Do you recall the first time you ever used the Internet? You might have wondered where in the world you could find information about computers without having websites to go to. And this might still be an on-going dilemma for many people.
How do you really search information on the Internet? The answer is fairly simple - use a search engine. An example of a search engine is Google and Yahoo. When you go to their website, you will notice that there's a long bar where you can type something. It also has a search button at the end. That's what a search engine looks like.
If you have been using search engines but still can't get the right website, here are good tips on how to search for information using the Internet:
1. Don't Type Too Many Words In The Search Bar.
Search engines rely on keywords. So if you want to know where to find information about auto accident insurance coverage, you can simply type "auto insurance" and go from there. The fewer keywords you type, the more results you'll get. Also, words like "the", "to", and "or" are omitted from the search. It's best not to type them unless you really have to.
2. Be Specific.
Be specific but not too restricting in your search. If you want to know more about litigation experts, don't merely look for attorneys and lawyers. The Internet is full of niches and subdirectories. You'll get faster to the exact thing you are looking for if you are a little more precise in your search.
3. Use The Search Engine Tools As Necessary.
If you are searching for pictures, videos, or groups, specifically select the right tab on the search engine's page. This way, you will be able to get the results of your preference. Understand how the search engine you are using works. They are very simple to use.
4. Consult Web Directories As Well.
Sometimes, you are looking for a certain website more than the information it contains. If you can't find what you are looking for in the search engine results, you can always check out web directories. Web directories are websites that contains the URL's of different sites that were submitted for listing. You'll most likely find what you are looking for there.
These are good tips on how you can find certain information on the web. The web is large and expansive. And it certainly contains anything and everything you are looking for. It is just a matter of using the right method when searching.
Wednesday, May 7, 2008
Home Network Security, Simplified
Many home users have unknowingly become computer geeks. Not too long ago using the terms 'router' or 'wireless' signaled the presence of the enthusiast or professional. No longer. Now, routers, hubs, switches, Ethernet cards, firewalls and a bewildering array of other network related buzzwords have entered the home.
By making the installation of these devices easy and inexpensive, vendors opened new sources of revenue for themselves and offered a significant value to home users. Now multiple home computers could share resources without 'sneaker net' - physically transporting files or moving printer connections. Now the whole family could use a single network connection to the Internet, and often without having to string wires all over the house.
What users didn't get is what every networking and computer professional has early on - training in how to secure that gear from hackers.
But, don't panic. The settings from the vendor are often quite good. Now, for some guidance...
RFM is a common acronym known to computer professionals. For the sake of propriety I'll ignore the middle letter, but the first and last stand for Read the Manual. It'll give you common useful settings and configuration information. Now read it again.
ROUTER PORTS
First, change the password and if possible rename the administrator account. The person who bought the same model you did has that information, and he may not be as trustworthy as you.
Port 80 is the standard for HTTP, needed for any web browsing. 'Ports' are network numbers used by software to distinguish traffic. Open that, but only for specific IP addresses or ranges going out. That way, only known computers can generate traffic out of your home network.
That tip is imperfect if you acquire an IP address automatically. I.e. use DHCP, as most do. But many providers allow you to purchase one static address for your router. That's the one that should have access out.
Why do you care about traffic going out? Because you can infect others. Practice safe networking. Don't spread viruses. Also, if you have wireless - see below - you may not know who's on your network. Even if you don't and you're not home, no one can sneak in with a laptop and get out of your network. Yes, it's happened.
You'll have to open Port 80 for all incoming traffic, unless you want to try to track which sites have which IP address - nearly impossible.
If you use a desktop e-mail client, rather than being entirely browser based, you need to open Port 25 for outgoing mail (SMTP) and 110 for incoming (POP3, ignore the acronym meanings).
And that's ALL... usually.
Manual or desktop FTP clients, which you should avoid because of their weak security, will need another, and specialized programs will require a few others. In most cases you'll find their numbers easily discoverable. Keep them to the bare minimum. The rule of thumb with network security is: everything closed by default, allow only those truly needed and only to those who need it.
By the way, if these sound a lot like firewall settings it's because routers and firewalls have some overlapping functionality. Routers route traffic, firewalls prevent or allow it.
WIRELESS NETWORKS
If you have wireless gear, you have more to do. Some, by default, allow anyone nearby to use them to access that network and hence the Internet. That means not only the teenager in the upstairs bedroom, but the neighbor next door and the hacker parked at the curb can access resources inside your home. Yes, that does happen.
