
 
Exactly what is Adware?
Adware works very much like Spyware.
Adware is software that will show you popup ads over and over. These files can also be extremely dangerous to your PC and could cause major problems with your Computer. 
 
Note: This article is an excerpt from a SPECIAL REPORT entitled "Spyware! – How To Get And Stay Safe". In the full report you'll find the information you need to effectively protect your computer and personal information. Avoiding the grief of dealing with problems like Identity Theft among others. 
 
The full version of the free report can be downloaded in PDF format by clicking over to http://www.easyhow-to.com/special-reports/spyware.htm

About the author:
Clyde Dennis, a.k.a. "Mr. How-To" has been writing and publishing Articles and Newsletters online since 1999. Clyde's company EASYHow-To Publications provides "How-To" information on How-To do, be or have just about anything one can imagine. For more information visit http://www.EASYHow-To.comEmail correspondence for Clyde should be sent to: cdennis at easyhow-to.com
Circulated by Article Emporium

So You've Never Used A Computer Mouse Before ?




by: Bonnie Archer
Here is a lesson for beginning computer mouse users. 
 
To hold the computer mouse:
Hold the sides of the mouse with your thumb on one side and ring finger or pinkie, which ever feels more comfortable to you, on the other side. Your index finger goes on the left button and your middle finger on the right button. (Some computer mice only have one button, some have several, some have a wheel which you can use your middle finger to depress the wheel then turn it up or down to scroll pages very quickly or slow depending on how quickly you turn the wheel. Personally I love the wheel and would not have a mouse without it!) When you are told to 'click' use the button under your index finger, or the left button. 
 
Moveing the computer mouse:
Slowly slide the mouse around on the mouse pad. See what happens to the arrow on the screen as you slide it around. 
 
Mouse pads:
You should have a mouse pad under your computer mouse, (although the new optic mice do not require one). You will have an array of choices when purchasing a mouse pad; find the one that is comfortable for you. Rest you hand on the mouse pad or desk and move it slowly there is no need to lift the mouse off the mouse pad unless you run out of room, then you just lift it up and reposition where needed. You don't need to move the mouse to the left or right, simply slide it left or right with the buttons still facing away from you. 
 
Clicking The Mouse:
Clicking sends a command to the computer. To click; gently press and release the left computer mouse button. Be careful not to move the mouse while you are clicking, if you accidentally do simply slide the mouse back to where you want to click and try again. Try to keep you hand relaxed on the mouse as you press and release without lifting your finger completely off the button. 
 
Thats all you need to know to start using your computer and that computer mouse.
Keep working on it and before you know it, it will feel like second nature to you and you will not even have to think about what you are doing, you will just do it. 
 
Note:
Most libraries have free computer classes for the beginner, if you feel you need hands on help this would be the perfect place to start! 
 
About The Author
B. Archer is a successful author and publisher of http://www.A1-computers.net.A great source of information about computers and computer accessories.
Circulated by Article Emporium

Seeking the most informative advice pertaining to computer memory



by: Tom
Sometimes when you're trying to find high-class information about computer memory, it will be tricky separating superior information from ill-equiped computer memory suggestions or guidance so it's astute to know how to qualify the advice you are presented with. 
 
CDW: Computer Memory
Shop CDW.com for the latest desktops, notebooks, printers, electronics and more. Pay just $9.99 for Ground Service shipping of any order up to 70 lbs. 
 
Now we'd like to give you some advice which we advise you to use when you're searching for information regarding computer memory. Please be aware that the advice we tender is only pertinent to internet based information concerning computer memory. Unfortunately we are unable to provide any guidance or advice for conducting research offline. 
 
Dell Small Business: Memory
Offer a range of performance-boosting computer memory products.
A great tip to follow when you are presented with information and suggestions on a computer memory webpage is to verify the ownership of the website. This may show you the people behind the site computer memory credibility The easiest way to reveal who owns the computer memory site is to find the 'about' page. 
 
Any worthwhile website providing information on computer memory, will almost certainly provide an 'about' webpage which will list the owner's details. The fine points should tell some indication about the site owner's capability. This means you can conduct an appraisal about the webmaster's familiarity and qualifications, to offer recommendations concerning computer memory. 
 
