Mac Attack Is Preferred To Weasly and Rascally Entry (WARE)
Many nasties exist in cyberland just waiting to plant themselves on an unprotected computer. In fact, recent studies have shown 74% of broadband users had spyware or adware on their computers; 67% had no antivirus or had outdated software on their PCs; and nearly 50% do not currently have a firewall. Statistics can be deceiving, but nearly 85% of computer users do not have adequate protection (antivirus, antispyware, firewall) on their systems placing them at risk. This last statistic is simply amazing considering the amount of information about viruses alone commonly known.
What risk, you meekly ask with a wry smile? Why the risk of spyware, malware, hijacking, logware. viruses, worms, trojans and phishing to name the more popular ones with new ones propagating faster than earthworms in summer. The bad guys are constantly creating nasties to invade the good guys' systems which many owners are not even aware of. I was recently called to aid a nervous friend who had no idea whatsoever what was happening to her system. She had recently subscribed to broadband (and I won't mention ComCast by name) and the tech had installed everything by the book. Yes, by the book, except he did not inform her she need a current antivirus, antispyware or firewall to protect her investment. My diagnostics found and removed 1,263 pieces of spyware, 8 viruses, 4 trojans and 6 worms which fortunately had done no permanent damage to the unit. She was encouraged to contact that company I won't disclose (ComCast), but probably didn't since chances are no responsibility would have been taken. Also, this company doesn't offer any free security software for subscribers like Cox Communications does. So it goes.
The first step in diagnosing any problem regarding WARE (weasily and rascally entry) is to closely examine your computer operation. Turn on the unit and then set back to watch the booting up. Here is a checksheet to help you:
1. Turn on your system, set back, relax and watch the advertising show. Quite a show will be displayed if you have sufficient inundated adware (advertising spyware) and you will notice continuous popups. The products displayed are many, but more so is the rapidity of each popup taking up your windows memory as well as bandwidth while demonstrating subliminal advertising to the hilt. It is safe to assume you are infested with adware if this occurs, but the products shown aren't that good. Make one check mark.
2. Lets say you turn on your system and it has difficult booting up. In fact, you have problems entering safemode and mutter to yourself: "damn Microsoft." It may not be Microsoft's entire fault, but a small portion is. Spyware can invade many different portions of your system and be transporting worms or viruses to make your life more exciting as well. Where did they come from, you ask? Probably not from the bar you were hanging at last night nor from the date experienced, but could have came from the email received afterwards; or from that free piece of software you installed; or from just being on the internet. WHAT!!!!! Yup, just by being on the internet.
The internet has changed substantially from years ago. Duhhhhhh!!! A system is at risk these days simply by going on the internet without sufficient protection-nasy bots hang out there testing individual computer protection and zoom onto an unprotected one after sending back sufficient information to bring the equivalent of the Red Sea spyware to you computer's front door. This may sound exaggerated, but not that much since the nastie technology has advanced substantially and for every protection released by a recognized laboratory, a counter-nastie is devised by someone out there to attack it. It can be described as evolutionary to the full extent and is an ever crusading battle for truth, justice and the American way. Where is Superman when you need him?
Back to spyware which plants itself on your computer and sends back information to a server ranging from your marketing habits, sites visited, personal information, etc. It is not a good thing to have on your computer and should be removed as soon as possible.
3. Hijackers-these little devils do exactly what the name implies>hijack your computer and without you even being aware of it. Hacks come onto your system, look around for personal information like passwords, financial information, telephone numbers, etc., and then proceed to do things like download illegal software onto the harddrive, make numerous phone calls, credit card purchases, etc., while your computer is identified as the one used for all transactions. Normally, they are discovered when the credit card or telephone bill arrives indicating $3000 worth of charges in Singapore and you scream!!; and perhaps when something peculiar happens with the computer like bouncing around or programs not there before. Either way, by then the damage is done and the culprits have skipped out leaving you with the aftermath of perhaps identity theft, numerous long distance and international phone calls, tons of credit card purchases and the need to cry all night long. All you can do is prevent it from even happening again after reporting identity theft to the authorities and Barney.
