Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[May 13, 2025, 02:04:25 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[January 03, 2025, 03:29:12 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno Articles » Personal Tech
 Spyware Is Not the Only Malware Threat to Your Home Computer
Pages: [1]   Go Down
  Print  
Author Topic: Spyware Is Not the Only Malware Threat to Your Home Computer  (Read 1097 times)
Daniel Franklin
TWI Hero
**********


Karma: 3
Offline Offline

Posts: 16647


View Profile Email
Spyware Is Not the Only Malware Threat to Your Home Computer
« Posted: September 23, 2007, 12:35:32 PM »


Given the huge amount of press and industry attention to “Spyware” it is easy to forget there are other types of malicious software or “malware” out there. Viruses, Worms and Trojans are still being developed to steal your personal data or damage your computer. These malicious programs can be hidden in email attachments or files which are downloaded off the internet.

Most computer users are familiar with the term “computer virus.” A Virus is usually hidden within another program or executable file. A Virus can be relatively harmless, for example displaying a message or picture at a preset time. Others variants however can be incredibly destructive including erasing data from your hard drive, corrupting programs or stealing sensitive information like passwords or financial data.

One of the limitations with a Virus is that it cannot spread itself automatically. Unfortunately a “Worm” can, and it exists to replicate itself. It is a self-contained program which is usually embedded in an email attachment like a Microsoft Word document. The most notorious variants like the “ILOVEYOU” Worm in 2000 are spread using the e-mail address book on the infected user’s computer. It emails itself to the contacts in the address book without the user’s knowledge.

A Worm can cause extensive damage to both the computer and the network your computer uses. A Worm infection consumes network bandwidth as it sends itself out. For example, a widespread infection can dramatically slow or totally overload a corporate network. It can even slowdown the speed of the Internet itself!

A Worm can also carry a dangerous program. The most common type of program is a “backdoor” which given hidden access to your computer to the virus creator. Your computer then becomes a “Zombie” used to send out Spam e-mail or other computer viruses.

A Trojan masquerades itself as a legitimate program or file. For example, you may think that you are downloading a MP3 music file but when the file is loaded a virus is installed on your system. Once installed onto the user’s computer it can have the same impact as a Virus.

Here are some common symptoms of infection by any of they types of malware:

- Unexplained crashes

- Strange program error messages

- Computer freezes

- Poor computer performance

- Angry emails from people you have “spammed” or unknowingly sent a virus (sign that your computer is a possible “Zombie”).

Here are some steps you can take to help prevent infection:

- Make sure you are receiving the latest Windows XP updates. It is highly recommended that you receive these updates automatically.

- Have a good firewall installed – ideally you want to have an application which filters both “inbound” and “outbound” internet traffic.

- Delete and do not open any email with an attachment from anyone you do not know.

- Install an anti virus program and keep the virus definitions up to date. Carry out a virus scan a least once a week. Always scan email attachments if you are planning on opening them.

- Use a Spam Filter to stop dangerous email getting onto your computer in the first place.

Richard Rogers is a owner of a number of computer related sites. One of his sites offers Free Computer Help for Windows XP Users and has just launched his new Registry Cleaner Blog.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.066 seconds with 24 queries.