About the author:
Tom Brown is the webmaster for http://www.dataformat-special-news.info
Circulated by Article Emporium

Seeking the best assistance in relation to super computer




by: Tom Brown

Seeking the best assistance in relation to super computer. When you're in the hunt for top-quality information about super computer, you'll find it hard extricating superior advice from poorly sourced super computer proposals and directions so it is wise to know ways of moderating the information you are given. 
 
Now we would like to offer you some advice that we believe you should consider using when you are searching for information about super computer. Please understand that any recommendation we may offer is only appropriate to internet information concerning super computer. We don't really offer any advice or guidance when you are also conducting research in books or magazines. 
 
A terrifc piece of advice you can follow when you are presented with help and advice regarding a super computer website is to verify the ownership of the website. Doing this could reveal the owners super computer credibility The fastest way to determine who owns the super computer website is to look on the 'about' page or 'contact' page. 
 
Any worthwhile website providing information on super computer, will always have contact information which will record the owner's details. The info should make known some advice about the owner's skill and understanding. This enables you to make an assessment about the vendor's qualifications and experience to provide advice to you regarding super computer. 
 
About the author:
Tom Brown is the webmaster at intelligence-special-news.info

Circulated by Article Emporium

Searching for the latest and accurate help relating to computer programming



by: Tom
When you're seeking better-quality information about computer programming, it will be easier said than done sorting out the best information from ill-advised computer programming submissions and proposals so it is imperative to know how to judge the information you are offered. 
 
Here's a few tips that we think you should use when you are searching for information concerning computer programming. Understand that the advice we tender is only pertinent to web based information about computer programming. We don't really offer any tips or guidance for researching in 'real world' situations.

Elementool: Programming Defect Tracking
Web-based software bug tracking tool. Enables programmers to track application defects without downloading software. Offers a free basic option. 
 
A good pointer to follow when you are presented with information or advice on a computer programming web is to research who is behind the website. This could reveal the people behind the website computer programming integrity The fastest way to determine who owns the computer programming site is to look for the 'about' page. 
 
All highly regarded sites providing information about computer programming, will nearly always have an 'about' or 'contact' page which will list the people behind the site. The details should tell you a number of key indications about the site owner's capability. This enables you to make an assessment about the vendor's qualifications and experience to provide advice to you regarding computer programming .
 
About the author:
Tom Brown is the webmaster for http://www.factspecialnews.info
Circulated by Article Emporium

Registry Cleaners: Why do you need one?



by: Joseph Tierney
The registry is the place where your computer stores the configuration information about your computer and your installed programs so that your operating system can use them. 
 
Maintaining the registry is an important step in keeping your computer healthy. Registry problems can include slow performance, computer crashing, and the annoyingh Microsoft Windows error messages. 
 
If any of these describes you as a computer user:
- Has old drivers on their system that have not been removed.
- Installs or uninstalls software very often.
- Have third party programs running such as Spyware and Adware (you can't stop these from being installed)
- Remove software by deleting them from the Program Files folder.
- Installs or Uninstalls hardware. 
 
Then you absolutely need to be repairing your Microsoft Windows registry regularly! All of the above leave traces in your registry that will only hurt your computer in the long run. If you don't clean your computer to fix your registry than you are going to be in a whole world of trouble. 
 
Make sure that you backup your registry before you try to clean or fix anything. Most registry cleaners have registry backup automatically for you, but be sure to check them out. Remember, don't try to edit anything in the registry yourself unless you are very computer savvy. 
 
Why do you need a registry cleaner? Registry cleaners are important because it protects your PC from harmful processes. Is your computer slowing down for no apparent reason? Are you having errors that are not solved by your anti-virus or anti-spyware program? Your PC might be affected by applications that are running without your knowledge. Registry cleaners are a must! Registry cleaners ensure that your registry is clean. 
 
Some errors are just a quick registry fix, while others could be more problematic. 
 
If you keep your registry clean, free of viruses and spyware your computer will last much longer. Spend the time or money now for a registry cleaner to save you even more time or money later down the road.