Lock down your wireless gear by, you guessed it, reading the manual to learn how to configure passwords and implement any other security features available.
It isn't necessary to dedicate your life to becoming a network or security expert in order to safeguard your resources. But having a home network connected to the Internet via a home router, puts you at extra risk compared to dial-up or single-connection users.
If you don't spend a modest amount of time to take simple steps today, someday you may spend much more after you've been hacked.
By making the installation of these devices easy and inexpensive, vendors opened new sources of revenue for themselves and offered a significant value to home users. Now multiple home computers could share resources without 'sneaker net' - physically transporting files or moving printer connections. Now the whole family could use a single network connection to the Internet, and often without having to string wires all over the house.
What users didn't get is what every networking and computer professional has early on - training in how to secure that gear from hackers.
But, don't panic. The settings from the vendor are often quite good. Now, for some guidance...
RFM is a common acronym known to computer professionals. For the sake of propriety I'll ignore the middle letter, but the first and last stand for Read the Manual. It'll give you common useful settings and configuration information. Now read it again.
ROUTER PORTS
First, change the password and if possible rename the administrator account. The person who bought the same model you did has that information, and he may not be as trustworthy as you.
Port 80 is the standard for HTTP, needed for any web browsing. 'Ports' are network numbers used by software to distinguish traffic. Open that, but only for specific IP addresses or ranges going out. That way, only known computers can generate traffic out of your home network.
That tip is imperfect if you acquire an IP address automatically. I.e. use DHCP, as most do. But many providers allow you to purchase one static address for your router. That's the one that should have access out.
Why do you care about traffic going out? Because you can infect others. Practice safe networking. Don't spread viruses. Also, if you have wireless - see below - you may not know who's on your network. Even if you don't and you're not home, no one can sneak in with a laptop and get out of your network. Yes, it's happened.
You'll have to open Port 80 for all incoming traffic, unless you want to try to track which sites have which IP address - nearly impossible.
If you use a desktop e-mail client, rather than being entirely browser based, you need to open Port 25 for outgoing mail (SMTP) and 110 for incoming (POP3, ignore the acronym meanings).
And that's ALL... usually.
Manual or desktop FTP clients, which you should avoid because of their weak security, will need another, and specialized programs will require a few others. In most cases you'll find their numbers easily discoverable. Keep them to the bare minimum. The rule of thumb with network security is: everything closed by default, allow only those truly needed and only to those who need it.
By the way, if these sound a lot like firewall settings it's because routers and firewalls have some overlapping functionality. Routers route traffic, firewalls prevent or allow it.
WIRELESS NETWORKS
If you have wireless gear, you have more to do. Some, by default, allow anyone nearby to use them to access that network and hence the Internet. That means not only the teenager in the upstairs bedroom, but the neighbor next door and the hacker parked at the curb can access resources inside your home. Yes, that does happen.
Lock down your wireless gear by, you guessed it, reading the manual to learn how to configure passwords and implement any other security features available.
It isn't necessary to dedicate your life to becoming a network or security expert in order to safeguard your resources. But having a home network connected to the Internet via a home router, puts you at extra risk compared to dial-up or single-connection users.
If you don't spend a modest amount of time to take simple steps today, someday you may spend much more after you've been hacked.
How To Stay Informed Of Future Security Threats
The internet and e-mail is an amazing resource and medium where everyone and everybody utilizes to communicate with each other.
Unfortunately, it is also being used for malicious activities such as scammers that use the e-mail to get money from computer users.
Fortunately, there is an easy way to recognize any attempts of scamming that arrive through e-mail.
Knowledge is power and the descriptions indicated below are three of the email scams currently being used by scrupulous individuals. Stay informed and read on.
Scams via phisher
How this e-mail scam works is through this: usually, you will receive an e-mail from a service online provider or through a bank that ill ask you to go click a specific link or visit a particular website and from there you will be elicited to provide your personal info.
This type of scam is called phishing.
Basically, this scam is where victims are asked and tricked to entering all their personal info like passwords, account numbers to an organization or company that presents itself as legitimate.
This trick is done by ingenious scammers who create a site that looks a lot like the original and authentic web site.
E-mails are usually used to invite and bait potential online victims to go to the fake website.
As much as possible, always be cautious and wary of e-mails that ask you to click a link and give out personal sensitive info like bank details.
You should know that any info provided on these fake sites are farmed and harvested by scammers which they in turn use to steal the funds from the user’s bank account or steal the identity of the victim.
