All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

©2004 by Kara Glover
___________________________________________________________________________________



Check out these great Free opportunities

Do You Get More Spam Than Real Email?

The unsolicited junk or bulk email that you receive is known as Spam. Spam is a very serious problem the people have to deal with daily. Sometimes the junk emails exceed the regular email messages that we receive in our email account. Spam filter can be a solution for you to get freedom from Spam mails. There are different types of software to keep out the Spam emails from your inbox. Spam filters can monitor the emails that come in your inbox and prevent any Spam mail from entering in to your inbox.

The Spam email that you receive is due to the inappropriate usage of mailing list. The mailing list consists of email ids of different people and all of them can be flooded with bulk or junk emails. Many companies send out the Spam email massages to a large number of people who do not ask for such massages. Spamming is considered to be very bad netiquette as it amounts in violating a person’s privacy. Netiquette demand that no email id can be used without the user’s permission.

Many Spam filters are designed to help people who are constantly bombarded with junk or bulk mails. Spam filters make use of filtering technology to filter the contents of the incoming emails. Spam filters can effectively help a person by sorting out these types of incoming emails.

Different types of Spam filters can be helpful for controlling spam. Content based Spam filter is one type that can be used by you. The filter scans the content of the email, and searches for tell tale signs for Spam in the message. Content based Spam filters have however not been very effective in controlling the bulk or the junk messages. The main reason for this being that the spammers had devised ways and means by which they can communicate their message despite the presence of such filters.

Spam filters that are prepared these days are designed to give advanced protection against unsolicited emails and spammers. Bayesian filter technology is another effective way of controlling these mails. Bayesian technology is not like other filtering methods that search for Spam identifying words in the header and the subject line. The Bayesian filter uses the entire perspective of an email when it looks for characters or words for identifying a Spam. Another feature of Bayesian Spam filter is that the more it analyzes the incoming mails, the more it learns to identify Spam mails.

Spam mails can sometimes bombard you in such a manner that you may end up receiving more Spam than the regular emails. Most email service providers have Spam filter software enabled in their sites. All you need to do is select the options of setting the Spam filter for your emails according to your liking. You can mark the sites from which you want to receive or not receive mails in your inbox. Setting the options for blocking the bulk or the junk mails is entirely your prerogative.
Author – MattGarrett

___________________________________________________________________________________



Check out these great Free opportunities

Does Your PC Have Worms?

Worms aren't just for dogs anymore. Find out how to inoculate your computer against these nasty parasites.

What Are Worms?
Worms are descended from viruses and are even nastier. Just as ever stronger doses of pesticide breed ever more resilient locusts, better and better anti-spyware software bred ever more devious viruses.

Finally, some virus designers stopped having their creations infect and take over files the way real viruses infect and take over cells. Instead, they created programs that could stand on their own and cause plenty of trouble without the help of any other software applications. Just worms are independent organisms that can infect a host directly, so do computer worms infect computers directly.

What Do Worms Do?
Worm designers are often even more sinister than virus designers, since worm designers are not just vandals. Worm designers often use their creations to achieve specific goals:

• Backdoor creation. Worms often try to set up another kind of malware, a backdoor. A backdoor is a hidden opening in your network connection that lets the worm send data out and take data in. Practically speaking, the data it's sending out are often spam emails, and the data it takes in are instructions on spam emails to send.

• Denial of service attack. Some worm designers really are vandals rather than profit-hungry con artists sending spam. But their vandalism can be more targeted. They use worms to send out numerous requests to remote computers, such as web servers, in order to overwhelm them and therefore shut them down. This is called a denial of service attack.

• Spyware, Trojan, adware, and virus installation. Worms are often used simply to unleash other forms of malware on a computer that might otherwise block them.

• Information theft and fraud.Worms can multitask in order to set up spyware that gathers sensitive information--often financial information--and then set up backdoors, Trojans, viruses, or dialers to disseminate the stolen data.

How Do Worms End Up on a PC?
Worms enter PCs just as viruses, spyware and other malware do: any way they can! Some favorite points of entry for worms:

• Websites can actually download software to your computer without you realizing it. This software includes not only worms, but also spyware, adware, viruses, and other malware. These malware programs find their way into websites either by the deliberate design of the site owner or because hackers have installed the software on the website's server.

• Peer-to-peer file-sharing networkscontain many nice-enough-looking files that are really worms. One of the sneakiest disguises is a filename that indicates the spyware is really a video of a beautiful actress.

• Email, the favored route of viruses, can still be exploited by Spyware. But since new email programs usually block the automatic opening of file attachments, this is less of a problem than it used to be.

• Any internet connection inevitably lets data flow both in and out, and so is vulnerable to attacks by worms.

How Do You Get Rid of Worms?
There's really only one good way to make sure your computer is rid of worms: scan it with multiple antivirus and anti-spyware programs using a full-system scan. Worms are tricky, so anything less than a full-system scan might let them escape. Worse, with new worms coming out all the time, some antivirus and anti-spyware packages may not even know about a new worm until after its wreaking havoc on your machine. That's why you should try using more than one antivirus program and more than one anti-spyware program to increase your odds of successfully detecting the malware.

Don't have more than one anti-spyware and antivirus software? You'd better start downloading. After all, worms won't take excuses.
author:Joel Walsh

___________________________________________________________________________________



Check out these great Free opportunities

Cyber Crooks Go "Phishing"

"Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.

But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have... or worse.

"Phishing" describes a combination of techniques used by cyber crooks to bait people into giving up sensitive personal data such as credit card numbers, social security numbers, bank account numbers, dates of birth and more.

Their techniques work so well that, according to FraudWatchInternational.com, "phishing" rates as the fastest growing scam on the Internet.

Here's the basic pattern for a "phishing" scam...
You receive a very official email that appears to originate from a legitimate source, such as a bank, eBay, PayPal, a major retailer, or some other well known entity.

In the email it tells you that something bad is about to happen unless you act quickly.

Typically it tells you that your account is about to get closed, that someone appears to have stolen your identity, or even that someone opened a fraudulent account using your name.

In order to help straighten everything out, you need to click a link in the email and provide some basic account information so they can verify your identity and then give you additional details so you can help get everything cleared up.

Once you give up your information... it's all over but the crying!

After getting your information, these cyber-bandits can empty your bank accounts, deplete your PayPal accounts, run up your credit card balances, open new credit accounts, assume your identity and much worse.

