Spyware, Adware and Virus Removal First Steps: Get Rid of Temporary Files

There are many software programs available designed to remove Viruses, Spyware, Adware and other nasties from your computer. Uneducated users simply run these programs in the mistaken belief that once they do, all is well.

For the best results, and to optimise computer performance and efficiency, it’s best to eliminate the many temporary files and temporary Internet files that build up on one’s hard disk over time.

Temporary Internet Files result simply from visiting web sites. Each web page usually consists of a number of individual elements, including one or more images. A typical business page is made from a large number of individual images, even if only a single image is visible when the page is fully loaded. Each of these images is stored on your hard disk in the Temporary Internet Files folder, also known as the Internet Cache”. Other elements such as cookies and multimedia files are also stored here. Particularly useful in the early days of the Internet when only dial-up accounts were available, the use of this cache idea helped speed up access to web pages on the second and subsequent visit. Because images and multimedia objects take a lot longer to download than text, once they were stored in a local cache, they would be displayed directly from the hard disk, and didn’t need to be downloaded again. Web access was therefore a lot faster. There appears no way of automatically deleting these files, and so the number increases constantly.

Temporary Files appear for other reasons. In the course of normal operation by some programs, they require “working space” and will create one or more temporary files. When programs are installed, particularly from zipped or compressed files, they usually need a temporary storage area in which to store files during the installation process. It would make sense in both these cases, for the programs to delete the temporary files when finished. However, it seems that in a lot of cases, the obvious doesn’t happen.

Why should we care that we have all these unwanted files on our hard disks?

Firstly, they do take up disk space unnecessarily, and secondly they reduce the performance of our computers. But in the context of viruses, spyware, adware, malware and other nasties, there are two reasons why all these temporary files are unwanted.

Most of the “nasties” mentioned above, apart from viruses, infiltrate our computers whilst visiting websites. Objects downloaded from web sites sit on our hard disk in the Temporary Internet Files folder. Deleting these files, therefore, is the first step to eliminating nasties. Some viruses and nasties will install themselves, or a copy of themselves in the Temporary folder where no-one can find them. Have you ever run a virus or spyware scan only to find that the culprit comes right back afterwards? The other reason to delete these files … and there could be a great many of them over time … is to minimise the time the scanning software has to run by reducing the number of files it has to scan.

Fortunately, Windows gives us a simple method to delete these files.

Click on “Start” and “My Computer”. With the right mouse button, click on your primary hard disk, usually the C: drive, known in Windows XP as Local Disk (C:). In the menu that opens, click on the “Properties” selection at the bottom. The window that opens will display a graphically representation of your hard disk showing the total space, and the amount used and free. On the left is a button called “Disk Cleanup”. Press that button.

Windows will now check your hard disk and open another window showing how many temporary and temporary Internet files there are. If you click on “ok”, Windows will proceed to delete those files. It’s safe to do so. The recycle bin is also listed, and if you haven’t emptied it for a while, now is a good time to do so. Leave the other options unchecked.

Your virus scanning software and “anti-nasties” programs will now run more quickly, and in fact, you might find your whole computer seems faster and more responsive.

There is one limitation of the Windows built-in file cleaner though: it often doesn’t delete all files, and the only way of doing it is to manually delete them. That’ll be covered in a future article.

Spyware Remover – Protect Your Computer from Spyware

Spyware – this is one of the biggest threats to security and privacy in the internet today. Spyware intrude, break and enter our computers and pose a great threat especially with more malicious spywares. Leaving a home or business computer unprotected from spyware is just like leaving the front door open to intruders. The internet was not designed with security checks in place, that is why spywares have spread unchecked and now pose a big threat to the security and privacy of millions of internet users all over the world. Roughly 90% of computers today are infected or are vulnerable to spyware. It is more important more than ever to make sure spyware protection is in place in the form of spyware removers.

