Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Viruses, Trojans, and Spyware - Oh My! > NetSparsh - Viral Content you Love & Share

Viruses, Trojans, and Spyware - Oh My!

Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!"

Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it's a full time job, even when I'm not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily.

The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you're not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I've burnt bread and I've tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time.

You must be wondering what my point is. Yes, removing a virus or building a computer isn't really that hard of a task?if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let's take a look at the following scenario.

James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn't done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup?

The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn't fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn't want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn't have seemed very significant.

Nine times out of ten an infected computer does require a re-format and re-install. I don't say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer.

Eric Graves is a Senior Computer Technician at ARCH Computing Services. His computer knowledge and interpersonal skills have helped the company to grow at a remarkable rate. He's currently completing his BS in IT Management, and will go on to complete his Master Degree in Information Systems Security. He is also currently the administrator for the Mutagenix forums, a Slackware based Live CD.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

Security Images Show Khashoggi and Fiancée in His Final Hours
New York Times
ISTANBUL — In the continuing frenzy of media attention to the murder of Jamal Khashoggi before a much-anticipated statement by President Recep Tayyip Erdogan, Turkish media have published poignant photographs of Mr. Khashoggi and his fiancée in the ...

and more »

Healthcare Finance News

Can't afford a security chief? Here are the alternatives
Healthcare Finance News
Particularly for smaller hospitals and medical groups, hiring a full-time chief information security officer can be a stretch of the budget and resources. But patient data must still be protected because smaller organizations face many of the same ...

and more »

Mashable

Japan is the latest country to challenge Facebook to improve security
Mashable
Japan's ask of Facebook comes after the social media company revealed that a security breach compromised the personal data of 29 million users. It also follows a year of scandal about how the British political consulting and data firm Cambridge ...

and more »

Forbes

Google And Our National Security: Lost In The Cloud?
Forbes
The experts all agree. The Pentagon and the U.S. military's future depends on advanced weapons systems that will require cooperation with America's most advanced technology companies, including the major players in Silicon Valley. But what if Silicon ...


NBC4 Washington

Security guard shoots intruder in lobby of local Fox station in DC, police say
CBS News
The man kicked through the glass doors of WTTG's Wisconsin Avenue studios before he was shot once by the armed security guard in the lobby around 3 p.m., Washington Metropolitan Police second district commander Melvin Gresham said. The station ...
Security Guard Shoots Man Trying to Get Into WTTG, Washington, DC, Fox StationNBC4 Washington
Security guard shoots man trying to break in to FOX 5 buildingWTOP
Security guard shoots man trying to enter DC local news station, authorities sayWSB Radio
FOX 5 DC -WBAL Baltimore
all 108 news articles »

Washington Post

Macedonia: Lawmakers who backed new name get more security
Washington Post
Interior Minister Oliver Spasovski said Monday that all 80 parliament members who backed launching the constitutional amendment process needed for the change were getting extra security after several lawmakers and their families reported death threats.

and more »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: October 13–19
Council on Foreign Relations (blog)
Below is a visualization and description of some of the most significant incidents of political violence in Nigeria from October 13 to October 19, 2018. This update also represents violence related to Boko Haram in Cameroon, Chad, and Niger. These ...


Voice of America

Relative: Victim of Brutal Ugandan Security Arrest Still Missing
Voice of America
Uganda's security forces are under scrutiny after a video surfaced showing plain clothed officers brutally beating and arresting a civilian on the street. Uganda's army spokesman says the troops are facing a disciplinary committee but the family of the ...

and more »

Today.com

After a break-in, I tried Amazon's best-selling $64 security camera
Today.com
I've always thought security cameras were something only businesses had. I also thought my garage was a safe space to store my Felt Racing bike. But on a Monday morning this past August, I realized I was wrong, on both counts. Thieves got into my ...

Google News

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More