FAQ Help Desk

What is Spyware?

Spyware is computer software that is installed surreptitious, on a personal computer to intercept or take partial control over the users interaction with the computer, without the users informed consent.

What is a computer virus?

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, USB drive or by the Internet. Additional,, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses. not insert their code into other computer files. Many personal computers are now connected to the hftemet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.

Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but situp, replicate themselves and perhaps make their presence known by presenting text, video, or audio messages.

Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. Asa result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.

There are many viruses operating in the general Internet today, and new ones are created and discovered every day.

What is SPAM?

Spamming is the abuse of electronic messaging systems to indiscriminate, send unsolicited bulk messages. While the most wide, recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, mobile phone messaging spam, internet forum spam and junk fax transmissions.

What is Phishing?

In computing, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulent, acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. eBay and PayPal are two of the t most targeted companies, and online banks are also common targets. Phishing typically carried out by email or instant messaging and often directs users to give details at a website, although phone contact has been used as well attempts to deal with the growing number of reported phishing incidents include legislation, user training, and technical measures.

What are Cookies?

HTTP cookies, sometimes known as web cookies or just cookies, are parcels of text sent by a server to a web browser and then sent back unchanged by the browser each time it accesses that server. HTTP cookies are us. for authenticating, tracking, and maintaining specific information about users, such as site preferences and the contents of their electronic shopping carts. The term "cookie" is derived from "magic cookie" a well-known concept in UNIX computing which inspired both the idea and the name of HTTP cookies.

So How did I get Infected In the First Place?

You usually get infect. because your security settings are too low. Spyware does not directly spread in the manner of a computer virus or worm: generaly, an infect. system does not attempt to transmit the infection to other computers. Instead, spyware gets on a system through deception of the user or through explodation of software vulnerabilities.


Safe Computing Practices

  1. Keep your Windows updated!

  2. Watch what you download!

  3. Avoid questionable web sites!

  4. Install Antivirus Software 'NOTE.:

    Please only run one anti-virus program and one firewall on your system. Running more than one of these at a time can cause system crashes and/or conflicts with each other.

  5. Change Web Browser

    Many malware infections install themselves by exploiting security holes in Microsoft Internet Explorer. tt is strongly suggested that you consider using an alternate browser such as Firefox.

  6. Install 3rd Party Firewall Software

    It is critical that you use a firewall to protect your computer from hackers. We don/ recommend the firewall that comes built into Windows. It does. block everything that may try to get in, it does. block anything at all outbound, and the entire firewall is written to the registry. Since most malware accesses the registry and can disable the Windows firewall, its preferable to install one of these excellent third party solutions. Two good free ones are ZoneAlarm and Outpost. The trial version of Sunbelt Kerio Personal Firewall will also work in 'Tree mode'. after the trial period expires. Please ony use one firewall at a time'.

  7. Install Javacool's Spr.vareBlaster Software.

    a) This excellent program blocks installation of many known malicious ActiveX objects. Run the program, download the latest updates, "Enable All Protection." and you're done. Although it won't protect you from every form of spyware known to man, it is a very potent extra layer of protection.

    b) Don/ forget to check for updates every week or so.

  8. HOSTS file and IE-SPYAD

    a) Another good program is MVPS HOSTS. This little program packs a powerful punch as it blocks ads, banners, 3rd party Cookies, 3rd party page counters, web bugs, and many hijackers.

    b) IE-SPYAD puts over 5000 malicious sites in your restricted zone, so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all.

    c) You can do a Google search for either program (MVPS HOSTS or IE-SPYAD).

  9. Install Ad-Aware and Spybot Spyware Software.

    a) If you do not already have it, Lavas., Ad-Aware is a must-have free scanner.
    b) Spybot Search & Destroy is another must-have free scanner. See this topic for instructions on how to run a scan with Spybot.

  10. Ewido Anti-Spyware

    An outstanding all-purpose anti-malware scanner and cleaner is Ewido. Although this is commercial software, the 30-day trial version will continue to work after the trial period expires in "free mode", with automatic updates and real-time protection disabled.

  11. Windows Defender

    Microsoft now offers their own free malicious software blocking and removal tool, "Windows Defender" (Not compatible with Windows 98 and ME.) It also features real-time protection.

  12. Lock down ActiveX in internet Explorer