Saturday, September 15, 2007

Keeping it Clean: Virus Removal Basics

The day you learn your computer is infected with a virus or spyware is a lonely yet aggravating day. You’ll be angry that you fell victim, and may feel helpless because of your lack of knowledge about virus removal or pc repair. But don’t worry - you’re not alone! Unfortunately, you’re actually part of a club of tens of thousands of people who feel the same way every day!

According to AVG, virus protection usually doesn’t detect adware or spyware both of which can wreak havoc on a computer. Thousands of people each day are infected with malicious programs! Worry no longer and stop feeling helpless because this guide is a basic computer virus repair guide that will help you identify and remove viruses and malware.

Are You Running Antivirus Software?

If you already have virus software perform an update for the latest version and then run a system scan. If you do not have such software, download a free copy of AVG virus protection at http://www.grisoft.com/doc/40/lng/us/tpl/tpl01. This will give you free real time virus protection, email scanning and virus removal tools.

Next, download and run Ad-Aware to remove spyware, adware, and other troublesome programs http://www.lavasoftusa.com/software/adaware/. Then download SpyBot Search & Destroy http://www.safer-networking.org/en/download/index.html. By using Ad-Aware and SpyBot you will have excellent protection against files that are often missed by virus protection.

To check for and eliminate browser hijackers, download and run CWShredder at http://www.intermute.com/spysubtract/cwshredder_download.html.

With the above programs simply run a scan and follow the prompts to remove any infected files or unwanted programs. Once that is done, upgrade your operating system, or download any needed patches, then reboot your computer.

These steps won’t solve every problem, but they will fix a large percentage of the things that cause your computer to act up.

Friday, September 14, 2007

Protect Your Computer And Your Personal Information From Spyware

Spyware is a broad term used for certain types of software that are downloaded onto your computer without your knowledge. Malware has become a phrase that is used when describing spyware and adware.

Spyware is placed on your computer in order to track your internet surfing habits. It knows every site you visit and every page on that site. Spyware also collects your personal information through software that tracks your actual keystrokes. If you fill in a form to make a purchase all your personal information, including name, address and credit card information can be tracked. The potential abuse of spyware tracking is also being discussed in some businesses that store secure information, such as credit card numbers or even medical records.

Adware is another type of spyware. It doesn't work by tracking your information as spyware does, but what it can do is actually change your browser settings without your consent. It can cause pop up ads to show on your computer. It can even place a new toolbar on your computer. Most people are unaware they even have any type of adware installed on their computer until their computer starts to slow down.

The spyware business is a billion dollar a year industry with people getting very rich selling the information they steal about you. There is a case currently in court in the State of New York against a spyware company. The outcome of this legal case will hopefully mean the end of secretly placed spyware.

In order to not fall prey to these types of malwares there are steps you can take. First, don't download freebies. A lot of services that are offered to you as "free" such as free music downloads are free per say, but the price you pay is allowing them to place spyware software or adware targeted advertisements on your computer. Read any agreements about the software very carefully before you download it.

Run an anti spyware software program often along with your virus protection software. Generally spyware and adware are designed to be difficult to remove from you computer and they leave behind "ticklers" which reinstall the software.

Data-Recovery: What You Need

Data recovery is something we hope that we will never need. Whether you simply make the mistake of deleting important software or you lose it all in a computer crash, that valuable asset of information may seem like it is lost forever. But, if you have complete and quality data-recovery software on your computer or through your system, you can be confident that it has a backup and it is there even though these things will happen to you. This can be so important when it comes to safeguarding your business or your personal information.

What people do not realize is that there are a number of ways that things can go wrong on their computers. Whether you are responsible for the computers of a large corporation, a small business or even just your own personal computer, having a way to restore information when things go wrong is quite important. Here are some things that could happen to you, well, anytime, even right now. Your computer could be running slowly or be loaded with powerful spyware that can destroy files, transmit personal data or, even worse, cause the computer to crash. All of a sudden, it’s gone. Or, you could be working along nicely without a care in the world and bam! A power surge, an electric storm or something else electrical happens and it’s all gone.

