Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Secure Your PC From Hackers, Viruses, and Trojans > NetSparsh - Viral Content you Love & Share

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.

No user on the internet is safe from assault. Viruses, Trojans and Spyware can all effect your computer by placing annoying ads, tracking your credit card numbers, or even slow it down to a certain extent it is deemed no longer usable. By following through these simple steps, you can help protect yourself from the internet.

High CPU Usage: If your computer seems to be slower than usual, it is very likely that you have been infected. Background services can slow down your computer, and to check performance, enter Task Manager (Ctrl+Alt+Delete). Then, click on the processes tab. You will be able to see active processes that are running. To find what should be running on your computer, visit http://www.theeldergeek.com/services_guide.htm.

Check your level of protection: A good way to know whether you are safe or not is by using security tools. Here are some you should try out: NeWT 2.1: This is a very simple tool to use, and it scans for more than 4000 common security vulnerabilities. Download NeWT here: http://www.tenablesecurity.com/newt.htm Sumantec security check: This is a free service provided by Symantec. Simply visit here (www.sumantec.com), then select Scan for Security Risks. It will only tell you what vulnerabilities you have, but however it won't tell you how to fix them. Infinitive! Port Scanner: Our very own online port scanner! http://infinate.x10hosting.com/phport

Update Yourself: Install all the latest update possible. Service Pack 2 is a good way to start if you're running Windows XP. Enable Automatic Updates, and make sure you have the latest updates on your PC.

Safe Surfing: Due to Internet Explorer's high popularity, it is usually safe to change altogether. A common program now is known as FireFox (www.mozilla.com/products/firefox), which is fast, responsive and similar to Internet Explorer. However a major flaw with FireFox is that you will need to install additional plug-ins in order for you to view certain pages.

Make Regular Backups: Prepare for the worst. Make regular backups of your important files and store them on a type of offline storage.

Don't open suspicious links: If you are sent a link you are not sure about, do not open them, Simple. Another good way is to avoid suspicious sites altogether. Many programs too, bundle with spyware, so when you download them make sure they are stated "Freeware", nothing else.

Program Protection: Use Anti-Virus and Firewall software. McAfee is a highly recommended product over Symantec, but there are also other free anti-virus/firewall software online such as NOD32. http://www.nod32.com/

If you have been infected: Find cleaning instructions online on sites such as http://vil.nai.com. It will tell you where to locate your infection, and where to find and remove it. System Restore is also a good option on Windows XP. To use System Restore, go to Start, All Programs, Accessories, System, System Restore. Simply click a restore point and reboot.

You can also remove viruses using the programs listed under Program Protection. To remove Spyware, Spybot S&D (http://www.safer-networking.org/en/index.html) is a free yet useful tool to use.

All articles are written by Infinitive!

Infinitive! http://www.infinate.x10hosting.com You may reproduce and use this article just so long as you add a link (http://www.infinate.x10hosting.com) down at the bottom.

Infinitive! All the latest articles, tools, news, file hosting and more!

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Retirement Security: Fire And Fury In Telecommunications
Seeking Alpha
AT&T's merger with Time Warner has hit a brick wall and the market is celebrating. Here's what I'm doing. How about you? Subscribers to "Retirement: One Dividend At A Time" got an early look at this material via free instant text message trade alert ...

and more »

Forbes

How This Millennial Went From A High School Dropout To Cyber Security Expert
Forbes
Manan Shah, the 24-year-old founder of cyber security firm Avalance Global Solutions, is one of the top cyber security experts, but his path to the top was far from traditional. A high school dropout and former hacker, Shah had to overcome run-ins with ...


TechCrunch

Tortuga Logic raises $2 million to build chip-level security systems
TechCrunch
Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build products that will find “lurking vulnerabilities ...


Fox News

Schools adept at shoring up security at any hint of danger
Fox News
Schools have become adept at rapidly shoring up security, measuring responses against the toll it could take on students' learning and sense of safety. The president of the National Association of School Resource Officers says schools regularly ...

and more »

UN News Centre

Russia again vetoes extension of chemical experts in Syria
ABC News
And it was Russia's 11th veto of a Security Council resolution dealing with Syria, its close ally. Russia cast its latest veto Friday night on a last-ditch resolution by Japan to extend the mandate for 30 days for further discussions. It was supported ...
Security Council fails at fresh attempt to renew panel investigating chemical weapons use in SyriaUN News Centre
Security Council Considers 30-day Extension on Syria ExpertsVoice of America
The Investigation Into Chemical Attacks in Syria Is Fizzling Out After a Security Council ShowdownTIME

all 588 news articles »

UN News Centre

At Security Council, UN chief urges cooperation to tackle security challenges in Mediterranean
UN News Centre
17 November 2017 – The Mediterranean – a confluence of civilizations, cultures, religions, trade and migration – is facing multiple security challenges, such as terrorism, illicit trade in narcotics, environmental degradation and forced displacement ...

and more »

New York Times

Homeland Security Official Resigns Over Remarks on African-Americans and Muslims
New York Times
WASHINGTON — The Department of Homeland Security's head of outreach to religious and community organizations resigned on Thursday after audio recordings revealed that he had previously made incendiary remarks about African-Americans and ...
Homeland Security Official Who Blamed Slums On 'Lazy Blacks' QuitsHuffPost
Homeland Security official Jamie Johnson resigns after comments ...Washington Post
Homeland Security's head of community outreach resigns over past controversial comments on black community, IslamCNN
Fort Dodge Messenger -The Grio -New York Daily News -The Hill
all 71 news articles »

North Darfur security: Swiss aid worker released, kidnappers held
ReliefWeb
The security authorities in North Darfur announced on Wednesday that kidnapped Swiss aid worker Margaret Schenkel has been “released from her captors in a mountainous area during a professional security operation”. The head of the National ...

and more »

KING5.com

Seattle police plan security for tree lighting ceremony
KING5.com
Seattle police have a plan to secure next week's holiday tree lighting ceremony in Westlake Park, and it makes room for protesters to exercise their first amendment rights. "It's the kickoff for the holiday season," said James Sido, DSA spokesperson ...


Computerworld

Strong and stable: The iOS security guide
Computerworld
So, what's the weakest point in mobile device security? Sadly, it's you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All ...

and more »
Google News

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

New Mass Mailing Spamming Internet Trojan for the Windows Platform

May. 16th 2005 - MicroWorld has reported the discovery of... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

Virus Nightmare..Lessons Learned

I got a virus the other day, Thursday I believe... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More