Monday, August 6, 2007

Adware, Malware and Spyware

Adware, Malware and Spyware

Adware, Malware, Spyware, Firmware, Software, Hardware, every kind of “ware” except your underware!! You may be “aware” of these terms and what they mean, or you may not. If not, you need to have some basic understanding of them. Let’s get started by going over the definition of them as they appear on the Wikipedia website:

“Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.”

“Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. It is a portmanteau of the words "malicious" and "software". The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.”

“Many normal computer users are however still unfamiliar with the term, and most never use it. Instead, "(computer) virus" is used in common parlance and often in the general media to describe all kinds of malware. Another term that has been recently coined for malware is badware, perhaps due to the anti-malware initiative Stopbadware or corruption of the term "malware".

Software is considered malware based on the perceived intent of the creator rather than any particular features. It includes computer viruses, worms, trojan horses, spyware, dishonest adware, and other malicious and unwanted software. In law, malware is sometimes known as a computer contaminant, for instance in the legal codes of California, West Virginia, and several other U.S. states.

Malware should not be confused with defective software, that is, software which has a legitimate purpose but contains harmful bugs.”

“Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, or diverting advertising revenue to a third party.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.”

Now that you’ve familiarized yourself with the foregoing, you should have a basic understanding of these terms and what they mean. Bottom line, you want to “distance yourself” (protect your computer/files) from these “viruses” as much as possible. There are many different companies offering a wide array of products to assist you in doing this. Some of them are free, and some costs a few bucks! The choice is yours on which one you choose, but don’t just take any one’s word for what/which one to use – do some research on the net. There’s many very respectable sites that do in-depth reviews of different products offered.

Hope this has been of some value to you, and drop back by in a few days for a discussion on safety on the Internet for your children. Until then, may your days be filled with smiles and sunshine!

Wednesday, July 4, 2007

WEB BROWSERS

BROWSERS

There are several types of Internet Web Browsers that people use to surf the web. The one you use can be based on several personal preferences. Of course, it also can depend on the type device (i.e, personal PC, IPod, etc.) you are using it on.

For those of you that are not sure what a “web browser” is, here is a definition from Wikipedia the free encyclopedia:

A Web browser is a software application that enables a user to display and interact with text, images, and other information typically located on a Web page at a website on the World Wide Web or a local area network. Text and images on a Web page can contain hyperlinks to other Web pages at the same or different website. Web browsers allow a user to quickly and easily access information provided on many Web pages at many websites by traversing these links. Web browsers format HTML information for display, so the appearance of a Web page may differ between browsers.”

(the full description for the above can be found at: http://en.wikipedia.org/wiki/Web_browser )

If you’d like to find out information concerning the various web browsers, you can click on the following link where I searched on Google using the search term “Web Browsers”:

GOOGLE SEARCH

If you went to the Wikipedia site above, you may have noticed the ratings on percent of people using the different browsers. Internet Explore being the top rated one. I personally don’t like, and don’t use IE. I have used Mozilla Firefox for the last couple of years, and am very pleased with it. I feel there’s less of a security threat with it. It is a “open source” program and is free! Of course, like the saying goes “different strokes for different folks”!

Regardless of what web browser you use, BE SURE and either keep the original install disk for it that came with your computer in a safe place where you can put your hands on it, or back the install software up on a CD/jump drive, so if your browser gets corrupted (you can't surf with it) and the “Repair” option in Windows doesn’t fix it, you can easily reinstall and be off to the races, again. I’ve worked in the computer arena for years, and it is simply amazing how many people don’t take steps to safe guard their software! As the old adage goes, an ounce of prevention is worth a pound of cure.

Also, it is very important to take a little time once a week (or minimally, monthly) and back-up your computer system. I’m not talking about creating “restore” points, I’m talking about getting yourself a device (an external hard drive works really well, and doesn’t cost that much), and backing your entire system up! The first time you do it might take a while, but by using the option to only back-up files since the last back-up date, it will not take long and will be worth it if you have the bad luck of a hard drive failing!!! You don’t want to lose all your hard work!

