Information Technology
Your PC and The Internet
Posted by cosmic • Filed under InformationTechnology, Internet
Your PC and the Internet
When a computer connects to a network and begins communicating with other computers, it is essentially taking a risk. Internet security involves the protection of a computer's internet account and files from intrusion of an unknown user.
Some apparently useful programs also contain features with hidden malicious intent. Such programs are known as Malware, Viruses, Trojans, Worms, Spyware and Bots.
* Malware is the most general name for any malicious software designed for example to infiltrate, spy on or damage a computer or other programmable device or system of sufficient complexity, such as a home or office computer system, network, mobile phone, PDA, automated device or robot. While it is sometimes software, it can also appear in the form of script or code.
* Viruses are programs which are able to replicate their structure or effect by integrating themselves or references to themselves, etc into existing files or structures on a penetrated computer. They usually also have a malicious or humorous payload designed to threaten or modify the actions or data of the host device or system without consent. For example by deleting, corrupting or otherwise hiding information from its owner.
* Trojans (Trojan Horses) are programs which may pretend to do one thing, but in reality steal information, alter it or cause other problems on a system such as a computer or programmable device. One of the most insidious types of Trojan horse is a program that claims to rid a computer of viruses but instead introduces viruses onto the computer. Trojans may also allow a hacker remote access to the computer system. Once a Trojan has been installed, the hacker can access the computer remotely and perform various operations.
* Worms are programs which are able to replicate themselves over a (possibly extensive) computer network, and also perform malicious acts that may ultimately affect a whole society/economy.
* Spyware includes programs that surreptitiously monitor keystrokes, or other activity on a computer system and report that information to others without consent. While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits, a history of visited sites, and user logins and passwords. Spyware can also interfere with user control of a computer in other ways, such as installing additional software or redirecting Web browsers. Some spyware can change computer settings, resulting in slow Internet connection speeds, loss of Internet connection, or functionality of other software. Sometimes, spyware is included along with genuine software, and may come from an official software vendor.
* Bots are programs that take over and use the resources of a computer system over a network without consent, and communicate those results to others who may control the Bots.
The above concepts overlap and they can obviously be combined. The terminology, along with the dangers involved, are constantly evolving.
Antivirus programs and Internet security programs are useful in protecting a computer or programmable device/system from malware.
Such programs are used to detect and usually eliminate viruses. Anti-virus software can be purchased or downloaded via the internet. Care should be taken in selecting anti-virus software, as some programs are not as effective as others in finding and eliminating viruses or malware.
When downloading anti-virus software from the Internet, one should be cautious as some websites say they are providing protection from viruses with their software, but are really trying to install malware on your computer by disguising it as something else.
We present a number of Free Utilities that can help you block, detect and remove unwanted script & software to enhance your internet experience. If you can not afford Internet Security Software, these alternatives will meet your requirements.
cosmic
Affiliates
- Australian Cyber Security Centre
Reporting Of Cyber Security Threats - JUSTHOST.COM
Top Class Web Hosting
IT Trivia
IBM's PS/2 Microcomputer
IBM's rollout of its PS/2 microcomputer came on two levels. The ads raved about the classy technical specs: a blazingly fast internal architecture, plug-and-play BIOS, keyboard and mouse interfaces that are still in use today (and are still called the PS/2 interface) and a floppy disk format (1.44M) that was so good it lasted as long as the technology."
The Advent of Windows 95
Without a doubt, Windows 95 reshaped the way the desktop looked and felt. When Windows 95 hit the market the metaphor for the desktop became standardized with the toolbar, start menu, desktop icons, and notification area. All other operating systems would begin to mimic this new de facto standard desktop."