Be aware that companies that are legitimate would never ask for any sensitive info through e-mail.
Never, ever click on these e-mail links. Never and do not give out any info about you. If there are doubts on the veracity of the e-mail, it is always best to directly contact the legitimate company.
How to know a scam if you see one
Generally, a scam has the following characteristics. It makes the promise to give you lots of money, lots of prizes or a job.
It also asks you for donations. It also proposes business deals that are lucrative. It also asks that you provide personal and very sensitive info. It also asks that you follow a specific link to a particular website and log in to a particular account.
Educating yourself is an essential contribution against being vulnerable to fraud as well as any virus or security threat.
The worm
Just this year, a worm that has the ability to e-mail itself in massive amounts target users of Yahoo Mail by arriving in inboxes with a subject that says: New site, along with it an attached forwarded message.
The worm was written using JavaScript and allows embedded scripts written in html to automatically run in the browsers of users.
Basically what this worm does is fool unknowing e-mail recipients to believe that they have received an online card and to click on a particular web link to access it.
However, once clicked, a Trojan is immediately downloaded to the user’s computer and is disguised as am html file thus innocently appearing as a web site page.
Receiving any e-mail that is similar to this should not let you be fooled. As much as possible, do not in any way follow these links in an e-mail message especially if you are not sure that it would lead you to a greeting card web site.
As much as possible, check the site’s true destination prior to clicking it. It would help if you course your mouse over the link and thru doing so immediately see the file extension.
All in all, staying informed is one way to harness power thru knowledge of current trends and updates on potential security and online threats.
This allows ample time for anyone to prepare their system and thereby prevent unnecessary crashes and problems brought about by malicious and threatening viruses, worms or scams.
Believe it or not, luck has little to do with this. The meeting of opportunity and preparation does much to make safe computing a reality that is possible and livable, now.
Unfortunately, it is also being used for malicious activities such as scammers that use the e-mail to get money from computer users.
Fortunately, there is an easy way to recognize any attempts of scamming that arrive through e-mail.
Knowledge is power and the descriptions indicated below are three of the email scams currently being used by scrupulous individuals. Stay informed and read on.
Scams via phisher
How this e-mail scam works is through this: usually, you will receive an e-mail from a service online provider or through a bank that ill ask you to go click a specific link or visit a particular website and from there you will be elicited to provide your personal info.
This type of scam is called phishing.
Basically, this scam is where victims are asked and tricked to entering all their personal info like passwords, account numbers to an organization or company that presents itself as legitimate.
This trick is done by ingenious scammers who create a site that looks a lot like the original and authentic web site.
E-mails are usually used to invite and bait potential online victims to go to the fake website.
As much as possible, always be cautious and wary of e-mails that ask you to click a link and give out personal sensitive info like bank details.
You should know that any info provided on these fake sites are farmed and harvested by scammers which they in turn use to steal the funds from the user’s bank account or steal the identity of the victim.
Be aware that companies that are legitimate would never ask for any sensitive info through e-mail.
Never, ever click on these e-mail links. Never and do not give out any info about you. If there are doubts on the veracity of the e-mail, it is always best to directly contact the legitimate company.
How to know a scam if you see one
Generally, a scam has the following characteristics. It makes the promise to give you lots of money, lots of prizes or a job.
It also asks you for donations. It also proposes business deals that are lucrative. It also asks that you provide personal and very sensitive info. It also asks that you follow a specific link to a particular website and log in to a particular account.
Educating yourself is an essential contribution against being vulnerable to fraud as well as any virus or security threat.
The worm
Just this year, a worm that has the ability to e-mail itself in massive amounts target users of Yahoo Mail by arriving in inboxes with a subject that says: New site, along with it an attached forwarded message.
The worm was written using JavaScript and allows embedded scripts written in html to automatically run in the browsers of users.
Basically what this worm does is fool unknowing e-mail recipients to believe that they have received an online card and to click on a particular web link to access it.
However, once clicked, a Trojan is immediately downloaded to the user’s computer and is disguised as am html file thus innocently appearing as a web site page.
Receiving any e-mail that is similar to this should not let you be fooled. As much as possible, do not in any way follow these links in an e-mail message especially if you are not sure that it would lead you to a greeting card web site.
As much as possible, check the site’s true destination prior to clicking it. It would help if you course your mouse over the link and thru doing so immediately see the file extension.
