Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.

No user on the internet is safe from assault. Viruses, Trojans and Spyware can all effect your computer by placing annoying ads, tracking your credit card numbers, or even slow it down to a certain extent it is deemed no longer usable. By following through these simple steps, you can help protect yourself from the internet.

High CPU Usage: If your computer seems to be slower than usual, it is very likely that you have been infected. Background services can slow down your computer, and to check performance, enter Task Manager (Ctrl+Alt+Delete). Then, click on the processes tab. You will be able to see active processes that are running. To find what should be running on your computer, visit http://www.theeldergeek.com/services_guide.htm.

Check your level of protection: A good way to know whether you are safe or not is by using security tools. Here are some you should try out: NeWT 2.1: This is a very simple tool to use, and it scans for more than 4000 common security vulnerabilities. Download NeWT here: http://www.tenablesecurity.com/newt.htm Sumantec security check: This is a free service provided by Symantec. Simply visit here (www.sumantec.com), then select Scan for Security Risks. It will only tell you what vulnerabilities you have, but however it won't tell you how to fix them. Infinitive! Port Scanner: Our very own online port scanner! http://infinate.x10hosting.com/phport

Update Yourself: Install all the latest update possible. Service Pack 2 is a good way to start if you're running Windows XP. Enable Automatic Updates, and make sure you have the latest updates on your PC.

Safe Surfing: Due to Internet Explorer's high popularity, it is usually safe to change altogether. A common program now is known as FireFox (www.mozilla.com/products/firefox), which is fast, responsive and similar to Internet Explorer. However a major flaw with FireFox is that you will need to install additional plug-ins in order for you to view certain pages.

Make Regular Backups: Prepare for the worst. Make regular backups of your important files and store them on a type of offline storage.

Don't open suspicious links: If you are sent a link you are not sure about, do not open them, Simple. Another good way is to avoid suspicious sites altogether. Many programs too, bundle with spyware, so when you download them make sure they are stated "Freeware", nothing else.

Program Protection: Use Anti-Virus and Firewall software. McAfee is a highly recommended product over Symantec, but there are also other free anti-virus/firewall software online such as NOD32. http://www.nod32.com/

If you have been infected: Find cleaning instructions online on sites such as http://vil.nai.com. It will tell you where to locate your infection, and where to find and remove it. System Restore is also a good option on Windows XP. To use System Restore, go to Start, All Programs, Accessories, System, System Restore. Simply click a restore point and reboot.

You can also remove viruses using the programs listed under Program Protection. To remove Spyware, Spybot S&D (http://www.safer-networking.org/en/index.html) is a free yet useful tool to use.

All articles are written by Infinitive!

Infinitive! http://www.infinate.x10hosting.com You may reproduce and use this article just so long as you add a link (http://www.infinate.x10hosting.com) down at the bottom.

Infinitive! All the latest articles, tools, news, file hosting and more!

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Politico

Bolton names Commerce official as his national security deputy
Politico
“I selected her as deputy national security adviser because her expertise is broad-based and includes national security matters related to our alliances, defense posture, technology security, foreign security assistance and arms control,” Bolton said ...
White House announces new deputy national security advisorDefenseNews.com
John Bolton begins to shape National Security Council staff - The ...Washington Post

all 9 news articles »

Fortune

Twitter Bans Ads from Russian Computer Security Company Kaspersky Lab
Fortune
Twitter has banned ads on its service from Russian security software maker Kaspersky Lab, after the U.S. government prohibited agencies from using its products because of alleged ties to the Russian government. The ban, confirmed by Twitter to Reuters ...
Twitter banned Russian security firm Kaspersky Lab from buying adsTechCrunch
Kaspersky banned from advertising on Twitter over security fearsTelegraph.co.uk
Twitter Ads policies - Twitter for BusinessTwitter for Business
Reuters -Homeland Security -Kaspersky Lab -Ars Technica
all 38 news articles »

CryptoSlate

Crypto Trade Group Pressures SEC to Exempt Ethereum From Security Classification
CryptoSlate
An alliance of lawyers, venture capitalists, and entrepreneurs have recently met with the US Securities and Exchange Commission to petition for the creation of cryptocurrency “safe harbors” for specific cryptocurrencies and tokens, including Ethereum ...
US Regulators Asked Not to Classify Ethereum as a Security: NYT ...CCN

all 20 news articles »

TechRepublic

Upcoming Windows Defender feature will tell you when security fails
TechRepublic
All of the attestation is done by the secure kernel, the end result of which is security validation that an attacker or malware in the Windows kernel can't alter. Microsoft gives an example where "an app could ask Windows Defender System Guard to ...
Windows 10: Microsoft to boost Linux app security with Windows Defender firewallZDNet
Hackers can bypass the Windows 10 S lockdown due to security flawDigital Trends
Google discloses 'medium-severity' security flaw in Windows 10 SWindows Central
Naked Security -Chrome - Google -Monorail - The Chromium Projects
all 59 news articles »

Brookings Institution (blog)

Development for security: Lending for peace?
Brookings Institution (blog)
Two World Development Reports tackled the security-development nexus. The WDR 2011 explicitly argued that investments in citizen security and justice reform can help countries break recurring cycles of violence. The WDR 2017 surmised that good ...


WFAA.com

Italy ISD increasing security after school shooting
WFAA.com
Italy ISD increasing security after school shooting. "Italy ISD will always be the school that this happened to. What we're going to do is focus on prevention and response." Author: Monica Hernandez. Published: 8:54 PM CDT April 20, 2018. Updated: 9:07 ...


Rutland Herald

Rutland Town eyes poll security at school
Rutland Herald
Rutland Town Clerk Kirsten Hathaway said the alleged threat of violence at Fair Haven Union High School and violence at schools in other parts of the country has her thinking twice about security at Rutland Town Elementary School during townwide voting ...

and more »

Assessing Server Security | CIO
CIO
Analysts at Chicago financial firm William Blair believe that Equifax's costs tied to dealing with last year's data breach could run between $200 million and $300 million1 – and that figure is after insurance coverage is applied. While this was a ...

and more »

NewsChannel5.com

Maintaining Cyber Security On Student Devices
NewsChannel5.com
FRANKLIN, Tenn. - In order to keep students without access to the internet from falling behind, students will be able to take laptops home. But some are questioning what that means for their cyber security. It's why several school districts have moved ...

and more »

Ars Technica

When you go to a security conference, and its mobile app leaks your ...
Ars Technica
A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the ...
No way, RSA! Security conference's mobile app embarrassingly ...The Register

all 7 news articles »
Google News

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More