Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Sunday, November 11, 2012

Acer: No touch screen business Win 8 notebook until 2013


Acer has been upfront in its approval of Windows 8 and will support its touch screen interface with upcoming notebooks, tablets, hybrids and all-in-one PCs. However, it may be a while before the company offers up those same kinds of products specifically aimed at business customers.
ZDNet.com reports that, according to Acer president Jim Wong, the company has no plans to offer a touchscreen Ultrabook for Windows 8 business users until sometime in late 2013. Wong stated:
The consumer market is moving faster than the commercial market. In commercial [ultrabooks] there will be no touch until the second half of next year. Commercial markets are always considering application [compatibility].
Acer has its own brand of business notebooks, TravelMate, that include some additional security features compared to its consumer products. Wong said that if business users want to go ahead and get a touchscreen Ultrabook based on Windows 8, they can purchase the newly revealed Aspire S7 notebook (shown above) when it launches later this fall.
And what about the prices for its upcoming Windows 8 products? Acer, and indeed most of the other PC makers, have yet to reveal how much their Windows 8 devices will cost. Wong said the reason for that is simple: The back-to-school shopping season is still underway. He said, "Now is the very end of the back-to-school cycle. Do you want to talk about it now, hurting your back-to-school business, or wait a bit?"
Wong also repeated the company's stance that it will make a Windows RT device at some point, but no other details were mentioned.
Source: ZDNet.com | Image via Acer

Sunday, April 22, 2012

Free Online Pdf,word,excel,ppt,html Converters


1.freepdfconvert:Limited services for a non member but still does the job
Convert PDF to Word(doc),Excel(xls),Rich text Document(rtf)
Extract images from Pdf documents into .jpg,.png formats


http://www.freepdfconvert.com/


http://www.freepdfconvert.com/membership.asp


Convert MS Office,open office ,Images,Web pages,Blog posts,Vector Graphic format files ,html To pdf,bmp,png,jpg formats.


2.Zamzar: Upload your documents and receive converted files via email
Convert Ms Word (doc,docx) to pdf , html, odp, pcx, png, ps or swf
Ms Excel(xls,xlsx) to pdf,rtf,csv,doc,html,mdb,ods or xml
MS Powerpoint (ppt,pptx) to pdf,html,pcx,ps,odp,png or sxf


http://www.zamzar.com/


Convert PDF to doc,html.odt,pcx,png,ps,rtf,txt and many more


3.K2pdf:Web based PDF online conversion service with extra features like encyption,adding owner password, user password and few more extra securites.


Convert MS Word,Excel,Powerpoint,MDI (Micorsoft Document Image format),PS and Images formats TO Pdf


http://www.k2pdf.com/convert.html


4.Neeviapdf:Another Useful online service with encryption and security features


Convert Word processing ,spread sheet,presentation ,graphic and more formats to PDF,Image,PS,Image formats


http://convert.neevia.com/


http://convert.neevia.com/fileformats.html


5.Pdfonline: Convert word (docx),Excel(xls)Powerpoint(ppt,pps),Ms publisher(pub),text,html,JPG,PNG,TIFF,WMF,EMF,GIF to Pdf documents.(2MB limit)


https://www.pdfonline.com/convert_pdf.asp


6.PrimoOnline: Convert Ms Office and other formats To Pdf


http://online.primopdf.com/


http://online.primopdf.com/FileTypes.aspx


7.Doc2pdf:convert unlimited documents instantly in the web browser.
Convert MicroSoft Word to Pdf or Open Document Text(odt)
Excel to Open Document Spread sheet (ods)or pdf
Power point to pdf,macromedia flash(swf) or Open document Presentation(odp)


http://www.doc2pdf.net/converter


8.Fastpdf: Convert Microsoft Word document(.doc) or Rich Text Document (.rtf) TO Portable Document Format(.pdf) and it should be 24 pages of less


http://blok-batu.blogspot.com/2008/10/www.fastpdf.com


9.Expresspdf: Convert webpages,Microsoft Word Documents,Excel To Pdf


http://www.expresspdf.com/




10.htmltopdf:Converts Html,Php or any other type of URL to pdf.Instant conversion ..no email submission required


http://www.rustyparts.com/pdf.php


11.PDF-o-matic :You can convert unlimited documents in the web browser .
Convert any Url to Pdf


http://www.easysw.com/htmldoc/pdf-o-matic.php


12.Html2pdf:You can convert unlimited documents instantly.
Convert blog posts,web pages or any Url to pdf


http://html2pdf.seven49.net/Web/en/Home/Default.htm)