If you are short on cash then there is a free registry cleaner available that I use exclusively. The program is called Error Nuker and it is a free ware registry cleaner. Error Nuker works on Windows XP, Windows 98, Windows ME, Windows NT4, and Windows 2000. Microsoft Windows does NOT come with a registry cleaner. 
 
About the author:
Joseph Tierney is a surfer and 2005 high school graduate. To learn more about Error Nuker and other free registry cleaners, please visit http://www.cflwaves.com/free-registry-cleaner.htm
Circulated by Article Emporium

Rackmount Computer Keyboards




by: Max Bellamy
The other piece of vital equipment to accompany the rack mount computers and the monitors are the rack mount computer keyboards. Rackmount computer keyboards are built with durability and reliability in mind.
 
Most keyboards in home systems get attacked by cookie crumbs, soft drinks, children’s sticky fingers and a whole host of other awful things and yet, for the most part, they keep on functioning. But they’ll break down soon enough in the desert or on a glacier because they’re not made to withstand those harsh environments. The keyboards must be made of materials that will not rust or corrode, will not malfunction in extreme heat or cold and will continue to operate no matter what the workload. 
 
Rack mount computer keyboards are manufactured with two things in mind -- easy compatibility with the rack mount system and durability of the keyboard itself. Essentially, manufacturers chose the finest keyboard on the market and adapted it to conform easily to the requirements of rack mount computer systems. Made to slide into the rack mounts they fit easily into any 19-inch standard rack. The keyboard of choice became the Qtronix, which has become the gold standard of rack mount computer keyboards.
 
Manufactured to the highest standards available, the Qtronix is made to operate without failure under extreme circumstances.

Because of high user demand for rack mount computer systems, monitors and keyboards, the industry prides itself on quality manufacturing. There is no higher standard to achieve than to be recognized by the US military as a supplier of top quality products that soldiers in combat situations can depend on, explorers in the Artic can rely on and that any other user of these products can absolutely depend on. 
 
About the author:
Rack Mount Computers provides detailed information about rack mount computers, cases, monitors, and keyboards. Rack Mount Computers is the sister site of Refurbished Laptops Web.
Circulated by Article Emporium

Protect Your Computer And Your Personal Information From Spyware



by: Ryan Larson
Spyware is a broad term used for certain types of software that are downloaded onto your computer without your knowledge. Malware has become a phrase that is used when describing spyware and adware.
 
Spyware is placed on your computer in order to track your internet surfing habits. It knows every site you visit and every page on that site. 
 
Spyware also collects your personal information through software that tracks your actual keystrokes. If you fill in a form to make a purchase all your personal information, including name, address and credit card information can be tracked. The potential abuse of spyware tracking is also being discussed in some businesses that store secure information, such as credit card numbers or even medical records.

Adware is another type of spyware. It doesn't work by tracking your information as spyware does, but what it can do is actually change your browser settings without your consent. It can cause pop up ads to show on your computer. It can even place a new toolbar on your computer. Most people are unaware they even have any type of adware installed on their computer until their computer starts to slow down. 
 
The spyware business is a billion dollar a year industry with people getting very rich selling the information they steal about you. There is a case currently in court in the State of New York against a spyware company. The outcome of this legal case will hopefully mean the end of secretly placed spyware. 
 
In order to not fall prey to these types of malwares there are steps you can take. First, don't download freebies. A lot of services that are offered to you as "free" such as free music downloads are free per say, but the price you pay is allowing them to place spyware software or adware targeted advertisements on your computer. Read any agreements about the software very carefully before you download it. 
 
Run an anti spyware software program often along with your virus protection software. Generally spyware and adware are designed to be difficult to remove from you computer and they leave behind "ticklers" which reinstall the software. 
 
