What is Spyware?

The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. You effectively have lost control of your computer. Spyware (also referred to as Adware or Malware) is software that is installed on your computer without your consent. Spyware software monitors or controls your computer use. It may be used to send you pop-up ads, redirect your computer to websites, monitor your Internet surfing, or record your keystrokes, which, in turn, could lead to identity theft.

Here are some of the symptoms that indicate Spyware is on a computer:

?a barrage of pop-up ads

?a hijacked browser - that is, a browser that takes you to sites other than those you type into the address box

?a sudden or repeated change in your computer's Internet home page

?new and unexpected toolbars

?new and unexpected icons on the system tray at the bottom of your computer screen

?keys that don't work (for example, the "Tab" key that might not work when you try to move to the next field in a Web form)

?random error messages

?sluggish or downright slow performance when opening programs or saving files

Follow these precautions in order to help prevent Spyware installation:

?Update your operating system and Web browser software. Your operating system (like Windows or Linux) may offer free software "patches" to close holes in the system that Spyware could exploit.

?Download free software only from sites you know and trust. It can be appealing to download free software like games, peer-to-peer file-sharing programs, customized toolbars, or other programs that may change or customize the functioning of your computer. Be aware, however, that some of these free software applications bundle other software, including Spyware.

?Don't install any software without knowing exactly what it is. Take the time to read the end-user license agreement (EULA) before downloading any software. If the EULA is hard to find - or difficult to understand - think twice about installing the software.

?Minimize "drive-by" downloads. Make sure your browser security setting is high enough to detect unauthorized downloads, for example, at least the "Medium" setting for Internet Explorer. Keep your browser updated.

?Don't click on any links within pop-up windows. If you do, you may install Spyware on your computer. Instead, close pop-up windows by clicking on the "X" icon in the title bar.

?Don't click on links in spam that claim to offer anti-spyware software. Some software offered in spam actually installs Spyware.

?Install a personal firewall to stop uninvited users from accessing your computer. A firewall blocks unauthorized access to your computer and will alert you if Spyware already on your computer is sending information out.

You may freely reprint this article provided the author's biography remains intact:

John Mussi is the founder of Direct Online Loans who help UK homeowners find the best available loans via the http://www.directonlineloans.co.uk website.

In The News:

A game changer in IT security  MIT Technology Review

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Traditional Antivirus Programs Useless Against New Unidentified Viruses!

Every now and then you can read about a new... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Protection for Your PC - Painless and Free!

Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More