As the technology has advanced, so has the threat to the security of our systems. We are installing more powerful and authenticated anti-viruses these days, but the threat to damage our system does not seem to be halting. As more and stronger anti-viruses are developed, so are the forms of the viruses. Every day, we come across a new form of virus that may cause damage to our PC and new software to get rid of them.
Most of you would have come across a situation when you observe some unusual activity in your system, something like missing icons on the desktop or unexpected pop-ups. This is one of the most common issues these days. If you have encountered any such situation, there is likelihood that your PC may be infected by Spyware.
Spyware is nothing but software that finds out a hideous place in your PC and then attacks the most important areas of your system. Its only motive is to harm you in all possible way.
How does it harm you??? Well, there are many ways; depending for what purpose it is developed. One of the most common among them is spreading your personal information for gaining some financial profits.
And who are the people who would actually steal your personal information? Well, they can be:
- The creator of the software
- A hacker
- A 3rd party who would want to use your personal information to get profited.
And how does they benefit???? There are several ways:
- Your browsing activity can be tracked and then hacked. This will cause a redirect of a particular website to market it.
- Simply misusing your information and causing a threat to personal security information as well as causing damage to your system.
Spyware is a program that is created with the basic motive of stealing the user’s personal information like security information, personal files and folders. The very word itself identifies that it is spying software. This means that a spyware can cause much more damage than what malwares and virus can……….
The strange thing about spyware is that they can hide themselves very efficiently even at the time of detection. Spyware blend themselves into the system with names that may appear too familiar to detect. So how the spyware does not allow any anti-spyware to detect??? There are two ways in which they can be done:
- The spyware encrypts in the code/data to allow avoid being detected. They also keep on changing their file per installation.
- The spyware tries to kill the anti-spyware process, and thus disabling them.
Do you know???
Gator and eZula are some of the most popular spyware.
Mostly you will be attacked by a spyware in the form of software. However there are some which may be present in the form of hardware too.
How to detect if you have been attacked by a Spyware?
Spyware can be detected by any of the activities mentioned below:
- You see a change in the configuration as well as basic settings in your system. This could be anything from a change in the screensaver to some important folders being automatically removed/ deleted.
- You are constantly redirected to a particular site while you are browsing through your default browser irrespective of your search criteria.
- You are receiving pop-up ads/advertisement which asks you to click on their ads to get rid of all the undesired activities.
- You see deterioration in the performance of your PC like slowing of speed, some programs not operating, etc.
- You see undesirable toolbar/icon installed in your default browser.
- Your default Home page keeps changing frequently.
- You encounter error messages while visiting some of your important/most visited sites.
- Some of the keys in your keyboard do not seem to function properly.
What are the sources of Spywares?
Spyware attacks can happen anytime during your browsing. You need to be precautious to avoid it. You may be infected by a spyware from any of the following pages:
- By visiting a web-page or by clicking an Ad on a webpage.
- By clicking on a link in your email or downloading an attachment from your e-mail.
- By downloading software which allows you to download only if you agree to share your information. These are generally mentioned in the Terms and Agreement section of the software referred to as “End User License Agreement”.
Form of Spywares:
Adware:
Adware or Advertising supported software is software that displays pop-up ads and renders advertisements. Generally the advertisements are in the form of pop-ups. Adware themselves are harmless but they generally come with spywares which monitors your internet activity and share your personal information to 3rd party website.
Adware’s are implemented in the software in the form of advertisement by the developer to recover the cost of developing the software. Advertisements are often irritating if they are interrupted in between. Some of the software which distribute the software free of charge but full of advertisements, offers paid services to give advertisement free software without any interruption. Thus revenue can be generated following any of the methods.
Trojans:
It is a file or programs that track your personal information and cause damage to the host computer system. Trojan Horse covers 80% of the malwares spread over the web. It spreads in the same way that a spyware infects a computer. They run silently in the background without the knowledge of the user. However, they are more harmful than the Adware.
Some other basic forms include:
Tracking Cookies: Cookies which track your personal information like your username, password, private and sensitive information, etc.
Browser Hacking: These causes changes in the host file, your home page, effects your search and displays error messages for the frequently browsed pages .
Keyloggers: It keeps a log of all your personal information and send it to a 3rd party for misuse.
