Security Information |
Viruses, Trojans, and Spyware - Oh My!
Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!" Six years later, and a lot of dead computers in the beginning, have placed me where I am now. Let me tell you, it's a full time job, even when I'm not at work. There is always some new technology being developed, and of course security is a never-ending battle with new viruses, trojans and spyware daily. The internet is full of how-to information. You can learn everything from how to make the perfect loaf of bread, tune your car, or remove a virus. Making a loaf of bread seems to be easy, and it probably is. Even if you end up making flat bread or burnt bread, you're not out a lot of money or in too much trouble. On the other hand, if you try to tune your car and break a spark plug or put the wires back incorrectly, it could end up costing you a lot more to fix it. All you wanted to do was save a few bucks and do it yourself. I've burnt bread and I've tried to fix my own car. The bread was thrown in the trash, the car I ended up taking to an auto mechanic and having it fixed right, which of course cost me much more than money, it cost me time. You must be wondering what my point is. Yes, removing a virus or building a computer isn't really that hard of a task?if you live and breathe computers like I do and others do (we affectionately call ourselves Geeks). Let's take a look at the following scenario. James is a real estate broker, and a damn good one. He makes his living helping people find the best buy for their dollar. As a result James keeps an extensive client list on his computer. Somewhere along the line he manages to pick up a nasty Trojan. His anti-virus software caught it but was unable to clean it. He does some research online and finds a site that explains how to remove the Trojan. After following the instructions he reboots his PC only to find that his machine will not boot. In frustration he goes to another computer and looks up information on boot problems and finds out that the best thing he can do is reformat his hard drive and re-install his operating system from his backup. Oh, by the way, he hasn't done a backup in over 6 months. By this time he has spent 4 or 5 hours trying to fix the problem, and now has the daunting task of re-installing his operating system without any backup? The moral of the story here is that he literally wasted hours that he could have spent making a sale or helping a client purchase a house or land. Is the above scenario a little extreme? In some ways it is, but it doesn't fall too far from the truth. Many of the clients I see with virus or spyware problems have tried everything they can to remove the problem, only to find out they spent hours with no results, and often come out worse than they were. By the time they come to see me they are frustrated and just want it fixed. Unfortunately, this does cost them money that they didn't want to spend in the first place, and more importantly in this day and age, it costs them more time. Time is the great equalizer. If James had been able to make a 10% percent commission on a $200,000 house, spending the 65 to 100 dollars to clean his computer wouldn't have seemed very significant. Nine times out of ten an infected computer does require a re-format and re-install. I don't say this lightly. It is usually much easier to backup and start over than spend hours trying to find every little piece of nastiness that was installed on your computer. Eric Graves is a Senior Computer Technician at ARCH Computing Services. His computer knowledge and interpersonal skills have helped the company to grow at a remarkable rate. He's currently completing his BS in IT Management, and will go on to complete his Master Degree in Information Systems Security. He is also currently the administrator for the Mutagenix forums, a Slackware based Live CD.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. The 5 Critical Steps to Protecting Your Computer on the Internet Spyware, viruses and worms.. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault. Is Adware - Spyware Putting Your Privacy at Risk Do you sometimes notice your computer running slower. Is your computer acting strange almost like its possessed? Well, it just may be plagued with Spyware. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. Types Of Computer Infections Computer infections can be broken up into 4 main categories which are explained in detail below:VirusesComputer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts. |
home | site map | contact us |