Beware of Spyware

One day, you suddenly realize that your computer started to work noticeably slower than it used to. You decide to run de-fragmentation of your hard drive and add more virtual memory to the system. No luck! May be, it's probably some viruses, you reckon turning on your virus scanning software. Even after running the anti-virus program you notice that the problem won't resolve. Not understanding what's happening frustrated you pick up the phone. It's time to call your tech-support. Sounds familiar? You are not alone! Each day, thousands of users are facing similar problems caused by malicious software called Spyware. According to Dell technical support, nowadays 12 percent of their support calls involve problems related to some kinds of Spyware. Microsoft reports that fifty percent of all computer crushes are caused by Spyware, viruses and Trojans.

What is a Spyware?

Spyware ? also named Malware or Adware ? are malicious software programs, which most of the time get installed on your computer without your knowledge. These programs are capable of doing many outrageous, sinister things to your computer such as changing computer settings, tracking your online behavior, monitoring and controlling your computer, recording your keystrokes, displaying unwanted advertisement and reporting needed information back to the person behind it.

The main types of Spyware are:

Key loggers: This type of Spyware copies everything you type to a file and send it to the hacker. The more sophisticated type, which is used for identity theft, copies the information you provide when you are connected to a secure website.

Browser hijacker: It modifies browser settings without your permission. This Spyware is capable of changing your start page, search page, search tool bar and redirect your url to specific pages.

Email redirector: Surreptitiously copies all your incoming and outgoing emails and sends to the hacker.

Dialers: This spyware install themselves to your dial-up settings and dials numbers without your knowledge, often to out of country numbers.

Collectware: The purpose of this Spyware is to track your surfing habit and transmitting the statistical data to the hacker. This information later gets sold to advertisement companies.

Adware: This Spyware downloads all sorts of banner advertisements every time you take some action such as typing a word on your search tool.

Why my antivirus program does not block a Spyware?

Although, Spyware uses same tactics like "Trojan" virus, technically it is not a virus. A virus is a program written to create trouble or possibly harm your computer system. Viruses are capable of replicate, evolve and cause severe damages to your computer files, registry or even hardware. Spyware, on the other hand, does not harm your computer intentionally. Any nuisance like system slow down is the collateral damage, which occurs while the Spyware serves its mission of monitoring your activities and making unwanted changes to your user experience.

People rarely read the fine prints of the user agreements while downloading a file, a program, a game or other free stuffs from the Internet. Unethical sites use this to their advantage and add tiny Spyware with the file you are downloading.

The anti-virus programs can not be sure, whether this program is installed deliberately by you or it's a malicious Spyware. This makes identifying and blocking a Spyware difficult for an Anti-virus program. However, things are started to change! Major anti-virus companies are planning to integrate anti-spyware programs to their existing products very soon.

How did I get infected with a Spyware?

There are numerous ways how you might end up with having a Spyware on your system.

- When you download and install programs, games, smilies, pictures, screensavers from dubious sites, there is a big chance that you might install a sneaky Spyware along the way.

- Some websites and pop-up windows try to download and install Spyware while you are there. According a recent analysis of sex-based websites, up to 80 percent of these sites are now being used to upload Spyware, worms and Trojans to unsuspecting visitors.

- Some add-ons to you browser that is supposed to enhance your browser experience may secretively install Spyware.

- The most cynical method of infecting you with Spyware is when you receive a sudden pop-up ad, which claims that your computer is contaminated and you have to run certain program to cure your system. If you are credulous enough to run this program, it just installs a Spyware instead of eliminating any.

How to fight back?

If you carefully follow the instructions outlined below, your chances of getting infected with Spyware are pretty slim.

Update your Windows Allow your version of Windows to update it automatically. Ensure that you have all the latest security patches installed.

Use Firefox as your default browser Since Internet Explorer is the main target for many Spyware, you will be better of with Mozilla Firefox. Moreover, it is a better browser than IE in many aspects.

Be extremely careful with your downloads Try not to download anything from a unknown site. If you still feel like getting a shareware or freeware program check it out on one of these online Spyware database. Spychecker (http://www.spychecker.com/) is one such service, and Camtech 2000's Spy Chaser (http://camtech2000.net/Pages/SpyChaser.html) is a nifty downloadable database of nearly 1000 spyware-infested programs.

Use an Anti-Spyware application Download and install one of the following anti-spyware programs: Ad-aware (http://www.lavasoftusa.com/software/adaware/), Spybot (http://www.safer-networking.org/en/spybotsd/index.html) and Microsoft AntiSpyware. Although, Microsoft's Anti-Spyware

(http://www.microsoft.com/athome/security/spyware/software/default.mspx) is still at beta stage, I am using it and very happy with its performance.

Get a Firewall If you are using Windows XP with Service Pack 2, you are probably fine! In other cases, if your computer is connected to the Internet directly you should get a firewall and install it. Zone alarm

(http://www.zonelabs.com/store/content/home.jsp) is a great firewall you can download for free.

A recently conducted survey of the Top Network Security threats in 2005 reveals that two-thirds of IT managers and administrators believe that Spyware will be the number one threat to network security. So don't take any chance! Make sure that you are protected!

