Trojan Horse – Greek Myth or Computer Nemesis?

We have all heard the term Trojan Horse, but what exactly is it? A Trojan Horse is a destructive program that masquerades as a harmless application. Unlike viruses, Trojan Horses do not replicate themselves, but they can be just as destructive. One of the most dangerous examples of a Trojan is a program that promises to rid your computer of viruses but instead introduces viruses into your computer. The Trojan can be tricky. Who hasn’t been online and had an advertisement pop up claiming to be able […]

More info

Phishing For Your Identity

Who hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the […]

More info

How You Can Protect Your WordPress Site from Hackers

These days your WordPress website security is no laughing matter – in fact, you could say it has become downright treacherous as more and more people come to find themselves left with the devastation of a hacker. Rather than being a statistic, now is a good time to take action and do what you can to protect your WordPress site from hackers. Let’s have a look at a few things you can do. #1 Protect Your wp-config.php This is an important WordPress file and so you will […]

More info

What Is Spyware? An Overview of Spy and Malware

Spyware is malicious software that can intercept and take control of your computer without your knowledge or consent. The presence of spyware in the computer of a person is a major threat to the privacy and productivity of a person. Spyware can get very easily installed to your computer without your knowledge. There are some software which can help you in fighting off the menace of spyware. Reading spyware reviews can help you in buying the best spyware remover available in the market. For, there are different […]

More info

Malware May Be Hard At Work On Your Computer

If you’ve been using a personal computer for some time the word “Malware” gets on your nerves. Malware is the nice term for malicious software, anyone that has had their PC corrupted by it will use a different choice of words. Malicious software includes viruses, adware, spyware, and Trojans. If you don’t take precautions they will take over your computer. Viruses are probably the most common type of malware. Viruses can do all kinds of maddening things to your computer. They can erase all the files on […]

More info

Malware or Spyware

Malware is a new term used to describe malicious “mal” software “ware” that has no other purpose other than to destroy or disrupt a computer. Spyware and adware are considered to be malware. There is only one reason for spyware to be put on your computer, and that’s to make money, and no, not money for you. When you download those funny and comical files that your friends e mailed to you, free video or music files, free wallpaper, etc. spyware usually comes attached. The spyware industry […]

More info

Virus Overview

Computer Viruses are one of the biggest “bogeyman” of the Internet, and with attacks by Melissa, ILoveYou, Nimda, and Michelangelo, there are damage estimates and virus warnings all over the Internet. But what are they really? A virus is a program that spreads to other computers. Like all forms of malware, it both runs without the user’s knowledge or permission and it can interfere with other programs that are trying to run on the same computer. Some viruses also carry a payload, like ticking time bombs. On […]

More info

Malware!

The five types of malware are: Virus: A virus is a computer program that has been coded to replicate itself and infect a computer without the user’s knowledge. A virus spreads from computer to computer by infecting network files as well as CDs, USB drives, and other forms of removable media. The best free anti-virus is AVG anti-virus which can be found at http://free.grisoft.com/ . Trojan horse: Trojan horse or just Trojan is a program which looks legitimate but performs illegitimate actions such as granting full access […]

More info

Firewalls and Proxies

In building construction, a firewall is a structure designed to contain building fires. For example, an attic crawlspace that covers the entire length of the building would allow a fire to roar from one end of the building to the other. Breaking up the crawlspace with non-flammable walls helps to slow the spread of a fire. Network firewalls have a similar function. A firewall is a network security system, either a program or an actual device, that breaks up a network to contain viruses and hackers. Imagine […]

More info

Backdoor Programs

It’s the ultimate nightmare for a computer user, the idea that someone outside the computer can take over. The official “technical” term is Remote Administration, but hackers are more likely to use the word Backdoor. With Windows XP, remote administration comes pre-installed. Windows XP has an option called Remote Assistance, where an XP technician can “remote in” and take over your computer. The remote tech has as much control over your system as if he was sitting there at the keyboard. The hackers predate Microsoft by several […]

More info
1 2 3