To combat spyware, it is important to understand what a spyware is. The term spyware covers a wide variety of malicious software that is designed to intercept or take partial control of the operation of a computer without the informed consent of the owner or user. The term spyware implies software that stealthily keeps an eye on the user; however, it has come to refer to software that undermines a computer’s operation without the owner or user knowing it. Spyware, adware and other malware will exploit the vulnerability of a computer usually for commercial purposes.

Spyware programs embed themselves into the computer and monitor the user’s internet browsing activities, spy on confidential information such as credit card info, send annoying pop-up advertisements and slow down your computer’s performance. Other consequences of spyware infestation include hijacked browsers resulting to reset home pages, changed search results, spam emails, toolbars added to the browser without consent and many more. In such cases, a spyware remover is necessary to clean up the system from all spyware programs and hidden malware.

A spyware remover is a necessary and worthwhile investment to keep any computer system free from spyware programs that could wreak havoc in it. Every computer must be well equipped to combat spyware and its effects. As the threat of spyware worsens, there is a variety of techniques available to counteract it. Spyware removers and other anti-spyware programs are available that help stem the threat of spywares. These spyware removers are designed to remove or block spyware. There are a number of spyware removers available, some are free while others require payment.

Some of the most popular spyware removers include Lavasoft’s Ad-Aware SE and Spybot – Search and Destroy. These spyware removers are effective tools for removing and intercepting spyware programs. Microsoft has also offered its own spyware remover dubbed Windows AntiSpyware Beta, which is currently released as a free download for users of Windows XP, Windows 2000 and 2003. Anti-virus firms have also introduced spyware remover functions in their respective products.

There are two ways in which a spyware remover can combat spyware. Real time protection prevents spyware from being installed. Scanning and removal inspects the contents of the computer’s files and removes files and entries, which match a list of known spywares. Most spyware removers today combine the two approaches. Spyware remover, just like anti-virus software require regular updates of its database of threats as new spyware programs are released all the time. The best spyware program protects the computer from any intrusive spyware and prevents it from being installed as well as keeps the system free from any trace of spyware programs.

Spyware Is Not the Only Malware Threat to Your Home Computer

Given the huge amount of press and industry attention to “Spyware” it is easy to forget there are other types of malicious software or “malware” out there. Viruses, Worms and Trojans are still being developed to steal your personal data or damage your computer. These malicious programs can be hidden in email attachments or files which are downloaded off the internet.

Most computer users are familiar with the term “computer virus.” A Virus is usually hidden within another program or executable file. A Virus can be relatively harmless, for example displaying a message or picture at a preset time. Others variants however can be incredibly destructive including erasing data from your hard drive, corrupting programs or stealing sensitive information like passwords or financial data.

One of the limitations with a Virus is that it cannot spread itself automatically. Unfortunately a “Worm” can, and it exists to replicate itself. It is a self-contained program which is usually embedded in an email attachment like a Microsoft Word document. The most notorious variants like the “ILOVEYOU” Worm in 2000 are spread using the e-mail address book on the infected user’s computer. It emails itself to the contacts in the address book without the user’s knowledge.

A Worm can cause extensive damage to both the computer and the network your computer uses. A Worm infection consumes network bandwidth as it sends itself out. For example, a widespread infection can dramatically slow or totally overload a corporate network. It can even slowdown the speed of the Internet itself!

A Worm can also carry a dangerous program. The most common type of program is a “backdoor” which given hidden access to your computer to the virus creator. Your computer then becomes a “Zombie” used to send out Spam e-mail or other computer viruses.
A Trojan masquerades itself as a legitimate program or file. For example, you may think that you are downloading a MP3 music file but when the file is loaded a virus is installed on your system. Once installed onto the user’s computer it can have the same impact as a Virus.

Here are some common symptoms of infection by any of they types of malware:
– Unexplained crashes
– Strange program error messages
– Computer freezes
– Poor computer performance
– Angry emails from people you have “spammed” or unknowingly sent a virus (sign that your computer is a possible “Zombie”).