An especially disturbing new variation of this scam specifically targets online business owners and affiliate marketers.

In this con, the scammer's email informs you that they've just sent $1,219.43 (or a similar big but believable amount) in affiliate commissions to you via PayPal.

They need you to log into your PayPal account to verify receipt of the money and then email them back to confirm you got it.

Since you're so excited at the possibility of an unexpected pay day, you click the link to go to PayPal, log in, and BANG! They have your PayPal login information and can empty your account.

This new "phishing" style scam works extremely well for 2 basic reasons.

First, by exploiting your sense of urgency created by fear or greed, crooks get you to click the link and give them your information without thinking.

Second, the scammers use a variety of cloaking and spoofing techniques to make their emails and websites appear totally legitimate, making it extremely hard to spot a fake website, especially when they've first whipped you into an emotional
frenzy.

The good news, however, is that you can protect yourself relatively easily against this type of cyber-crime with basic software and common sense.

Most of these scams get delivered to you via Spam (unsolicited email), so a good spam blocker will cut down on many of them even making it to your inbox.

If you receive an email that looks legitimate and you want to respond, Stop - Wait - Think!

Verify all phone numbers with a physical phone book or online phone directory like www.Verizon.com or www.ATT.com/directory/ before calling.

Look for spelling and grammatical errors that make it look like someone who doesn't speak English or your native language very well wrote it.

Never click the link provided in the email, but go directly to the website by typing in the main address of the site yourself (example: www.paypal.com or www.ebay.com).

Forward the email to the main email address of the website (example: support@paypal.com) or call the customer service number on the main website you typed in yourself and ask if it is in fact legitimate.

Above all remember this:
Your bank, credit card company, PayPal, eBay and anyone else you deal with online already knows your account number, username, password or any other account specific information.

They don't need to email you for ANY reason to ask you to confirm your information -- so NEVER respond to email requests for your account or personal details.
author:Jim Edwards
___________________________________________________________________________________



Check out these great Free opportunities

Computer-Virus Writer's: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos worldwide."

The above description is the profile of the average computer-virus writer, according to Jan Hruska, the chief executive of British-based Sophos PLC, the world's fourthlargest anti-virus solutions provider.

"They have a chronic lack of girlfriends, are usually socially inadequate and are drawn compulsively to write self- replicating codes. It's a form of digital graffiti to them," Hruska added.

To create and spread cyber infections, virus writers explore known bugs in existing software, or look for vulnerabilities in new versions.

With more and more new OS (operating system) versions, there will be more new forms of viruses, as every single software or OS will carry new features, and new executables that can be carriers of the infection.

Executables are files that launch applications in a computer's operating system, and feature more prominently in new platforms like Microsoft's Windows 2000 and Windows XP than they did in the older DOS or Windows 3.1.

Virus writers also share information to create variants of the same infection, such as the Klez worm, which has been among the world's most prolific viruses.

The Klez, a mass-mailing worm that originated in November 2001, propagates via e-mail using a wide variety of messages and destroys files on local and network drives.

But the news gets worse. Recent events have uncovered what may be a new trend: spammers paying virus writers to create worms that plant an open proxy, which the spammer then can use to forward spam automatically. Many suspect this occurred with the SoBig virus.

The Sobig worms, began spreading in the early part of 2003. The unusual thing about them was they contained an expiration date and were given a short life cycle to see how features worked in the wild.

Having an expiration date also makes the virus more dangerous, because most people would have been alerted to the new worm within a few weeks and anti-virus definitions would have been updated.

A variant of Sobig, Sobig-F was so efficient that just a few infected machines could send thousands of messages. Sobig-F created a denial-of-service effect on some networks, as e- mail servers became clogged with copies of the worm.

According to Mikko Hypponen, manager of anti-virus research for Finland-based F-Secure Corp, Sobig-F sent an estimated 300 million copies of itself.

Computer Economics, Inc. states, "Nearly 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage." However criminal prosecutions have been few, penalties light and just a handful of people have gone to prison for spreading the destructive bugs.

Why is so little being done? Antiquated laws and, for many years, as crazy as it sounds, a "wink, wink" or even admiring attitude toward virus creators.

One person has been sent to prison in the United States and just two in Britain, authorities say. But the low numbers are "not reflective of how seriously we take these cases, but more reflective of the fact that these are very hard cases to prosecute," said Chris Painter, the deputy chief of computer crimes at the U.S. Department of Justice.

So what can you do to protect yourself against computer viruses?

Well, first and foremost, make sure you have proven anti-virus protection like like Symantec's Norton Anti-Virus or McAfee's ViruScan.

In addition, If you haven't already done so, I highly recommend installing Microsoft's Service Pack 2. SP2 tightens your PC's security with a new Windows Firewall, an improved Automatic Updates feature, and a pop-up ad blocker for Internet Explorer. Plus, the newly minted Security Center gives you one easy-to-use interface for keeping tabs on your PC's security apps.

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to 34. Capable of creating chaos worldwide."

Now, I'm no psychiatrist, but to me, the above description sounds more like someone with a few "bats in the belfry!"
author: Dean Phillips
___________________________________________________________________________________



Check out these great Free opportunities

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam
filters are intelligent in so far as they're capable of comparing two sets of information and acting on the result. This
is in direct contrast to the vast majority of other spam filters who use pre-built rules to decide which email is spam and which is not.


Bayesian spam filters can take one group of legitimate email and another group of spam and compare the values and data of
each. The definition of legitimate email that it creates at the end of this comparison session is what it uses going forward to scan your inbox for spam.


FYI Bayesian spam filters are named after Thomas Bayes an 18 century cleric who created something known as Bayes Theorem. In
summary Bayes Theorem is as follows: .."in statistical inference to update estimates of the probability that different hypotheses
are true, based on observations and a knowledge of how likely those observations are, given each hypothesis." In plain English it looks for obvious repeating patterns to form an "opinion" on something. In spam filter terms that "opinion" becomes a rule which keeps you spam free (or pretty close.)


The really neat thing about Bayesian filters is that they're capable of learning. For example if they decided to block an email because the filter perceived it as junk but the user marked it as valid mail the Bayesian filter then knows not to
block that type of email in the future. So, in time, this type of spam filter learns enough to block spam far more effectively.
AOL have embraced this type of spam filter with the launch of AOL 9.0 and AOL Communicator- if the big dog wants it then it must be worthwhile.


