Sunday, September 27, 2009

Browse the Internet Virus Free

Copied: Code speck

The internet is a dangerous place these days no matter if you have a PC or MAC, you download or you don't. In this article I'm going to show how to protect your Windows PC with some free software that essentially makes your PC impervious to ANY virus (or potential unwanted programs - PUPS) while browsing websites on the Internet.

First, let me explain how 90% of my customers get infected. We'll use "Bob" as our example.

  1. Bob never installs his Windows critical updates for whatever reason.
  2. Bob has basic antivirus (also known as signature based antivirus) that may or may not be updated.
  3. Bob gets on the Internet everyday and mainly reads the news from various news site, searches for stuff on Google and maybe plays free online games.
  4. One day while searching for a cheap cell phone Bob all of the sudden is inundated with lot's of popups and a new (fake) antivirus program that says he's infected and needs to buy this antivirus "right now!!!"
  5. Bob is infected with malware and a fake anti-virus.

Bob could have prevented this malware infection with a few free anti-malware applications, and when I say a few I only mean two:

  1. A free anti-virus - There are 3 free anti-virus applications that are pretty robust and easy for the average PC user to install. Avira's AntiVir, Avast Antivirus and Grisoft's AVG Free.
  2. Sandboxie Free - This application places all files downloaded from the Sandboxie web browser into a "virtual computer" that runs on your computer (ya never know it's there). If configured properly, once you close the Sandboxie web browser the virtual computer is destroyed along with any malicious files that you may have accidentally downloaded to it.

Now we're going to secure your PC with both applications: A free Anti-virus and the Sandboxie web browser.

  1. Pick your antivirus. My personal favorite is Avira, but any of the 3 anti-viruses I previously mentioned will work just fine. Download, install and update it (updates are usually automatic). Remember, anti-virus by itself is not enough protection for your PC these days, you need additional protection.
  2. Now it's time to install Sandboxie. You can go to Sandboxie(dot)com and download the free version of Sandboxie from there. Once Sandboxie is installed you should have an icon on the desktop called "Run Sandboxed Web Browser". If the shortcut is not on the desktop you may click start, all programs, Sandboxie, then right-click over "Run Sandboxed Web Browser" and click send to desktop. Next, we'll configure the Default Sandbox to DELETE all contents once the Sandboxed Web Browser is closed. This is the most important part.
  3. Click Start (or click the Windows globe for Vista).
  4. Click All Programs.
  5. Click Sandboxie.
  6. Click Sandboxie Control.
  7. Right Click Sandbox DefaultBox.
  8. Click Sandbox Settings.
  9. Click Delete.
  10. Click Invocation.
  11. Click the First Checkbox (automatically delete the contents of the sandbox).
  12. Click Apply and OK.
  13. Close Sandboxie Control.

Ok, now we're all set to say goodbye to any form of malware (viruses) that get's installed via browsing ANY site on the internet. Go ahead and double click "Run Sandboxed Web Browser". Looks just like you're default web browser (firefox or IE) right!

Notice the little # signs on each side of the title bar at the top of the web browser. This means that ALL files downloaded unintentionally are stuck inside the sandbox and are DELETED as soon as you close the web browser. Basically this means you can visit any website without having to EVER worry about getting infected. That is the power of browsing the web via a sandboxed web browser.

One last quick note. If you want to intentionally download a file (like a picture) Sandboxie will ask you where you would like to "recover" the file. This is up to you. You can recover to the default folder or choose a folder. Please be aware that recovering files can be dangerous, this is where you'll need your free anti-virus (to scan recovered files).

About the Author:

My name is Matt and I offer st. louis computer repair and consulting services. If you're not in St. Louis I can help with your PC remotely right over your internet connection! Call my St. Louis office at 314.226.4279 and schedule your appointment today. I also have a site that reviews cheap all in one printers.

Article Source: ArticlesBase.com - Browse the Internet Virus Free

Thursday, September 17, 2009

How to Remove Spyware from Your Computer?

Copied: Code Speck

How can we remove spyware from our computer? This is a tough task for those people who know little about computer knowledge. Fortunately, you can take a few minutes to read this article and follow the steps bellow to protect your computer from spyware.

There are two main paths that spyware act on a computer. One is to monitor everything the users do in his system and then transfer the information or data it collects from this computer to the third party of this spyware. The other is to catch the setting of IE or other browsers on users’ computer and then change it to other unwanted, malicious or insecure websites. Large scale of pop ups will show up while you use this infected computer and your computer system will finally be a mess. For the safety of your PC, you have to pay enough attention to deal with spyware.

If you really want to prevent spyware, you can follow the five steps here:

1. Backup your important files and data first and then disconnect the internet;

2. Download the anti-spyware program from safe website.

3. Run the Full scan or Online Scan and remove the detected threats.

4. Install a forcible Fire Wall.

5. Contact the support team of security program once you have any question on the program or your computer.

The existence of spyware definitely will slow down your PC; bring other negative effect to your computer. It is so bad to your computer life. You should equip your computer with forcible security or anti-spyware program and be watchful while using computer, then you can be at ease with your computer experience!

http://www.threatremove.com/how-to-save-your-computer-from-viruses/

About the Author:

Spyware Cease, started its development cycle in early 2006. It is is a highly-integrated anti-spyware program that enables you to prevent and clean up the latest spyware threats like keyloggers, trojans, adware, malicious cookies tracking, browser hijackers, worms, phishing attacks and other malicious spyware attacks, effectively eliminating unwanted pop-ups, minimizing identities thieves and speed up PC performance.