All in all, staying informed is one way to harness power thru knowledge of current trends and updates on potential security and online threats.
This allows ample time for anyone to prepare their system and thereby prevent unnecessary crashes and problems brought about by malicious and threatening viruses, worms or scams.
Believe it or not, luck has little to do with this. The meeting of opportunity and preparation does much to make safe computing a reality that is possible and livable, now.
What To Do If Your Computer Is Attacked
Prevention is always better than a pound of cure.
Believe it or not, it is now utterly impossible to survive without a computer. Almost anything and everything could be done on-line nowadays.
From purchasing to selling to paying bills, one really need not go out as any transaction could actually be made thru the computer thanks to the internet. Unless of course fresh air is also available online.
However, the computer’s flexibility has also allowed it to be vulnerable to attack from one of the most potentially harmful entities around: the computer virus.
The instance you detect that the computer you own is infected with a virus, the following are helpful tasks that you could do to protect it further and to also avoid other personal computers to be affected as well.
Use disks from trusted sources
You do not allow your shoes to tread on any mud puddle or any dirty floor, or your shirts to be easily vulnerable to stains or dirt. Therefore, it is always best to treat your computer the same way.
As much as possible, always be careful with what kind of disks as well as files enter your computer. Either the files were downloaded from the internet or the disks borrowed from friends, it is always best to make sure where they come from or to scan them in order to avoid any potentially harmful viruses.
It is also not a good idea to download any files from internet sites that are unsafe or insecure. Also, do not immediately open attachments received via e-mail.
Take a good look on the subject of the email as well as where the email came from. Be wary even if the email was from your contacts.
Fortunately, there are now facilities in email services that immediately scan attachments prior to opening them. Email subjects that are vague and from senders that have gibberish email addresses must arouse your suspicion.
Included in this group are those emails that aggressively claim that you should “Check out this message!” or that you should “See the following pics!”
Acquire a program that fights viruses
Fortunately, there are a lot of anti-virus software programs that scan and eliminate viruses once they are detected. This allows anyone to safely and confidently share data and disks, the freedom to download any files from the internet as well as open any attachments received via e-mail.
When the virus hits
Fear not. As much as possible, relax. There is a way out of this predicament. All you have to do is to visit the web site of the manufacturer of your anti-virus software. They may have the latest software which, if it will not delete the harmful virus, could identify and detect it.
Search for a vaccine
The world wide web is available at your beck and call so you could search for any information you may need with regards to the particular virus that you want deleted.
By entering the virus name on the search engine, all information as well as vaccine may present itself.
Download, download, download
Be free to install as well as download any patches of software or programs that could help in eliminating the computer virus.
You could also try to religiously follow any of the instructions that you will find in order to manually delete the virus.
Do not rest on your laurels
Do not be easily convinced that once the computer virus has been deleted, the virus is now totally eliminated.
The best way to determine if the virus is completely destroyed is via running a virus scan. If the scan reports that no virus components have been detected, you can now relax.
Un-attach yourself from attachments
Caution must always be practiced once attachments have been received. The file extensions that one should be careful in opening are those that end in *.exe, *.doc, *.ppt or *.xls.
However, those that end in the following extensions such as: *.js, *.vbs should – as much as possible – never be opened.
All in all, every computer is vulnerable to be attacked. What one needs to protect your own PC is caution and preparedness to look towards the future and anticipate any potential attack prior to it happening. This ensures your computer to run as smoothly as it possibly could.
Believe it or not, it is now utterly impossible to survive without a computer. Almost anything and everything could be done on-line nowadays.
From purchasing to selling to paying bills, one really need not go out as any transaction could actually be made thru the computer thanks to the internet. Unless of course fresh air is also available online.
However, the computer’s flexibility has also allowed it to be vulnerable to attack from one of the most potentially harmful entities around: the computer virus.
The instance you detect that the computer you own is infected with a virus, the following are helpful tasks that you could do to protect it further and to also avoid other personal computers to be affected as well.
Use disks from trusted sources
You do not allow your shoes to tread on any mud puddle or any dirty floor, or your shirts to be easily vulnerable to stains or dirt. Therefore, it is always best to treat your computer the same way.
As much as possible, always be careful with what kind of disks as well as files enter your computer. Either the files were downloaded from the internet or the disks borrowed from friends, it is always best to make sure where they come from or to scan them in order to avoid any potentially harmful viruses.
It is also not a good idea to download any files from internet sites that are unsafe or insecure. Also, do not immediately open attachments received via e-mail.