So what Bayesian spam filtering options are available to you? Well quite a few to be honest and you'll be pleasantly surprised
by some of the names involved :-) The first one on the list is AOL with their AOL Communicator product. The spam filtering
features in AOL Communicator and AOL 9 are, to be honest, impressive. Think what you will of the provider themselves AOL
Communicator is an excellent product and is suitable for use by both PC and Mac OSX users.


Next up we have Eudora. The nice folks at Qualcomm have designed an excellent email client that also has built in Bayesian spam
filtering. I've used Eudora in the past and it's a neat little package. Again the benefits here are advanced integrated spam
filtering with your e-mail automatically. Mac OSX and OS9 users are in luck with Eudora providing support for both.


Bayesian spam filters are providing a more rounded defense for computer users of all levels in fighting spam. As an indication of the strength of Bayesian spam filters more and more companies are either:

a. Updating their spam filters to include bayesian technique as a plugin or;

b. Basing their new products on bayesian filtering principles from the ground up.
by: Niall Roche



Check out these great Free opportunities

Avoid, Shun, Thwart, Prevent, and then Filter Spam

Email is rapidly becoming the standard means of communication among businesses, associates, and even friends. While many people have now been using the internet and email for years, there are thousands of new users on the internet each day. With inexpensive web hosting, free email services, and the blog burst upon us, getting your own slice of the internet pie has never been easier.

Whether you’re a seasoned professional looking for a refresher course, or you’re new to the internet and email and want to start off right, here are some easy steps to follow to reduce the amount of spam you receive.

Don’t choose an obvious email address. Spammers will generate lists of email addresses based on common names. A common list would be something like: nick@yahoo.com, nick1@yahoo.com, nick2@yahoo.com, etc. If you create an email account with less obvious combinations of your name plus some numbers, chances are better that you won’t find your way onto one of these lists.

Treat your personal email address with care. Only give out your personal email address to close friends and family who you trust. Give your direct business email only to clients and other contacts you trust to only use your address for legitimate business purposes.

Use different accounts for different functions. Create different aliases with your business’s domain name or create a few free accounts from free email servers like Hotmail, Yahoo!, Excite, etc. Use one account that you don’t care about for posting to forums or discussion groups. Use another to subscribe to newsletters and newsgroups. When any of these addresses starts to get spammed too heavily, simply delete the account and switch to a different one.

Remove your email address from your website. Between blogs and cheap web space, it seems everyone has their own piece of cyberspace. Before you put a link to your email address on your site, remember that spammers have bots that harvest these addresses. They will even find addresses printed in plain text. Consider using a web-based form for communication from you website, or place your address as a gif or jpeg.

Do not open, respond to, or purchase from spam. Interacting with spam in any of these ways indicates to the spammer that not only is your address valid, it’s also active. Do not respond with “unsubscribe” in the subject line, or click on any links to remove your name out of the database, as both of these are common ploys to confirm your email address. Remember, because sending email is so inexpensive, spamming can be profitable even if only a small percentage of people purchase what they’re selling. Don’t support what you’re trying to stop.

Finally, Filter you incoming email using filtering software. Even if you guard your email address religiously, you’ll likely still receive spam. Filtering software is usually inexpensive and effective, but there are some important features to consider with any filtering package:

• Make sure you can control what comes to your inbox and what gets deleted. The best programs create a spam folder for you to review before permanently deleting emails.

• The software should block images from incoming emails. Many jpegs in spam actually hide code that notifies the spammer when the email is viewed. Blocking images will not only keep offensive content off your screen but will also help prevent more spam in the future.

• Choose software that provides you with updates - as new spamming techniques are created and proliferated, filtering software should keep up.

While eliminating spam from coming to your email address is nigh unto impossible, following these simple steps will mean you’ll have to spend less time deleting spam from your inbox, giving you more time for the important things of life – like reading this article.
author:Nick Smith

Check out these great Free opportunities

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Online services such as Internet banking save time and money. However, from the depths of its vast expanse have come the dregs of society intent on preying on the new, the naïve, and the less informed.

Phishing is one of the main scams in the present moment. People set up phoney websites and email addresses. Then they spam Email inboxes with official-looking messages explaining that your account with Company X has encountered a problem and that they need you to login and confirm some details. The email addresses are masked to appear official and the links provided in the email all seem to check out. If you click on the link provided then you will usually be taken to a site that looks for all intents and purposes to be official. When you click 'submit' your details will be sent to a criminal somewhere who will do as they please with your information, such as withdrawing money from a bank account or purchasing things in your name. The scam has been labelled 'Phishing' because the criminals engaging in the activity behave similarly to a fisherman throwing bait out in the hope that they'll receive just one bite from the millions of people that receive the email.

So how do you avoid these online scams? First and foremost, it is important to realise that no legitimate organisation should be sending you a request to fill out your personal details because of some server error or for any other reason. Your bank will never send you an email with content along the lines of "We've lost your bank account number and password... please supply them again for our records". You should also know that no bank is going to require your social security number, bank account number, and PIN number just to log in to your account or retrieve your password. Other sites such as Ebay, PayPal, and the like will not email you asking for these details either.

If you're a little unsure as to whether or not an email is official, scroll down a bit until you find the link that they are requesting you to click and simply hold your mouse pointer over the link text without clicking. Now take a look at the bottom left-hand corner of your browser window. The link text is often the address that the phisher wants you to think you will be heading to but the real address will be revealed in the bottom of the browser. This address will most likely not have anything whatsoever to do with the company that the email is attempting to imitate. It could be a dodgy web site or even just a page on someone's personal computer. If the address doesn't appear in the bottom left-hand corner then you can right-click on the link, select 'properties' from the pop-up menu and then read the address listed in the information box.

To avoid further scams make sure that you have updated firewall and anti-virus software active on your system at all times. This will make it harder for anyone to install key loggers, Trojans, spyware, or other similar devices intended to retrieve your information. Keep your operating system up to date with the latest security patches and updates and be careful where you enter your details. Always look into the reputability of the site that is requesting your details and keep an eye on the lower right-hand corner of your browser. If the page you are viewing has a little padlock symbol appear in the corner, then it means that your details are being secured by some encryption method. You can double click on the icon to get more details if you wish. Sites without the padlock icon don't have encryption, which means that your details are a lot easier for malicious crooks to get a hold of. Even if you're sure the website is legitimate, it's not a good idea to send your details over an unsecured connection. By the way, email does not count as a secure connection, and neither does any instant messaging program, (such as MSN, ICQ, Yahoo Messenger, AIM etc.) so don't give out personal details that way either.