Until next time, may your sails be full and the wind at your back!

BTW, to all you “Yanks” out there – HAPPY 4TH OF JULY!!!!!!

Tuesday, June 26, 2007

EMAIL

“You Got Mail”! Ah yes, what a great thing – sometimes!!!

If it is from family or friends, you look forward to seeing what they have to say, and what possibly they’ve sent you! BE AWARE – because they may have unintentionally just sent you something you (or they) didn’t expect – a virus embedded in a file!

Well, here’s what I do and if you think it might be worth it, you can do the same.

First of all, I DO NOT use my Windows Outlook Email to receive any email!! I simply open and read my email on my Internet Service Provider’s (ISP) web site. If per chance, you don’t want to use your ISP’s web mail, there’s plenty of ones out there that offer large (2Gig) free email accounts (i.e., Google, Yahoo, etc.).

If you think you need further security with you email correspondence (i.e., anonymity and encryption), there’s services that provide these. One that I’ve used in the past and was happy with their free service was Mailvault from MetroPipe Network Services. You can do a web search and find different providers of these services. Like anything, check them out good before opting to use them!

Back to email, itself! If you don’t recognize who it is from – delete it! No, you didn’t win the UK lottery without even entering it; you can’t help the poor soul from some far off country trying to claim and get to their lost money; nor, help some crooked banker out from so far off land trying to close an unclaimed account!

Also, if you insist on using an email client on your system (i.e., Outlook), DO NOT have the settings to where there is a “preview pane” opened. If you do, you’ve already “let loose” any malicious code contained in the email!

Here are some common extensions for email to pay attention to:

Should Be Allowed: .DOC .PDF .TXT .XLS .ZIP
Should Not Be Allowed: .BAT .COM .EXE .HLP .PIF .SCR

Last, but by no means least, be sure you have your system protected with some good software (see my previous post on this)! BTW, all the web based email providers that I’m aware of, provide this on their site(s).

Thursday, June 21, 2007

USER IDs and PASSWORDs

Obviously, how you generate, use and protect these on the Web is of vital importance! Let’s look at each of these areas, and possible approaches to each one.

Generating userids and passwords – first of all, you could invest in a random generator program, or simply do it yourself. I prefer the latter, seeing it only “costs” a little bit of your time.

The method I use is to open a blank word document. I set it up in a table format using the drop down menu at the top of the page, and the “Insert Table” option. You can use as many columns and rows as you desire.

Next in each cell/square, randomly type a combination of letters, numbers and special characters. Seeing passwords are generally case sensitive, use both upper and lower case letters.

Most password fields on web sites are 10 to 12 characters in length, so create some of each. I usually create about 50 rows of these in the advent that my list is stolen, it would take some effort to determine the right combination for use on any given site.

Next, I use the back ground high lighter tool on the menu bar in MS word to color code a random selection of the cells. I may, or may not, use the ones that I high light. I then take a pocket note book and record what userids and passwords I’m using for what web sites. Obviously, you then need to keep this in a safe and secure place. Here’s an example of what it looks like when completed:

3jicexet38+?

04562wimid

312prwi311

88459qirws

6318g#rjm2i

52me593mid

93mida3929

imide9354

ux4!9204q6e

Now, using a jump/thumb drive, which can be purchased for a few dollars depending on the features and storage capacity, I save my file of userids and passwords to it. I do not keep these on my system’s hard drive for security reasons (i.e., if I’m hacked, the list can’t be comprised very readily). A jump drive is also an easy way to back-up your other important files and documents, and offers great portability! You can now get them with multiple gigabits of storage capacity, and they easily plug into a usb port on your computer.