There are many more ways in which you can lose all of the personal data that is stored on your computer. You don’t even have to have the programs running to lose it. Nevertheless, many people mistakenly believe this will not happen to them and therefore do not do anything to prevent this total loss. Data recovery is necessary for this not to happen. The strange thing is, it takes only minutes to install and use and it virtually and it takes care of itself. It is not overly costly either. So, why don’t more people use data recovery? They just don’t realize its importance. And that is one mistake we don’t want to make. Data recovery is a need all computer users have.

Wireless Networks: How Do They Work?

Wireless networks use radio waves instead of wires to transmit data between computers. Here's how:

The Binary Code: 1s and 0s

It's well known that computers transmit information digitally, using binary code: ones and zeros. This translates well to radio waves, since those 1s and 0s can be represented by different kinds of beeps. These beeps are so fast that they're outside the hearing range of humans.

Morse Code: Dots And Dashes

It works like Morse code, which is a way to transmit the alphabet over radio waves using dots (short beeps) and dashes (long beeps). Morse code was used manually for years via telegraph to get information from 1 place to another very quickly. More importantly for this example, though, it is a binary system, just as a computer system is.

Wireless networking, then, can be thought of as a Morse code for computers. You plug in a combined radio receiver and transmitter, and the computer is able to send out its equivalent of dots and dashes (bits, in computer-speak) to get your data from here to there.

Wavelengths And Frequencies

You might wonder how the computer can send and receive data at high speed without becoming garbled nonsense. The key to wireless networking is how it gets around this problem.

First, wireless transmissions are sent at very high frequencies, which allows more data to be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) -- a frequency similar to mobile phones and microwave ovens. However, this high frequency produces a wavelength that is very short, which is why wireless networking is effective only over short distances.

Wireless networks also use a technique called "frequency hopping." They use dozens of frequencies, and constantly switch among them. This makes wireless networks more immune to interference from other radio signals than if they transmitted on a single frequency.

Internet Access Points

The final step for a wireless network is to provide internet access for every computer on the network. This is done by a special piece of wireless equipment called an access point. An access point is more expensive than a wireless card for 1 computer, because it contains radios capable of communicating with around 100 computers, sharing internet access among them. Dedicated access points are necessary only for larger networks. With only a few computers, it is possible to use 1 of them as the access point, or to use a wireless router.

Industry Standards

Wireless equipment from different manufacturers can work together to handle these complex communications because there are standards which guide the production of all wireless devices. These standards are technically called the 802.11. Because of industry compliance with these standards, wireless networking is both easy to use and affordable today.

Wireless Is Simple To Use

If all this talk of frequencies has you worried -- relax. Wireless networking hardware and software handle all of this automatically, without need for user intervention. Wireless networking, for all its complicated ability, is far simpler to use than you might expect.

How to Increase Your Computer Speed Fast

I'm sure you've come across tons of articles and even suggestions from some of your friends on how to get your computer to work faster. Its really not that hard to increase your internet speed. I'm going to make it real simple for you and you don't need to be a computer geek to make this work. The first thing you need to remember is to never, and I mean absolutely never download programs especially free software without reading the fine print. Most free computer software will bombard your computer with spyware which will eventually bring your internet speed to a screeching halt! If your computer is already infected with spyware you can download the leading spyware remover called ad-aware which will scan your computer and remove spyware and tracking cookies from your computer.

Another way of making your computer and internet connection faster is by clicking on start, then run and typing in msconfig. Go to start tab and remove any program except your antivirus software and any other program which you must have start when windows starts. This tip will increase your computer start up time dramatically!

Step number 3, and I do this almost on a daily basis is to clean up your internet cache. Go to your control panel which you can access from your start button and click on internet options. Go to temporary internet files and clear your history. I would recommend that you also set internet history to a maximum of 2 days. Next step is to delete your temporary internet files including offline content. Last step is to delete cookies. Be careful though because deleting your cookies will also delete useful information from your computer. You can read a how to on cookies here www.howstuffworks.com/cookie.htm.