13.Issuu:Convert your documents to online magazines so that you can post anywhere on the web or share instantly with your friends


http://issuu.com/




14.Koolwire:It is a pdf email conversion service where you can email documents and receive converted docments in your inbox
doc@koolwire.com-Convert PDF to word or rtf
pdf@Koolwire.com-Convert Word(doc,docx),excel(xls,xlsx),powerpoint(ppt,pptx),rich
text format(rtf),images ,text files to PDF
wav@koolwire.comConvert MP3 to Wav
mp3@Koolwire.com-Convert Wav to mp3 (10mb limit)


http://www.koolwire.com/


15.Adobe Online Conversion Tools: Converts text and html documents to PDF


http://www.adobe.com/products/acrobat/access_onlinetools.html


16.Youconvertit:Convert documents,online videos and send files to email addresses


http://www.youconvertit.com/


Source: http://www.articlesbase.com/software-articles/free-online-pdfwordexcelppthtml-converters-618473.html

Saturday, April 21, 2012

Getting your free adware and spyware program


With adware and spyware programs becoming a perennial threat in the online world, it would be wise to have your PC always protected. There are literally hundreds and hundreds of spyware and adware programs lurking somewhere on the Internet, looking for a chance to get into your PC. Some of them may require that you click into one of their links in order for them to get into your system. But there are other more malicious programs that will actually force their way into your system if you are not that careful.


Once inside your computer, these malicious programs can do a lot of unpleasant things. Some adware programs will try to bombard you with a number of ads while you are browsing on your computer. No matter how many times that you try to get rid of them, they still keep coming on to you. 


They may suddenly pop up over the website that you are currently browsing, therefore distracting you to take notice of their ads. One time won't bother you at all. But sometimes these ads can get so persistent that they already become a hassle. They begin to disturb you and you may want to get rid of them.


There are also other programs that may bother you in a different way.  These are spyware programs that can get as malicious as can be. These programs can get downloaded into your system secretly without you knowing it. And just like what the name implies, spyware programs try to spy up on you in a variety of ways.  They can monitor your surfing habits and send it to someone from the outside who might find a use for it. 
Where to Find Adware and Spyware Scanning and Removal Tools


Some spyware programs can log all your keystrokes. This can be very invasive and compromise your way of life. Such programs may be able to get hold of your secret personal information without you knowing it. 


Through a spyware program that records all the letters and number that you punch in your keyboard, email addresses and passwords can be obtained. If you make purchases with your credit card online, this type of spyware program may be able to get your credit card number and other important credit information that may compromise everything. 


There are also spyware programs that can force itself into your computer and do its dirty deed. It can scan into your computer hard drives and may make changes in your system. It may change your security settings and allow other malicious programs to come in. this type of spyware program can also prevent you from using certain legitimate programs and instead force you to use another type of software instead. 


All these malicious programs can really become a serious problem if left unchecked for a long time. What you may need is a special software that may be able to scan your computer and search for unwanted programs like these and remove them effectively. Such programs may also be able to block such malicious programs from ever getting into your PC.


There are some software programs available online that offer you free scanning and removal of spyware from your PC. You can choose from a variety of legitimate programs that will be able to effectively do the job for you and for free. But most of the times, these free online spyware scanning and removal tools may not be able to provide you with the full protection that you need. You may need to purchase a spyware and adware removal software that may be able to provide you with the most comprehensive spyware protection that you 

Dust Kills Cleaning the Unit Fan is Essential Computer Care


Between taking care of the household, the kids, the pets, and the district PTA, computer care is probably one of the last things that you think of doing on a regular basis.  Without a regular maintenance schedule however, you could find out (the hard way) that a neglected computer is an energy hog - one that works harder than it needs to and one that could be a financial burden to replace.


Let's talk about maintaining hardware.  So much emphasis is put on maintaining a computer's operating system that we sometimes forget how important it is to maintain a computer's hardware components. Since there can be quite a few components to take care of, let's talk about the most important one.


The most important component of a computer's hardware system is its fan. The fan is located on the computer's CPU unit and when that thing gets clogged with dirt and dust, it can run down a computer faster than you can say, "Something's wrong with my computer and I don't know what it is!" In short, the fan is responsible for keeping a computer's motor cool and this motor is what keeps the computer's hard drive and peripherals functioning the way you need them to, which translates to "fast." 


