It is possible that if one avoided all sources of spyware, ad-ware and virus infection that infection would be at minimal levels. Although I don't recommend using only this method as a form of fighting spyware, it can be a potentially effective mean. Used in conjunction with a virus scanning program (I recommend Avast), abstaining from visiting these web sites or using these programs will help your PC to fight off infections, infestations and slower speeds due to unneeded running processes.
The most common places where your PC will pick up spyware, ad-ware and viruses will be adult websites or websites related to security. By security, I mean websites related to computer hacking and the like. If you partake in software piracy, you will notice that many of these websites that are piracy download zones have javascripts and cookies running that download software to your computer unknowingly. They usually come in the form of cookies. If you run a good virus program while you visit these sites, your virus program will most certainly warn you to "abort the connection" or "terminate the script." This means a server-side script is running to put spyware in the form of cookies onto your hard drive.
Another good spot to accumulate spyware, especially trojans, is peer to peer file sharing software. Such programs like Bearshare, ARES, Kazaa, etc. have been known to be breeding grounds for trojan horses and keyloggers for sometime. I recommend if you decide to use these programs, you use the "lite" version of the program. Lite versions of said programs have been scaled down in memory usage and the like. They will still operate just as well as the full program, but your computer will like you better for not subjecting it to unknown dangers.
And alas, the final spot of interest would be chain mail letters with attachments. These annoying buggers are usually sent to you by friends with too much time on their hands. Some people become addicted to chain mail letters; they send out every single one they receive. These letters sometimes can have viruses in their attachments, but because the average computer user does not realize it, he or she is spreading a virus. ALSO NOTE: Chain mail letters have been known to connect pedophiles with their prey. This is because the person who receives the letter can trace it back to every single person who has read it. Notice a chain mail letter has tens, maybe hundreds of e-mail addresses upon it, and sometimes these belong to young people (as young people make up a large portion of Internet users). Use a virus scanning program that checks your incoming mail (Avast will do this), and use something like NetNanny to make sure your kids have no strange men or women talking to them on MSN messenger.
I am a young, aspiring computer engineer into Internet Marketing, hardware, software, web design, SEO and just about anything related to computers. Please come check out my growing PC forum at http://www.markspcforum.com
express cleaning service Arlington Heights ..In our case ? we serve Microsoft Business Solutions ERP... Read More
Linux essentials:It's free for download but you have to pay... Read More
Manufacturing in the USA is far away down from mid... Read More
Microsoft Business Solutions Great Plains is very good fit for... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
You've finally created databases that you can actually use to... Read More
Midsize business or non-profit organization should decide if one-vendor solution... Read More
Microsoft Great Plains might be considered as ERP platform to... Read More
In this article you will find some background information about... Read More
Microsoft Business Solutions CRM is now approaching the phase of... Read More
Passwords protect your most sensitive personal, financial and business information.... Read More
I have recently created my first Php program. I wanted... Read More
Microsoft SQL Server is the leader for inexpensive and middle... Read More
Once a business idea is selected, it is highly recommended... Read More
With so many Microsoft Windows related viruses, errors, and other... Read More
Almost all new and major brand of PCs come with... Read More
Microsoft CRM customization techniques are very diversified and based on... Read More
Did you ever give a thought to the number of... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
In part III of this ISDN primer, we learned that... Read More
Microsoft Great Plains and Microsoft CRM become more and more... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
Accounts payable is just one area of office management where... Read More
In this short FAQ style article we would like to... Read More
ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More
tidy up service Arlington Heights ..In the real world a "fire wall" is a fireproof... Read More
When Windows fails to boot it is normally caused by... Read More
It is now common thing when large corporation selects mid-market... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
Microsoft Business Solutions Great Plains has full-featured manufacturing set of... Read More
Spyware is like the new technological nuclear weapon on the... Read More
Task Manager is a Windows system utility that displays thetasks... Read More
The most important benefit of XML is its simplicity. Though... Read More
Make-or-Break Factors in Success and ProfitabilityFor quick printers, estimating can... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
Customer Relationship Management, abbreviated "CRM," is the term for a... Read More
Microsoft Business Solutions Great Plains might be considered as ERP... Read More
Just the thought of a duel-boot scares many people away,... Read More
Whether you are an experienced web programmer or a complete... Read More
Microsoft Great Plains, Navision, Solomon and Axapta are Microsoft Business... Read More
Is Photoshop CS2 worth the upgrade? You bet it is!... Read More
It is a well known fact that Java as a... Read More
A UNIX Shell is in simplest terms, a command line... Read More
In 2004 Oracle, Inc. made its new step toward J2EE... Read More
If you copy something from a Web site or elsewhere...... Read More
Innovative Maintenance Systems (IMS) is one company that offers solutions... Read More
In the case when you represent mid-size or mid-size-to-large business,... Read More
Microsoft Great Plains is one of three Microsoft Business Solutions... Read More
The destruction of the Soviet Union about 15 years ago,... Read More
Having from five to ten and more favorite screensavers is... Read More
Software |