Take a good look on the subject of the email as well as where the email came from. Be wary even if the email was from your contacts.
Fortunately, there are now facilities in email services that immediately scan attachments prior to opening them. Email subjects that are vague and from senders that have gibberish email addresses must arouse your suspicion.
Included in this group are those emails that aggressively claim that you should “Check out this message!” or that you should “See the following pics!”
Acquire a program that fights viruses
Fortunately, there are a lot of anti-virus software programs that scan and eliminate viruses once they are detected. This allows anyone to safely and confidently share data and disks, the freedom to download any files from the internet as well as open any attachments received via e-mail.
When the virus hits
Fear not. As much as possible, relax. There is a way out of this predicament. All you have to do is to visit the web site of the manufacturer of your anti-virus software. They may have the latest software which, if it will not delete the harmful virus, could identify and detect it.
Search for a vaccine
The world wide web is available at your beck and call so you could search for any information you may need with regards to the particular virus that you want deleted.
By entering the virus name on the search engine, all information as well as vaccine may present itself.
Download, download, download
Be free to install as well as download any patches of software or programs that could help in eliminating the computer virus.
You could also try to religiously follow any of the instructions that you will find in order to manually delete the virus.
Do not rest on your laurels
Do not be easily convinced that once the computer virus has been deleted, the virus is now totally eliminated.
The best way to determine if the virus is completely destroyed is via running a virus scan. If the scan reports that no virus components have been detected, you can now relax.
Un-attach yourself from attachments
Caution must always be practiced once attachments have been received. The file extensions that one should be careful in opening are those that end in *.exe, *.doc, *.ppt or *.xls.
However, those that end in the following extensions such as: *.js, *.vbs should – as much as possible – never be opened.
All in all, every computer is vulnerable to be attacked. What one needs to protect your own PC is caution and preparedness to look towards the future and anticipate any potential attack prior to it happening. This ensures your computer to run as smoothly as it possibly could.
Setting Up A Safe Home Network
Securing the computer in your home is a task that requires your full and serious attention.
They take a lot of your time and there are steps that need to be done. The following are some of the tips and advice you could do to be able to secure your very own personal computer.
Anti-virus programs is a must
Imagine it this way, would you allow someone to knock at your door and enter your own living space in order to make you buy something or use your own telephone?
If they were neat and presentable enough you could probably let them inside your own home, but just like anyone else, you definitely would be watching their every move.
Observe just what it is you have done. You have already profiled that person and based on the profile you have come up with, have also decided what you will do.
This is because you are very much cautious and concerned on just who enters your own space.
Basically, this is how anti-virus programs work.
These programs scan all contents of every file, looking for patterns that are specific and one that would match a particular profile. This is basically termed as virus signature – or something that is notoriously harmful to your computer.
Every file that has a signature match, the program provides options on just how it is it should respond. One such response is by removing the patterns that are offensive or one that destroys the file.
A virus basically works this way. They are like salesmen who knock in your own living space and they would get you to buy or listen to their sales pitch. However, they could try to pilfer your money or valuables.
One way to know if a particular scammer is prowling in your neighborhood is probably by reading about them in the news or seeing them in a tv news report. These reports could give you an idea of what these scammers look like or what are the things to be wary and watch out for.
Anti-virus software programs basically work similarly. When the vendors know of a new potentially threatening virus, they have a set of updated signature viruses that could include the new virus threat.
Scan and check, check and scan
Other ways and means for viruses to enter your personal computer is via floppy disks, web sites, email, CD-ROM as well as downloaded files.
As much as possible, all these avenues must be checked if they contain viruses or not.
For instance, prior to using a particular floppy disk, it must first be checked for any viruses.
Also, when downloading a specific file from the net, these must be checked for any viruses. Your own anti-virus software program usually allows you to specify and check these places for any viruses. They may also do this scan automatically.
Patch it now, patch it good
The instance your computer’s system breaks down, do you have an idea on how you should restore its functions?
Many vendors have patches whose purpose is to fix any types of bugs. Usually, vendors offer patches that are free in their own web sites. When purchasing programs, it is a great idea if you ask the vendor how they supply patches.
Software vendor programs also have a service that allows you to a recall. Notices for patches could be received via e-mail through mailing list subscription. Through this service, one can easily learn computer problems even if you have yet to discover them and before any intruders could have the opportunity to exploit your computer’s system.
