Thursday, November 29, 2007

Beating Adware, The Sneakiest Software

Promoters of adware, software that shows advertising on a user`s computer, use some cunning tricks to get you to install their software on your machine. Here`s what to look out for.Adware is, by definition, something reasonable people don`t want on their computers. That`s why malware can`t just come out and ask people to install it. Often, the computer owner is completely unaware of it being installed. But not always.When adware doesn`t want to sneak in through an open window, it will try to trick you into letting it in through the front door. Don`t think you could be tricked? Don`t be so sure until you`ve checked out these most common ways people have been tricked into allowing malware to be installed on their machines.Adware Installation Trick 1: Piggybacking• How it works: malware may come bundled with a legitimate piece of software the user actually wants, such as a game or emoticon. The malware is merely labeled `companion software,` without any indication of what it will do.• How to fight it: be very suspicious of any software that comes bundled with other software. Don`t installed software that comes bundled with other software unless you know everything that the bundled software does. After all, if the bundled program has anything to do with the program you actually want, why couldn`t the software developer just get both programs` functionalities into a single piece of software? Software developers are now very sensitive to malware concerns and will provide a lengthy explanation of just why the bundled software is necessary, in the cases when they actually do need to use bundled software.Adware Installation Trick 2: Bait and Switch• How it works: since people are getting more and more suspicious of bundled software, the malware`s developers may simply label it as valuable software, for instance, a browser plugin that supposedly accelerates web browsing (but in reality only shows ads).• How to fight it: again, a suspicious mind is useful in avoiding malware. Ask yourself some questions:o What will this software actually do? Malware often comes with very fuzzy claims attached. Sure, it says it will improve your browsing experience, but how? Often, this improved browsing experience just means a browsing experience with more advertising.o If the software is so great, why is it being given away free? Most commonly, software is only given out free in two cases: if it`s OpenSource (designed by a community of developers and not proprietary--OpenSource software is always clearly labeled as such); or simply a come-on for a fuller-featured version of the software. If neither case is true, there`s a real chance the software is financed by adware.Adware Installation Trick 3: Outright Lying• How it works: malware may even be labeled as something else entirely, such as a well-known piece of software or a crucial component of the computer operating system.• How to fight it: this is the trickiest malware of all, and requires extreme caution. You don`t want to start deleting any of your program files, much less your system registry entries, unless you`re absolutely sure it`s malware. Plenty of overzealous parasite hunters have shot their own machines to bits this way. This is one case where you want to be using an anti-spyware program, and preferably a second anti-spyware program to provide a second opinion.Getting Rid of AdwareAdware is so tricky that trying to uninstall it by yourself could be like a trip into the Matrix. Luckily, there are good anti-spyware programs that tackle adware as well--after all many adware programs are also spyware since they monitor your internet usage.True, it may feel like adding insult to injury to have to install more software to get rid of software you never meant to install in the first place. But sometimes you just have to fight fire with fire.
By: Joel Walsh
Source: http://www.spyware-refuge.com?%20adware%20protection

Wednesday, November 28, 2007

Antivirus Software – Get The Bugs Before They Get You!

You turn on your computer, and it doesn’t look quite right. Maybe your icons have changed, or the background picture is wrong. Some options are disabled. Even worse, you may not be able to boot your computer up at all. Guess what – it’s probably got a virus.In today’s online world, protecting your computer from all the nasty things online is vital. Viruses can cause obvious issues, as described above, but they can also run silently in the background, propagating themselves across your computer and transferring on to the computers of people you know. Mostly, you only know you have a virus when substantial damage has already been done.Some common signs of a virus include:-Programs working erratically-Computer locks up-Greyed out options-The browser home page has changed-Icons have changed-Difficulties starting up the computerThere is a solution! Antivirus software is readily available, and the good ones are very efficient at dealing with viruses in all their many and varied mutations. Basically, if you’re online, you need this type of software.So which one do you choose? For starters, be careful of using something free off the internet, particularly if it’s one you’ve never heard of. Sometimes these programs are a way of implanting more viruses on your computer. Some of the better known brands give you the option of doing a free scan online, which is useful, but not a long term solution.It’s really important to choose well-known antivirus software. Ask friends, or someone computer savvy, for their recommendations. It may be worth visiting a computer store and buying it there, rather than online – after all, if they’ve gone to the trouble of stocking it, it’s most likely an established and trusted product.There are plenty of good brands available, far too numerous to list here, but some of the best known are from McAfee, Norton and Trend. Check out the support available to you – can you contact someone if you have trouble installing the software?Most importantly, make sure there’s an easy way to update the software on a regular basis (preferably as part of the purchase cost!). For example, my antivirus software pops up a little box every time an upgrade is available. I click okay, and it’s automatically downloaded to my computer. Viruses change and develop at an alarming rate, so it’s vital to keep your antivirus software up to date.Finally, the all-important backup! The word “backup” tends to produce the same glassy eyed response as the word “budget”, but it really is an essential part of being online. Regularly backup your important files to CD or DVD. If you’re a business user, an automated and frequent backup process is vital. Once a virus has destroyed your computer, it’s too late.Being online is wonderful, but don’t let it become a nightmare. Antivirus software will play a vital role in keeping your online experience a positive one.
By : Felicity Walker
Source : http://www.media13.com