Here are some steps you can take to help prevent infection:
– Make sure you are receiving the latest Windows XP updates. It is highly recommended that you receive these updates automatically.
– Have a good firewall installed – ideally you want to have an application which filters both “inbound” and “outbound” internet traffic.
– Delete and do not open any email with an attachment from anyone you do not know.
– Install an anti virus program and keep the virus definitions up to date. Carry out a virus scan a least once a week. Always scan email attachments if you are planning on opening them.
– Use a Spam Filter to stop dangerous email getting onto your computer in the first place.

Spyware – Know Your Enemy

Spyware is a term that has become quite common to hear.

The term spyware refers to a broad category of malicious software designed to intercept or take partial control of a computer’s operation without the “known” consent of that machine’s owner or user. Spyware is as a term is being used quite loosely and includes a number of different programs. The thing they all have in common as spyware, is that they monitor the computer and/or user and share information with a third party. With or without the consent of the computer’s owner.

Semi spyware has become widely used and they manifest themselves as software, plugins or help files to other programs you want or need, and if you accept their policies and term of usage, you also accept the fact that these semi spyware programs will be installed and used.

They are normally not directly malicious as the secret spyware, but they do send out information from your computer to a third party. Most commonly some kind of habit tracing or statistics of surfing or similar. In most cases the information is completely anonymous and do not pose any kind of threat to you as an individual.

Spyware – a virus or not?

Spyware differs from viruses and worms in that it does not usually self-replicate. Like many recent viruses, however, spyware – by design – exploits infected computers for commercial gain.

Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements; theft of personal information (including financial information such as credit card numbers); monitoring of Web-browsing activity for marketing purposes; or routing of HTTP requests to advertising sites.

These things are very hard to keep track of and know if a spyware is alive in your computer or if pop ups and other changes in your surfing programs behaviour should occur.

The only reliable way to know if an evil spyware is living and thriving inside your computer, is to install and use a good spyware removal program.

How does spyware infect?

Spyware does not spread like a computer virus or worm. Instead, spyware installs on your computer through deception or exploitation of software vulnerabilities.

Spyware Trojan horse!

A Trojan horse, by definition, smuggles in something dangerous in the guise of something desirable. So spyware often hide as an add on to some other program you really want.

Bundled Spyware

Spyware can also come bundled with shareware or other downloadable software, as well as music CDs. The user downloads a program (for instance, a music program or a file-trading utility) and installs it, and the installer additionally installs the spyware. Although the desirable software itself may do no harm, the bundled spyware does.

Manipulating Security Features

Another way of distributing spyware involves tricking users by manipulating security features designed to prevent unwanted installations. Internet browsers like Internet Explorer for example are easy targets t this method. Everybody has them and use them online almost daily. The way you protect yourself against this, is to always keep your operating system up to date when it comes to security updates.

Use Microsoft Update regularly (and often).

Examples of Spyware

As with computer viruses, researchers give names to spyware programs which frequently do not relate to any names that the spyware-writers use. Researchers may group programs into “families” based not on shared program code, but on common behaviours, or by “following the money” or apparent financial or business connections.

For instance, a number of the spyware programs distributed by Claria are collectively known as “Gator”. Likewise, programs which are frequently installed together may be described as parts of the same spyware package, even if they function separately.

It is also important to know that different anti spyware program creators and big antivirus software creators may have different names for the save spyware. This can cause you to believe that you have 2 or more spyware products installed when you actually only have one, but mentioned with different names.

* CoolWebSearch, a group of programs, installs through the exploitation of Internet Explorer vulnerabilities. The programs direct traffic to advertisements on Web sites including coolwebsearch. To make this happen, they display pop-up ads, rewrite search engine results, and alter the infected computer’s hosts file to direct DNS lookups to these sites.

* Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites.

* 180 Solutions transmits extensive information to advertisers about the Web sites which users visit. It also alters HTTP requests for affiliate advertisements linked from a Web site, so that the advertisements make unearned profit for the 180 Solutions company. It opens pop-up ads that cover over the Web sites of competing companies.