A dirty fan doesn't rotate fast enough to keep that motor cool and a completely clogged fan just stops rotating altogether. This causes the computer's motor to work harder - and a harder working motor can raise the electric bill! Worst case scenario: the motor can overheat and stop working as well. No motor equals no computer. 


Keep your computer's fan clean by preventing the fan from getting dirty or dusty in the first place. Use the computer in a dust-free environment and never smoke around it. Nicotine and tar mean certain death when it comes to computer fans, however should you find a need to clean the fan, do so with extreme care.


It's quite easy to cause more damage from cleaning so if you're not comfortable with cleaning your PC yourself, take it to a shop for servicing. Otherwise, you can unplug and disassemble the computer to do it yourself.


You'll need a can of compressed air and an anti-static rag to remove stubborn clumps of dust. Hold the can perfectly vertical and spray the fan being careful not to spray the dust off the fan onto other sensitive parts of the computer like circuit boards or inside the motor casing. Wipe up remaining dust with your anti-static rag and then reassemble the computer.


One thing that you certainly don't want to use to remove computer dust is a vacuum cleaner. Although using a vacuum cleaner seems to make more sense, the strong suction of a vacuum cleaner can actually spark damaging static electricity or dislodge loose cables. You also don't want to use oil-based cleaners. Although Pledge may dust your wooden tables and cabinets to a perfect shine, the oil inside a cleaner like this will erode sensitive computer parts. Stick to a liquid-free dusting method and your dusting routine will be safe enough to repeat as often as you need.


As previously mentioned, preventing dust from entering the computer is extremely important and will reduce the need to open and dust your system in the first place. The severity of outside elements (smoking, humidity, pets, etc.) will ultimately determine how often you'll need to de-dust your machine. But as an average, you shouldn't need to perform this procedure any more than once or twice a year.


The entire exercise should take no more than twenty minutes tops and once complete, you'll immediately see and hear the difference in your machine. The computer's keyboard and mouse will run more smoothly, hardware won't take as long to connect, and the entire machine won't be as loud as one that's corroded with ugly dust bunnies.

Monday, April 9, 2012

Backup Techniques to secure your Important Data

IBackup is a really good choice for an online backup and cloud storage company, but they have some really stiff competition. SOS has really made a strong name for themselves and is taking the online backup world by storm. Their affordable pricing and high quality features have brought them customers from all over the place. There are a few things that they have done particularly well, especially in comparison to a company like IBackup.

256 - bit encryption software is the tools of choice for both IBackup and SOS, and for good reason. This is what banks use, and what some parts of military installations choose to use as well. It has been proven to be one of the most secure versions of encryption software available on the market today. Even though it is so readily available, it is nearly impossible to break. Since you can schedule when backups occur and put security restrictions on different accounts, all of your information is as safe as it can possibly be.

Data recovery services entail the recovery of data from a computer's hard drive. The hard drive may have been formatted or damaged. Computer forensics is a special branch of computing that deals with complex data recovery to ensure that valuable data that has been lost is recovered in as much of its original state as possible, and to trace the data security path to determine why the data was lost in the first place in instances where foul play is suspected.

It doesn't matter how expensive or luxurious a computer or laptop is. There will always come a time where they crash and break down. There are numerous reasons why systems crash. This usually results in the loss of important files and documents. Some causes may not result in the loss of data, however, when a computer or a laptop crashes, you will obviously have to bring it for repair. How can you continue working on your current assignments, reports or projects, or even have access to all of your pictures, music and videos if your PC has to be repaired? Repairing these machines will take a long time; at least a week, or even longer. Also, your CPU's condition may leave repairmen with no choice but to format it, which will result in the loss of files.

If you are using your computer or laptop all the time for work-related items, such as documents, reports and other important files, or just to store memories in the form of pictures and videos, it is always best to keep copies of every important file you have. It is also recommended that you store extra copies on different backup products, so you will really not have to worry about your important documents getting lost even if you have no control over the reason why your PC had to crash.

Source: http://www.articlesbase.com/data-recovery-articles/backup-techniques-to-secure-your-important-data-5802102.html

Sunday, March 4, 2012

Finding the Security Suite that meets your needs Protection You Can Afford Protection You Can Afford

Before proceeding to read this article, it is important that we state something up front.    It is essential for the reader to understand and appreciate that there is no such thing as a secure operating system or web browser.  While the use of security suites and other complementing products can significantly reduce your risks, they are not magic wands that you can wave to eliminate 100% of your risk.  Any product claiming they can do this should be viewed with great skepticism.  