Another common scam very similar to phishing involves the emailing of promises of great wealth. Seriously, what do you think your chances are of winning the lottery, let alone one that you never even entered? Or of some obscure yet ridiculously rich person in Africa dying and you being legally allowed to pick up their money? Or of a foreign prince wishing to smuggle money out of his country using your account? These emails are all scams. I wish it were true that I won three different lotteries every single day, but if you get in contact with the people sending these messages they're going to do their utmost to clean out your pockets. Unfortunate as it may sound, the 'Please Donate to Charity' emails sent are usually also scams. If you really want to donate money to a charity, look them up and send it the usual way, don't respond to a multi-recipient email that may or may not be real. You also shouldn't donate to some random charity that no one has ever heard of before. Some of the Internet lowlifes have started up fake charities, 'dedicated to helping Tsunami victims' or similar and are simply pocketing the donations.

Everything in this world can be used for either good or evil purposes and the Internet is no exception. Staying alert and having just a little bit of Internet know-how can keep you out of harm's way for the majority of the time, and allow you access to the wonderful online services available with relative safety.
author:Daniel Punch

Check out these great Free opportunities

Are You A Spam Zombie?

Over the past few years you've all become familiar with the terms spam, spam filter, whitelists, blacklists and a whole myriad of other terminology associated with the problem of spam. You now have to add a new and extremely worrying phrase to that list - spam zombie.

With the net closing in around them spammers are looking for new and more inventive ways to send out their junk email. Spam filters and challenge response systems are becoming progressively more intelligent and blocking more spam each day. What was a spammer to do? The spammers took the next step - infiltrating your PC and using it as a spamming tool.

When most of you think of the word zombie you're reminded of old B movies with groaning zombies chasing the terrified actress through a castle, swamp or whatever low cost setting the movie revolved around. Spam zombies are, however, far more real and far more dangerous.

A spam zombie is when your computer is taken over by a type of virus called a Trojan. Once this Trojan virus is on your computer it sets up an SMTP (Simple Mail Transfer Protocol) application which allows it to begin sending email directly from your PC to tens of thousands of victims. This all happens invisibly in the background and can be difficult to detect for even the experienced computer user.

How do these Trojans get onto your computer? As in most cases they come from porn, warez or similar sites. One of the first spam zombie trojans to appear became available via a link on sites promising viewers free access to a porno webcam. One click later and the Trojan is installed on your computer ready to send out spam. Phatbot and Proxy-Guzu are two of the more common Trojans used for the purpose of turning your computer into a spam zombie.

How can you check if your computer has become a spam zombie? Make absolutely certain that both your anti-virus and firewall software have current detection signatures and have been completely patched and updated. Working online without taking these necessary security precautions is simply asking for trouble.

Internet Service Providers are under huge pressure to quarantine the IP address of any computer which has been turned into a spam zombie. This is done on the basis that the ISP risks their entire IP range being blacklisted or banned by some spam filtering services or companies.

The very least you owe yourself is to run a full virus and spyware scan on your computer today. You might be unpleasantly surprised at what you'll find lurking there.
by: Niall Roche

Check out these great Spam eliminating Ideas

Are Surf For Money Ventures For You?

If you've been in any internet circles within the last eight years you've probably been approached by an eager "surfer" wanting you to register for a surf for money or surf for cash program. What exactly are those and are they profitable? Let's see.

Basically surf for money programs are advertising programs that allow their members to participate. The member makes money by watching the advertisements in a surf rotation, and makes a commission from doing so.

In most of these programs, the member also makes an income from telling others about it, and they then can sign up, using the member's referral link.

Do members have to actually open the advertised sites, or just watch them appear?

In some current surf for money programs, the advertised sites do not necessarily have to be viewed, however the catch is there are oftentimes sites of interest that may not be a nuisance to learn from - or be entertained by.

With more advanced scripting in use, viewers are given the option of opening any site of interest in another window while not losing their place in the site rotation so the quota for the day can be reached.

Auto-surf is a new option in some control panel menus that allow the member to "visit" websites with a new site automatically loading every 20 seconds. No clicking involved.

After the member has finished surfing, the member's page is refreshed manually and credit is placed on his/her account. Depending on the level of investment, more or less sites must be surfed involving more or less time of the member.

Reputable surf for money or surf for cash programs disallow pornographic sites or those utilizing pop-ups or abusive language.

How is the Surf For Money Member Paid?

Often these programs use third-party gateway payment systems such as Paypal and still others use an in-house payment processor.

Additional Surf for Money Concepts

Members who have their own commercial interests to promote can also accrue advertising "credits" towards free "hits" for other surfers in the same program to visit. This allows people to
advertise their sites to an audience of potential customers for
free or at a low cost. When a site is listed, it can be placed
into a rotation system. There's also the option to buy more credits and banner ads.

But Are Surf For Cash Programs For You?

It can't be denied that anything associated with referral marketing has been given a bad name because of greedy administrators and even greedier users who try to spam the system in one's favor. In fact, one popular surf for money program has been in internet news for failure to process pay-outs. (Sorry, it can't be listed for legal reasons).

However, the concept of surf for money is solid and when properly employed can earn a member a few coins. Especially if the integrity of the company is sound - but remember that principle applies to any business venture.

The popularity and feedback from enthusiastic users of surf for money programs attests to its potential and has helped more than some meet their advertising goals. And reputable surf for cash companies allow a money back guarantee. The Terms and Conditions are to protect both parties and to ensure everyone knows what their obligations are.

So there you have it! If there's no investment and the risk is low, perhaps surf for money is for you.
by: Reggie Andersen

Check out these great Spam eliminating Ideas

Anti Spam at the Enterprise Level

Every one of us knows how spam impacts us. Every day we either get a ton of spam - or if we're fairly well protected by spam filters - only a few pieces.

Like a large number of people, I don't use any spam filters. Ah. You think I'm insane. But wait. My problem is that I get a lot of email from marketing types which I want to receive. And the spam filtering software is not very sensitive to my needs. Even white-listing doesn't always work. So, I prefer to get all that spam and just delete it.