Spybots: it monitors your browsing activity as well as sends your information to 3rd party website. It may also affect your host system as it may exist as a dll file.
Preventive Measures to be taken:
Similar to anti-virus, lot many anti-spyware software are available to prevent the attack of the malevolent software. Spyware doctor and Super Anti-spyware are some of the good ones available in the market to remove spyware.
Some more preventive measures that need to be followed are:
- Do not set up suspecting software into your system. Alternatively, browse for any undesired software in your system already set up, uninstall it immediately.
- Enable the security settings of your default browser.
- When downloading free software, do read the Terms and Conditions and License Agreement before installing the software. It is not advisable to download softwares that ask to share or access your information.
- Running an anti-virus, anti-malware and anti-spyware regularly for the PC always ensures safety and security. Additionally, running a CCleaner helps to remove all the unwanted and unused files from your system.
Computer and virus.
Now Internet is being a common option to know many unknown things and to communicate with our relatives who stay in distance through many social communication site. Multinational companies use the net for teleconferencing and to promote their products. Net banking, face book daily shopping's are very common use now a days through net. Students are using it in their studies . There are many other uses of Internet in our daily life. A common problem in using net is virus and mail ware. Hackers are throwing many virus in net daily ,due to which all small and big users are in a great stress regarding this. Even general users are also in thought due to this virus and malware.
How is it affected?
We are downloading many components daily through net. It may be any software or, educational matter or any form of interview, songs and movies. When it is done ,without our knowing many virus and mail ware is coming and also downloading in computer. If the computer once affected then it may not run further and from distance the unknown hackers may control your personal computer and will be able to know all subjects regarding your computer.
Thus the hackers are doing many illegal work and damaging your computer and even mobile also. The another name of this virus is Trojan.
TROJAN-what is it?
Experts are saying the term "TROJAN" came from the Greek work. In Greece history the name is related with the troy war. At that time a wooden horse was made and filling with soldiers ,it was send to the place of enemy. They thought that the opponent accepted the defeat and then enemies thought it might be a gift. They accepted the horse and took it in their area. Then the Greek armies came out from that horse and defeated them with a great horror. This horse was called TROJAN.
The name of this virus may came from that horse name and tactics. This malware also acts like that, it enters in your computer silently and helps to transfer all data's to sender and damages the users computer.
We used anti-virus to protect our computer and the branded anti-virus companies are in great thought to resist it. It is quit impossible to know ,from where it is coming as the users are changing their domain name continuously. It is attacking not only big companies but affecting many social organisation, even they are using it to know many Government secrets.It is creating problem in banking service mainly in ATM and net banking.
Not only computer, smart phone , digital television, printers, many electronics and electrical components are affected due to this virus.
Some tips to protect TROJAN.
- Use genuine operating system and it must be up to date.
- Use firewall and and genuine anti-virus software . Be sure that when you will download any or opening your mail ,it must be scanned automatically. It will block any unwanted virus or mail ware and will protect the compute.
- Be sure that your anti-virus protection is updated.
- Don't open any unknown email and don't download any unwanted software.
- Keep your personal computer with password protected and don't share it with any.
- Keep regular maintenance using defragnation and disc clean up tools.
So be alert regarding this TROJAN virus. It is a new threat to computer world.
Digital security systems are high-technology equipment combination installed for detection of attackers or potential intruders in our homes or any other types of establishments. These systems mostly consist of video surveillance cameras and digital cameras, sensor devices, motion detectors and sound-attenuation motors. These days, several incredible properties are susceptible to burglary and other forms of anti-social activities. Hence, installation of digital security systems in home, business or office may give users a sense of security as well as peace in their minds. Digital systems have different types of components. This includes video surveillance cameras, and other types of detectors.
Surveillance Cameras
Now let us have a look over the most essential part of digital security system named surveillance cameras. Cameras are mostly placed at the top of homes, offices or other incredible properties. Alternatively, you may place them in some of the hidden locations at interior or exterior portion of your building or in any other strategic way. Small telescope or bullets are the popular forms of security cameras used for surveillance. This is because; bullet camera systems are weatherproof and highly durable. Other than this, small telescopic cameras have built-in lens, day and night operation capabilities, inexpensive and most essentially users can install such systems in easy way. The main role of such cameras is involved in producing and recording images for security and surveillance.
