Computers Plus

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 27 April 2008

Your Computer May Be Infected. Here's How To Check.. (NOT about virus)

Posted on 05:06 by Unknown
by: Fazly Mohamed

NOTE: Please take time to read on - it may be vital for your PC's security. If you are not in the mood, just save it or print it out for later reference.

A recent research revealed that 80% of the computers today is infected with these dangerous spyware and most of the users not aware of it. (Your computer could fall into this lot too.) The most dangerous fact is, even though the anti-virus software is running, these software can even inactivate them and take over your PC.

Have you experienced any of the following?

  • Awsome popups comes out of nowhere, when browsing the web
  • Home page reset to some other site

How can this happen?

The components installed when viewing certain sites, starts up and running as soon as it's finished installing (or after the page is completely loaded) and with every windows startup since then. Their job is to collect information and report (or transfer) it to an external computer.

What is deceptive software? (Reference: www.microsoft.com)

Spyware and unauthorized adware are two examples of "deceptive" software. Deceptive software includes programs which take over your home page or search page without first getting your permission. There are a number of ways deceptive software can get on your system. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Whenever you are installing something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of adware in a given software installation is documented, but it may appear at the end of a license agreement or privacy statement.

Sometimes deceptive software gets silently installed on your system without any warning at all. If you use Internet Explorer as your Web browser, this can happen if your Internet Explorer security setting is set to its lowest value. Make sure to keep this setting at the medium level or higher. Doing so will help you control what is being installed on your computer.

Have you ever had an experience where you were repeatedly asked to accept a download even after you said "no"? Creators of deceptive software often use such tricks to get you to load their software. If this happens to you, do not click "yes". Instead, try to close the Web page that first asked you to accept the download by hitting the "X" in the corner of the window. Alternatively, quit Internet Explorer and restart it to begin browsing the Internet again. If you visit a Web page that continually displays these tricky pop-up windows, that Web site may not be worthy of your trust.

Your computer may be infected by now, but you may not know. Just have a checkup with a software specifically designed for it, to know the status of your computer. You must clean infections once you find it and the game is not over yet. The spyware might reinfect your PC. So it's highly recommended that you run a firewall on your system after the clean up. This will allow you to monitor every single communication occurs with your computer and block the ones which you feel unnecessary. The firewall acts as a barrier between your PC and the external world (Internet / Network).

A good spyware detector recommended by most people is, http://noadware.cjb.net and it shows you all the infections and potential dangers in great detail. It's free to scan but not to clean. It's a good idea to have a scan even you have no idea of cleaning, since you know the status of your PC in great detail. This gives two advantages.

Firstly, if there are minor infections and if you have a fair knowledge on registry settings and how to edit them, you may have a try to clean them up. Secondly, if it shows that there are major infections, you can avoid using credit cards and doing other confidential stuff, until you clean it up later.

You must run a firewall. In many new operating systems (eg. Windows XP), there is a built-in firewall. Google search on how to activate it. Others may try one at http://www.download.com

You may have a question by now. What is the purpose of these spyware? Even though we cannot give an explicit and clear cut answer, we can safely state that every thing boils down to the urge of more profits. How? The spyware collects all your personal information and transfer it to an external computer. The information is reviewed by a software in the receiving computer and then delivered targeted popup ads to your PC. There are many things that spyware does in addition to this. The most dangerous of those is that collecting the credit card numbers.

If you have some technical knowledge on your PC, here's a technical explanation on what trouble does the spyware cause.

1. An extra process is running to monitor and log your activities in your PC.

2. Constant transfer is taking place between your PC and the spyware writer's computer.

The first process in it self is an unneeded process and it contributes to slow down your PC. Second is the most harmful. It transfers logged info to the external PC (spyware writer's PC). Then the external PC transfers targeted popups to the infected PC. This, in addition to slowing down your PC because of these extra processes, it also slows down the internet connection, as the bandwidth is shared. In short, PC with a spyware is like a dumping ground for snakes. Once its there and up and running, it can do almost anything with your PC.

Please pass this on to all you know. The most risk is for people who use Internet Explorer, as it is the most popular web browser and that very fact has drawn more attention of many malicious software developers.