Now this solution can work for me despite the time it takes to delete my daily overdose of spam. However, at the enterprise level, it's a whole different story. If you have a relatively large internal network with even a modest number of email users, you're looking at a major problem. And the more users you have, the worse the problem is.

Sure, you can put up software on the mail server. Works, kind of. But pretty soon you may find you need to upgrade the mail server. And that's after you already put it on a stand-alone machine.

Rather than continuing to buy ever more expensive software to run on a machine that keeps needing to be upgraded, you might want to think about a dedicated anti spam appliance.

To give you some idea of what's possible let's take a look at Barracuda Networks dedicated anti spam appliance. All you need to do is put this baby in front of your mail server. I say baby, advisedly because this one will learn by doing and by training provided by your users.

Dean Drako, CEO of Barracuda Networks said, "Bayesian filtering is still one of the most accurate defenses against spam. The new plug-ins allow users to directly train the Bayesian filter, making the Barracuda Spam Firewall even more accurate based on the users individual email preferences. Viruses and other threats can infect the network quickly if they are not stopped at the network edge. With Intent Analysis our customers have an advantage over these threats because the Barracuda Spam Firewall is able to block them real time. Consequently we have consistently been a first responder when some of the most malicious virus attacks have hit, saving our customers from potentially devastating damage to their networks."

This is one beautiful little machine. A Barracuda Spam Firewall can support from 1,000 to 30,000 active users. It can usually be installed in less than five minutes and receives automatic hourly updates for new forms of spam and viruses. It has a 10 layer defense system beyond the use of open source anti spam and anti virus solutions: denial of service and security protection, IP block list, rate control, virus check with archive decompression, proprietary virus check, user specified rules, spam fingerprint check, Intent Analysis, spam rule-based scoring, and Bayesian analysis. Plus it also does both inbound and outbound email filtering with the inclusion of sophisticated outbound email filtering techniques (just in case you've got a spam zombie on board or somebody's got an infected PC).

However, it isn't exactly cheap. Still, when you consider the time, bandwidth, user frustration and potential hardware upgrade costs, the price may look a lot more reasonable. You can check it out at http://www.barracudanetworks.com/

If you are in the market for an anti-spam appliance, the Barracuda Spam Firewall isn't your only choice. The impact of spam on internet businesses - even those who primarily use it for just email - is so great that a simple search for "anti spam appliance" will find you a number of alternatives to examine. Even McAfee is getting into the anti spam hardware game.

I'm hoping that it won't be too long before I can pick up a Bayesian multi-level anti spam, anti virus firewall appliance for my home PC that keeps me safe and cuts my need to delete without deep-sixing the email I want or costing me more than I can afford. I suspect it's on the way.
by: Richard Keir

Check out these great Spam eliminating Ideas

All About Spam

Spam is annoying. Period. Why people would want to send all of us stupid messages about buying prescription drugs or getting some outrageously good mortgage rate is beyond me. Well, not really.

You might ignore those emails. But not everyone does. And that's why they're sent. Emails cost so little (or nothing) to send. So sending out a million of them could be a cakewalk. Let's say one out of every 1,000 recipients falls for their ploy. Someone just got 1,000 new customers!

How in the heck did those spammers get your address in the first place? Well, they actually use a variety of techniques. They use programs called spambots to search the web and pick up any email addresses that could be listed on websites. They use what's called the "Dictionary" technique, where they take a well-known email extension (earthlink.net, for instance), and make up all kinds of possible user names to go with it. For example, with me they could try the usernames "kara", "kara1", "kara2" and so on, until they can confirm one of those connected to an earthlink.net extension is a valid email address. Kinda like going page by page through the dictionary.

Ever fill out a registration form on a website and find a little checkbox, probably near the bottom, asking if you want to receive additional information, newsletters, or something of that nature? Often the box is checked, and in order NOT to receive the info, you have to UNCHECK it (or else). Well if you miss those types of boxes on the wrong kinds of sites, your email addresses may be handed to spammers on a silver platter. Well, almost. Often a zillion email addresses are sold for next to nothing to spammers on CDs. (Couldn't you almost call those silver platters?)

Many internet service providers (those guys that keep you connected to the internet so you can send and receive email) use a variety of methods to block spam before it ever gets to you. Nevertheless, we all know that some spam inevitably gets through to our inboxes. That's when we need to take a proactive stance and install some sort of software to filter it out!
by Kara Glover

Check out these great Spam eliminating Ideas

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

by Kara Glover

Check out these great Spam eliminating Ideas

Alien Intruders!

You probably didn't casually invite, or extend a formal attendance request to, these undesirables known as viruses.

Regardless of your opinions, such cyber-nomads may call on you, complete and active, with their destructive payloads.

So what is a virus?

A virus is a program that can self replicate or reproduce itself.

These programmable pirates have a special talent for attaching themselves to executable programmes. When such programmes are executed (often by you, but not always), so is the virus.

They don't necessarily have an ".exe" file extension and are relative masters of disguise. Extensions can be doubled-up to create an optical illusion or optically misleading appearance.

A boot sector virus is probably the worst in so far as it will upset the normal loading of your operating system and therefore, disable your computer. Pointers to your 0.S., can be overwritten, effectively, rendering it to be non-existant. That's never a good thing but not the end of the world, however it seems.

Following, is an example of how devilishly deceptive these vindictive vermon are, in their presentation

A friend of mine rang me last week in a distressed state, with news that her I.S.P. was threatening to shut down her e-mail account because her computer contained viruses affecting her outgoing mail This message seemed to come from her provider but in fact was created by a worm (type of virus). The e-mail was complete with the providers U.R.L., instructions to open its attachment (which it claimed that it contained a free virus cleaner) and even a password to access the attachment. This password could "swing" some cautious people to believe that the attachment was legitimate. Indeed there was only one mistake and it was that the e-mail in question was addressed to "Dear account holder" and not her specific e-mail address.

What is often helpful in determining legitimatacy, is to simply check the properties of the particular mail or e-letter. Where the "from" field can be set to display any name(as spammers demonstrate), more info. via the properties option, may help you to decide.