Toolbars from any other then the big players like Google, Yahoo, Msn and similar very often contains spyware to some degree today.

And even the big guns have started to incorporate “spyware like” statistics gather from their toolbars. They do tell you about them, and ask for your permission to install or active these routines. But they often do it in such a convoluted way, no one actually understand it.

So start out the day by cleaning your computer and then working. Make sure you have a restful safe day, download, scan and clean your computer from any spyware today …

Spyware – Eradicate It Now

Spyware removal has become a tedious work. As the spyware threat has worsened, a number of techniques have emerged to counteract it. Among these are

• programs designed to remove or to block spyware
• educating the users in such a way that spyware removal no longer is needed
• user practices which reduce the chance of getting spyware on a system.

Spyware remains a costly problem even with all new technology used to combat them. If a large number of spyware programs have infected a Windows computer, the only way to save the computer may be to back up user data, and fully reinstalling the operating system.

Anti-spyware programs

One of the markets most popular anti-spyware programs, Adwarealert will help you find and ultimately rid your computer of unwanted spyware software.

Many programmers and some commercial firms have released products designed to remove or block spyware. Steve Gibson’s OptOut, , practially invented a growing category. Programs such as,

• Adwarealert
• Lavasoft’s Ad-Aware SE
• Patrick Kolla’s Spybot – Search & Destroy

rapidly gained popularity as effective tools to remove, and in some cases intercept, spyware programs.

Recently Microsoft bought the GIANT Anti-Spyware software, renaming it as Windows AntiSpyware beta and releasing it as a free download for Windows XP, Windows 2000, and Windows 2003 users. The renamed software for now exists as a time-limited beta test product that will expire at the end of July 2006. Microsoft is continuously developing and updating this product.

Antispyware protection, removal and antivirus

Major anti-virus firms such as Symantec, McAfee and Sophos have come later to the table, adding anti-spyware features to their existing anti-virus products.

In the beginning, anti-virus firms did not want to add anti-spyware functions, citing lawsuits brought by spyware authors against the authors of web sites and programs which described their products as “spyware”.

However, recent versions of these major firm’s home and business anti-virus products do include anti-spyware functions. The spyware is treated differently from viruses though.

Symantec Anti-Virus, for instance, categorizes spyware programs as “extended threats” and now offers real-time protection from them (as it does for viruses). The drawback with these programs is that they are very complex and in many cases produce more hurdles to jump over then you as a user really need.

Like most anti-virus software, anti-spyware software requires a frequently-updated database of threats. As new spyware programs are released, anti-spyware developers discover and evaluate them, making “signatures” or “definitions” which allow the software to detect and remove the spyware.

If a spyware program is not blocked and manages to get itself installed, it may resist attempts to terminate or uninstall it. Some programs work together: when an anti-spyware scanner (or the user) terminates one running process, the other one starts up the killed program again, making it virtually impossible to clean the computer.

Some spyware will detect attempts to remove registry keys during the spyware removal and immediately add them again. Usually, booting the infected computer in safe mode allows an anti-spyware program a better chance of removing persistent spyware.

The most extreme way of cleaning is to move the hard drive to another computer, boot on the normal boot disk that computer has, and then clean the infected disk. You can also mount the infected disk over the local network and scan & clean it to remove as much spyware as possible.

It doesn’t matter what way you choose to clean your computer, but using a good spyware removal program will make your life much easier …

Secure Your Computer From Viruses And Spyware For Free

One of the hazards of using a computer online today is the danger of infestation with a variety of malware, viruses, trojan horses, spyware, zombieware, worms, loggers, dialers – no matter what you’re infected with, it carries the dangers of:

– Reduced performance
– Unwanted emailing
– Damage to your data, or even to your bios (which means your computer is toast)
– Theft of your data, up to and including all your personal information

When malware is released in a large network, the results can be even worse, with mass infections causing shutdowns of entire systems, theft of corporate data, and revenue loss that can rise into the millions.