These steps are the basics you can take which will speed up your internet connection immediately. I would also recommend doing a virus check on your computer on a weekly basis. If you don't have antivirus software, get it! You'll be happy you did. Just one virus can wreak havoc on your computer! Make sure you test your internet speed whether its broadband or dial-up, before and after you take these simple steps so you can compare if these steps you've taken have worked. Taking these basic steps will make you a happy surfer and will restore your faith in the World wide web!

Do You Know How To Remove Spyware From Your Computer?

Spyware is rapidly becoming a major problem for Internet
users. It is estimated that 9 out of 10 computers are
infected with spyware or ad ware or both. Spyware may be
responsible for 50 % of all computer crashes. Spyware runs
silently and you may not be aware that your every move on
the Internet is being observed and recorded.

If a user does not detect and remove spy ware from his
computer, all his files may get infected and it may stop
working. All his passwords, credit card numbers and other
personal information may be stolen before he can realize
what is going on. Once spyware has been removed, the
computer will run much faster. It is worth while you to
find and use the best spyware removal software available.

Features Of Good Spyware Removal Software
A few features to consider, while searching for spyware
removal software products, are:

* It should offer complete protection from spyware, key
loggers, remote acess Trojans (RATS), browser hijackers and
ad ware.
* A good spyware program will offer automatic updates, to
provide protection from the latest spy ware threats.
* The spyware product should offer technical support, so
you can call or e-mail someone, if you have a technical
problem.
* A good customer service back up also shows that the
manufacturer can be trusted to look after the needs of the
customer in the long run.

How Does It Work?

It is very difficult to find and remove spyware software
from a computer manually. Spyware protection software
detects and removes spyware and ad ware from your computer
automatically. It can also protect your computer from data
thieves, hackers, malicious e-mail and other threats.

There are many free spyware protection software products
available. These programs can be used to detect and remove
spyware and adware that is already present in your
computer. Many types of spyware, install themselves on your
computer again, after you have deleted them.

Free spyware removal programs can help you to assess the
problem. A permanent solution may be to get the best
spyware solution product available.

Internet Security Basics 101

The explosive growth of the Internet has meant that thousands of people are today experiencing the joys of being online for the first time. With growth there always comes pain. Be it your growing pains as a child or the growth and development of this part of our culture called the Internet.

Firstly we need to quickly explain what the Internet is and where it came from. The Internet is the offspring of a military project called Arpanet. Arpanet was designed to provide reliable communication during global nuclear war. A vast network of interconnected computers was set up all over the world to allow the various branches of US and NATO forces to communicate with each other.

Nuclear war never came (thankfully) and the world was left with a massive network of computers all connected together with nothing to do. Colleges and universities started to use these computers for sharing research internationally. From there it grew and spread outside colleges to local homes and businesses. The World Wide Web was born and its father was a guy called Tim Berners Lee.


When you're connected to the Internet you're sharing a vast network with hundreds of millions of other users. This shared network provides resources that 15 years ago were never thought possible. Unfortunately when something is shared its open to abuse. On the Internet this abuse comes from hackers and virus creators. Their sole intent is to cause chaos and/or harm to your computer system and millions of other computer systems all over the world.


How do you combat this? You need an Internet security system. This might sound complicated but your Internet security system will be quite straigtforward being comprised of just 2 - 3 Internet security products. We'll look at each of these products in more detail now:



AntiVirus Software
The first and most critical element of your Internet security system is antivirus software. If you don't have up-to-date antivirus software on your PC you're asking for trouble. 300 new viruses appear each month and if you're not constantly protecting your system against this threat your computer will become infected with at least one virus - it's only a matter of time.


Antivirus software scans your PC for signatures of a virus. A virus signature is the unique part of that virus. It can be a a file name, how the virus behaves or the size of the virus file itself. Good antivirus software will find viruses that haven't yet infected your PC and eliminate the ones that have.

Antivirus software can only protect your computer from viruses trying to infect it via email, CD-Rom, floppy disk, Word documents or other types of computer files. Antivirus software alone will not keep your computer 100% safe. You also need to use firewall software.



Firewall Software
The use of firewall software by home computer users is a relatively new occurence. All Internet connections are a two way process. Data must be sent and received by your computer. This data is sent through something called ports. These are not physical things rather aspects of the way your computer communicates online.

