|
|
5 Simple Ways To Increase Your Computer Speed
If you're a computer expert, you'll probably already know about these tips (hopefully this will provide you with a little reminder). If you're not an expert, don't worry - these tips are simple, and don't require a lot of computer experience. While...
Cisco CCNA Certification: Broadcasts, Unicasts, and Multicasts
When you begin your CCNA studies, you get hit with a lot of
different networking terms right away that you might not be
familiar with. What makes it a little more confusing is that a
lot of these terms sound a lot alike. Here, we're going...
Search Engine Marketing - John Alexander Interviews SEO author Susan O'Neil about the early days
Search Engine Marketing - John Alexander Interviews SEO author Susan O'Neil about the early days. Robin Nobles was the very first person to develop a structured series of comprehensive courses and lessons which are recognized and approved by the...
Vulnerability Assessment and Network Security
Dicar Networks 97 East Brokaw Road Suite #230 San Jose, CA 95112 THE DYNAMIC PROCESS OF NETWORK SECURITY by Vlad Sharoiko Network security is a dynamic process because of the new threats and vulnerabilities that are uncovered every day. Your...
Why Learning The OSI Model Is Important - And Not Just For Exams!
There's nothing I enjoy more than teaching Cisco technologies, especially CCNA candidates. Whether it's in-person or online, everyone's excited to be there. There's a sense of anticipation in the air, and everyone is ready to work hard, get their...
|
|
|
|
|
|
|
|
Is "Spyware" Watching You?
Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy.
I listened to his horror story with a sympathetic ear, but I felt secure since I carry anti-virus software and a firewall (both by Norton).
At his suggestion - and to my surprise - I ran a program called "Spy Sweeper" and found a veritable minefield of dangerous and harmful programs lurking on my computer.
"Spyware" is software that gets onto your computer and literally "spies" on your activities.
The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer.
Three primary types of spyware exist to complicate your online life, including:
1. "cookies" 2. "adware" 3. malicious programs like "keystroke loggers"
Cookies represent mostly a danger of lost privacy.
In theory, someone could use a "cookie" to track you across multiple sites, combine that data with several databases, and figure out a lot more information about you than would make you comfortable.
"Adware" tracks more than just your movement across sites, it spies on your installed software and computer habits to then serve up advertising, modify websites before you see them, and generally do things without your knowledge with the intention of trying to get you to buy things.
"Keystroke loggers" and other malicious programs exist for one purpose: to cause personal mayhem and financial damage.
Spyware gets on your computer in one of several different ways.
First, it rides along with software you download from the 'Net and install on your system.
Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message.
Third, hackers find an open
port on your computer and use the "back door" to install basically anything they want.
And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing.
Now, suppose you carry an up-to-date anti-virus program and a firewall - shouldn't that represent potent protection?
In a word: NO!
I can personally attest that even the most up-to-date anti- virus programs and firewalls will not (repeat, WILL NOT) catch all the spyware that can infest your computer.
You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily.
Check out "Spy Sweeper" from webroot.com - this is the program I used to discover the spyware on my computer.
One thing I noticed, however, is that this program is a memory hog, so once I scanned, I turned it off and then use it 2-3 times a week... not the best strategy, but I want to give you the "whole" picture.
I also got the following recommendations from numerous subscribers about 2 programs to specifically help identify and remove spyware from your system (PC):
1. "Ad Aware" from lavasoft.de 2. "Spybot Search & Destroy" from safer-networking.org
The overwhelmingly recommended firewall suggested by readers was Zone Alarm Pro from Zone Labs => http://www.ebookfire.com/zonealarm.html
The bottom line seems pretty simple (but lengthy) if you want to protect yourself against this growing threat.
~ Keep your anti-virus program current ~ Install a firewall ~ Carefully screen software before installing it ~ Scan for specifically for spyware weekly ~ Stay current on this growing threat.
About the Author
Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|