Beware of Spyware

One day, you suddenly realize that your computer started to work noticeably slower than it used to. You decide to run de-fragmentation of your hard drive and add more virtual memory to the system. No luck! May be, it's probably some viruses, you reckon turning on your virus scanning software. Even after running the anti-virus program you notice that the problem won't resolve. Not understanding what's happening frustrated you pick up the phone. It's time to call your tech-support. Sounds familiar? You are not alone! Each day, thousands of users are facing similar problems caused by malicious software called Spyware. According to Dell technical support, nowadays 12 percent of their support calls involve problems related to some kinds of Spyware. Microsoft reports that fifty percent of all computer crushes are caused by Spyware, viruses and Trojans.

What is a Spyware?

Spyware ? also named Malware or Adware ? are malicious software programs, which most of the time get installed on your computer without your knowledge. These programs are capable of doing many outrageous, sinister things to your computer such as changing computer settings, tracking your online behavior, monitoring and controlling your computer, recording your keystrokes, displaying unwanted advertisement and reporting needed information back to the person behind it.

The main types of Spyware are:

Key loggers: This type of Spyware copies everything you type to a file and send it to the hacker. The more sophisticated type, which is used for identity theft, copies the information you provide when you are connected to a secure website.

Browser hijacker: It modifies browser settings without your permission. This Spyware is capable of changing your start page, search page, search tool bar and redirect your url to specific pages.

Email redirector: Surreptitiously copies all your incoming and outgoing emails and sends to the hacker.

Dialers: This spyware install themselves to your dial-up settings and dials numbers without your knowledge, often to out of country numbers.

Collectware: The purpose of this Spyware is to track your surfing habit and transmitting the statistical data to the hacker. This information later gets sold to advertisement companies.

Adware: This Spyware downloads all sorts of banner advertisements every time you take some action such as typing a word on your search tool.

Why my antivirus program does not block a Spyware?

Although, Spyware uses same tactics like "Trojan" virus, technically it is not a virus. A virus is a program written to create trouble or possibly harm your computer system. Viruses are capable of replicate, evolve and cause severe damages to your computer files, registry or even hardware. Spyware, on the other hand, does not harm your computer intentionally. Any nuisance like system slow down is the collateral damage, which occurs while the Spyware serves its mission of monitoring your activities and making unwanted changes to your user experience.

People rarely read the fine prints of the user agreements while downloading a file, a program, a game or other free stuffs from the Internet. Unethical sites use this to their advantage and add tiny Spyware with the file you are downloading.

The anti-virus programs can not be sure, whether this program is installed deliberately by you or it's a malicious Spyware. This makes identifying and blocking a Spyware difficult for an Anti-virus program. However, things are started to change! Major anti-virus companies are planning to integrate anti-spyware programs to their existing products very soon.

How did I get infected with a Spyware?

There are numerous ways how you might end up with having a Spyware on your system.

- When you download and install programs, games, smilies, pictures, screensavers from dubious sites, there is a big chance that you might install a sneaky Spyware along the way.

- Some websites and pop-up windows try to download and install Spyware while you are there. According a recent analysis of sex-based websites, up to 80 percent of these sites are now being used to upload Spyware, worms and Trojans to unsuspecting visitors.

- Some add-ons to you browser that is supposed to enhance your browser experience may secretively install Spyware.

- The most cynical method of infecting you with Spyware is when you receive a sudden pop-up ad, which claims that your computer is contaminated and you have to run certain program to cure your system. If you are credulous enough to run this program, it just installs a Spyware instead of eliminating any.

How to fight back?

If you carefully follow the instructions outlined below, your chances of getting infected with Spyware are pretty slim.

Update your Windows Allow your version of Windows to update it automatically. Ensure that you have all the latest security patches installed.

Use Firefox as your default browser Since Internet Explorer is the main target for many Spyware, you will be better of with Mozilla Firefox. Moreover, it is a better browser than IE in many aspects.

Be extremely careful with your downloads Try not to download anything from a unknown site. If you still feel like getting a shareware or freeware program check it out on one of these online Spyware database. Spychecker (http://www.spychecker.com/) is one such service, and Camtech 2000's Spy Chaser (http://camtech2000.net/Pages/SpyChaser.html) is a nifty downloadable database of nearly 1000 spyware-infested programs.

Use an Anti-Spyware application Download and install one of the following anti-spyware programs: Ad-aware (http://www.lavasoftusa.com/software/adaware/), Spybot (http://www.safer-networking.org/en/spybotsd/index.html) and Microsoft AntiSpyware. Although, Microsoft's Anti-Spyware

(http://www.microsoft.com/athome/security/spyware/software/default.mspx) is still at beta stage, I am using it and very happy with its performance.

