Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
How to Thwart the Barbarian Spyware! > NetSparsh - Viral Content you Love & Share

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to employ software, along with our intelligence, to prevent viruses and spyware. To put this article into proper perspective, we'll use Medieval defense tactics.

This is accomplished by 3 methods. First, a firewall... 'The Castle Moat' so to speak. A firewall can't see inside your computer beforehand though, so if any viruses or spyware were present before the firewall was installed then its of no use. Of course, its extremely good at preventing new attacks.

Second, a anti-virus program.... 'The Castle Drawbridge! They will not provide much help with spyware, but good virus protection is as desirable as one of Avaris's dreams! One drawback can be the updates, of course.If you've just updated Wednesday night and a virus hits the next day, then you may not be protected till next Wednesday night, and by then it may be too late. If you're smart, you will have signed up for email alerts with the provider, or even better, you'll have a anti-virus program that has a real time update feature. I get the tingles when I see that little pop-up saying a update is available and click here. Its downloaded ,installed, and updated in about 20 seconds! A new virus or Trojan or God forbid, a new keylogger can hit the internet and spread in a matter of days, and I'm sure this must make the definition writers lives a living hell. I have great admiration for them as they could have been wealthy doctors, but they have chosen to help us... the end users. (moment of silence here)

Last, we have anti-spyware programs,'The Flaming oil'! (my favorite). Their update features are like the anti-virus programs, so you have to be as vigilant with this method of defense too as you would be with the others. I've heard there are people out there that don't even know when their updates run, or even if its configured to do so! I refuse to believe this sordid rumor!

So you've got your defenses set up, you're looking good. But the best defense is a good offense, attack! That's what some organizations do. They prowl the net looking for websites that harbor drive-by downloads, URL Re-Directing and such. When they find them, they shut them down, or report them so effective protection can be manufactured. These people have my sincere thanks for what they do. With identity theft on the rise and Websense reporting that the average computer has 28 items of Spyware on it, we need all the help we can get. Oh sure, you're saying not my computer ! Well, lets discuss those little boxes that you click "I Agree" to when you download something. Do you read the entire statement? This is one way spyware has become so rampant, because so many downloads have extra software included in them. These can be harmful to your computers well being. KeyLoggers, popups, adware, malware...

Need I go on?

So my idea is that we need these shining knights from the castle to journey forth on a quest. They will be little robots or spiders like the search engines use. They will be given absolute power over harmful programs they find. They will be like Gort in the movie "The Day the Earth Stood Still".

Dell recently reported that 12% of their calls were for spyware damage, Microsoft says half of their reports of system crashes are caused by spyware. These calls cost these companies millions of dollars in revenue, which they then pass the costs of onto us, the consumers.

Who knows, if viruses and spyware ever get controlled, the average computer may only cost a dollar!

About the Author: Doug Woodall has a web site at http://www.spywarebiz.com There he provides free information and recommended products to combat Spyware.

His Website is recognized by Learning Fountain and ISafe Doug's Articles have earned him Trusted Author Status at ImpactArticles.com He is a member of the IWA (International Webmasters Association) Article edited for proper content by Wendy McCallum Permission to copy ok as long as about author info remains with article.

Copyright 2005 SpywareBiz

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Retirement Security: Fire And Fury In Telecommunications
Seeking Alpha
AT&T's merger with Time Warner has hit a brick wall and the market is celebrating. Here's what I'm doing. How about you? Subscribers to "Retirement: One Dividend At A Time" got an early look at this material via free instant text message trade alert ...

and more »

Forbes

How This Millennial Went From A High School Dropout To Cyber Security Expert
Forbes
Manan Shah, the 24-year-old founder of cyber security firm Avalance Global Solutions, is one of the top cyber security experts, but his path to the top was far from traditional. A high school dropout and former hacker, Shah had to overcome run-ins with ...


TechCrunch

Tortuga Logic raises $2 million to build chip-level security systems
TechCrunch
Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build products that will find “lurking vulnerabilities ...


Fox News

Schools adept at shoring up security at any hint of danger
Fox News
Schools have become adept at rapidly shoring up security, measuring responses against the toll it could take on students' learning and sense of safety. The president of the National Association of School Resource Officers says schools regularly ...

and more »

UN News Centre

Russia again vetoes extension of chemical experts in Syria
ABC News
And it was Russia's 11th veto of a Security Council resolution dealing with Syria, its close ally. Russia cast its latest veto Friday night on a last-ditch resolution by Japan to extend the mandate for 30 days for further discussions. It was supported ...
Security Council fails at fresh attempt to renew panel investigating chemical weapons use in SyriaUN News Centre
Security Council Considers 30-day Extension on Syria ExpertsVoice of America
The Investigation Into Chemical Attacks in Syria Is Fizzling Out After a Security Council ShowdownTIME

all 588 news articles »

UN News Centre

At Security Council, UN chief urges cooperation to tackle security challenges in Mediterranean
UN News Centre
17 November 2017 – The Mediterranean – a confluence of civilizations, cultures, religions, trade and migration – is facing multiple security challenges, such as terrorism, illicit trade in narcotics, environmental degradation and forced displacement ...

and more »

New York Times

Homeland Security Official Resigns Over Remarks on African-Americans and Muslims
New York Times
WASHINGTON — The Department of Homeland Security's head of outreach to religious and community organizations resigned on Thursday after audio recordings revealed that he had previously made incendiary remarks about African-Americans and ...
Homeland Security Official Who Blamed Slums On 'Lazy Blacks' QuitsHuffPost
Homeland Security official Jamie Johnson resigns after comments ...Washington Post
Homeland Security's head of community outreach resigns over past controversial comments on black community, IslamCNN
Fort Dodge Messenger -The Grio -New York Daily News -The Hill
all 71 news articles »

North Darfur security: Swiss aid worker released, kidnappers held
ReliefWeb
The security authorities in North Darfur announced on Wednesday that kidnapped Swiss aid worker Margaret Schenkel has been “released from her captors in a mountainous area during a professional security operation”. The head of the National ...

and more »

KING5.com

Seattle police plan security for tree lighting ceremony
KING5.com
Seattle police have a plan to secure next week's holiday tree lighting ceremony in Westlake Park, and it makes room for protesters to exercise their first amendment rights. "It's the kickoff for the holiday season," said James Sido, DSA spokesperson ...


Computerworld

Strong and stable: The iOS security guide
Computerworld
So, what's the weakest point in mobile device security? Sadly, it's you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All ...

and more »
Google News

Online Shoppers, Beware of a New Scam

Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Phishing: A Scary Way of Life

The Federal Bureau of Investigation has identified "phishing" as the... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More