With that being said, let’s talk computer security and security suites.  There are numerous ways in which the security of your computer can be breached.  The most common threats come from worms, viruses, Trojans, phishing, hackers and crackers.  Potential security breaches can come in the form of downloading unfamiliar email attachments, being monitored by spyware, maliciously attacked by malware, or probed through port scanning.

Dshield.org (www.dshield.org), a non-profit company, functions as a “dominating attach correlation engine with worldwide coverage”.  In short, they work with people and companies to track, among other things, port scanning violations.  Port scanning involves a person (referred to as a hacker or cracker) who attempts to break into you computer through the open ports in your system.  Once an open port is located, the individual attempts to collect your personal data or install a malware program into you computer.  On average, Dshield.org logs over 1.1 billion reported attempts of port scanning each month.  What is even scarier is that this is just based on their program participants.  You can imagine how many more incidents are occurring each month to the general population of computer users.

Dshield.org also reports on survival time.  Survival time refers to how long it will take before an unpatched PC is attacked or infected.  Below is a snapshot of their current operating system breakdown:

Current OS Breakdown

Category % Adjusted Survival Time    
Windows 27.0000 128 min    
Unix 0.5000 3648 min    
Application 3.0000 1203 min    
P2P 1.5000 1591 min    
Backdoor 0.5000 5432 min  
Source:  Dshield.org – Survival Time History (11/8/05)


In short, if you have a Windows-based operating system and an unpatched PC, you will be attacked or infected in a little over 2 hours.  When looked at in these terms, securing your computer becomes a mission.

Here are a few easy steps you can take to immediately protect your computer.  

1. Don’t run unfamiliar programs on your computer.  
It sounds like common sense, but many of the most prominent attacks have involved spyware and email attachment worms such as Bagle and Netsky.  If you don’t recognize the sender, don’t download its attachments.

2. Don’t allow unrestricted physical access to your computer.  
If you have sensitive or proprietary information on your computer, allowing other employees or family members to use your computer can lead to potential  breaches in your computer’s security.

3. Don’t use weak passwords.
Use passwords which are difficult for someone to figure out.  People frequently use the names of children, pets, anniversary dates, or birthdays.  Because there seems to be a password needed for everything, it is not uncommon to see many people using the same password for everything.  Big mistake!  The use of only one password provides a hacker with easy access to a smorgasbord of personal information.  If you have to write your passwords down, it is best not to leave them on a post-it, attached to the screen of your computer.  You may chuckle at the absurdity, but it happens more than you think.

4. Don’t forget to regularly patch your operating system and other applications.
Many industry experts believe that most network security attacks would be stopped if computer users would just keep their computers updated with patches and security fixes.  Too often, we forget to do this on a regular basis.  Remember that every day, new viruses, worms and Trojans are being created and distributed.  They are looking for the weaknesses in your computer system.  Having outdated software is basically the same as holding the door open and inviting them in for a visit.

5.  Don’t forget to make regular backups of important data 
Always keep a copy of important files on removable media such as floppy/ZIP disks or recordable CD-ROM disks.  Store the backups in a location separate from  the computer. 

In most cases, Windows desktop and screen-saver passwords provides adequate protection for normal security concerns.  However, if you feel more comfortable taking additional security measures consider obtaining a comprehensive security suite.  

Selecting a Antivirus Software
The next question is how do you pick the best product for your needs?  You start by asking yourself a series of questions.  Do you need password protection for individual files, your desktop, a network, or to block someone’s access to the Internet?  Is your computer used only by you or do multiple users have access to the computer?   How many users in total do you expect on your computer? What are your system requirements?  How much do you want to spend?  

Once you are able to answer these questions, you can begin to research which security suite will best meet your needs.  Product reviews and user statements provide a great starting point.  PCMagaine (www.pcmag.com), Zdnet.com (www.zdnet.com), and Consumer Reports (www.consumerreports.org) are just a few informative sites that offer research on various computer software products.

There are numerous security suites available on the market.  Take the time to choose the one that meets your specific needs.  As a starting point, we’ve listed a couple of the more popular programs:

1. Kaspersky Personal Security Suite
Description:  A comprehensive protection program package designed to guard against worms, viruses, spyware, adware and other malicious programs.  The program offers five pre-defined security levels and is convenient for mobile users.  System requirements:  Window 98/2000/XP; Internet Explore 5.0 or higher, Memory: minimum of 64 MB RAM, 100 MB free on hard drive.