Tuesday, November 27, 2007

Computer Tips

Computer errors are very common and every computer user may face different kinds of issues so they should learn about the solutions of the common computer related problems. The common factors that cause problems in computer are viruses, spyware, Trojan horses, adware, corrupted registry, faulty hardware, low memory, low capacity hard disk, low CPU speed and stuffing computers with large number of software applications. In this article, I have compiled a list of the most common computer problems and their solutions.Computer is very slowThis is very common issue and it arises due to the several factors such as too many programs running at the startup, low RAM, low processor speed, spyware running as a background application, errors in the Windows registry and the buildup of the garbage files on the hard disk. Scanning your computer with an up-to-dated anti virus and anti spyware program, cleaning and repairing Windows registry, increasing memory, deleting temporary files, deselecting the programs at startup and uninstalling unwanted software applications can solve this problem to a very large extent. Network Server is not accessibleIn a networked environment every computer depends on the server for logon authentication, files access, internet and printing access and sharing server resources. The downtime and the communication failure with the server are very problematic and frustrating for the users. Check both end of the network cable and make sure that the attached RJ-45 connectors are properly plugged into the LAN card and hub/switch. Ping the server’s IP and make sure you get the reply from server. Ensure that your server is on and working fine. A large number of the running applications on the server and simultaneous access to the server from a number of users can slow down the performance and speed of the server. Scan your PC with an up-to-dated antivirus program because certain viruses and spyware are responsible for the communication failure. Replace your LAN card with new one and assign different IP address and try to connect with the server. Computer locks up or freezesMissing .dll files, viruses, faulty registry, defective RAM and spyware slows down the performance of the server and it locks up frequently. Scanning PC with the anti virus and anti spyware program, cleaning and repairing registry and increasing RAM can solve this issue.Computer won’t bootFaulty power cable, power extension and power supply all contributes to this problem. Checking one by one each of the above components can pinpoint the problematic part. Simply replace that part with new one and your compute is okay.Computer reboots itselfDefective cooling fan, power supply, RAM, viruses and spyware can cause this to happen. Memory usage is maximum in computerEither the memory is less than the recommend memory to run certain applications, swap memory chips with each other, scan your computer for viruses and spyware, increasing the page file and physical memory can overcome this problem.Browser’s home page has changed itselfThis is most likely a spyware problem and scanning computer with an up-to-dated anti spyware program can fix this issue.Computer’s clock losing timeIf you see that your computer’s clock is losing time frequently replace your CMOS battery. My computer can’t get connected to internetCheck IP address, gateway address, scan your PC for viruses and spyware, check network cables and make sure that server’s or gateway’s firewall application is not blocking http requests from your PC.Computer making noisesFaulty RAM, VGA, hard disk, Sound card, Processor and other components produce noises. Make sure that each hardware device is properly connected inside the PC and if the problem is still not resolved then replace the faulty hardware component with new one.
By B Bashir
Article Source: http://www.Free-Articles-Zone.com