Be cautious when reading attachments via e-mail
Always be careful when opening received e-mails that carry attachments. Sometimes, the potentially threatening messages could come from unsolicited e-mails.
To be able to determine if an email is safe or not, it would be best to conduct the following test and ask these questions: Was the email sent by someone you know? Did you receive this e-mail before? Is the subject of the email described in a clear manner?
A suspicious e-mail usually read as BradPitt.jpg.vbs. Worms could travel this way and reading / opening it could bring damage to your computer system.
All in all, caution and care is needed to be able to protect your computer from unnecessary attacks by malicious viruses and worms.
They take a lot of your time and there are steps that need to be done. The following are some of the tips and advice you could do to be able to secure your very own personal computer.
Anti-virus programs is a must
Imagine it this way, would you allow someone to knock at your door and enter your own living space in order to make you buy something or use your own telephone?
If they were neat and presentable enough you could probably let them inside your own home, but just like anyone else, you definitely would be watching their every move.
Observe just what it is you have done. You have already profiled that person and based on the profile you have come up with, have also decided what you will do.
This is because you are very much cautious and concerned on just who enters your own space.
Basically, this is how anti-virus programs work.
These programs scan all contents of every file, looking for patterns that are specific and one that would match a particular profile. This is basically termed as virus signature – or something that is notoriously harmful to your computer.
Every file that has a signature match, the program provides options on just how it is it should respond. One such response is by removing the patterns that are offensive or one that destroys the file.
A virus basically works this way. They are like salesmen who knock in your own living space and they would get you to buy or listen to their sales pitch. However, they could try to pilfer your money or valuables.
One way to know if a particular scammer is prowling in your neighborhood is probably by reading about them in the news or seeing them in a tv news report. These reports could give you an idea of what these scammers look like or what are the things to be wary and watch out for.
Anti-virus software programs basically work similarly. When the vendors know of a new potentially threatening virus, they have a set of updated signature viruses that could include the new virus threat.
Scan and check, check and scan
Other ways and means for viruses to enter your personal computer is via floppy disks, web sites, email, CD-ROM as well as downloaded files.
As much as possible, all these avenues must be checked if they contain viruses or not.
For instance, prior to using a particular floppy disk, it must first be checked for any viruses.
Also, when downloading a specific file from the net, these must be checked for any viruses. Your own anti-virus software program usually allows you to specify and check these places for any viruses. They may also do this scan automatically.
Patch it now, patch it good
The instance your computer’s system breaks down, do you have an idea on how you should restore its functions?
Many vendors have patches whose purpose is to fix any types of bugs. Usually, vendors offer patches that are free in their own web sites. When purchasing programs, it is a great idea if you ask the vendor how they supply patches.
Software vendor programs also have a service that allows you to a recall. Notices for patches could be received via e-mail through mailing list subscription. Through this service, one can easily learn computer problems even if you have yet to discover them and before any intruders could have the opportunity to exploit your computer’s system.
Be cautious when reading attachments via e-mail
Always be careful when opening received e-mails that carry attachments. Sometimes, the potentially threatening messages could come from unsolicited e-mails.
To be able to determine if an email is safe or not, it would be best to conduct the following test and ask these questions: Was the email sent by someone you know? Did you receive this e-mail before? Is the subject of the email described in a clear manner?
A suspicious e-mail usually read as BradPitt.jpg.vbs. Worms could travel this way and reading / opening it could bring damage to your computer system.
All in all, caution and care is needed to be able to protect your computer from unnecessary attacks by malicious viruses and worms.
Computer Viruses And Guarding Against Them
In this modern Information Age, computers are necessities in life. Whether we use them for simple functions such as typing our homework and business reports, up to more important acts like online business meetings and transactions, one cannot deny that computers are a big part in our daily lives. Using a computer, particularly the Internet, is one task that even a ten year old can do at this particular period in time.
With the growing increase of popularity and reliance on computers, as well as the demand for it, security risks have also gone up, which is a reality that cannot be ignored. With the billions of information bits being spread across the World Wide Web, hackers and computer intruders (criminals) see the value in focusing their attention to computers and the Internet. The information they would retrieve here is (more often than not) more useful than when doing it the old-fashioned way.
As such, these intruders have devised some methods into getting information out of computer users, with or without these people knowing that they’ve been hacked into. As is the case in real life, there are some computer programs that are disguised to be innocent, but actually act as spies, providing information to the intruders. These malicious programs which are security threats are called computer viruses.