About the author:
This article courtesy of http://www.adware-eliminator-guide.com
Circulated by Article Emporium

PC Maintenance and Improving Performance



by: Shawn Shellenbarger
Once you bring your personal computer home from the store or receive it in the mail there is no one around to offer basic personal computer maintenance tips for cleaning up and improving performance of your computer. Maintenance and cleaning up of your PC should be part of a regular routine to ensure that you don't have any long-term problems with the computer. Unfortunately most basic computer users may not understand the mechanics of a computer or may feel intimidated with the maintenance. There are really simple steps anyone can take to ensure that your computer will continue working at the level it did when you first pulled it out of the box. 
 
One of the first files to become acquainted with on your computer is the System Tools, located under the Start Menu, then Programs, and Accessories. The System Tools houses basic maintenance tools like Disk Defragmenter, Disk Cleanup, Backup, Scheduled Tasks, and System Information and ScanDisk on some Microsoft Windows computers. Strange that these files are located in Accessories because they really are the key to keeping your system running correctly and helping to improve performance as the computer ages. 
 
On a regular basis you want to go to My Computer and then right click on the Local Disk (C Drive) and open up the Properties. This allows you to see how much space you are using and how much you have left to use on your computer. Under Tools in this area you can usually perform a scan of the disk. If you cannot run a disk scan from here, your Microsoft should have a disk scan available under the System Tools. It is important to run this disk scan to determine if there are any errors or problems running on your computer and the disk scan will repair those potential problems. Some experts recommend doing a thorough disk scan the first time and then a basic disk scan up to once a week to keep your computer performing at top conditions. 
 
After this it is important to regularly perform a disk cleanup, which is located either under Properties under the C Drive, or under System Tools. Be aware that both the disk scan and the disk cleanup can take quite a bit of time and it is best to before these maintenance tools when you will not be using the computer. Set a routine with yourself like performing the disk clean up and disk scan on Saturday night while you are watching movies with your family. After a disk cleanup, it also helps to regularly perform a disk defragmentation. A computer hard drive will begin to fragment over time, which means that programs that once worked in conjunction have become separated over time and may not be in the proper place to work well on your computer. This can slow down processes or make using certain programs difficult. Using the disk defragmenter can pull together those pieces again and return things to working order.

Basic maintenance routines that will ensure your computer runs at peak performance start with simply getting rid of files you do not use. If you have old word documents, software programs you have not used in a long time, or pictures and music you are not using, delete them from your computer. Remember that once you delete them, they do not automatically disappear, but instead go to the recycle bin and it is just as important to empty the recycle bin as it is to delete old files. 
 
Old internet files can also cause your computer to slow down. Often with a Disk Cleanup there will be an opportunity for you to get rid of temporary internet files, but you can also get rid of them on your own by going to your Temporary Internet files in Microsoft Explorer. Click on Tools then Internet Options, General Tab, Temporary Internet Files, and Delete Files. As well, take time to clean out any other temporary files you may have acquired, like downloads from the internet. Depending on the model of your computer, the temporary files could be in different locations, but most often when you go to Disk Cleanup and scan there will be an option to get rid of temporary files as well. 
 
One of the other helpful and easy ways to maintain your computer's performance is to always run your protection programs, use a personal firewall when accessing the computer, and always install software updates available for Microsoft and protection programs. Keeping up on regular maintenance and setting a routine for updates on the computer will ensure that your computer performs the way it was intended to when you first brought it home. 
 
About the author:
Shawn Shellenbarger
Maximum Software
http://www.PCPowerSuite.com
http://www.SpywareSnooper.com
http://www.PCBugDoctor.com
Circulated by Article Emporium

Notebook or Desktop Computer -- Which Should You Choose?



by: Reid Neubert
On TV and in the movies, we see a lot of portable computers being used in homes and offices. Does that mean that's the trend? Is that what you should get? 
 
Portable computers cost more, so unless you really have the need for one, you get a lot more computer for your money with a regular desktop PC. The main thing is portability. If you need a portable computer, get a laptop. ("Laptop," "portable," and "notebook" all refer to the same thing, by the way). Otherwise, a desktop computer is a better buy, and better ergonomically. 
 
The Price Difference
You might wonder why laptops cost more than desktop computers with comparable features and power. That is largely because it is more expensive to manufacture laptops and their parts. For portable computer components, factors such as compactness, the amount of heat they generate, their weight, and power consumption are more important than they are for desktops. Those factors add to their manufacturing costs. 
 