Attachments are potentially dangerous. You should train yourself to look for such things, and not exclusively this. If you have a suspicion, ignore them. If it seems an awful lot more important than account closure warnings (family matters), then simply ring the addressee in question. Surely most other matters can wait until office opening hours in cases where 24-hour telephone support is not an option. Incidentally, the described worm is a BAGLE variant and is currently in circulation and though it can be cleaned, can also be disruptive.

Smallish text files can be copied and pasted into your e-mail client, eliminating an unnecessary attachment. Doing this will increase the chances of your friends recieving your mail as account providers can have automated software that block mail outside certain perameters, and often legitimate ones are blocked. The limitation when pasted directly into your client is file size.

Incidentally, free and other accounts, in a bid to obliterate spam, can make sucessful mail delivery a nightmare. An option is to put your info./file/picture on some free webspace and simply e-mail the link to it.

Another virus infects your macros( a program,within a program that is similar in delivery to predictive text), and is known as a macro virus and affects the usability of associated files, which are usually files produced using text editors or word processing programs.

Saving such files in R.T.F. or rich text format where you have an otpion, is helpful. Turning your macros "off" could be considered, but their benefits are lost and the virus has won, even before entry.

These are harmless enough and there is no need to freak out. A free cleaning option is mentioned below.

If your great grandmother, untypically sends you software as an attachment, and typically sends you a woolen sweater, then alarm bells should sound.

Anyone who depends on their P.C. as a tool and not a toy, needless to say, should discourage forwarded jokes.These jokes can be time-consuming to read, can be colossal in number, are often habitually forwarded, and not really worth the threat. Believe me when I say that I'm opposite to a "killjoy" and mean this, for semi-serious users who rely on their respective and respected machines.

Consciously or unconsciously, forwarding is "viral", and a perfect vechicle to that end. While it is a very useful and functional tool, perhaps its' use could be limited to its' initial purpose. Human interaction can contribute to the propagation of "troublesome transients". There are other ways to communicate with your friends.

Of course, if you can afford it, you should get an anti-virus program. Corporations, companies and anyone without financial restraint have such programs updated continuously as no-one can predict when (in real time) that some virus creator will decide to unleash his newest version. Previous virus definitions are of little use in protecting against future viruses. Such definitions describe the nature (how and where infection occurs) and an engine is used to scan or locate and clean the infected files. Given the reproductive properties of viruses, the amount of such infected files can be enormous and sometimes they are files with particular extensions.

Regular domestic P.C. users should probably update their definitions weekly and there are anti -virus software manufacturers that will scan your machine for free (use your search engine) but it should be remembered that the virus could already be in your machine at this stage. The program that you pay for can block them at all entry points and is the nearest thing to protection.

Definitive protection requires you to connect to nothing, insert or install nothing, network with no one, and perhaps swabbing your machine with an industrial disinfectant. However, I would consider such measures to be excessive and no way to live your productive life.

Wishing you the best of luck for the future, and may your connection with these "malicious modem and medium migrants" be in the singular, as most of us learn more diligently(not faster), through experience.
author:Seamus Dolly

Check out these great Spam eliminating Ideas

Adware And The Case Against Bundled Software

Bundling software applications together is a practice much abused by purveyors of adware. The potential for sneaking unwanted software into a bundle of desirable software is obvious. The benefits of bundling software aren't so obvious. Isn't it time to consider dumping the practice of bundling software altogether?

Bundled Software: When Is It Not Adware?

If a user wants a piece of software, why can't he or she be allowed to install it separately? If the bundled software were essential to the functioning of the original software (excluding generic functions such as install, un-uninstall, and documentation), why wouldn't the developer build its functions directly into the original software?

Sure, sometimes there's a software application that clearly complements another application. But for users who do not want the complementary software, having it just means a bloated install file and a needlessly long installation process.

Does the chance that users will want the bundled software ever outweigh the risk of the bundled software being installed without the user noticing? In the case of adware, the technology community is increasingly willing to put the burden of proof on the adware bundlers:

* Cnet's download.com website recently removed any and all software that comes bundled with another piece of software that shows advertising, regardless of how well informed the user is of the bundled software.

* Affiliate networks such as Commission Junction and Kolimbo have either cautioned advertisers against accepting adware distributors into their affiliate programs or kicked them out altogether.

* Many technology law experts are saying that the click-wrap license agreements that supposedly legitimate adware are not proof of informed consent. Some experts even say that such agreements amount to unconscionable contracts: the burden imposed by adware is so great and the benefit offered so negligible.

Adware and Bundled Software: A Modest Proposal

If the spam arms race is any indication, we may soon face even more aggressive attempts to get adware on our computers. There will be even more tortured arguments that bundled adware is installed with users' informed consent. Why not head off any of those arguments right now? Let's push for an industry standard that reputable developers do not bundle software (with a few highly specific exceptions such as documentation, installation, and error reporting).

In the end, by getting rid of bundled software, what do we have to lose except adware?
author:Joel Walsh's

Check out these great Spam eliminating Ideas

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the Internet in recent times. When spyware infects a computer system, it may be relatively harmless or it may be devastating.

Spyware like coolwebsearch and new.net are capable of paralyzing a computer system. Laws to regulate spyware are pending in many states and may take years to enforce.

What Is Spyware?
Spyware is any software that collects information about computer usage and/or the computer user. It is installed on one computer and sends information to another computer. Some spywares like the Weather Bug, Bear Share and Kazaa are knowingly downloaded and installed by users. Other spyware is installed without the knowledge or permission of the user.

How Does Spyware Affect A Computer?
Symptoms of spyware infection includes:

* Very slow system performance while browsing the Internet.
* Your homepage changing mysteriously on its own.
* Excessive appearance of pop-ups, on sites likes Google, Yahoo and MSN, which don't use them.
* You can only get your browser to visit sites, which are trying to dupe you into buying spy ware removal software.

Many spyware detection and elimination programs are easily available for free on the Internet.

How Does One Deal With Spyware?
There are many tools and catalogues available to deal with spyware. One of these tools is Spybot Search and Destroy. It scans computers for spyware and harmful programs. It shows a list of problem areas to the user and allows him to delete any or all of them.

A user can leave legitimate programs installed by him. These may include peer-to-peer file sharing software or software installed to monitor the on-line activities of children.

A Comprehensive Solution
It may be a good idea for most computer owners to get a comprehensive PC security solution as a bundle. Norton and McAfee, now offer a complete security suite consisting of anti-virus, personal firewall, anti-spam and privacy offerings, and anti-spy ware.