2. Shield Deluxe 2005
Description:  This program provides protection from viruses, adware, spyware, and privacy threats while using very low system resources.  Additionally, the maker, PC Security Shield offers ongoing free technical support.  System requirements:  Windows 98 or higher, WinNT, WinXP, WinME; Internet Explorer 5.1 or higher, Memory:  32MB ram or higher, 65 MB free disk space.


By: iknowpedia.blogspot.com

Who are the Players in the Antivirus Industry?





Everyone in the United States has heard of the leading antivirus vendors Symantec, Mcafee, Computer Associates, and Trend Micro. These companies have market-leading presence in the United States.  Microsoft, as well, has plans become a key player in this market.  Microsoft acquired intellectual property and technology from GeCad software in 2003, a company based in Bucharest, Romania.  They also acquired Pelican Software, which had a behavior based security as well as Giant Company Software for spyware and Sybari Software, which manages virus, spam, and phishing filtering.


A lot of discussion has centered on whether Microsoft with come to own a dominant position in the antivirus market by simply bundling its technologies with its operating systems at no charge.  This is a similar technique applied in other markets such as word processing and Internet browsers.


Of course there are a number of antivirus vendors who also play in this market. There are many companies with great market presence in other countries that are beginning to become more widely known. These vendors include GriSoft out of the Czech Republic, Sophos in the united Kingdom, Panda Software out of Spain, Kaspersky in Russia, SoftWin in Romania, F-Secure in Finland, Norman in Norway, Arcabit in Poland, VirusBuster out of Hungary, and AhnLab in South Korea.


It is not clear where the industry is heading and everyone in this market faces a rapidly changing landscape. The amount of effort to find and provide fixes for viruses is staggering. Malicious programs are getting more complex and the number of them is increasing.  Many companies may find themselves without the resources to match the efforts of those truly bent on creating havoc.  Some virus companies are getting of hundreds of new samples a day! Moreover, the new viruses are getting "smarter" in that they propagate themselves quickly and they often hide themselves and are smart enough to move around in a system by renaming themselves in an effort to make it hard to remove them.




By: iknowpedia.blogspot.com


Securing Your Computer System






Today, more and more people are using their computers for everything from communication to online banking and investing to shopping.  As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers.  While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets.  Below are a few easy, cost-effective steps you can take to make your computer more secure.

  1. Always make backups of important information and store in a safe place separate from your computer.
  2. Update and patch your operating system, web browser and software frequently.  If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard.  This program will help you find the latest patches for your Windows computer.  Also go to www.officeupdate.microsoft.com to locate possible patches for your Office programs.
  3. Install a firewall.  Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet.  Consideration should be given to the benefits and differences between hardware and software based firewall programs.
  4. Review your browser and email settings for optimum security.  Why should you do this?  Active-X and JavaScript are often used by hackers to plant malicious programs into your computers.  While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you.  At a minimum set your security setting for the “internet zone” to High, and your “trusted sites zone” to Medium Low.
  5. Install antivirus software and set for automatic updates so that you receive the most current versions.
  6. Do not open unknown email attachments.  It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.    
  7. Do not run programs from unknown origins.  Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes.  They may contain a Trojans horse waiting to infect a computer.
  8. Disable hidden filename extensions.  By default, the Windows operating system is set to “hide file extensions for known file types”.  Disable this option so that file extensions display in Windows.  Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.   
  9. Turn off your computer and disconnect from the network when not using the computer.  A hacker can not attack your computer when you are disconnected from the network or the computer is off.
  10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program.  Obviously, you need to take this step before you experience a hostile breach of your system.  


By: iknowpedia.blogspot.com





About Encryption and Making Your System Secure About Encryption and Making Your System Secure





What does encryption do for me?
Encryption and cryptographic software has been used in many different ways to make systems more secure.  This article discusses only a few ways that such software can make your system more secure, including:


1) Encrypting your email
2) Encrypting your files


To programs are mentioned that will help encrypt information. There are many more programs out there that will help, but these programs are good and a good place to start as any. They have the added benefit of both being free with source code available.


Will encryption stop people from accessing my information?
Encryption simply makes it harder for people to gain access to important information, like passwords or sensitive information in a file. The first thing you should know about encryption is that the algorithm that is used to encrypt can be simple or more complex and that affects how securely what you have encrypted is protected.  Encryption systems have been broken when the method of encryption is understood by hackers and is easy to break.  