Fortunately, a few free programs and sensible use of your computer can prevent these nasty things from happening to your computer.

Virus Protection

Install a decent virus protection software. You can download AVG Anti-Virus Free edition which is free for personal use, and ensure it’s constantly updated.

AVG is easy to use, takes very few system resources, provides rapid virus database updates, and other great features like Automatic updates, E-mail Scanner etc.

And has excellent technical help available which other free antivirus software’s lack.

Firewall Protection

If your OS is Windows XP, a default firewall comes with it, but you may be better off downloading another free firewall and using it since the Windows firewall has been shown to have some of the same security holes as IE and Windows. That doesn’t mean the Windows firewall is bad, it just means that using software developed by different teams of developers will protect you better.

ZoneAlarm is a great free software for home users. It has got all the features a home user needs. Has simple interface, is easy to use and customize, works with little or no configuration.

Spyware Protection

You should also keep good anti-spyware software on your computer. Spybot – Search and Destroy is one of many good examples of these, and it’s free. Be wary of anti-spyware programs that advertise via pop-ups; these “anti-spyware” programs sometimes contain some of the same problems they supposedly protect you from!

Spybot S&D is one of the best free Anti-Spyware software, I have been using it for last couple of years. Spybot is great at keeping spyware out of the systems. The program has an easy to use interface, very user friendly system. The program takes out cookies, spyware, ads, and many other things you do not want it.

Apart from Spyware removal Spybot has other Advanced tools like:

– Secure Shredder – Securely remove files you no longer want from your hard disk.
– BHOs – Show and manage the Browser Helper Objects from your Internet Explorer
– IE tweaks – Modify some hidden Internet Explorer settings.
– Hosts File – Take a look at your hosts list.
– System Internals – Search for registry inconsistencies
– System Startup – Show and manage the applications that your machine will run on System Startup.
– Uninstall info – Show all registered software uninstall entries

Sensible Personal Precautions

Most viruses come from your email. This cannot be overemphasized. Never open an email attachment that you weren’t expecting; always check with the person who emailed it to you, through a phone call or just via email or chat, to make certain it is a real attachment that’s safe to open.

Other viruses come from illegal and legal downloads. If you’re downloading illegal software or data, you can expect to find viruses in a pretty high percentage of it. What’s tragic is that a lot of illegal viruses creep into legal download sites. This is why you need to maintain your virus protection program in an up-to-date manner, even when you’re careful about downloads.

A few viruses are attached to web pages. Though their servers generally shut them down as soon as they’re found, or your server blocks the sites to protect you, you’ll find a few viruses that download to your computer simply by visiting a site. You can protect yourself by maintaining the Internet Explorer security settings at a medium level or higher, or by using alternate browsers like Firefox with good security.

Spyware often comes from “free” programs. You’ve seen those cool screen-savers for free? Spyware. Try to download free programs from places that vet their software carefully.

With these three software’s (available for download at syschat.com) installed and some personal precautions your computer should be spyware and virus free.

Recent studies show that 9 out of 10 PCs are infected with Spyware

Spy Sweeper named PC Magazine’s Best of the Year 2004 for
antispyware

The very best AntiSpy program on the market –

Webroot Spy Sweeper. Webroot Spy Sweeper was named best
spyware remover 2004 by PC magazine and praised for it’s
efficiency, speed and userfriendlyness.

Spyware and malware are large problems for Internet users today
and can be both annoying and a real threat to you and your
computer. There exist a number of different spy and malware of
which some are relatively friendly and only spies on your surfing
habits, while others like the Trojans can be used to corrupt your
hard drive or steal your usernames and passwords. A Trojan can
even be used to steal your identity by extracting all necessary
information from your computer.

