Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Your Computer May Be Infected, Heres How To Check (NOT about virus) > NetSparsh - Viral Content you Love & Share

Your Computer May Be Infected, Heres How To Check (NOT about virus)

NOTE: Please take time to read on - it may be vital for your PC's security. If you are not in the mood, just save it or print it out for later reference.

A recent research revealed that 80% of the computers today is infected with these dangerous spyware and most of the users not aware of it. (Your computer could fall into this lot too.) The most dangerous fact is, even though the anti-virus software is running, these software can even inactivate them and take over your PC.

Have you experienced any of the following?

  • Awsome popups comes out of nowhere, when browsing the web

  • Home page reset to some other site

How can this happen?

- The components installed when viewing certain sites, starts up and running as soon as it's finished installing (or after the page is completely loaded) and with every windows startup since then. Their job is to collect information and report (or transfer) it to an external computer.

What is deceptive software? (Reference: www.microsoft.com)

Spyware and unauthorized adware are two examples of "deceptive" software. Deceptive software includes programs which take over your home page or search page without first getting your permission. There are a number of ways deceptive software can get on your system. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Whenever you are installing something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of adware in a given software installation is documented, but it may appear at the end of a license agreement or privacy statement.

Sometimes deceptive software gets silently installed on your system without any warning at all. If you use Internet Explorer as your Web browser, this can happen if your Internet Explorer security setting is set to its lowest value. Make sure to keep this setting at the medium level or higher. Doing so will help you control what is being installed on your computer.

Have you ever had an experience where you were repeatedly asked to accept a download even after you said "no"? Creators of deceptive software often use such tricks to get you to load their software. If this happens to you, do not click "yes". Instead, try to close the Web page that first asked you to accept the download by hitting the "X" in the corner of the window. Alternatively, quit Internet Explorer and restart it to begin browsing the Internet again. If you visit a Web page that continually displays these tricky pop-up windows, that Web site may not be worthy of your trust.

Your computer may be infected by now, but you may not know. Just have a checkup with a software specifically designed for it, to know the status of your computer. You must clean infections once you find it and the game is not over yet. The spyware might reinfect your PC. So it's highly recommended that you run a firewall on your system after the clean up. This will allow you to monitor every single communication occurs with your computer and block the ones which you feel unnecessary. The firewall acts as a barrier between your PC and the external world (Internet / Network).

A good spyware detector recommended by most people is, http://noadware.cjb.net and it shows you all the infections and potential dangers in great detail. It's free to scan but not to clean. It's a good idea to have a scan even you have no idea of cleaning, since you know the status of your PC in great detail. This gives two advantages.

Firstly, if there are minor infections and if you have a fair knowledge on registry settings and how to edit them, you may have a try to clean them up. Secondly, if it shows that there are major infections, you can avoid using credit cards and doing other confidential stuff, until you clean it up later.

You must run a firewall. In many new operating systems (eg. Windows XP), there is a built-in firewall. Google search on how to activate it. Others may try one at http://www.download.com.

You may have a question by now. What is the purpose of these spyware? Even though we cannot give an explicit and clear cut answer, we can safely state that every thing boils down to the urge of more profits. How? The spyware collects all your personal information and transfer it to an external computer. The information is reviewed by a software in the receiving computer and then deleivered targeted popup ads to your PC. There are many things that spyware does in addition to this. The most dangerous of those is that collecting the credit card numbers.

If you have some technical knowledge on your PC, here's a technical explanation on what trouble does the spyware cause.

1. An extra process is running to monitor and log your activities in your PC.

2. Constant transfer is taking place between your PC and the spyware writer's computer.

The first process in it self is an unneeded process and it contributes to slow down your PC. Second is the most harmful. It transfers logged info to the external PC (spyware writer's PC). Then the external PC transfers targeted popups to the infected PC. This, in addition to slowing down your PC because of these extra processes, it also slows down the internet connection, as the bandwidth is shared. In short, PC with a spyware is like a dumping ground for snakes. Once its there and up and running, it can do almost anything with your PC.

Please pass this on to all you know. The most risk is for people who use Internet Explorer, as it is the most popular web browser and that very fact has drawn more attention of many malicious software developers.

About The Author

Fazly Mohamed - [email protected]

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

20 Constants In Software Development
HuffPost
If you have more than one developer worth their salt then you will always have disagreement about something. Everyone wants good documentation of code but no one budgets for it. The more high performing a team the more annoyed team members get about ...


PCWorld

The best free video editing software: Great tools for YouTube stardom and more
PCWorld
The best free video editing software can be surprisingly good. The choices vary widely and include include scaled-down, trial versions of professional suites, open-source alternatives with a plethora of features, and simple applications aimed at home ...
Video Editing Software Developer Avid to Offer Remote Collaboration ToolsCTech

all 2 news articles »

Naked Security

Mailsploit: using emails to attack mail software
Naked Security
The most basic tenet of secure programming is this: don't trust anything you're planning to consume. Why? Because computer programs consume things from the outside world – like files, cookies, voice commands, passwords and a multitude of other data ...