Space Requirements
While laptops are certainly compact, a desktop computer with a flat panel monitor can take up almost as little space. While called a "desktop" computer, the computer itself is most often kept on the floor. That leaves just the monitor, keyboard and mouse on the desk, which is really very similar in footprint to a notebook computer. 
 
A great way to further reduce the space taken up on the desktop computer is get a keyboard drawer to hold the keyboard and mouse. That way, they slide out of the way under the top of the desk when they aren't needed. 
 
Be Mindful of Ergonomics
Ergonomics is the science of designing and arranging things so that people can interact with them more comfortably and safely. The basic ergonomic principals for computer use tell us that, 1) the keyboard should be as close to your lap level as possible (assuming you touch-type), 2) the monitor should be about arm's length in front of you, and 3) the top of the monitor should be at about your eye level. Try achieving that with a laptop computer! Two words: im-possible. 
 
It is obvious then, that a desktop computer is much better ergonomically than a laptop is. For prolonged use, especially, you're much better off with a desktop computer. 
 
And Don't Forget Usability
Another aspect of ergonomics is usability. Because of size constraints, laptops also are lower on the usability scale than desktop PCs are. For one thing, laptop keyboards lack the separate groupings of the different sets of keys with space between them. For another, there are fewer keys on a laptop's keyboard, so some of them have to perform double duty. On a standard keyboard, you don't have to deal with that. 
 
Screen Resolution
Computer monitors -- the bulky ones, anyway -- can be set at different resolutions. In other words, you can change the fineness of the image on the screen. The range is typically 640x480 -- that is 640 pixel across and 480 pixels up and down -- to 800x600, 1024x768, or even higher. At 640x480, the icons and such appear quite large; at 1024x768, they are substantially smaller. The most common resolutions today for desktop computers are 800x600 and 1024x768. 
 
Something They Don't Tell You
Laptop displays, on the other hand, have a fixed, or native, resolution. You can change the setting, but then the images and text don't look good. While people tend to think that bigger numbers are better, a higher screen resolution may not work as well for you. It may make everything too small to see comfortably. 
 
Remember, the laptop's screen is smaller that a desktop's. While a typical desktop computer screen is 17" or so a laptop's is usually in the range of 12" to 15." That is a big difference. Make sure you can see everything clearly before choosing a high-resolution laptop. 
 
About the author:
Reid Neubert is the creator of ConsumerTechTips.com, the site that provides simple, useful information about consumer electronics for shoppers, plus money-saving links to online bargains from leading retailers. For more information or to contact Reid, visit http://www.consumertechtips.com
Circulated by Article Emporium

Network Security 101




by: Robert Flanglin
As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. It is important to protect your network and ensure the safety of all computers and users in that network. 
 
What is a Network?
In order to fully understand network security, one must first understand what exactly a network is. A network is a group of computers that are connected. Computers can be connected in a variety of ways. Some of these ways include a USB port, phone line connection, Ethernet connection, or a wireless connection. The Internet is basically a network of networks. An Internet Service Provider (ISP) is also a network. When a computer connects to the internet, it joins the ISP’s network which is joined with a variety of other networks, which are joined with even more networks, and so on. These networks all encompass the Internet. The vast amount of computers on the Internet, and the number of ISPs and large networks makes network security a must. 
 
Common Network Security Breeches
Hackers often try to hack into vulnerable networks. Hackers use a variety of different attacks to cripple a network. Whether you have a home network or a LAN, it is important to know how hackers will attack a network. 
 
One common way for a hacker to wreak havoc is to achieve access to things that ordinary users shouldn’t have access to. In any network, administrators have the ability to make certain parts of the network “unauthorized access.” If a hacker is able to gain access to a protected area of the network, he or she can possibly affect all of the computers on the network. Some hackers attempt to break into certain networks and release viruses that affect all of the computers in the network. Some hackers can also view information that they are not supposed to see. 
 