How to Remove Spyware

Introduction to SpywareSpyware is a software program that stealthily collects information about the user’s activities on the computer and reports back to the spyware software creator. The most common sources of the spyware are files sharing programs, online gaming, screens savers and downloading software from insecure websites. Once spyware are enters the computer they change the behavior of the computer. A spyware can be installed in a computer by different ways. Sometimes it can be installed with the popular shareware programs. A spyware infected computer may show following changes.Symptoms of Spyware• Web browser’s home page is changed automatically.• New toolbars are installed.• Antivirus and Anti spyware programs frequently complains that your system is infected with the spyware, malware or Trojan horses.• It takes a long time to start or resume your computer programs.• Excessive pop-up ads are installed in the computer automatically.• Computer becomes very slow to response and internet connectivity also takes time.• Unwanted search results appear when you search something.• New desktop shortcuts are created.• If your system is infected with spyware then you may notice bounced back emails or emails being sent without your knowledge.• Keyboard loggers can capture the password and user name and send back to the spyware software creator.How to Remove SpywareA spyware program is very different in behavior and symptoms from the viruses. Following are some of the programs that help you manage detect, remove and protect your system from the spyware.Panda Security SuiteTrend Micro Anti spyware programZone Alarm ProMcAfee Antivirus + Anti spyware programPest PatrolSpyblockerSpycopAdditionally from the following spyware resources you can check if your system is infected with the spyware.http://www.spychecker.com/http://www.tom-cat.com/spybase/spylist.htmlhttp://www.infoforce.qc.ca/spyware/PreventionWith some preventive measures you can protect your system from being infected from the spyware, malware, adware and keyloggers. These safety tips include safe emailing, safe surfing, securing browser’s settings, using spyware detection and prevention software, blocking pop-up ads, blocking files sharing applications and regularly scanning your computer with the anti spyware and antivirus software programs.
By B Bashir
Article Source: http://www.Free-Articles-Zone.com

Monday, November 26, 2007

The Importance Of Proper Security For Your PC

The world online can be a scary place and sometimes it can get downright nasty. From viruses and spyware to internet identity theft, the information stored on your computer is under constant assault and should be protected at all costs. Why? Unscrupulous hackers will stop at nothing to get your precious personal information, and you have to stay one step ahead of them to ensure that they don’t. Let’s begin our search for the reason why we should protect our PCs with the proper security by looking at the ways that they can be assaulted online. Here are just a few of the nasty things waiting for an unprotected PC online: · Computer viruses are PC software programs that you accidentally download to your computer through an email attachment or other type of download. Once installed on your computer, a virus can interfere with your PC’s operation; record, corrupt or delete data; and spread itself to other computers through your network or the internet. · Identity theft occurs when some unscrupulous internet hacker, thief or otherwise bad guy gets a hold of your personal information such as your social security number, date of birth or other sensitive information and uses it to commit fraud or other crimes. Once obtained, this information is used to commit a wide variety of crimes. Those crimes include: credit card fraud, utilities fraud, banking and loan fraud, employment fraud, social security fraud, tax return fraud, medical fraud, securities and investment fraud, bankruptcy fraud, and immigration and government documentation fraud.· Spyware are software programs that you download onto your computer along with many other software applications. This software is then used to track your online browsing habits so that you can be “hit” with pop ups that you will be more likely to respond to. Not only is this software an invasion of your privacy, it also can compromise your data and affect your PCs performance.How to Protect Your PCThe number one thing that you can do to protect your PC is to have an operable firewall. A firewall can help protect your computer against security attacks. While most operating systems come with a firewall already in operation, you can update your firewall or get one for free if you don’t have one from most PC security software companies. In order to get the best PC security that software can provide, it is recommended that you use anti-spyware and anti-virus software in addition to a firewall. All of these anti-software and filters prevent hackers from accessing our personal information stored on our computers. They also protect against programs and viruses that we can unknowingly download. Once installed on our computer, these programs can direct us or our information to sites set on thievery. More Protection for Your PCEven though all of the above mentioned software applications go a long way in protecting your PC from harm, you may want additional protection to ensure that your PC’s vulnerable spots are impenetrable. Here are just a few examples of the security software that you may want for your PC:· Privacy Protector – As mentioned earlier, spyware can track everything that you do on your computer. This is because everything that you do on your computer leaves a trace or electronic trail that is stored on your computer. With the right software, prying eyes can see and access any sites you have visited and files you have accessed or shared while online by exposing this electronic trail. Privacy protection software helps reduce this risk by erasing the electronic trail that you have left behind. · Secure Delete – When you delete files on your computer, you may think that they are trashed and inaccessible, but with the right recovery utilities, your deleted data can be recovered easily. Secure deletion software makes sure that your deleted data is gone forever and safe from sticky fingers. · Spyware Detective – Added spyware detection software will help you spot spyware programs immediately and have them removed from your computer at the click of a button. As you can see, there are many dangers lurking on the internet including spyware, viruses and hackers. Just one unprotected computer can be a highly lucrative capture for the right thieves and provide them with countless data that reveals everything from your browsing habits to credit card numbers. Make sure that your PC does not fall into their grasp. Protect it with the proper PC security programs.
Author : PC Power Suite
Article Source: http://www.articledashboard.com

