Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Secure Your PC From Hackers, Viruses, and Trojans > NetSparsh - Viral Content you Love & Share

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.

No user on the internet is safe from assault. Viruses, Trojans and Spyware can all effect your computer by placing annoying ads, tracking your credit card numbers, or even slow it down to a certain extent it is deemed no longer usable. By following through these simple steps, you can help protect yourself from the internet.

High CPU Usage: If your computer seems to be slower than usual, it is very likely that you have been infected. Background services can slow down your computer, and to check performance, enter Task Manager (Ctrl+Alt+Delete). Then, click on the processes tab. You will be able to see active processes that are running. To find what should be running on your computer, visit http://www.theeldergeek.com/services_guide.htm.

Check your level of protection: A good way to know whether you are safe or not is by using security tools. Here are some you should try out: NeWT 2.1: This is a very simple tool to use, and it scans for more than 4000 common security vulnerabilities. Download NeWT here: http://www.tenablesecurity.com/newt.htm Sumantec security check: This is a free service provided by Symantec. Simply visit here (www.sumantec.com), then select Scan for Security Risks. It will only tell you what vulnerabilities you have, but however it won't tell you how to fix them. Infinitive! Port Scanner: Our very own online port scanner! http://infinate.x10hosting.com/phport

Update Yourself: Install all the latest update possible. Service Pack 2 is a good way to start if you're running Windows XP. Enable Automatic Updates, and make sure you have the latest updates on your PC.

Safe Surfing: Due to Internet Explorer's high popularity, it is usually safe to change altogether. A common program now is known as FireFox (www.mozilla.com/products/firefox), which is fast, responsive and similar to Internet Explorer. However a major flaw with FireFox is that you will need to install additional plug-ins in order for you to view certain pages.

Make Regular Backups: Prepare for the worst. Make regular backups of your important files and store them on a type of offline storage.

Don't open suspicious links: If you are sent a link you are not sure about, do not open them, Simple. Another good way is to avoid suspicious sites altogether. Many programs too, bundle with spyware, so when you download them make sure they are stated "Freeware", nothing else.

Program Protection: Use Anti-Virus and Firewall software. McAfee is a highly recommended product over Symantec, but there are also other free anti-virus/firewall software online such as NOD32. http://www.nod32.com/

If you have been infected: Find cleaning instructions online on sites such as http://vil.nai.com. It will tell you where to locate your infection, and where to find and remove it. System Restore is also a good option on Windows XP. To use System Restore, go to Start, All Programs, Accessories, System, System Restore. Simply click a restore point and reboot.

You can also remove viruses using the programs listed under Program Protection. To remove Spyware, Spybot S&D (http://www.safer-networking.org/en/index.html) is a free yet useful tool to use.

All articles are written by Infinitive!

Infinitive! http://www.infinate.x10hosting.com You may reproduce and use this article just so long as you add a link (http://www.infinate.x10hosting.com) down at the bottom.

Infinitive! All the latest articles, tools, news, file hosting and more!

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

Security Images Show Khashoggi and Fiancée in His Final Hours
New York Times
ISTANBUL — In the continuing frenzy of media attention to the murder of Jamal Khashoggi before a much-anticipated statement by President Recep Tayyip Erdogan, Turkish media have published poignant photographs of Mr. Khashoggi and his fiancée in the ...

and more »

Healthcare Finance News

Can't afford a security chief? Here are the alternatives
Healthcare Finance News
Particularly for smaller hospitals and medical groups, hiring a full-time chief information security officer can be a stretch of the budget and resources. But patient data must still be protected because smaller organizations face many of the same ...

and more »

Mashable

Japan is the latest country to challenge Facebook to improve security
Mashable
Japan's ask of Facebook comes after the social media company revealed that a security breach compromised the personal data of 29 million users. It also follows a year of scandal about how the British political consulting and data firm Cambridge ...

and more »

Forbes

Google And Our National Security: Lost In The Cloud?
Forbes
The experts all agree. The Pentagon and the U.S. military's future depends on advanced weapons systems that will require cooperation with America's most advanced technology companies, including the major players in Silicon Valley. But what if Silicon ...


NBC4 Washington

Security guard shoots intruder in lobby of local Fox station in DC, police say
CBS News
The man kicked through the glass doors of WTTG's Wisconsin Avenue studios before he was shot once by the armed security guard in the lobby around 3 p.m., Washington Metropolitan Police second district commander Melvin Gresham said. The station ...
Security Guard Shoots Man Trying to Get Into WTTG, Washington, DC, Fox StationNBC4 Washington
Security guard shoots man trying to break in to FOX 5 buildingWTOP
Security guard shoots man trying to enter DC local news station, authorities sayWSB Radio
FOX 5 DC -WBAL Baltimore
all 108 news articles »

Washington Post

Macedonia: Lawmakers who backed new name get more security
Washington Post
Interior Minister Oliver Spasovski said Monday that all 80 parliament members who backed launching the constitutional amendment process needed for the change were getting extra security after several lawmakers and their families reported death threats.

and more »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: October 13–19
Council on Foreign Relations (blog)
Below is a visualization and description of some of the most significant incidents of political violence in Nigeria from October 13 to October 19, 2018. This update also represents violence related to Boko Haram in Cameroon, Chad, and Niger. These ...


Voice of America

Relative: Victim of Brutal Ugandan Security Arrest Still Missing
Voice of America
Uganda's security forces are under scrutiny after a video surfaced showing plain clothed officers brutally beating and arresting a civilian on the street. Uganda's army spokesman says the troops are facing a disciplinary committee but the family of the ...

and more »

Today.com

After a break-in, I tried Amazon's best-selling $64 security camera
Today.com
I've always thought security cameras were something only businesses had. I also thought my garage was a safe space to store my Felt Racing bike. But on a Monday morning this past August, I realized I was wrong, on both counts. Thieves got into my ...

Google News

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More