|
|
Cyber Warfare
In these days of all-out combat in Afghanistan, terrorist attacks in New York and Anthrax in Washington, it's easy to lose one's perspective. I know I've become addicted to checking the major news web sites several times a day. I now listen to the...
Data Backup Solution: Why you need a backup plan in place – Part 2
In the first part of this article series, I talked about the three main threats to the data on your computer. I talked about the need for a data backup solution that protects your data properly. In this article, I'll outline the most common data...
Does it worth to backup emails from clients like Outlook Express?
How often do people loose their email data?
Is this important to backup your email client before loosing important emails?
Are you thinking it won't happen to you?
Well, for those who use an email client and loosing their emails is one of the...
Tips To Select Proper Motherboard
Selecting motherboard is really simple. As name suggests "Motherboard" acts as a protective mother of CPU, RAM and other add on cards since these components stand firmly on motherboard. Number of devices have been integrated on motherboard over a...
What is Data Recovery? - A brief Introduction
What is Data Recovery? Data Recovery is the process of retrieval of inaccessible or corrupt data from digital media that has become damaged in some way. Data Recovery can be used to recover data from devices as varied as Hard Disk Drives, Memory...
|
|
|
|
|
|
|
|
Secrets to SpyProofing Your Computer In Four Easy Steps
Secrets to SpyProofing Your Computer In 4 Easy Steps
DO I NEED TO SPY PROOF MY COMPUTER?
I think the question should be, do I use my computer for anything that would best remain private and confidential? Computer monitoring has become a huge industry, involving individuals, companies and governments worldwide. Ask the millions of people who’ve had their identities stolen if they would have done anything different, knowing what they do now.
Did you know identity theft is the nations fastest growing crime?
With the advent of computer technology and the Internet spreading through our homes and businesses at lightning speed, if you haven’t been affected by computer crime in one way or another, chances are you will be soon. TYPES OF COMPUTER RECORDING DEVICES
There are two main products that are used to capture and record computer activity: Hardware Keyloggers and Surveillance Software. 95% of these are designed to be undetectable by computer users. Many Surveillance Software programs are available via a simple download over the Internet, FREE of charge, and completely anonymously!
HARDWARE KEYLOGGERS
This product requires no technical skill whatsoever to install and is often overlooked by even seasoned computer users. This type of keylogger requires that the culprit have physical access to your computer and can be installed in less than 5 seconds.
Once installed, a hardware keylogger will capture every keystroke entered into your keyboard and then store it for future retrieval on the device itself.
Some hardware keylogger companies boast a two-million keystroke capacity! That’s about 5 years worth of typing for the average computer user. Whether at home or in the office, you can easily fall victim to this type of spying.
A hardware Keylogger is installed between your keyboard and computer.
One of the most popular hardware keyloggers is KeyGhost (www.keyghost.com) . You can visit their website for more information on hardware keyloggers and why they are such an intrusion into your privacy.
REMOVAL OF HARDWARE KEYLOGGERS
By taking a peek behind your system and following your keyboard cable, you can find out if there is something "odd" inserted between your keyboard and computer. To remove a hardware keylogger, you MUST SHUT DOWN YOUR SYSTEM! You could damage your system if you attempt to remove the keylogger while your computer is running! Once your system is powered off, carefully remove the device from in between your keyboard and computer, and then plug your keyboard directly back into the computer. Make sure that it is plugged in completely and be gentle as the connectors are somewhat fragile.
BEWARE SURVEILLANCE SPY SOFTWARE Surveillance Software is by far the most insidious…and hard to detect of all computer monitoring type spyware products. Some legitimate uses for spy software are to watch a child’s Internet activity or to monitor employees while in a work environment. Unfortunately, this type of spy software is often used unethically and even illegally by ANYONE who wants to spy on or steal sensitive or private information from you, or your business, without ever being caught. Surveillance Spyware can be broken down into four main sub categories:
Keyloggers, which record keystrokes like a hardware keylogger, but without a physical device. Email Redirectors, which silently duplicate all incoming and outgoing messages to a third party. Chat Loggers and URL Recorders, which will monitor popular instant messaging programs such as AIM and Yahoo Messenger, regular IRC chat clients and web browsers. All communications and web site visits are recorded and sent back to the intruder.