They are quite easy to install and allow parents to monitor children who use the computer. There are many threats on the Internet, from which these suites can protect your computer.
author:
Philippa Smith

Check out these great Spam eliminating Ideas

9 Steps to Protect your MS Windows System from Viruses

Nowadays as the Internet and other networks are greatly developed computer viruses are distributed rapidly and intensively. Everyday several new viruses capable to damage considerably your computer system arise. Anti-virus specialists work hardly to make updates their software against new viruses as soon as possible. The viruses can get inside computer in different ways. That is why there is no simple method to protect system. Only series of measures can give you reliable protection from the infection. Below are 9 steps to protect MS Windows based PC system from viruses.

1. Make regular backups.
It should be said that there is no absolutely safe way of protection. Virus creators regularly find holes in new computer products to use them for infection of computer systems. Some dangerous viruses can considerably damage data files or even erase entire file system. Make regular backups of your data files to separate file storage device. It can be separate hard drive, flash card, compact disc or another file storage device which you choose. To ease the procedure you can use some automatic backup software. And be ready if the system will die because of virus infection.

2. Be ready to reinstall your system if it dies because of viruses.
Get distributives of your operation system and distributives of software which you use and keep them together, for instance, on a set of CDs not far away from you. In this case if virus infection will cause unrecoverable system failure you can rapidly reinstall your working medium.

3. Protect your network connection with Firewall.
Firewall is a software which blocks suspicious potentially dangerous connections to preventing viruses from network to penetrate into your system. Windows XP system has quit simple but reliable built-in firewall. You can enable it as follows. 1) in Control Panel, double-click Networking and Internet Connections, and then click Network Connections. 2) Right-click the connection on which you would like to enable firewall, and then click Properties. 3) On the Advanced tab, check the option to Protect my computer and network.

If you need more flexible control of connections with network you can get and install more advanced firewall software like Norton Personal Firewall or Outpost Firewall. If you use this software you have ability to permit or to block particular connections and to monitor network activity.

4. Use antivirus software.
Install antivirus software which will scan your system searching and erasing viruses on a regular basis. Leaders in antivirus software products for Windows systems are Norton Antivirus, McAfee, Kaspersky Anti-Virus and PC-cilin.

5. Regularly update operating system.
Windows XP has built-in automatic update service. It regularly contacts Microsoft server to find updates and notifies you if updates are ready to be installed. Updates are important because hackers regularly find holes in operating system which are often used by virus creators.

6. Don't install and don't run suspicious software.
Check new programs which you are going to install with anti-virus software. Don't download software from suspicious websites. To download software always seek website of software creator or official distributor. Do not open applications received by email from unknown persons.

7. Limit access to your computer.
Protect enter to system with password.

8. If you use Internet Explorer, consider moving to another browser.
As IE is the most distributed browser today virus creators actively use defects in its security system to infect computers. Infection may arise if you will visit webpage which contains invisible harmful code. You are more safe if you use less known browser only because virus creators do not pay much attention to it. Major IE competitors Firefox and Opera browsers provide now the same comfortable interface and range of services for working on the Web.

9. Use spam protection.
Viruses are often distributed via email. Switch on spam filters in your email box to block spam receiving. If you need assistance with using of the filters you can ask your email service provider.
author:
Evgeny Kovalenko

Check out these great Spam eliminating Ideas

7 Steps To Effectively Take Control Of Your Inbox And Reduce Spam

Everbody hates spam! I am sure spammers hate getting spam too, but they still continue to dish it out. Why? Because it is still effective. Believe it or not, many of us still click on the links or follow-up with the spam message. As long as we continue to do this, spam will exist. If everybody understood this and paid no attention to spam, the spammers will eventually give up because it costs them realy money to send out emails. It is hard to quantify what the cost of sending out one, two or fifty emails is, but 1 million or 5 million emails certainly has a cost that is not negligible. When the payback starts to get so small that the spammers cannot make a decent living, they will find something else to do. This day will come and I cannot wait for it to arrive.

In the meantime, what can we do about it. Well, I am not going to tell you that there is a perfect solution that will stop all spam, but what I will tell you is that there is a way to reduce the problem and manage it effectively using the 7 steps outlined below.

Step #1: Get Your Own Domain Name

Fighting spam effectively starts with getting your own domain name. For example if your name is Andy Williams, you would purchase a domain name called andywilliams.com, which is of course already owned by the famous singer. This has some unique advantages over using an ISP given domain name or a webmail service such as Hotmail or Gmail. It also has some minor disadvantages. Let's examine these.

One major advantage is that you control the entire email address. You could create emails addresses like andy@andywilliams.com, info@andywilliams.com, sales@andywilliams.com and so on. This is in stark contract to an ISP assigned name like andywilliams@comcast.net. If you wanted another one, you'd have to open up another account or pay extra for each additional ISP assigned address. If you ever decided to switch ISP's, you would lose that email address and have to start over using a new one, and inform everyone you communicated with about it - a very messy proposition.

Many get around this problem by getting a Hotmail, Yahoo Mail or Gmail account which you can access from anywhere as long as you have internet access. These types of email accounts definitely have a place in your email toolchest, but do not suffice as your primary personal email address. One reason is that you do not have access to your email messages and address books when you are not online, like during a long flight. Anotehr drawback is that they do not allow you to export the online address books making portability very tedious.

I prefer owning my own domain name which I call my permanent email address. I will always have this email address as long as I renew this domain name every year. The cost of registering a domain name varies from $4 to $8 per year for most common ones. This is a small price to pay for the advantages it brings you.

The one minor disadvantage of owning your own domain name is that you need to manage it yourself, or have someone do it for you. This in my opinion is far outweighed by the advantages mentioned above.

Step #2: Create Private Email Adresses

A private email address is one that nobody but your inner circle knows about. Every person that you give your personal email address to is someone that you trust and want to receive email from.

Setup one private email address for every person who is going to need to receive messages. This could be you and 5 other members of your family or 12 employees that work for you. This part is quite straightforward, you simply login to your email control panel and create new accounts for each email address that is going to be used to receive email.

Step #3: Create Public Email Addresses As Aliases

A public email address is generally known to the public. It can be specific like andyw@andywilliams.com or generic like receptionist@andywilliams.com.