The Register

Language bugs infest downstream software, fuzzer finds • The ...
The Register
Developers working in secure development guidelines can still be bitten by upstream bugs in the languages they use. That's the conclusion of research presented last week at Black Hat Europe by IOActive's Fernando Arnaboldi. As Arnaboldi wrote in his ...

and more »

GeekWire

Tempered Networks raises another $7M for 'identity-defined networking' cybersecurity software
GeekWire
Founded in 2014, Tempered Networks originally focused on IoT security, but today its flagship product is networking infrastructure software that also acts as a layer of security. Its point-and-click “identity-based networking” architecture is based on ...

and more »

Midland Daily News

Midland County updates financial software
Midland Daily News
Midland County is purchasing financial software to replace out-of-date software currently in use. County commissioners recently unanimously approved spending $368,185 with Bellefeuil, Szur and Associations (BS&A) for various software programs, data ...


512tech.com

Planview expands its software offerings with another acquisition
512tech.com
Austin software maker Planview is expanding its project management offerings with the acquisition of a Tennessee-based company, the company said Monday. Financial terms of the deal were not disclosed. Planview sells software that helps companies map ...

and more »

Wall Street Journal

Software Firm Settles US Security Probe Over Its Links to Russia
Wall Street Journal
A telecom software company has agreed to resolve a criminal investigation of its use of uncleared Russian nationals working in Russia on a U.S. defense project by implementing a security plan that American officials hope will serve as a new industry ...


NBC 5 Dallas-Fort Worth

Dallas Fire-Rescue Using New Dispatch Software - NBC 5 Dallas ...
NBC 5 Dallas-Fort Worth
Dallas Fire-Rescue dispatchers are using a new software system that puts a priority on emergency calls.

and more »

DigitalSpy.com

Hidden software on HP laptops discovered that tracks what you type
DigitalSpy.com
Hardware manufacturer HP has been found to have a major security flaw in its laptops, dating back to 2012. The company's devices use Synaptics Touchpad software, and security researcher Michael Myng discovered an exploit in the code while looking for a ...
Hundreds of HP laptop models found to have hidden keylogging softwareRT
HP laptops found to have hidden keyloggerBBC News
Your laptop could be recording EVERYTHING you type: Sinister keylogging software that lets hackers spy on users is ...Daily Mail
htxt.africa
all 75 news articles »
Google News

CRM and Customer Life Cycle

Customer Relationship Management or CRM is a combination of enterprise... Read More

C++ Function Templates

C++ Function templates are those functions which can handle different... Read More

Great Plains Bill of Materials Setup & Customization for Process Manufacturing ? Overview

Microsoft Great Plains has full-featured Manufacturing suite of modules: Capacity... Read More

Microsoft Small Business Manager Customization Options - Overview

Microsoft Business Solutions Small Business Manager is Great Plains Dexterity... Read More

Beware of The Pirated Software E-Mail Scams!

You have gotten those E_Mails buy software at deep discounts.... Read More

Microsoft Great Plains Integration with Microsoft Access ? Overview for Developer

... Read More

Microsoft Great Plains FA: Fixed Assets ? Overview For Consultant

Great Plains Fixed Assets Management module is a robust tool... Read More

Outlook... Not Just for Email! Using Your Outlook Calendar

Microsoft Outlook is one of the most widely used software... Read More

Business Plan Software Review: Ultimate Business Planner?

One of the main reasons business owners and entrepreneurs use... Read More

SQL Administrator Skills Required to Support Microsoft Great Plains

Microsoft Great Plains is becoming more and more popular and... Read More

eConnect: eCommerce Development for Microsoft Great Plains

Microsoft Business Solutions Great Plains has several options to enable... Read More

Adware and Spyware Blockers

The most important things you can do for your computer... Read More

Make or Break Factors - When Considering Estimating Software

Make-or-Break Factors in Success and ProfitabilityFor quick printers, estimating can... Read More

Software For Your Hard-Drive

All your software is stored on a hard-drive. But how... Read More

EDI: Electronic Document Interchange for Microsoft Great Plains ? Overview for Software Developer/Pr

Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More

Know Linux

Linux essentials:It's free for download but you have to pay... Read More

Great Plains Sales Order Processing and Invoicing Modules ? Tips For Consultants

We'll give you non formal view, based on our consulting... Read More

Microsoft Great Plains Food Processing ? Implementation & Customization Highlights

Microsoft Great Plains might be considered as ERP platform to... Read More

Internet Security Threats: Who Can Read Your Email?

Before being able to choose a secure Internet communication system,... Read More

Groupware as a Document Manager: Collaboration Series #3

This article is the third of a series of articles... Read More

Explore the Internet in a Whole New Way

For a long time now Microsoft's Internet Explorer has ruled... Read More

Microsoft CRM and Great Plains Implementation: Freight Forwarding Business Automation Example

Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More

Microsoft Great Plains POP: Purchase Order Processing ? Overview For Consultants

Great Plains Purchase Order Processing (POP) module makes up one-third... Read More

Microsoft Great Plains Customization Recovery & Upgrade for Large Corporation

At the end of XX century, in the late 1990th... Read More

How To Avoid Getting Hooked By Pfishing

"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More