Why bother to encrypt my email?
It should be noted that email is far less secure than paper mail for two very good reasons:  first, electronic data can be accessed easily over an Internet and secondly, electronic data is really simple to copy. There is a very good chance that someone has snooped around in your email despite your best intentions to stop it.


How do I go about encrypting my email?
There are many programs out there that can help you encrypt your email.  A very popular one is PGP (Pretty Good Privacy) or its Gnu offshoot GPG.   


PGP (http://www.pgpi.org/) self-describes itself this way: This "is a program that gives your electronic mail something that it otherwise doesn't have: Privacy. It does this by encrypting your mail so that nobody but the intended person can read it. When encrypted, the message looks like a meaningless jumble of random characters. PGP has proven itself quite capable of resisting even the most sophisticated forms of analysis aimed at reading the encrypted text."


Why bother to encrypt my files?
The answer to this boils down to what you store on your computer.  If you have financial data with important information like social security numbers, email addresses, account numbers and passwords, then you open yourself up to losing very valuable information.  Most corporate Internet security employees will attest to the widespread theft of very valuable information. As long as you are connected to the Internet you are vulnerable.


How do I go about encrypting my files?
AxCrypt File Encryption Software  (http://axcrypt.sourceforge.net/) Self-described as "Free Personal Privacy and Security for Windows 98/ME/NT/2K/XP with AES-128 File Encryption, Compression and transparent Decrypt and Open in the original application."


By: iknowpedia.blogspot.com

How many spyware items are infecting your computer?



I just had, by mistake, a plug-in called Intelligent Explorer attach to my browser. What a nightmare!  I have another article on this topic, but this brings home a point.  Spyware or adware items are continually infecting computers. Most computers have no protection from them. Most frightening is the frequency of them.  From the InfosecWriters web site, "According to a 2004 survey by America Online and the National Cyber Security Alliance, 91% of users questioned were familiar with the term spyware. Only 53% believed their computers were infected, but a scan found that 80% of their PCs had some type of spyware installed on them."  It goes on to say,  "...The average number of spyware components per computer was 93 with one computer having well over a thousand."


What is Spyware?
Butte College  (www.bctv.butte.edu/support/spyware.html) offers this definition:


“The term ‘spyware’ is broadly defined as any program that gets into your computer without permission and hides in the background while it makes unwanted changes to your user experience.


Spyware is generally not designed to damage your computer. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.
At present, most spyware targets only the Windows operating system (Internet Explorer).”


To be fair, spyware can be harmless, for example tracking cookies don’t do much. While such things infringe on your privacy, they don't really harm anything. Others, however, are extremely dangerous.


So what do you do about it?
No spyware program seems to do everything, but there are a lot of goods solutions out there that can help. Here is a list of some of the top Spyware tools to look at:




1) Try Ad-Aware 6.0 Professional from LavaSoft (there is also a free version with less functionality)


2) Spybot Search & Destroy from PepiMK Software


3) Xoftspy form Pareto Logic


5) Spyware Guard from Javacool Software is a free program


4) Pest Patrol (now part of Computer Associates by acquisition)


5) McAfee Anti-Spyware


One thing is for certain: you do need to take spyware seriously.  For some reason, too many people out there think anti-virus solutions are the end-all solution. They are not.  


And, when all else fails?
Finally, as drastic as it seems,  if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.


By: iknowpedia.blogspot.com PLR Articles

Computer Viruses that Come a Calling

Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage.   New viruses are created daily.  This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.


Virus: Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.


Virus: W32.Beagle.CO@mm
A mass-mailing worm that lowers security settings.  It can delete security-related registry sub keys and may block access to security-related websites.


Virus: Backdoor.Zagaban
A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.


Virus: W32/Netsky-P
A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.


Virus: W32/Mytob-GH
A mass-mailing worm and IRC backdoor Trojan for the Windows platform.  Messages sent by this worm will have the subject chosen randomly from a list including titles such as:  Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.


Virus: W32/Mytob-EX
A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH.  W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.  This virus spreads by sending itself to email attachments harvested from your email addresses. 


Virus: W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
This family of worm variations possesses similar characteristics in terms of what they can do.   They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network.   Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).


Virus: Zafi-D
A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe.  It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension.  W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!". 


Virus: W32/Netsky-D
A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.


Virus: W32/Zafi-B
A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com.  A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)” 


iknowpedia.blogspot.com