A public email address is created as an email alias. An email alias is not a real email address, but an address that gets redirected to a real email address. For example, you setup receptionist@andywilliams.com as an alias that redirects to mary@andywilliams.com. Whenever some sends an email to receptionist@andywilliams.com, it will end up in Mary's inbox. If you change receptionists, you simple modify the redirect for a very elegant solution. You can then publish this public email address on a website, in a brochure, on print advertising, business cards etc. without giving away your personal email address and without having to make much changes if Mary leaves and a new receptionist is hired. This is a huge benefit and maintains your privacy as well as those of others you have created email adresses for.

How does this help with spam, you ask? By using email aliases in a smart fashion, you could very easily shut down any spam that starts coming in. Let's examine how this can be done.

Step #4: Setup the Default or Catch-all Email Address

Your email control panel will have something called a "default address" or it is also sometimes called a "catch-all address". This is a valid email address that all unresolved emails go to. If you set this up to be your personal email address for example, then you will receive all emails that are addressed to "anything"@andywilliams.com, this includes sales@andywilliams.com, joe@andywilliams.com, andrew@andywilliams.com etc. Herein lies the secret to combat spam.

Step #5: Create Specific Named Public Email Addresses As And When Required

When you are forced to register on a website where you want to get some information from, you are usually asked for a valid email address. Well guess what, you now have an unlimited supply of valid email adresses. I usually use a specific format when registering at websites - it is "websitename"@andywilliams.com. So if I am registering at a website called www.get-rich-quick.com, I would use the address get-rich-quick@andywilliams.com as my valid email address. When the site sends me an email, it gets redirected to my personal email or whatever the default or catch-all address is.

Step #6: Send Spam Back To Where It Came From, If Possible

Here comes the real bonus, if you subsequently start receiving spam addressed to none other than get-rich-quick@andywilliams.com, you simple create an email alias for get-rich-quick@andywilliams.com and redirect the email back to exactly where it came from, for example georg-bush@get-rick-quick.com. You will then never get another email from anyone using that email address ever again. This is cool and is my favourite part. Bear in mind that spammers usually send email from an address that is not their own, so if you see an address like noreply@get-rick-quick.com, then you would redirect it somewhere else, for example a Hotmail address that you setup just for redirection purposes. Please exercise some discretion here because spammers often use the email addresses of real people and we don't want these innocent people getting redirected email.

Step #7: Be Diligent In The Ongoing Management Of Your Domain

If you do this diligently for each website where you register by identifying the website name, you will very quickly know which websites are selling email addresses and which ones honor their promise not to share your information. ALl this while, nobody by your personal inner circle knows your private email address.

A real-life example in my case: I use a specific email alias for my Paypal account which nobody but Paypal knows. I have never ever received spam on this address, but I have received hundreds of spam messages on other email aliases that I have created. All of these emails supposedly come from Paypal and address me as "Dear Valued Paypal Member" or something similar, warning me that my account is going to be closed or suspended unless I click on their link and update my credit card information.

I hope that I have given you some food for thought on how to manage the ever growing spam problem by protecting yourself by taking some initiative and getting your own domain name. The added benefit is that you now have a permanent email address no matter where you choose to live or which ISP you use to connect to the internet.

There are many other ways to fight spam which I will perhaps address future articles.
author:
Balraj Dhaliwal

Check out these great Spam eliminating Ideas

5 Zero Cost Solutions to Spam

Spam is a daily nuisance for all of us. It doesn't matter whether you're employed or unemployed. It doesn't matter if you're a CEO of a multinational or if you're a work at home parent - spam affects us all.

There are dozens of porgams available for fighting spam. The major problem is that most of these programs cost money.
What I'm going to do is show you 5 different ways of combating spam - all free.


1. Don't give out your personal email address.
This is stating the obvious but it's the first big mistake people make. DO NOT use your personal email address for
sign up forms, competitions, surveys or any other nonsense that may result in you being spammed. It's much easier to prevent spam, by never giving out your personal email address, than it is to cure the problem once you're on 100's of junk email lists.



2. Use a free email account
Set yourself up with a Hotmail, Yahoo or any other free email account and use it as a spam holder account i.e. use it on all those popups or sign up forms that you *suspect* may try to spam you. You can then periodically check your free email account for both legitimate and spam email and
delete the rubbish you don't want. This single step can save you countless spam related headaches.


3. Use a disposable email address
You could also try a disposable e-mail address from www.spamgourmet.com. This is a brilliant idea. Once you've registered your forwarding email address (your personal
email address) with them you can then create
self-destructing email addresses that stop working after receiving a specific number of emails.


4. Use a free spam filter.
Unfortunately even when you follow all the correct steps you can still wind up getting junk email. There's only solution at that point - install a spam filter on your PC.
The best free spam filter I've come across so far is Mailwasher. An excellent
program that won't cost you a penny.



5. Newsgroups and forums
Spammers love newsgroups and forums. They especially love the way people post their personal email addresses there. It doesn't matter if it's a paid, private or free forum spammers have their harvester programs hunting for email addresses every minute of every day. If you have to post
your email address then use the following format:

username AT domain.com. If that doesn't make sense then what I mean is instead of posting as test@spam-site.com you'd
post as test AT spam-site.com.

Spammers can harvest 35,000 email addresses per hour from newsgroups and forums - don't let your email address become one of those.
by: Niall Roche

Check out these great Spam eliminating Ideas

5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!
If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road.

With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection.

And that protection needs to be in place as soon after you hook up your new machine as possible.

The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark.

1. Running a Personal Firewall

A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet.

Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting.

If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer.

If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:

- Your computer came pre-loaded with a firewall such as Norton Internet Security or McAfee Internet Security
- You have no firewall installed and should download one ASAP.

If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free.

You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm

2. Turn on Windows Updates

Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis.

These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy.

If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not.

To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify."

To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify."

Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed.

3. Install & Update Antivirus Software

Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet.

It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded.

The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else.

In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you.

If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is.

4. Install Anti-Spyware Software

Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent.

Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones.

One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer.

Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan.

You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware

5. Set up a Free Email Account

This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail.

Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam.

If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk.

This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address.

If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire.

Some of the better free email services are www.hotmail.com, www.gmail.com and www.yahoomail.com.

If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system.
author: John Lenaghan

Check out these great Spam eliminating Ideas