When accessing a site requiring your userid and password, you have three options for entering them:

- type them in using your regular keyboard (NOT good as a key stroke logger virus may have infected your computer and is recording your strokes);

- “type” them in using window’s virtual keyboard (you can find this by going to the Start menu, click on Programs, then Accessories, then Accessibility and On-screen Keyboard). This option eliminates the key stroke logger threat seeing you just click on the desired letter/number/character on the window’s on screen keyboard; or,

- copy and paste them from the list you’ve created above. I prefer this method as it saves time and eliminates typing mistakes.

o I MUST WARN you though, when copying and pasting, the last thing you have high lighted, right clicked on, and pasted is still in your windows Clipboard!! Be sure and copy something of no importance immediately afterwards so as not to leave sensitive info on the Clipboard, in case your system is hacked! You can also create a short cut to the clip board and go into it and delete any info on it.

In closing out this “tome”, be sure and change your web site(s) password regularly!!!

Wednesday, June 20, 2007

Firewalls

What can be said about firewalls? Ask 10 different people and you’re likely to get 10 different answers to which one is best!

There are many out there, and many are good (especially, if you’re talking to some one that is using the one you’re asking about!). To name just a few, there is Norton, ZoneAlarm, Kerio, Black Ice, OutPost, McAfee, and so on. I use to mainly use Norton, and have to say I had pretty good results with it. I have family and friends that have used some of the others, and of course swore by them!

Some of the forgoing may have a limited free version, or may not. Prices can be found, and write ups galore, by just using a search engine.

For the past year and a half, I’ve been using a totally free one – Avast. I am very pleased with it, and in conjunction with my hardware firewall (a Linksys router), I have had Zero problems!

I really like the fact Avast (btw, I’m not associated with them, other than using their product), offers 7 different types of protection (shields), and they constantly keep their virus package and program updated (using the auto update function eliminates the possibility of forgetting to do it yourself).

As I mentioned above, I also use a router as a hardware firewall, and for the price of approximately $30 dollars US I feel it is well worth it, even if you’re only running one PC in your home. You just plug it into the back of your modem and your PC(s) into it.

For clarification purposes here, I’m referring to a wired router, not a wireless. I’m waiting on security to catch up in the wireless world before I venture there. IMHO, it is to easy for any one with a few skills to tap into your wireless, and then into your network/PC(s)!

Hope you find this of some use and benefit! See you next time!

SECURITY TIPS

SECURITY TIPS
For The Novice (and not so Novice)
Computer User


Hi, and welcome to U-Dont-Know-Jack! If you have now read my Bio., you now know Jack (or know of me)!

First and foremost, I don’t profess to be any sort of “guru” on the topics I’m sharing with you. I simply would like to share with you a few tips that I have learned and use in an attempt to safe guard my computer and personal information on the Internet in order to give you something to think about (and possibly use yourself, if you see fit to).

BTW, if any one tells you that you can make yourself/your computer completely safe on the wild Web (other than disconnecting your computer), I’d like to hear how they do it!

I will provide you some tips/tricks on the following topics that I use, and which so far, have kept me and my data safe and sound:

  • Adware, Spyware, Malware, Etc.
  • Browers
  • Email
  • Userids and Passwords
  • Firewalls
  • Purchasing Online

When it comes to security and ways to safe guard your data/computer, you can go to great extremes (i.e., fingerprint/retina scanning) and expense, or you can find your own comfort level and costs. What I will share with you are some ways to keep the cost at a minimum, and still get a decent level of protection while doing so.

Purchasing Online

Purchasing online, or any other way except cash for that matter, is an opportunity for thieves to steal your identity, empty your credit card/bank account and bring utter chaos into your life. I would like to offer two ways that you can purchase online and limit your exposure to this. They are: virtual and prepaid credit cards.

You can use any of the search engines to find out who offers virtual credit cards. I prefer using a prepaid credit card. It has two distinct advantages over a virtual one. First and most importantly, you don’t have to furnish any personal information to purchase one from a retailer in your local area! Second, you can use it when going on a trip in place of your regular credit card, thereby guarding against the possibility of losing your regular one(s) and going through the hassle of canceling and replacing it. Of course, both have the advantage of the fact that your exposure to loss is limited to the amount you have on the card.

Hope you have found the foregoing of some value and use! Until next time, happy surfing!








Google