Get a Firewall If you are using Windows XP with Service Pack 2, you are probably fine! In other cases, if your computer is connected to the Internet directly you should get a firewall and install it. Zone alarm

(http://www.zonelabs.com/store/content/home.jsp) is a great firewall you can download for free.

A recently conducted survey of the Top Network Security threats in 2005 reveals that two-thirds of IT managers and administrators believe that Spyware will be the number one threat to network security. So don't take any chance! Make sure that you are protected!

Nowshade Kabir is the founder, primary developer and present CEO of Rusbiz.com. A Ph. D. in Information Technology, he has wide experience in Business Consulting, International Trade and Web Marketing. Rusbiz is a Global B2B Emarketplace with solutions to start and run online business. You can contact him at mailto:nowshade[at]rusbiz.com http://ezine.rusbiz.com

reliable maid service Highland Park ..
In The News:

Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.
A woman named Wika announces her engagement to an AI chatbot sparking worldwide debate about virtual relationships and technology.
The notorious people search site National Public Data relaunches despite a previous breach affecting 3 billion individuals, raising fresh privacy concerns.
Revolutionary TRAUMAGEL gel controls life-threatening bleeding from gunshot wounds and traumatic injuries, helping first responders prevent prehospital deaths.
Protect your home network by enabling proper encryption, creating strong passwords, checking connected devices and using VPN and antivirus software.
The Navy's solar-powered Skydweller drone flew nonstop for 73 hours in Mississippi, proving renewable energy can power long-endurance military missions.
Moving and downsizing expose seniors to identity theft and scams as data brokers collect real estate records and personal information to sell to criminals.
ShengShu's Vidar technology revolutionizes humanoid robot training by using AI-generated synthetic video, reducing required training data from hours to just 20 minutes.

Lotus Domino/Notes - Microsoft Great Plains Tandem as ERP with Documents Workflow - Overview for IT

Lotus Domino/Notes ? Microsoft Great Plains tandem as ERP with... Read More

Microsoft Great Plains PM: Payables Management

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

Partitioning, Formatting and Reinstalling in Windows 98

Formatting and reinstalling windows 98 is very easy if you... Read More

Spyware Statistics -- Whats New in May 2005?

Although statistics often is blamed for various deadly sins --... Read More

Microsoft Great Plains: carpet, textile, fabric, felt distributor ? implementation overview

In this small article we will show you the possible... Read More

Great Plains Sales Order Processing and Invoicing Modules ? Tips For Consultants

We'll give you non formal view, based on our consulting... Read More

Protect Your Computer...and Your Business!

We all take the computer for granted. I mean, all... Read More

The Importance of Timely Timesheets

Whether you are a small consultancy firm, a medium sized... Read More

What Stands Behind The Software Description?

With thousands of web pages added to the Net every... Read More

How to Build a Basic CSS Layout

Designing without tables by using CSS layouts is fast becoming... Read More

An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you... Read More

Brief Notes About Mainframe Software Pricing

We don't think about mainframe software pricing anymore, we just... Read More

Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

All of us know that Microsoft bought former Great Plains... Read More

QuarkXpress Tips: How to Move Content Between Print and Web Layouts

Since its release in 1987, QuarkXpress had made an immediate... Read More

Microsoft RMS Customization ? PO Items Receiving in Great Plains

Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More

The Truth: Netzero 3G

We've all seen the ads on TV for Netzero 3G.... Read More

Microsoft Great Plains Beverage Production & Distribution ? Implementation & Customization Highlight

Microsoft Business Solutions Great Plains has many years of successful... Read More

Begun, The Browser Wars Have

As Mozilla Firefox nears 10% market share, with well over... Read More

Spyware Protection: A Must for Any Home Computer

Now that spyware is the single most dangerous threat to... Read More

Intro to UNIX Shells

A UNIX Shell is in simplest terms, a command line... Read More

Microsoft CRM Messaging through Lotus Domino eMail Server - Balanced Solution

Microsoft CRM and IBM Lotus Notes Domino seem to be... Read More

What is a Document Manager without Version History?

Document Manager and Version HistoryIn previous articles I have discussed... Read More

The Dreaded Paper Label - Should it be Used?

While paper labeling CDs and DVDs may appear to be... Read More

Microsoft Great Plains eCommerce: overview for developer

Microsoft Business Solutions Great Plains was designed back in the... Read More

Crystal Reports - Geterogeneus databases: SQL Server, Oracle, Unidata, Btrieve ? Tips For Developer

Crystal Reports is the most flexible tool on the market... Read More

house cleaning company Lincolnshire ..