Screen Recorders, which silently take snapshots of your entire desktop screen and everything you are doing, and then package it up as a slide show, for the intruder to view. Screen recorders can also email or upload these recordings for remote access.
DANGERS OF SURVEILLANCE SPY SOFTWARE Surveillance Spy Software is wreaking havoc in families and businesses around the globe with very little media attention. Surveillance Spy Software among other things is used for: • Spousal Spying • Financial Spying • Blackmail • Identity Theft • Corporate Espionage • Stalking
Whatever anyone wants to find out about you or your business can now be easily obtained with Surveillance Spy Software that can be purchased by anyone easily right over the Internet…
One of the leading Surveillance Spy Software companies is Spectorsoft http://www.spectorsoft.com
They openly acknowledge that a large part of their sales are from spouses who spy on their mates. Businesses will not let anyone know their systems have been compromised with Surveillance Spy Software, unless they are absolutely forced to. It's bad for business.
DETECTING SURVEILLANCE SPY SOFTWARE
The only product I've found to specifically target and detect surveillance spy software is from a company call SpyCop ( http://www.spycop.com).
SpyCop has been reviewed by the best in the industry including law enforcement, government and hundreds of businesses both large and small.
Here’s what some of the leading experts in the industry are saying about SpyCop:
SpyCop... found a trace of SpectorSoft's Eblaster keylogger on my system that Spy Sweeper and Norton AntiVirus failed to notice EDWARD C. BAIG PERSONAL TECH WRITER USA TODAY
The best I've seen
so far is SpyCop. It scours your system, looking for secret keystroke-logging software. JOHN DVORAK CONTRIBUTING EDITOR, PC MAGAZINE
If you're on the receiving end of a snooping program, wouldn't you want to know? SpyCop can ferret out hidden spy programs… KIM KOMANDO THE KIM KOMANDO SHOW
SpyCop has been recommended in many books: The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick Microsoft Encyclopedia of Security by Mitch Tulloch Secrets of Computer Espionage: Tactics and Countermeasures by Joel McNamara : Steal This Computer Book 3: What They Won't Tell You About the Internet by Wallace Wang : Privacy Tactics by Scott Germaise Home Networking Bible by Sue Plumley Computer and Intrusion Forensics by George Mohay Absolute PC Security and Privacy by Michael Miller
WHAT IS ADWARE?
The public has become outraged at the advertisers who use hidden marketing programs to take over computers for the purpose of marketing their products. The symptoms of Adware are uncontrollable popups, unwanted extra toolbars, and drastically slowed down computer performance that can result in freezes or lock up. Most spyware detectors are concentrated on detecting adware because that is what is getting all the press…and adware profiles are free for them to add to their detection databases. This makes it very easy and inexpensive for anyone to get into the adware detection business. Many times the same advertising spyware databases are passed around or copied between Adware detection companies with very little new research done.
Unfortunately, there are many inferior products out there that only do a half job at detecting adware. Adware is extremely annoying and will often cost you money because this type of spyware is poorly designed, and may cause severe damage that only a computer repair shop can fix. All expenses related to adware damage come out of YOUR pocket, not the advertiser.
REMOVAL OF ADWARE I’m going to let you in on a little secret that many in this industry don’t want you to know: You DO NOT have to spend ANY money to detect and deal with Adware because the best product out there is FREE. Yes, I said FREE, and it amazes me how many people are spending their hard earned cash to detect Adware …but as I explained earlier, there is a lot of confusion regarding the subject of spyware.
Look what Andrew Brandt from PC World wrote about all these so called spyware detectors
POOR DEFENDERS Some anti-Spy Software companies use confusing ads, and our tests show their $20-$60 products are less effective than free competitors. Andrew Brandt
From the December 2004 issue of PC World magazine
You've almost certainly encountered the ads: A dialog box pops up on your system bearing the message Warning! Your computer may be infected with Spy Software and suggesting that you scan your computer immediately. Click it, and you often reach a Web site providing a free Spy Software scanner that finds all sorts of malware on your PC--and then offers to sell you software that will clean it all up. Should you buy these products? Based on our tests, our opinion is no.