Firewall software watches these ports to make sure that only safe communication is happening between your computer and other computers online. If it sees something dangerous happening it blocks that port on your computer to make sure your computer stays safe from the person who is trying to hack into your system.

An easier way to understand a firewall would be to picture your computer as an apartment complex. At the front door of this complex there is a security guard. Every person who enters the complex must pass this security guard. If the security guard recognizes the person entering as a resident he allows them to pass without saying anything. If, however, the person entering the complex is unknown to him then he will stop that person and ask for identification. If they have no business being at the apartment complex he escorts them from the building.

If you are not currently using firewall software your computer will get hacked into - that's a guarantee.



PopUP Blocker
You can get a good popup blocker at no cost. An easy way to do this is to install either the Google or Yahoo toolbar. Both of these come with popup blockers built in. Popups are not necessarily dangerous but are a nuisance and using either of these toolbars will make your life that bit easier.


A simple rule for practicing online security is: "If in doubt then don't". If you don't recognize the file, the email address, the website or if your gut feeling says "no" then don't click that button.

Top 10 Ways To Protect Yourself From Computer Viruses

As more and more people are becoming comfortable using their computers at school, home or in the office it’s only a matter of time before they encounter a computer virus. Here are our top 10 steps to protect you from computer viruses.

Use a high quality anti-virus program. There are many different anti-virus computers programs on the market some of them are better than others. Look to reputable computer magazines or websites for ratings to help you find the one that matches your needs.

Always use your anti-virus software. Make sure your anti-virus software is always turned on and scanning, incoming and outgoing email messages, and any software programs you run.

Keep your antivirus programs up to date. Most programs come with a yearly subscription make sure you take advantage of the updates. More advanced programs allow you to schedule updates or full system scans for “off hours” like 2AM when you aren’t likely to be using your computer.

Keep your computer up to date. From time to time operating systems fall victim to security holes or issue updates. Make sure you check periodically to make sure you are running stable up to date versions of your software.

Backup your data regularly. Most windows computer users keep their documents in the “My documents” folder. This makes it easy to back up all of your important documents. Make weekly or monthly copies to CD or USB drives.

If you use floppy disks or USB drives on public computers like your school computer lab, Kinko’s, or even digital photo printing store make sure you scan them for viruses. Public computers are notorious for not being up to date and properly protected.

Be wary of email attachments. Treat any email attachment as potentially dangerous. Never open attachments from people you weren’t expecting. Also be careful of attachments from people you know but weren’t expecting. Many computer viruses replicate themselves by reading the contacts from an infected computer.

Use text email if possible. While HTML email is prettier and allows you more control over formatting it also can carry computer viruses. If you use text based email the only way to get a virus is by opening an attachment.

Use downloaded freeware and shareware files or software with caution. Try to download them from popular reputable sources that scan the programs before they are uploaded. To make sure you are safe scan the program before you install it on your computer.

Be wary of links in IM or instant messaging software. Don’t accept invitations from people you don’t know and never click a link from someone you don’t trust, they can easily redirect you to another website that will try to install a virus on your computer system.

What Is Adware?

Adware is one of many "malwares" or malicious software programs that are unknowingly installed on your computer when you visit online sites and download freebies. When you use share files or visit sites with free downloads of wallpaper, videos, or music, some of these sites will send along adware software with your download.

These malwares are a rapidly growing threat to all computer systems. It is estimated that in the first three months of 2005 over 80% of computer users had some type of malware software program running on their computer, without their knowledge.

Although it is much less a threat to your computer and information than spyware is, what adware will do is cause pop up banners and advertisements to appear on your computer. These advertisements are displayed on your computer no matter what program you might be using. What the people who place this type of nuisance software on you computer say is that adware advertising helps them to recover costs and allows them to offer you those freebies you want.

What you want to do to stop adware from appearing on your computer is to first run an anti-adware program. Run this program on demand regularly. Along with an anti-adware software program run your regular computer virus scan on demand also.

Check the security level on your computer. You security level setting should be at least medium to help protect you from unwanted downloads.