About The Author
Fazly Mohamed - fazlymohamed @ yahoo.com
Email ThisBlogThis!Share to XShare to Facebook
Posted in adware, clean up, computer, infected, spyware | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Top 55 Tips for Search Engine Optimization (SEO)
    Here is The Top 55 SEO tips for beginner, newbie, or new webmaster.. Search engine optimization or SEO pertains to the the way you optimi...
  • Troubleshooting and Maintaining Your Laptop Battery
    Troubleshooting and Maintaining Your Laptop Battery The actual life of a laptop battery will vary with computer usage habits. For most use...
  • How to Send a Fax from Your Computer
    So how can you send a fax from your computer using the Internet or email? We are in the days of an easy lifestyle where we can do everythin...
  • How to Clean Your Computer Motherboard (Mainboard)
    If you have not done the inspection mentioned in the previous article - How to Clean your Case, now is the time to do so. Look at the blades...
  • A Comparison: Using Registry Repair Tools Versus Local Computer Repair Shop to improve PC performance
    What do you think is a more effective way of repairing your PC system registry files? Taking it into your local computer repair shop or dow...
  • Linux Versus BSD
    If you compare Linux and OpenBSD in their desktop environment features, Linux offers more applications than OpenBSD; but in a server solutio...
  • Computer Tips : 23 Easy Ways To Speed Windows Xp
    Computer Info, Tips and Tricks about the Operating System.. ( Windows XP ) Since defragging the disk won't do much to improve Windows X...
  • Driver Data
    Your PC has a number of hardware components that need to communicate with each other and with the programs you’re using. This can get tricky...
  • Buy Quality Computer Hardware Online
    Computer hardware means the physical part of a computer. No software or program can do anything without proper hardware. Moreover the succes...
  • DVD Repair, Scratched DVDs and Unfinalized DVDs recovery tips and tricks
    Simple and (hopefully!) free procedures to handle unsuccessfully finalized DVDs, damaged DVDs or DVDs that have not been burned correctly by...

Categories

  • adware
  • adwatre
  • and Panda Antivirus
  • anti spam
  • antivirus
  • antivirus info
  • audio
  • backup
  • bed sector
  • bios
  • Bit Defender
  • boot
  • bsd
  • buy
  • case
  • cd
  • centre
  • clean up
  • cleaner
  • compare
  • component
  • computer
  • computer definition
  • computer description
  • Computer Drivers
  • computer info
  • computer info centre
  • cookies
  • cpu
  • ddr
  • ddr1
  • ddr2
  • defragment
  • describsion
  • desktop
  • detect
  • device
  • devices
  • disc drives
  • dos
  • downgrade
  • download
  • driver
  • dvd
  • ebook
  • email
  • error
  • external
  • faster
  • firewall
  • flash
  • format
  • free antivirus
  • Free Download
  • game
  • graphics card
  • guide
  • hard disk
  • hard drive
  • hardisk
  • hardware
  • helps
  • infect
  • infected
  • info
  • information
  • install
  • internet
  • junk
  • Kaspersky
  • keyboard
  • laptop
  • link exchange
  • linux
  • mac
  • mainboard
  • malware
  • McAfee Virusscan
  • memory
  • microsoft
  • modem
  • monitor
  • motherboard
  • mouse
  • multimedia
  • Norton Antivirus
  • notebook
  • office
  • online
  • operating system
  • optimize
  • overclock
  • Panda Antivirus
  • paper
  • patition
  • pc
  • PDA
  • performance
  • peripherals
  • photo
  • photoshop
  • picture
  • Power Supply
  • powerpoint
  • printer
  • problem
  • processor
  • programs
  • protect
  • ram
  • reboot
  • registry
  • removable drive
  • remove
  • repair
  • restore
  • scanner
  • sdram
  • search engine
  • secrets
  • security
  • seo
  • SEO Tips
  • service
  • simm
  • slow PC
  • software
  • soundcard
  • sp3
  • speed up
  • spyware
  • system
  • tips
  • tools
  • top
  • top 10
  • Trend PC-cillin
  • tricks
  • trojan
  • troubleshoot
  • turorials
  • update
  • upgrade
  • vga card
  • video
  • virtual PC
  • virus definition
  • viruses
  • website
  • windos xp
  • windows 95
  • windows 98
  • windows me
  • windows vista
  • windows xp
  • worms

Blog Archive

  • ►  2011 (1)
    • ►  September (1)
  • ►  2009 (12)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (4)
  • ▼  2008 (98)
    • ►  December (4)
    • ►  November (8)
    • ►  October (5)
    • ►  September (3)
    • ►  August (1)
    • ►  July (2)
    • ►  June (4)
    • ►  May (18)
    • ▼  April (24)
      • Vista Registry Cleaners - Do They Actually Work?
      • How to Keep Computer Clean?
      • Computer Repair Service, Fixing The Problems
      • Back up, Restore, Update and Remove Device Drivers...
      • Your Computer May Be Infected. Here's How To Check...
      • Seven Tips to Having a Healthy Computer
      • The Different Between One Registry Cleaner Softwar...
      • 3 Tips To Choosing The Perfect PC Registry Cleaner
      • Tips on How to Buy Antivirus Software
      • Use A Registry Cleaner To Speed Up A Slow PC
      • Webmaster Info - Things That can Hurt the Search E...
      • Computer Info Centre Features
      • New Software Download
      • Getting Your First Computer With "Computer Info Ce...
      • Downgrade Vista to XP with Virtual PC 2007
      • Computer Tips: Is Your PC Running Slow?
      • Computer Info Centre: Make The Most Of Your Computer
      • What is The Windows Registry?
      • Link Exchage
      • Most Popular Download - Free
      • Computer Tips and Tricks
      • Computer Informations
      • 10 Best Hidden Windows Features/ XP Secrets/ XP Li...
      • Should You Upgrade Your Hardware PC?
    • ►  March (18)
    • ►  February (11)
Powered by Blogger.

About Me

Unknown
View my complete profile