How to Run a Successful Conference Call

These days with more and more of us working from home, working on the road, and generally dealing with multiple suppliers, contractors and business partners in locations all over the world, the conference call is supplanting the face-to-face meeting. Here are some tips on getting the most out of your conference call... Tip One: Send Out an AgendaThe key to an effective meeting is an agenda - this applies to any kind of meeting, not just a conference call. With a conference call, always make sure you have the instructions on how to access the conference call at the top of the agenda, preferably in a box or with some other text decoration to make it stand out.Another option is to send a meeting request from within your calendar application, whether it be Microsoft Outlook or Apple's iCal, or some other scheduling tool. The meeting request is sent as a specially formatted email, so you can add attachments just like with a regular email. Attach the agenda, and repeat the instructions on how to connect to the conference call in the body of the email.Most conference service providers require participants to dial a special number (which may be different depending on where the user is, or it may be a national number), then enter a conference "room" number, followed by a security code or PIN. Make sure all the necessary details are included on the agenda and the meeting request.If the conference call is a regular status update, ensure you also send out the meeting notes from the previous call, since the first item on the agenda should be chasing people up for the actions they've agreed to be responsible for.Tip Two: Take Care of HousekeepingAt the beginning of the call, call off the roll and ensure everyone is on the call. Introduce any newcomers to the rest of the group and invite them to spend a couple of minutes describing themselves and their role on the call. If anyone is missing from the participants list, immediately call them (preferably on their mobile) to get them onto the call as soon as possible. If they can't get on the call within a couple of minutes, proceed without them. Nothing detracts from a good conference call more than making everyone wait at the beginning.Next, ensure everyone has a copy of the agenda, and that they can all hear one another OK. If you are not going to be the one taking notes, make sure everyone is clear who is. This serves two benefits: firstly, the person taking notes is going to be careful and accountable, and secondly, a single set of meeting notes will be distributed after the call. If this is not made clear, you may end up with several versions, which is both redundant and confusing.Finally, lay out the rules for interaction on the call. Because it's audio-only, the usual cues we use to indicate that we wish to take a turn at speaking are not present. Therefore it's worth stating at the outset what the rules will be. These can be as simple as "Please make a note of any questions and we'll deal with them in turn after each agenda point", or as sophisticated as listing the order of speaking of the participants, and asking each participant only to speak at their particular time. This last is called "round table" conferencing, and is particularly effective once people are used to it. It has the dual effect of keeping all participants engaged, and speeding up the time it takes to get through each point.Clearly it's unrealistic to expect people to stick to the interaction rules for the duration of the call, but laying them out at the outset will help ensure things run quickly and smoothly.Tip Three: Turn Off SpeakerphoneUnless you have a majority of participants all in one room together, you should turn off speakerphone. Speakerphone and conference calls are a bad combination, unless you have a high-quality dedicated speakerphone. In order to prevent audio feedback, speakerphones automatically mute the speaker when a sufficiently loud sound is heard at the microphone. Unfortunately, few speakerphones do this particularly well, and often the speaker will mute because of its own output feeding back into the microphone. This means annoying dropouts and missed words and sentences. Because it's a conference call, often these dropouts can go on for some minutes before someone has the opportunity to pipe up with "We missed all that!" Needless to say, having to constantly repeat yourself can be very time consuming and irritating for all the non-speakerphone participants.Even if you're in the same room as someone else, it can sometimes be an improvement to use two handsets rather than use speakerphone.Tip Four: Send Out Meeting NotesYou should ensure everyone on the conference call gets a copy of the meeting notes no later than the following morning, while the call is still fresh in everyone's minds. There are many helpful guides on the web for effective note-taking, but in essence:
Don't try to write down absolutely everything; just the items where an action needs to be taken
Keep track of who has agreed to be responsible for each action
Keep track of the deadlines for each action item
Don't forget to note the time and date of the meeting and who was presentIf the conference call is a regular status update, ensure you note in the meeting notes the time and date of the next meeting. If possible, deadlines for action items should correspond to the dates of status meetings so that the notes can be quickly scanned (or even sorted) for items that need to be chased up in a given meeting.Tip Five: Keep it BriefStudies have shown that people start to suffer a number of unpleasant side-effects after holding a telephone receiver to their ear for longer than about an hour. In any event, forty minutes is about the limit of most people's concentration span.If you find the call is starting to drag on beyond an hour, it's a good idea to wrap things up and continue either later that day, or preferably the following day. If you find this is a regular occurrence, it may be an indicator that you need to revisit the agenda, or possibly split the group up into separate, more focussed groups. A particular time-waster is having engineers and businesspeople on the same conference call. A better way to handle this is to have three shorter meetings - one with just the engineers, one with the businesspeople, and one with single representatives from each group to present the results and take any feedback to the next department meeting. With practice, you can keep the length of each meeting down to around twenty minutes.
Author : Michael Pollitt
Article Source: http://www.articledashboard.com