Destructive Attacks
There are two major categories for destructive attacks to a network. Data Diddling is the first attack. It usually is not immediately apparent that something is wrong with your computer when it has been subjected to a data diddler. Data diddlers will generally change numbers or files slightly, and the damage becomes apparent much later. Once a problem is discovered, it can be very difficult to trust any of your previous data because the culprit could have potentially fooled with many different documents. 
 
The second type of data destruction is outright deletion. Some hackers will simply hack into a computer and delete essential files. This inevitably causes major problems for any business and can even lead to a computer being deemed useless. Hackers can rip operating systems apart and cause terrible problems to a network or a computer. 
 
The Importance of Network Security
Knowing how destructive hackers can be shows you the importance of Network Security. Most networks have firewalls enabled that block hackers and viruses. Having anti-virus software on all computers in a network is a must. In a network, all of the computers are connected, so that if one computer gets a virus, all of the other computers can be adversely affected by this same virus. Any network administrator should have all of the essential files on back up disks. If a file is deleted by a hacker, but you have it on back up, then there is no issue. When files are lost forever, major problems ensue. Network security is an important thing for a business, or a home. Hackers try to make people’s lives difficult, but if you are ready for them, your network will be safe. 
 
About the author:
Robert Flanglin is very interested in security and enjoys writing about network security. Robert Flanglin also writes for the Network Security Journal ( http://www.networksecurityjournal.com).
Circulated by Article Emporium

Malware Quiz



by: Joel Walsh
Most people who think they know all about spyware, Trojans, viruses, and other malware really don't. Take this quiz to make sure you know who your enemies are. 
 
This quiz tests your knowledge of five of the most common kinds of malware, the software you don't want on your computer: Trojan, worm, virus, spyware, and adware. Keep in mind that there are at least seven other kinds of malware we know about. 
 
The answers are located at the end of the quiz. 
 
1. Which of the following is most likely to make your computer stop working?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
2. Which of the following is not a stand-alone program?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
3. Which of the following is most likely to send spam emails from your computer?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
4. Which of the following is lest likely to be detected with standard antivirus software?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
5. Which of the following is most likely to come with other malware?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
6. Which of the following is bundled with the peer-to-peer file-sharing software, Kazaa?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
7. Which of the following is most likely to install a "backdoor" internet connection?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
8. Which of the following is most likely to be involved in a denial-of-service attack?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
9. Which of the following is the only malware publicly documented as having been employed by the FBI to bring a suspect to trial?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
10. Which of the following is most likely to steal your identity?
a. Trojan
b. Worm
c. Virus
d. Spyware
e. Adware 
 
Answers:
1. c. virus. Trojans, worms, spyware, and adware all depend on your computer staying up and running. They use your computer's resources to accomplish whatever their designer intended, such as sending emails, displaying advertising, or stealing information from your computer. Viruses, however, are usually created by vandals who just want to damage as many computers as possible. 
 
2. c. virus. Viruses are not stand-alone programs. Just as biological viruses must take over the cells of their host in order to function and reproduce; computer viruses must take over one or more files of the computer on which they are stored. Trojans, worms, spyware, and adware are all stand-alone programs that can run without the help of another application, though they often come bundled with other applications as a decoy, or with other malware. 
 
3. b. worm. Worms are stand-alone programs that are often used to send spam emails, or emails containing viruses. Trojans often contain worms which are then installed for the purpose of sending spam emails, but the worms are what actually send the emails. 
 
4. e. adware. In the strictest sense, adware is rarely patently illegal or destructive, and so antivirus software makers have traditionally avoided treating it as malware. Adware designers are usually large advertising companies with hundreds of millions of dollars, and they take care to insert end-user licensing agreements (EULA) that supposedly mean that the software is installed with permission. Also, adware will not usually do anything more destructive than show advertising. Nonetheless, adware can quickly multiply on a computer, hogging system resources and causing a computer to slow down or even malfunction. That's why most anti-spyware software makers target adware as well. 
 
5. a. Trojan. By definition, Trojans bear other malware within them, just as the mythical wooden worse bore Greek warriors. The malware can be viruses, worms, spyware, or adware. 
 