You may think that ad ware might not be that bad, that it is good if
the ads are chosen to fit your interests. This might be true if the
spy ware didn’t have a number of other negative effects, such as
an increased amount of pop up ads, unexplained home page
changes, strange results when searching the web and the fact
that your computer are being slowed down by the spy wares.
These are all very common results and symptoms of spyware and
ad ware. More unusual problems connected with spyware and
Trojans are the corruption of the hard drive, the loss and exposure
of private information and login information and in a worst case
scenario, the theft of the identity of the owner of an infected
computer.

Spyware is a large treat to the security of your online privacy.

There are however steps that you can take to avoid suffering the
negative effects that spy- and ad ware can bring, and start
protecting you computer and building an Identity Theft Protection.
The first of these steps are to get a good antispyware and
antiadware program able to remove spyware. There are a number
of different spyware removers available and two of the most well
known might be Ad Aware and Spybot which are both good
programs. The best available program that is designed to remove
spyware and adware is however at the moment SpySweeper
which was chosen as the best spyware remover 2004 by PC
magazine.

Spy Sweeper can scan your computer 30% faster then other
available products and successfully remove spyware like
CoolWebSearch. Spy Sweeper also uses a system monitor that
automatically discovers spy ware and prevents installation of
spyware on our computer. Spy sweeper is effective for spyware
and adware removal.

The active shield uses System Monitoring to in real time prevent
new spy- and adware programs from being installed on your
computer. This fact combined with the fact that Spy Sweepers
uses a constantly updated database of all available spy- and ad
wares means that this adware remover can clean your computer,
ridding it of any and all spy- and ad ware. Once it has cleaned your
computer it can keep it clean and assure that your computer stays
clean from ad- and spy ware.

By keeping your computer free from spyware and adware Spy
Sweepers also protects your information and keeps your identity
safe. Spy Sweepers prompts you to update it if it has been to long
since it was last updated.

If spy sweeper finds a spyware it will immediately quarantine the
spyware and disable the spy wares functionality until you can
decide whether to delete the file or try to clean the file from
spyware elements and return the file to its original place on your
hard drive.

If you have a problem with Spy Sweeper despite its highly user
friendly and automated design you will have access to an excellent
customer support where experts answers any question you might
have.

Spy Sweepers deserved the title PC Magazine’s Best of the Year
2004 since it can do everything the alternatives can do, but better
as well as faster then the alternatives.

Protecting Yourself From Spyware

If you practice diligence and follow some basic rules then you will have a much better chance of preventing the ability of a malware application from infecting your computer. Most computer spyware today is installed without your knowledge when you visit a website or download an application that will place the application on your hard drive. So one way to prevent the installation by not visiting unscrupulous web sites when you surf the web.

There has been a strong increase in the number of computer malware / spyware out on the net the past few years. Many experts in the field expect the number of infections to only increase as time goes along. Spyware are actually programs that are installed on your computer but you usually do not know of the installation and many times you did not even approve the installation. These programs can cause all types of problems for your computing experience, which range from annoying popups to someone actually stealing your personal data and impersonating your identity. You may also experience a reduction in performance of your system, since many times these programs will consume a lot of computing power as the program performs its tasks. Even though the number of computer spyware infections are increasing exponentially does not mean all is lost and you should just throw your hands up and turn off your computer forever.
Since most spyware is installed because of security holes in your browser always ensure you have the latest version of updates for your Operating System and Browser. You can also switch your Web Browser to something like FireFox which is targeted less than the more popular Browsers.

Also ensure you have a spyware protection and remover application installed. This is one of the most important items you can do to protect yourself from these infections and help to minimize the chance that you will be come infected with these types of applications.

Its About Time You Looked Into Spyware Removal

If you are like most people you don’t yet have spyware removal capabilities. You are doing more and more on the internet and you are starting to enjoy the ease and convenience of the increasing amount of services that you can receive in the comfort of your own home. You have also probably heard of viruses and malware like spyware and adware and you may have even gotten antivirus software thinking that this will protect your computer so that you can have peace of mind and continue to enjoy the internet for all of its great qualities.