Saturday, November 24, 2007

Notebook And WiFi Standards

Every modern notebook is Wi-Fi enabled, allowing internet access from any part of the globe. But while using your wireless notebook, you should be aware of Wi-Fi standards, hotspots, and how to effectively use this technology to make the optimum use of your notebook.The 802.11g Wi-Fi standard is the latest standard, which your notebook follows when you are online. The Wi-Fi alphabet spaghetti consists of protocols like 802.11, 802.15, 802.16, and 802.20. However, for most notebook users 802.11 would be sufficient with added `a`, `b`, or `g`. There are protocols like `e`, `h`, `i`, and `n` that are waiting in the wings to make their entry. Nevertheless, as of now, 802.11g is the only protocol that one needs to think when it comes to wireless connectivity. The latest Wi-Fi standard is the 802.11g and offers connection speeds up to 54 Mbps in the 2.4 GHz radio bands, which is five times more than the previous standard 802.11b. It is more stable, more secure, and backward compatible.Almost all notebooks that are manufactured today are 802.11g Wi-Fi standard ready. This standard is also designed to replace the older Wired Equivalent Privacy or WEP by specifying the Wi-Fi Protected Access or WPA. The WPA will function as an interim solution, until the next standard, the 802.11i network security standard is implemented with a new algorithm called Temporal Key Integrity Protocol, which shall be much more secure and reliable. However, until the new standard is implemented, the 802.11g is to be followed. There are only two disadvantages with this notebook Wi-Fi standard, that firstly, since it is a new standard, it may not perform as promised; and secondly, with fast emerging latest technologies, it may become obsolete by newer standards before you have the time to benefit from it.Few tips for a secure Wi-Fi experience:1 - You should raise the level of your laptop settings. Raise the security settings of software applications like Microsoft Outlook and Internet Explorer. Update them frequently to ensure latest protection from hackers and viruses. You should keep the encryption feature always on to ensure safest browsing with Wi-Fi.2 - Along with the software, you should also consider updating to better hardware. Hackers have always found 802.11a and 802.11b very easy to hack. However, 802.11g is harder to crack and you should consider upgrading your hardware to a `g` card. An 802.11g is backward compatible with IEEE 802.11b, thus 802.11g can leverage the widespread, international adoption of IEEE 802.11b in products from laptops to PDAs. A personal firewall, such as ZoneAlarm or BlackICE can significantly add up to the security level of your notebook.3 - Whenever you are using your notebook at a Wi-Fi hotspot, make it a point not to send data. While you are surfing, do not type your credit-card number, expiration date, passwords, bank account numbers, etc. Sensitive data are the goldmines for hackers, and they will swipe your bank account before you can finish saying, ` I have been a victim of online identity theft!`4 - Consider not staying online while working. If the risks outweigh the benefits, then it would be better to stay offline; at least until the new 802.11i standard is not implemented. Even then, the security can be breached, albeit with difficulty. If you do not need Wi-Fi to implement your work, then stay switched off. If you need the Wi-Fi just to send and receive files, then stay connected for only that period. Rest of the time, stay offline.Precautions to take at a public Wi-Fi hotspot:Whenever you are in public domain, you need to take precautions, as it is free for all. The Wi-Fi hotspots are available to any and every person, and anybody can be connected. Besides online thefts, there is also the risk of offline thefts.While in a public hotspot, do not be so absorbed with your notebook, that you fail to notice the people around you. There are persons who are in the business of stealing notebooks, from public hotspots. And they do not operate as individuals but as a gang.Also, while you are online at a public hotspot, follow simple rules like encrypting files before transferring or emailing them; making sure you are connected to a legitimate access point; and file sharing is turned off. Basic precautions like password protecting your notebook, updating your system regularly, and using anti-virus software should be strictly followed. For further online security, consider using a personal firewall, a virtual private network (VPN), and web-based email with secure http (https).Having a good Wi-Fi experience directly translates into a satisfying Internet experience. With the above suggestions being implemented, you are guaranteed to have a pleasant online time with your notebook.
By Roberto Sedycias
Article Source: http://www.Free-Articles-Zone.com