Do not download free files from the internet, period. When downloading any software read the end-user license agreement. Some of these agreements will state that when you download their software you are also agreeing to accept a downloaded spyware that may be placed on your computer at the same time.

Be aware of threats to your computer, and your personal information.

Building Cheap Computers in 3 Easy Steps

Just a decade ago, the only people who put computers together were those individuals who possessed an extensive technical background. Advancements in technology have eliminated some of the complexities in how computers work. This change has resulted in average people who have a basic understanding of computers being able to build a system themselves. Whether you are interested in building computers to establish a new hobby or to start a business, you can so in only a few easy steps and on a shoestring budget.

The first step in building cheap computers is to determine the route you want to use to build systems. You basically have three choices when considering building cheap computers: build a system from scratch, expand on a bare bones computer, or upgrade an existing system. Building a system from scratch can be a rewarding experience. However, it is not for everyone. If you are impatient or are intimidated by mechanical tools, you are better to choose one of the other two options.

Regardless of the method you choose, you will follow three basic steps:

1. Plan
2. Assemble
3. Test

The planning phase of your project involves determining the specifications for the computer you want to build. Once you know this information you can start shopping for parts that meet those specifications. Your main considerations should be
hard-disk, memory, and CPU (central processing unit). The harddrive is important because it determines how much information you are able to store on the computer. While you could build a computer with a harddrive smaller than 2 GB (gigabytes), it is not recommended.

The harddrive and memory work together. The amount of memory you place in your computer will directly affect how the system is able to complete the different processes that you request when using the system. If you have no idea what size hard-drive and the amount of memory you need, you should consider the type of operating system you intend to load on the system. You can consult the manufacturer of your hard-drive or review the information on Cheap-Computer-Guy.com, which features a list of minimum harddrive and memory requirements for various operating systems, and use this information as a guide.

The equipment presented in this article includes the basics of a computer system. Of course, nowadays people want far more than the basics and you undoubtedly feel the same way. There are optional components available that you may want to add to your systems, which include CD or DVD drives, a modem or other communication component for Internet connectivity, or a video graphics card.

Once you have decided on the specifications of the computer you want to build, you are ready to assemble the system. In addition to detailed information about the parts you will need to build your computer, cheap-computer-guy.com includes step-by-step instructions for assembling a cheap do-it-yourself computer.

When you have finished assembling the computer, you will then need to test to make sure that the system boots and that all components are functioning properly. Once you have completed all these tests you will have built your own cheap computer.

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the
Internet in recent times. When spyware infects a computer
system, it may be relatively harmless or it may be
devastating.

Spyware like coolwebsearch and new.net are capable of
paralyzing a computer system. Laws to regulate spyware are
pending in many states and may take years to enforce.

What Is Spyware?

Spyware is any software that collects information about
computer usage and/or the computer user. It is installed on
one computer and sends information to another computer.
Some spywares like the Weather Bug, Bear Share and Kazaa
are knowingly downloaded and installed by users. Other
spyware is installed without the knowledge or permission of
the user.

How Does Spyware Affect A Computer?

Symptoms of spyware infection includes:

* Very slow system performance while browsing the Internet.
* Your homepage changing mysteriously on its own.
* Excessive appearance of pop-ups, on sites likes Google,
Yahoo and MSN, which don't use them.
* You can only get your browser to visit sites, which are
trying to dupe you into buying spy ware removal software.

Many spyware detection and elimination programs are easily
available for free on the Internet.

How Does One Deal With Spyware?

There are many tools and catalogues available to deal with
spyware. One of these tools is Spybot Search and Destroy.
It scans computers for spyware and harmful programs. It
shows a list of problem areas to the user and allows him to
delete any or all of them.

A user can leave legitimate programs installed by him.
These may include peer-to-peer file sharing software or
software installed to monitor the on-line activities of
children.

A Comprehensive Solution

It may be a good idea for most computer owners to get a
comprehensive PC security solution as a bundle. Norton and
McAfee, now offer a complete security suite consisting of
anti-virus, personal firewall, anti-spam and privacy
offerings, and anti-spy ware.

