Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Viruses, Trojans, and Spyware - Oh My! > NetSparsh - Viral Content you Love & Share

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!"

Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it's a full time job, even when I'm not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily.

The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you're not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I've burnt bread and I've tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time.

You must be wondering what my point is. Yes, removing a virus or building a computer isn't really that hard of a task?if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let's take a look at the following scenario.

James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn't done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup?

The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn't fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn't want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn't have seemed very significant.

Nine times out of ten an infected computer does require a re-format and re-install. I don't say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer.

Eric Graves is a Senior Computer Technician at ARCH Computing Services. His computer knowledge and interpersonal skills have helped the company to grow at a remarkable rate. He's currently completing his BS in IT Management, and will go on to complete his Master Degree in Information Systems Security. He is also currently the administrator for the Mutagenix forums, a Slackware based Live CD.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Vanity Fair

Forget the Summit: How Trump Let Putin Win the Cyber-Security War
Vanity Fair
As the White House trained its attention on the spectacle surrounding the meeting of Donald Trump and Vladimir Putin in Helsinki, the Trump administration was largely ignoring a more potent danger back home. The Trump-Putin summit, after all, is mostly ...
Trump stresses Israel's security in talks with PutinReuters
The Early Edition: July 16, 2018Just Security
Putin: Trump 'paid particular attention' to Israel's security at summitThe Jerusalem Post
Foreign Policy -Axios -Haaretz
all 2,777 news articles »

Forbes

Lack of confidence in data security can cost you more than you think
CSO Online
Leading the way to a new era of data protection, the long-awaited GDPR has emphasized the importance of data security more than ever before. Besides tarnishing their reputation, businesses face the risk of encountering large fines if they don't align ...
How GDPR Will Affect Privacy And Security Standards In US Health CareForbes

all 24 news articles »

CNBC

Tech consumers should not be forced to sacrifice privacy for security
CNBC
We all expect privacy, especially when it comes to our phones. But how do we feel about upholding the privacy of criminals and terrorists? And what should we do if the information needed to catch or prosecute a criminal – or potentially save lives – is ...


107.180.56.147 (press release) (blog)

Chicago DHSChemSecurityTalks Focus on Midwest Chemical Security
107.180.56.147 (press release) (blog)
To address these issues and more, the Department of Homeland Security (DHS) will hold the second of three DHSChemSecurityTalks events in Chicago on July 19. The first event took place last month in Oakland, California. The Chicago event provides a ...


The Nation.

The United States Has a National-Security Problem—and It's Not What You Think
The Nation.
So effectively has the Beltway establishment captured the concept of national security that, for most of us, it automatically conjures up images of terrorist groups, cyber warriors, or “rogue states.” To ward off such foes, the United States maintains ...


Curbed NY

NYC security deposits unfairly burden low-income New Yorkers: report
Curbed NY
New York City Comptroller Scott Stringer is calling on the state to impose limits on security deposits, which he says unfairly burdens low-income New Yorkers. The Comptroller's office has put out a new report that shows that New Yorkers sunk $507 ...
Report: NYC Apartment Security Deposits Are Too Damn HighGothamist
Stringer wants one-month cap on renters' security depositsThe Real Deal
New York City proposes sweeping new rules for security depositsHousingWire

all 6 news articles »

Forbes

Alight Solutions' Jason Lish Takes Unusual Path From Chief Security Officer To CIO
Forbes
Jason Lish was recently promoted to Chief Information Officer of $2.3 billion Alight Solutions. As CIO, he is responsible for Alight's overall digital, technology, enterprise risk and security strategy, and execution. Lish also leads the team charged ...


Forbes

To Grow The Internet Of Things, Improve Security
Forbes
The Internet of Things continues to grow rapidly, but concerns about security remain a significant barrier and are hindering the adoption of IoT devices. Research by Bain & Company finds that enterprise customers would be willing to buy more IoT ...

and more »

CNBC

Europeans are giving Trump a defiant runaround on trade and security
CNBC
As a presidential candidate, Donald Trump began telling the Europeans in 2015 that they had to: (a) cut their systematic and excessive trade surpluses with the U.S., (b) eliminate discriminatory trade rules and practices to open up markets for American ...
Globalised business is a US security issueFinancial Times

all 345 news articles »

TMZ

TI Charged for Assaulting Security Guard ... Likely Faces No Jail Time
TMZ
Prosecutors in Henry County charged the rapper with simple assault, public drunkenness and disorderly conduct stemming from his arrest back in May, when a security guard refused to let him into the premises. T.I.'s lawyer, Steve Sadow, tells TMZ the ...

and more »
Google News

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Dont Get Hacked - A Guide to Protecting Your Business from Thieves

You've seen it in the news - 40 million credit... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More