6. e. adware, though d. spyware, is also correct. Kazaa's developers, Sharman Networks, make most of their money from the advertising shown by the included adware. The adware typically runs even when the Kazaa software is not in use. Sharman Networks has adamantly denied that the adware that comes with Kazaa is spyware, since, like most adware, it comes with an end-user license agreement that says the user grants permission for the software to be installed. In reality, few Kazaa users, until recently, were aware of just how much adware was being installed on their machines (as much as a dozen or more). Plus, the adware does monitor your internet usage, and so is spyware in the strictest sense. 
 
7. b. worm. Worms most commonly install a "backdoor" internet connection in order to send out data (for instance, spam emails or requests to remote servers) undetected. 
 
8. b. worm. Worms, which most commonly install a "backdoor" internet connection on the host computer, are perfect for sending out the millions of server requests needed to achieve a denial-of-service attack. A denial-of-service attack is when a server is maliciously sent so many hits that it is overwhelmed and cannot continue to operate. 
 
9. a. Trojan. The Trojan "Magic Lantern" was famously used to install monitoring software on the computer of a suspect who was later brought to trial partly on the strength of the evidence gathered. 
 
10. e. Spyware. Spyware is malware that collects information from your computer and sends it to another remote machine, so by definition any software that steals your identity is spyware. However, spyware is often installed on your computer by a Trojan, or sent to you by another computer infected with a worm, so other kinds of malware pose an indirect threat of identity theft as well. 
 
About the author:
Joel Walsh writes for spyware-refuge.com about spyware, viruses, Trojans, adware, worms, and other malware: http://www.spyware-refuge.com?Computer Viruses[Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "Computer Viruses" OR leave this bracketed message intact.]
Circulated by Article Emporium

Looking for the latest opinion regarding computer science




by: Tom
When you are in search of better-quality information on computer science, it will be intricate extricating the best information from unprofessional computer science suggestions and support so it is important to recognize how to judge the advice that is offered. 
 
Hoovers: Computer Sciences Corp. Company Research
Find information on Computer Sciences Corp with operations and products, financials, officers, competitors and more at Hoovers Online.

Now we would like to offer you some advice which we recommend you think of using when you're searching for information about computer science. It is important to remember that the guidance we put forward is only applicable to internet advice about computer science. We are unable to offer any assistance or guidance when you are also conducting research in books or magazines. 
 
Computer Degrees and Training Online
Earn your computer degree fast & advance your career. Free tool to compare top online schools to find the degree program thats right for you, no obligation. Your future is waiting! 
 
A great tip to pursue when you are presented with help or advice concerning a computer science page is to research who is behind the website. This may show you who owns the site computer science qualifications The quickest way to work out who owns the computer science website is to look on the 'contact' page or 'about this site' information. 
 
All reputable sites providing information about computer science, will almost always provide an 'about' or 'contact' page which will list the owner's details. The fine points should tell some indication about the site owner's capability. This permits you to make an informed assessment about the vendor's qualifications and experience to offer help regarding computer science. 
 
About the author:
Roger Collins is the webmaster for http://www.dataformatspecialnews.info
Circulated by Article Emporium

Looking for the best sourced help regarding computer security



by: Anne Kent
Looking for the best sourced help regarding computer security. When you're in the hunt for top-quality advice concerning computer security, it will be intricate sorting out the best information from poorly sourced computer security proposals and help so it is important to recognize ways of judging the information you are offered. 
 
What follows next are a few tips that we believe you should use when you're searching for information regarding computer security. You need to realize the advice we offer is only appropriate to internet info about computer security. We do not give you any tips or guidance if you are receiving information offline. 
 
An excellent tip to follow when you're presented with help or advice concerning a computer security webpage is to ascertain who owns the site. This may show you the people behind the site computer security credentials The fastest way to determine who owns the computer security website is to look on the 'contact' page or 'about this site' information. 
 
All respectable sites giving you information on computer security, will always have contact information which will provide you with the owner's details. The details should make known some advice concerning the owner's requisite knowledge. You can then decide for yourself about the webmaster's training and understanding, to advise people on the subject of computer security.


About the author:
Anne Kent is the webmaster at datainfointerest.info

Circulated by Article Emporium