Well that is great but I want to warn you that all antivirus software is not as comprehensive as it claims to be. That is it will protect your computer from internet borne viruses and probably worms but it often does not protect you from the spiders of spyware and adware. You may need to get something to perform spyware removal as well.

So what is the big deal anyway? What does spyware do that is so bad? Well let me explain. Spyware is just what its name tells you, software that spies. It is created by internet deviants as well as some companies that you would otherwise think are upstanding to crawl your computer and gain information. The reason you need spyware removal is that the information could be things like usernames and passwords to different accounts including banks and other money user accounts which is obviously a security threat to your livelihood and are mostly sought by deviants looking to steal identities. However the information may be more subtle than that including your internet browsing and search histories, or purchase records, or email addresses. All things that are less threatening but sometimes very private information that may help them to target you in future sales.

How does it do this? Well there are many ways and most of them are very clever and designed to be undetectable by the typical internet surfer. They gain access to your hard drive through a variety of methods which are often unknowingly allowed by user “click-throughs.” They then insert code at various spots on your computer often in your computer registry. This code not only causes unwanted export of information but also can clog up your registry causing your computer to slow down, freeze, or otherwise not run as smoothly. So go get yourself equipped for spyware removal and be safe!

From Spyware with love

Its late. You’ve been scouring the web for that perfect present for your Aunt Bess in Idaho. You finally find it at presents4aunties.com. The site looks a little rough on the edges, weird colors and such. But they have that gift you know will make Aunt Bess add you to her will. You purchase the gift, log off and head to bed. Tired but happy.

The next day, coffee in hand, you turn on your computer. That’s strange you say, its awfully slow this morning. Finally its booted and ready to go. You open your browser to check the Cow Tipping Blog for the latest posts.
What’s this you say, My Homepage is now longer the Log , but a site trying to sell me a DVD of the Surfs vs the Terminator!
Oh well you say, not quite fully awake. You type in the URL for your Log and wait. And wait, and wait. Finally its up! You start to read the mornings postings. You’re into the second post about the upcoming Cow Tipping Championship in Vegas when a Popup appears and says you need to go to heartburn.com for the new revolutionary cure for heartburn. Click here now it says and receive a free gift, the secret cure for Baldness!

Weird you think, you click the X to close it.

You don’t realize by clicking the X that a small hidden piece of code has just been downloaded to your computer.
You finish the Log postings and decide to check your Bank Account. You type in the URL and wait, and wait. Finally the Bank Logon appears. You log in, completely unaware of the code, which is actually a Key logger, is recording your every keystroke. The Transaction is there for Aunties gift, you’re so happy. You log off and remember you forgot to email that document for your Boss. That’s ok you say, I can log in from here and send it! Technology is so great ! You log into your work portal and access your email program, find the document, attach it to the email form and send it. You vaguely remember it had something to do with the updated personal info list for all of the employees at your job. It includes their Addresses, email addresses and Direct Deposit Account numbers, also their Logon Names and Passwords to access the Computers at work.

Darn you say as another Popup appears, what’s wrong with this computer?

Well at least you didn’t forget the Bosses Document. Wouldn’t want to get in trouble with the Boss. You’ve a great job, working for the Trans Global Bank after all. Offices all over the world don’t you know.

Well time to check your Anti-Virus program for updates. Hmm it says no updates kneed ed . You notice the Misspelling but what the heck, those things happen. Gee the computer is really slow! You decide to reboot, hoping that will fix it. Gripes, now it wont even boot! At least there’s a little extra money in the ole Bank Account to get it fixed.

The above is fiction. No animals were harmed. But its scary huh to think it could happen.
Granted it’s a worse case scenario, but I wonder…

Be smart out there people, learn how to use your Anti-Virus and Anti-Spyware programs. Keep em updated, and it they don’t work well for your surfing habits, find programs that will. Keep your computer protected, your well being may depend on it.