Computer viruses should not be taken lightly. They work in many different ways; one of them may be to provide data to the one who planted the virus. Other viruses can simply be annoying - slowing down your computer, building unwanted files, etc. – while some can be very disruptive, such as deleting your hard drive, compromising your operating system, etc.
As such, there are different types of viruses which normally differ in how they function and how they are spread. Examples of these include Trojan horses, worms, email viruses, and logic bombs. It would be important for you to know these kinds of viruses in order to better protect you from them, as well as to have the proper programs to get rid of them.
Trojan horses are simply computer program that cannot reproduce themselves, but can do damage anywhere from minimal to extremely dangerous. It usually disguises itself as a common file (maybe an .mp3 music file or a .jpeg picture file) but does the damage when the computer user opens it. This is why you should take extra care when opening a suspicious looking file – it could very well be a Trojan horse.
Worms are self reproducing programs that mainly use security holes in order to spread itself throughout the network. If your computer is infected with a worm and is able to replicate itself a number of times, this usually causes your computer to slow down noticeably since it uses your computer resources and memory to do so. They often use security flaws in operating systems (such as Windows) in order to self reproduce.
Email viruses are self explanatory – they spread via email. Once a user opens the infected email, what it usually does is send itself to other computer users via the email addresses found in the user’s address book. Because it uses email and a lot of people open emails without really checking or being careful, it spreads very quickly across the entire world and can cause chaos within just a few days.
Logic bombs are viruses that target specific computer applications, causing them to crash (for example, Windows). This can also be spread via email attachments or by innocently downloading it off the Internet. It can cause a great deal of harm (particularly if it infects Windows and the like), or just a small amount (small program).
Fortunately for computer users, there are anti-virus programs available anywhere, whether in the Internet or at the computer shop. These programs specifically target over thousands of viruses and wipe them clean from your system (if infected) or protect you from incoming attacks (if not yet infected).
Anti-virus programs are constantly updated (normally everyday) since there are always new virus definitions each day, and you can get infected by these new viruses. These software developers are always researching about the newest viruses to ensure you, the user, are protected from these viruses as much as possible. Your PC security and safety are always being considered.
With the growing increase of popularity and reliance on computers, as well as the demand for it, security risks have also gone up, which is a reality that cannot be ignored. With the billions of information bits being spread across the World Wide Web, hackers and computer intruders (criminals) see the value in focusing their attention to computers and the Internet. The information they would retrieve here is (more often than not) more useful than when doing it the old-fashioned way.
As such, these intruders have devised some methods into getting information out of computer users, with or without these people knowing that they’ve been hacked into. As is the case in real life, there are some computer programs that are disguised to be innocent, but actually act as spies, providing information to the intruders. These malicious programs which are security threats are called computer viruses.
Computer viruses should not be taken lightly. They work in many different ways; one of them may be to provide data to the one who planted the virus. Other viruses can simply be annoying - slowing down your computer, building unwanted files, etc. – while some can be very disruptive, such as deleting your hard drive, compromising your operating system, etc.
As such, there are different types of viruses which normally differ in how they function and how they are spread. Examples of these include Trojan horses, worms, email viruses, and logic bombs. It would be important for you to know these kinds of viruses in order to better protect you from them, as well as to have the proper programs to get rid of them.
Trojan horses are simply computer program that cannot reproduce themselves, but can do damage anywhere from minimal to extremely dangerous. It usually disguises itself as a common file (maybe an .mp3 music file or a .jpeg picture file) but does the damage when the computer user opens it. This is why you should take extra care when opening a suspicious looking file – it could very well be a Trojan horse.
Worms are self reproducing programs that mainly use security holes in order to spread itself throughout the network. If your computer is infected with a worm and is able to replicate itself a number of times, this usually causes your computer to slow down noticeably since it uses your computer resources and memory to do so. They often use security flaws in operating systems (such as Windows) in order to self reproduce.
Email viruses are self explanatory – they spread via email. Once a user opens the infected email, what it usually does is send itself to other computer users via the email addresses found in the user’s address book. Because it uses email and a lot of people open emails without really checking or being careful, it spreads very quickly across the entire world and can cause chaos within just a few days.
Logic bombs are viruses that target specific computer applications, causing them to crash (for example, Windows). This can also be spread via email attachments or by innocently downloading it off the Internet. It can cause a great deal of harm (particularly if it infects Windows and the like), or just a small amount (small program).