Motion Detector
Now we will have a small overview over another essential part of digital security system named motion detectors. Whenever you install motion detectors, it may seem to be unresponsive. However, when the device detects any type of body movement or motion, alarm, along with other security related systems are activated automatically in no time. In this way, security officials and other authorities may come to know about any of the anti-social activities or unauthorized access taken place inside home or offices. It is one of the best security gadget because it cannot be recognized and give a quick alarm whenever it is necessary.
Infrared Detector
Now days, PID i.e. passive infrared detector systems have become one of the popular indoor security systems. PID systems are inexpensive, functional and are of highly reliable. Anyone can make use of such types of alarms inside their homes or business premises. However, such systems are unable to serve any outdoor uses. Initially, PID system measures the temperature of home. Once the device suitably programs the temperature, it will set an alarm in case of having any variation in the temperature because of heat produced by body. PID systems have proved to be highly useful in ensuring security of homes. However, these systems are not suitable for homes having any of the small animals. This is because; animal heat often set infrared alarms.
Ultrasonic Detector
As similar to Infrared systems, Ultrasonic detectors have also become popular home security systems for homes. The interesting feature associated with ultrasonic detectors is that such detectors make use of Doppler shifts to show and find the presence of an intruder. Ultrasonic detector systems, as the name is suggesting can emit such ultrasonic waves, which human beings can never hear throughout their entire daytime. If any intruder enters in your premises, ultrasonic waves shift to buzz the alarm. Alternatively, you can install microwave detectors for their homes. Microwave detectors use microwaves to detect the presence of burglars. Any of the detected motion will definitely set off burglar alarm.
In fact, you should have several reasons for ensuring protection of your homes. Therefore, one should essentially install some suitable indoor detection systems. It is true that these gadgets are quite expensive. But you can make sure the protection of homes and have peace in their minds.
COMPUTER SECURITY
Hi friends, today I'm going to write about some security measures that you need to take while using your computer. If you don't take it seriously now you may be in danger in the future. You may be having your personal details or even some important information like credit card details, bank details, passwords of online accounts and much more which you don't want anyone to steal and use. So, as it is rightly said 'prevention is better than cure' you should always try to protect your computer by following some tips that I'm going to share with you today.
So let's get started. These are the 8 tips that you should follow to be more secure on your computer.
1. Strong Password:
First thing to keep in mind is that you should have a strong password for your computer as you have strong passwords for your online accounts (hope so, if not then choose a strong password for them now). By strong password I mean that it should be more than 10 characters. The more bigger the password is the more secure it will be. It should contain CAPITAL LETTERS as well as small letters, numbers and even symbols like @, #, &, *, etc. You should not use your name, username, pet's name, date of birth as your password. And also keep in mind that the password should be a word that is not found in the dictionary (this will give you additional security by avoiding dictionary attacks).
2. Admin Password:
The next thing that you need to do is to create a password for the Administrator Account. There is an easy way around to open the administrator account when the password is left blank. When you install Windows on a computer, by default it leaves the administrator password as blank. So, you should take care to password protect your administrator account, because if someone gets access to your administrator account, he can do whatever pleases him like deleting a user account, change the passwords of the user accounts (by a simple trick known by most of the computer geeks), install virus and malicious softwares and so on.
To change the administrator password, go to the control panel, click on User Accounts, and select the Administrator account and follow the instructions.
3. Antivirus:
You should have an antivirus software to protect your computer from viruses. Just having an antivirus also will not work, you should update it regularly. Try to install a paid antivirus if possible which will give you additional features. AVG, Avast and McAfee are some of the popular ones out there.
4. Update Operating System:
Update your operating system periodically. In windows you have the option of automatically searching their official website for updates regularly. Every now and then they release new patches which contain an updated security feature.
5. Encryption Tools:
You can also use encryption tools like TrueCrypt to encrypt your files with a password. This software can create a virtual drive in your hard disc which can only be opened if you enter the password correctly. You can even password protect your hard disk.