4. Loggers-these devices are implanted on your system to record and transmit everything you log onto your keyboard. Imagine, everything you key into the system has been transmitted to a server somewhere with the idea of obtaining personal identity such as social security numbers, checkings/saving accounts, and any other preferably financial information that can be gleaned. It's mind boggling!!
5. My new favorite is entitled Child Protection or Surveillance TV...in reality its another device which takes snapshots of your entire harddrive or individual files for transfer to a server located in some unknown place where another computer examines for personal information. Very advanced, very sophisticated and demands a good antispyware with current definitions to find on your system.
6. Malware, also called Riskware, is anything that poses malice or risk to your system. This can range from a latent threat which may lay dormant for awhile and then come forth to deliver a potent virus, worm, logger, or hijacker. It depends upon which form deviousness the programmer had in mind when conceiving or if he or she had been to mass recently. Regardless, they can be identified with a good antispyware and dispatched to nastie heaven in the manurepile of digital bliss.
7. One last latter day creation Phishing. Phishing involves professional looking email from what appears to be your bank, ISP, etc., usually stating they are reorganizing financial information and would like for you to resubmit yours again. NOTTTTTTTT!! Its not the real thing and will go only to a server probably out of country where good use will be made of the information given. New security packages now have developed anti-phishing packages, but the best thing is common sense. REMEMBER THE FOLLOWING:
1. Nothing is free completely.....you will always receive something in the background if download.
2. Never open emails you don't recognize. Opening one is sufficient enough to insure an abundance of spam and possible unleashing of nasties upon your system.
3. Never respond to spam. They take it as consent has been given. Best thing is to simply brand it as junk mail, let your system remove it, or delete it, and then report it to your ISP.
4. Don't be taken in by official looking email that resembles your financial institution, ISP or something similar. It probably isn't and could prove far more devastatin than you can imagine. Ignore all Selective Service Draft Notices.
5. Always beware if downloading something, like software, and it comes in a bundled package. Generally, this is an indication it provides products for you to evaluate which involves spyware. Always go to reputable sites for software.
6. USE COMMON SENSE with everything. Keep you antivirus definitions current; update your antispyware consistently; and be aware of your firewall, keep it current and see what it stops.
7. Check your checkings/saving account statements; any other financial investiments; phone bill; credit card statements, etc., to insure nothing out of the ordinary is happening.
8. Never give a contribution to anyone named Barney who claims to be purple and sings a weird song beginning with "I love you, you love me..." Chances are its not Barney, but someone named Bluto seeking enough scratch to find Popeye for a hit. Don't be fooled.
We now come to the part where a discussion of good antispyware products is necessary. Well, this must be prefaced by determining broadband including DSL or using dialup yet. I heartily recommend the use of a router with NAT for broadband/dsl even if only one computer is used. Secondly, choose a good antivirus, firewall and antispyware. I currently utilize an excellent D-Links router with NAT and two anti-spyware programs, SpySweeper and counterSpy. You can't lose with two antispyware programs, but may have difficulty running two antivirus programs simultaneously, i.e. Norton and McAfee. My system only uses one antivirus, Kaspersky Personal Professional and one firewall, Zone Alarm For Wireless. In total, they all work superbly and provide excellent protection for my needs.
I run a wireless for my laptop and use the same two antispyware programs, Kaspersky Anti-Hacker and Kasperky Personal Professional. Again, the protection is superb and no noticeable problems have been noted since configuring both the desktop and laptop.
Now, do you know enough to go out there and fight the good fight. Probably, but you will learn a great deal in the future as the evolutionary struggle continues. You can always visit sites like McAfee, Symantec, Kasperksy, etc., to view the latest virus/worms/trojans; and there are excellent sites for spam like The Spamhaus Project (www.spamhaus.org) or the following for WARE: www.kephyr.com, www.spyware.guide and www.webroot.com has a wonderful guide entitled Truth About Spyware and Adware. There are also psychiatric/psychological sites if you ever become confused to the point of believing you are one with your computer. Feel free to write the following in Google: whyme, hit enter and wait for the results. Help is on the way and you will find your personality again!!!