Fortunately for computer users, there are anti-virus programs available anywhere, whether in the Internet or at the computer shop. These programs specifically target over thousands of viruses and wipe them clean from your system (if infected) or protect you from incoming attacks (if not yet infected).
Anti-virus programs are constantly updated (normally everyday) since there are always new virus definitions each day, and you can get infected by these new viruses. These software developers are always researching about the newest viruses to ensure you, the user, are protected from these viruses as much as possible. Your PC security and safety are always being considered.
Pop-ups
Pop-ups are those annoying advertisements that - as the name says - pop up on your monitor as you surf the Internet. Their main purpose is to attract visitors to advertisers' web sites or to collect e-mail addresses.
The pop-ups that come on your screen as a web page loads are usually caused by something called JavaScript. This is a simple programming language that can be integrated into the HTML used to build web sites.
Some pop-ups are useful. Sometimes a user clicks a link on the Web page and a small window will open asking a user to fill in information or giving a user more information. Music sites often use pop-ups to play tunes in a specialized player window. This can be a completely legitimate use of pop-ups and is quite different from the pop-up advertisements that appear unbidden.
JavaScript can control the size of the window and the elements displayed. The status bar or the menus can be hidden, making it impossible to navigate away from the pop-up. Your only options are to close the window using the 'x' box in the top right corner or to click on the ad and be taken to the advertiser's web site. Annoying, huh?
Some pop-up windows are either poorly programmed or intentionally malicious. The JavaScript will create multiple windows, and when one of those windows is closed more windows will open. The only way out of this endless cycle is to close the browser.
A relatively new kind of pop-up is created using Flash and can be programmed to follow your mouse or to float on the screen as you scroll the window.
In addition to pop-ups created with JavaScript and Flash, 'adware' can create pop-up ads according to the content on a web page. Adware is usually just advertising-supported software which displays ads when you use that program. Sometimes, however, 'adware' refers to small hidden programs that deliver targeted advertising to your web browser. These programs may look for certain keywords on a web page and generate advertisements based on those words.
Another type of pop-up is the pop under. Rather than appearing on top of web pages they're hidden until you close the browser window. These are a little bit less intrusive than pop-ups but still an unwanted nuisance. There's no end to the cleverness of advertisers!
It's the nuisance factor of pop-ups that has encouraged almost every web browser designer to include some kind of pop-up killer in their program. The latest versions of all the major browsers have integrated pop-up killers.
There are also many specialized pop-up killer utilities that run in the background and require no user intervention, most available free of charge. So, download one today. Unless you just enjoy advertising.
The pop-ups that come on your screen as a web page loads are usually caused by something called JavaScript. This is a simple programming language that can be integrated into the HTML used to build web sites.
Some pop-ups are useful. Sometimes a user clicks a link on the Web page and a small window will open asking a user to fill in information or giving a user more information. Music sites often use pop-ups to play tunes in a specialized player window. This can be a completely legitimate use of pop-ups and is quite different from the pop-up advertisements that appear unbidden.
JavaScript can control the size of the window and the elements displayed. The status bar or the menus can be hidden, making it impossible to navigate away from the pop-up. Your only options are to close the window using the 'x' box in the top right corner or to click on the ad and be taken to the advertiser's web site. Annoying, huh?
Some pop-up windows are either poorly programmed or intentionally malicious. The JavaScript will create multiple windows, and when one of those windows is closed more windows will open. The only way out of this endless cycle is to close the browser.
A relatively new kind of pop-up is created using Flash and can be programmed to follow your mouse or to float on the screen as you scroll the window.
In addition to pop-ups created with JavaScript and Flash, 'adware' can create pop-up ads according to the content on a web page. Adware is usually just advertising-supported software which displays ads when you use that program. Sometimes, however, 'adware' refers to small hidden programs that deliver targeted advertising to your web browser. These programs may look for certain keywords on a web page and generate advertisements based on those words.
Another type of pop-up is the pop under. Rather than appearing on top of web pages they're hidden until you close the browser window. These are a little bit less intrusive than pop-ups but still an unwanted nuisance. There's no end to the cleverness of advertisers!
It's the nuisance factor of pop-ups that has encouraged almost every web browser designer to include some kind of pop-up killer in their program. The latest versions of all the major browsers have integrated pop-up killers.
There are also many specialized pop-up killer utilities that run in the background and require no user intervention, most available free of charge. So, download one today. Unless you just enjoy advertising.
Subscribe to:
Posts (Atom)