6. Key Scrambler:
There are softwares known as key scramblers or anti-keyloggers which do the work of scrambling the keys that you type on your keyboard. It protects you from a malicious softwares known as keylogger which is used by computer criminals to capture and send your usernames and passwords to them by capturing every single character you type on your keyboard. Hence, key scrambler is a must if you use your computer more for online business and transactions.
7. Firewall:
Firewall is another important software that you need to keep your computer secure. There is a default firewall already available in Windows. You can enable it by going to the control panel. If you want to have more advanced firewall with more features, you can go ahead and download ZoneAlarm which is a free and a very powerful firewall. It will prevent others from accessing your computer illegally.
8. Update Your Softwares:
You should also update your softwares regularly. All softwares contain bugs which are fixed in the next release or update. So, if a new update is available for a software go ahead and download and install it. This will prevent the bug from damaging your computer. The updates are available in the official websites of these softwares. You can also update it from the software itself.
Hope these tips have helped you. Have a secure journey with your computer henceforth.
Spyware is malicious software that installs itself in the user’s computer without the knowledge of the user and sends personal information to the creator of the spyware. The creator can be the owner of a website who would use your personal information and track your browsing activity and then market it for their purpose. They may also be a hacker who would misuse your information and then create damage to your security as well as to your PC. Some of the most popular spyware are the Gator and eZula.
The spyware application may be any hardware or software that would track your personal information.
Detection of Spywares:
Your computer has been infected with a spyware if any of the following undesirable activities happens in your computer:
The settings of your computer changes randomly like the wallpapers, screen size, etc.
You intend to visit a site but you are redirected to some other site which differs totally from your search criterion.
You constantly receive pop-up ads/advertisement about various products.
The performance of your PC deteriorates.
Unexpected toolbar installed in your browser.
Unexpected icons installed in your browser.
Your Home page changes frequently.
Display of error messages constantly for the most visiting sites.
Some of the most used keys in the keyboard do not seem to work.
Source of Spywares:
Spyware attacks can happen anytime during your browsing. You need to be precautious to avoid it. You may be infected by a spyware from any of the following pages:
By visiting a web-page or by clicking an Ad on a webpage.
By clicking on a link in your email or downloading an attachment from your e-mail.
By downloading software which allows you to download only if you agree to share your information. These are generally mentioned in the Terms and Agreement section of the software but we rarely read through and, download. The “End User License Agreement” as they refer, allow the developers of the software to use your personal information.
Form of Spywares:
Adware:
Adware or Advertising supported software is software that displays pop-up ads and renders advertisements. Generally the advertisements are in the form of pop-ups. Adware themselves are harmless but they generally come with spywares which monitors your internet activity and share your personal information to 3rd party website.
Adware’s are implemented in the software in the form of advertisement by the developer to recover the cost of developing the software. Advertisements are often irritating if they are interrupted in between. Some of the software which distribute the software free of charge but full of advertisements, offers paid services to give advertisement free software without any interruption. Thus revenue can be generated following any of the methods.
Trojans:
It is a file or programs that track your personal information and cause damage to the host computer system. Trojan Horse covers 80% of the malwares spread over the web. It spreads in the same way that a spyware infects a computer. They run silently in the background without the knowledge of the user. However, they are more harmful than the Adware.
Some other basic forms include:
Tracking Cookies: Cookies which track your personal information like your username, password, private and sensitive information, etc.
Browser Hacking: These causes changes in the host file, your home page, effects your search and displays error messages for the frequently browsed pages .
Keyloggers: It keeps a log of all your personal information and send it to a 3rd party for misuse.
Spybots: it monitors your browsing activity as well as sends your information to 3rd party website. It may also affect your host system as it may exist as a dll file.
Preventive Measures to be taken:
Similar to anti-virus, lot many anti-spyware software are available to remove this malicious software. Spyware doctor and Super Anti-spyware are some of the good ones to remove spyware.
Some more preventive measures that needs to be followed are :
Do not install suspecting software. Alternatively, if you find any undesired software in your system already installed, uninstall it immediately.
Enable all the browser’s security settings.
Read the Terms and Conditions before installing free software and ensure that it does not share or access your information.
Run an anti-virus, anti-malware and anti-spyware regularly for the PC. At the end run a CCleaner to remove all the unwanted and unused files from your computer.
More Articles …
Subcategories
Web Hosting
Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.
Page 97 of 193