Nowshade Kabir is the founder, primary developer and present CEO of Rusbiz.com. A Ph. D. in Information Technology, he has wide experience in Business Consulting, International Trade and Web Marketing. Rusbiz is a Global B2B Emarketplace with solutions to start and run online business. You can contact him at mailto:nowshade[at]rusbiz.com http://ezine.rusbiz.com

rental limo Bingham .. Lockport Chicago limo O’Hare
In The News:

For the first time ever, SpaceX launched a rocket into space from Florida and landed the booster the Bahamas, allowing for future polar-orbit spaceflight missions.
Attackers use caller ID spoofing and AI voices to steal money. Tech expert Kurt “CyberGuy" Knutsson provides seven ways to protect yourself.
Tech expert Kurt “CyberGuy" Knutsson talks about the Genesis GV60 MIV, an electric rescue EV with snow tracks for extreme missions.
Tech expert Kurt “CyberGuy" Knutsson helps you ensure a smooth online experience with a reliable, secure home network setup.
Kurt “CyberGuy" Knutsson talks about Vollebak’s Shielding Suit, which blocks EM radiation, infrared and tracking for privacy.
Even Apple products are vulnerable to cybercriminals, and a new report suggests the owners of Mac products will have to be more vigilant this year.
An inflatable six-person tiny house from a firm called 2001 looks like a space station with its inflatable dome that is transportable and eco-friendly.
Scams cost Americans an estimated $159 billion every year and average about $3,500 in losses per victim. The CyberGuy has advice to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Zeekr and Waymo are joining forces for the world's first mass-produced autonomous vehicle, combining an electric vehicle with self-driving technology.
A humanoid robot training center has opened in Shanghai, a big step in China's efforts to become a global leader in robotics and artificial intelligence.
Security experts have discovered that hackers are targeting apps on the App Store to spread malware that steals information from saved screenshots.
A new luxury SUV combines military-inspired design and high-end luxury transportation and includes two military-grade gas masks to protect against chemical warfare.
80% of stalking victims are tracked using tech. GPS trackers, like AirTags, are among the most popular ways to do it. Here's how to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains how to protect yourself against artificial intelligence-fueled romance scams, which have become the most common type of fraud in 2025.
Kurt "CyberGuy" Knutsson explains the steps to declutter text messages on a Mac or iPad. Apple offers ways to do this more efficiently.
Here's how to take control of the algorithms on Facebook, YouTube, Instagram and TikTok if your social media feeds aren't showing you content you want to see.
Beware of iCloud scams using urgent messages. Tech expert Kurt “CyberGuy" Knutsson helps you spot the red flags to protect yourself.
Travel abroad worry-free with these top translation apps for travelers. Tech expert Kurt “CyberGuy" Knutsson highlights some favorites.
The European Space Agency's Euclid space telescope was going through preliminary tests in September 2023 when it captured images of an Einstein Ring in a nearby galaxy.
Tech expert Kurt “CyberGuy" Knutsson says hackers are using Microsoft Teams for phishing, vishing and quishing via social engineering.
Red light camera tickets: Not liable to ID the driver; some are fishing expeditions. Tech expert Kurt “CyberGuy" Knutsson helps you fight back against tricky fake tickets.
The apps collecting the most data about you are among the most widely used. Kurt the CyberGuy takes a look at 20 of these apps and how you can protect personal information.
AST SpaceMobile of Texas is developing the world's first global cellular broadband network that can connect directly to your smartphone without special equipment.

Partitioning, Formatting and Reinstalling in Windows 98

Formatting and reinstalling windows 98 is very easy if you... Read More

Crystal Reports for Microsoft Great Plains ? Overview for Developer

Microsoft Great Plains is main accounting / ERP application... Read More

Interactive Mapping Brings Information to Life

What is Interactive Mapping?Interactive mapping is a visual display medium... Read More

Review of TikiWiki Content Management System

TikiWiki is open source software - it is written in... Read More

Do You Want Your Own Fully Programmable ERP? - Part 1

We are in a transition phase in the Managerial Administration... Read More

Importance of Coding Standards

Programming Help for BeginnersWe write programs to instruct computers. When... Read More

Free Software - Powerful Alternatives to Budget-Busting Software

When you buy a computer, it most likely comes with... Read More

Antivirus Software ? Get The Bugs Before They Get You!

You turn on your computer, and it doesn't look quite... Read More

Microsoft CRM Integration with Microsoft Retail Management System (RMS) ? Overview

Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More

Can Group Collaboration Software Meet Business Needs?

According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More

Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on... Read More

Lotus Domino Implementation and Development: Infrastructure ? Present and Future

Domino server is a buffer between the operation system and... Read More

Microsoft CRM Conversation Gateway: VoIP - Implementation & Customization

Microsoft CRM is winning market share step-by-step from such the... Read More

Microsoft Business Solutions Customization Options - Overview for Programmer

Several years ago Microsoft purchased Great Plains Software, then Navision... Read More

A Case Study on Selecting Contract Management Software

Professional services firm cuts costs and improves productivity with integrated... Read More

Software Companies: Generate New Revenue Streams and Decrease Costs with Custom e-Learning Content

It's no secret that software companies operate in a very... Read More

Daffodil DB: Web Database

What is a Web Database?A web database is a database... Read More

Microsoft CRM for Corporate Business ? Working Offline

If your company has regional and worldwide operations, you might... Read More

Microsoft Great Plains Subcontracting ? Overview for Microsoft Business Solutions Partner

Microsoft Business Solutions Great Plains is very popular ERP/MRP applications... Read More

Adware, What Is It?

Adware is a type of Spyware program that displays some... Read More

A Simple Guide To Wikis

A wiki is an editable text-based website. But you don't... Read More

Crystal Reports For Microsoft RMS ? Overview For Developer/Report Designer

If you are software developer or database administrator - we... Read More

The End of Spyware?

The US House of Representatives has recently passed the "Spy... Read More

Microsoft Great Plains: Government & Non-Profit Organization ? Workflow Implementation

Usually workflow & messaging is realized in CRM and then... Read More

DB Integration - Software for Combine MS Access Databases

Our company, Novaprof Inc., developed unique software - DB Integration.... Read More

taxi from O'Hare Portage ..