They are quite easy to install and allow parents to monitor
children who use the computer. There are many threats on
the Internet, from which these suites can protect your
computer.

3 Summer Computer Tips

#1 – Summer Computer Travel
Holiday travelers should be on alert when arriving home from long weekends, such as the Fourth of July, a popular time for computer viruses to spread.

Most computer users have a tendency to turn off their computers when away on trips, which means you’re not getting newly-released anti-virus patches or anti-spyware updates; the two most common areas that cause computers problems. We recommend you update anti-virus and anti-spyware scans before opening e-mail or going online after an extended absence.

We consistently see an increase in calls for virus related problems immediately following long weekends. Avoid the problems altogether by updating your security software before using your computer. For a free listing of viruses, spyware threats and trends, visit: www.VisitingGeeks.com/downloads.htm

#2 -- Should You Leave Your Computer Running?
One question we hear frequently is, "Should I leave my desktop computer on or turn it off?"

There are 2 schools of thought…
Turning it on and off numerous times during the day subjects the microcircuits to flexing and fatigue due to change in temperatures. Over time this could lead to a break in the circuitry and result in system failure.

Leaving the computer on all the time puts excess wear on the mechanical components (the hard drive spindle motor and cooling fans).

Best compromise. First user in the morning turns it on; last user turns it off.

We leave our desktops on all the time allowing for scheduled utility tasks to run during overnight hours. We also restart the systems (to flush the RAM and reset the operating system) on a regular basis and routinely remove the case covers to clean out any dust that may have accumulated, especially around the fans and screens.

#3 -- Stop Popups!
Never click inside the window of a popup. Instead, close it by clicking on the X in the upper right corner. Many people are fooled into installing spyware applications by popups that promise to clean their system. If you receive a message saying it can help, assume it’s spyware and don’t click!

3 Simple Ways To Save A Bunch Of Money When Buying A New Computer!

Looking to buy a new computer?

Overwhelmed by all of the options available to you?

Stressed by the high cost of computers today?

For most people, buying a new computer does not have to be as stressful as buying a new car. Nor does it have to be as expensive. If you’re like most people, and you have a limited budget for buying a computer, then you need to try to get as much computer for your money as possible.

Here are 3 simple ways anyone can save money when buying a new computer:

1) Shop around for best deal.

Sounds pretty obvious. But many people don’t realize they don’t need the fastest, most expensive computer with the most “extras”. In fact, if you are already using an older computer, even the least expensive new computer will be a big upgrade. If you don’t know a lot about computers, you can learn a lot by shopping around. Ask lots of questions, compare prices, compare features, then find the best price. Shop at your local electronics store, and look for the best deals online. You’ll be surprised at how much money you can save by shopping around!

2) Install your own “extras”

Many computers you will find in a store have a lot of extra software already installed. While this is convenient, it is not always the best way for you to save money. Also, while many of these extras sound good, you don’t always need them. You can often find better deals by shopping around separately for your own software extras (such as a word processor, anti-virus, popup blocker, spyware removal, games, etc). And some of these you can get for free. So before you buy the “fully loaded” computer, ask yourself if you really need all the extras, then shop around to see if you can buy a scaled down computer - and get the extras yourself for much less!

3) Don’t buy extended warranty

If you are not a computer “techie”, the extended warranties offered by the computer retailers often sound like a good idea. After all, who wants to be bothered paying for service on a computer after you buy it. But keep in mind that most computers come with a warranty, and most computer problems will either happen at the beginning (when you still have the warranty in effect) or much later (when it might be cheaper to buy a new computer). Technology changes very quickly these days. So consider whether or not it’s worth the inflated price of the extended warranty. And, if you really feel you need the extended warranty, then ask to purchase it at a lower price. Not all retailers will negotiate on the warranty, but some will. And whether you buy the extended warranty or not, make sure you back up all your files periodically, just in case!

If you have an unlimited budget, consider yourself lucky. And if you do business on the computer, make sure you get what you need, while trying to keep the price down. At any price, buying something that does not fit your needs is not a good deal.

Hope you find these tips helpful, and happy computer shopping!