Following complaints from several PC World readers, we tested seven heavily advertised Spy Software-removal tools-- MyNetProtector, No Adware, Pal Spy Software Remover, SpyAssault, SpyBlocks, Spy Software Stormer, XoftSpy--
and found that none were as effective as reputable free products such as SpyBot Search & Destroy
Andrew Brandt PC World Magazine...
Here’s what some of the leading experts are saying about FREE SpyBot
Spybot Search and Destroy is adaptable for both beginning and power users, BRUCE STEWART CNET EDITOR.
Spybot: A powerful, easy to use tool for detecting, removing, and preventing adware… WINPLANET.COM
So folks, don’t waste your money on Adware Spyware detectors, just do like Andrew Brandt says and get your FREE copy of SpyBot S&D from the website link below: To download your FREE copy of SpyBot go to www.safer-networking.org
There are a lot of companies imitating SpyBot and tricking customers into thinking they are going to the SpyBot website when they are really going to a competitor who wants to cash in on SpyBot’s popularity.
Adware Prevention (Careful what browser your using)
Many people are unaware that they can get adware deposited on their computer by simply visiting a website with an insecure browser. To help prevent new adware from making its way onto your machine when you surf the net, I recommend FireFox. FireFox is the latest cutting-edge browser designed for simplicity and security: To download your FREE copy http://www.mozilla.org/
FOUR EASY STEPS TO SPY PROOF YOUR COMPUTER 1. Check for hardware keyloggers attached to the keyboard input. 2. Download your copy of SpyBot from www.safer-networking.org 3. Download your copy of SpyCop www.spycop.com 4. Download your copy of FireFox browser http://www.mozilla.org/
Copyright © 2005 Elizabeth Ward. All rights reserved. Permission is granted to reproduce this report for free distribution at any website as long as it is reprinted in its entirety. Copies may be obtained in Ebook format from www.nospyzone.com
About the Author
Elizabeth Ward is a freelance writer and consultant for tech magazines and security magazines. She is a watchdog for consumer computer users and small business.
|
|
|
|
|
Tom's Hardware |
: Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
www.tomshardware.com |
  |
HardwareCentral - Your source for in-depth computer hardware info. |
HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
www.hardwarecentral.com |
  |
Apple - Hardware |
Find your favorite Mac, iPod and other Apple accessories. |
www.apple.com |
  |
Ace Hardware |
Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
www.acehardware.com |
  |
Computer hardware - Wikipedia, the free encyclopedia |
The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
en.wikipedia.org |
  |
Hardware - Wikipedia, the free encyclopedia |
Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
en.wikipedia.org |
  |
Open Directory - Computers: Hardware |
Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
dmoz.org |
  |
Microsoft Hardware – Home Page |
Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
www.microsoft.com |
  |
AnandTech: your source for hardware analysis and news |
Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
www.anandtech.com |
  |
hardware.com - Routers, switches, firewalls, servers, memory ... |
Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
www.hardware.com |
  |
Slashdot: News for nerds, stuff that matters |
From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
hardware.slashdot.org |
  |
InformationWeek HardwareTech Center |
Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
www.informationweek.com |
  |
What is hardware? - A Word Definition From the Webopedia Computer ... |
This page describes the term hardware and lists other pages on the Web where you can find additional information. |
www.webopedia.com |
  |
Google Directory - Computers > Hardware |
Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
www.google.com |
  |
Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
www.restorationhardware.com |
  |
HwB: The Hardware Book |
HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
www.hardwarebook.net |
  |
Reg Hardware: Product News and Gadget Reviews from The Register |
More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
www.reghardware.co.uk |
  |
red hat hardware compatibility lists |
hardware.redhat.com/ - Similar pages |
|
  |
TrueValue.com |
Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
www.truevalue.com |
  |
A complete illustrated Guide to the PC Hardware |
A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
www.karbosguide.com |
  |
|