Article Source: ArticlesBase.com - How to Remove Spyware from Your Computer?

How to Save Your Computer from Viruses?

Copied: Code Speck

Many computer users are not masters in solving computer problems. So they always like to turn to some professional persons for help. However, it will be better if we can grasp some basic knowledge about computer and sometimes we can even save our computer from viruses by ourselves. So what should we do for this?

In the first place, we should know the symptoms of an infected computer. And this is especially crucial for computer rookie because it is difficult to tell whether your computer has been infected or not. You know that because of the power of internet and the development of computer technology, computer virus will also update and be more complex than it just showed up decades ago. So if we want to distinguish infected files and remove them successfully, carefulness and patience are needed as well as relative knowledge. Here are some examples for an infected computer:

Your computer freezes or block up frequently;

You get lots of error messages or popups;

You can’t load some programs or applications as usual;

Your browser goes blank without any reason or become empty when you click some websites, etc.

What can we do if our computers really get infected? Don’t be panic! You can follow the steps bellow and save your computer by yourself!

  1. Backup the important documents or information first.
  2. Download a forcible security program for your computer.
  3. Run the Online scan of this program to detect threats on your computer.
  4. Disconnect your computer from internet and run the Full scan.
  5. Remove the detected files found by your anti-virus program. For those files in Quarantine folder, you can delete them after confirming.

After the above steps, you can also send your Scan results or Analysis report to the support team and ask for further help for your problem. If possible, have your anti-virus program keep up-to-date whenever you use it. This will be the guarantee of your computer security.

About the Author:

Spyware Cease, started its development cycle in early 2006. It is is a highly-integrated anti-spyware program that enables you to prevent and clean up the latest spyware threats like keyloggers, trojans, adware, malicious cookies tracking, browser hijackers, worms, phishing attacks and other malicious spyware attacks, effectively eliminating unwanted pop-ups, minimizing identities thieves and speed up PC performance.

Article Source: ArticlesBase.com - How to Save Your Computer from Viruses?

Wednesday, September 16, 2009

Internet and Computer Fraud


White Collar Crime Unit
The Department of the Prosecuting Attorney's White Collar Crime Unit prosecutes traditional economic crimes such as theft, forgery, credit card fraud, and identity theft. It also prosecutes a variety of high-tech computer crimes, including computer fraud, computer damage, and unauthorized computer access crimes.

White Collar Inquiries
The White Collar Crime Unit receives frequent inquiries from the public about internet and computer fraud. Some inquiries turn out to be civil matters rather than criminal matters. Civil matters are referred elsewhere for resolution. Criminal matters are investigated by a team of skilled investigators who prepare cases for prosecution by the deputies of the White Collar Crime Unit. They aggressively pursue criminals suspected of computer crimes and have an excellent track record for seeking restitution when possible.

Prevention
It is far easier to prevent computer crime than it is to prosecute it and secure restitution, and most victims will never fully recover all that they have lost. For this reason, the White Collar Crime Unit also focuses on Crime Prevention, providing computer safety information and extensive community outreach.



Protect yourself! Learn all that you can on the ways to prevent these types of computer-related scams.

Just as you should take caution with any phone calls or mail you receive about suspicious-sounding deals, you should do the same when you're online. Internet fraud can be found in chat rooms, e-mail, web sites and message boards. Listed below are the top ten online frauds for 2003, which cost each victim an average of $5271:

1. Online Auction Sites


Nearly 90 percent of Internet fraud was associated with online auction sites. These sites offer anything from high-value collectibles to computers. Generally you will send money for the item, but you will receive a lower-quality or lower-priced item, or nothing at all.

2. General Merchandise Sales

Sites that offer retail goods. Like the online auction sites, what you pay for may not be what you receive.


3. Nigerian Money Offers


Someone claiming to be a representative of the Nigerian (or any other country's) government asks you to help move millions of dollars of overpayments into overseas bank accounts. They ask for your bank account number, so they can transfer the money into your account temporarily and claim you will receive a percentage of the money for helping. In actuality, they drain your bank account.


4. Information / Adult Services


Web sites that offer music, pictures or games for download. Some downloads could contain viruses that can infect your computer, and some can charge your phone bill (if using a dial-up modem).


5. Internet Access Services


So-called "internet providers" that promise free or low-priced Internet access, free web page design or other Internet services, then do not deliver.


6. Computer Equipment and Software


Computer equipment and software that was paid for but was never delivered or was not what you ordered.


7. Work-At-Home Schemes


Business opportunities that claim you can make thousands of dollars a month working at home. These schemes usually require buying materials or information about the business. What you receive in return is inadequate materials or nothing at all.


8. Lotteries


False promises to help a consumer win money or collect on winnings from foreign lotteries.


9. Fake Checks


Consumers are paid with phony checks for products or services, with instructions to wire back some of the money to the offender.


10. Advance Fee Loans


Loan schemes that charge an up-front fee, and promise you will be approved for a loan regardless of your credit history.


Also be leery of online investment schemes. Remember, if it sounds too good to be true, most likely it is too good to be true.

In Hawaii, Internet fraud can be prosecuted under traditional theft statutes. If the amount of the victim's loss exceeds $300.00, the suspect can face up to five-years in prison and a $10,000.00 fine. If the amount of the victim's loss exceeds $20,000.00, the suspect can face up to ten-years in prison and a $25,000.00 fine.

Computer Crimes


With the advent of the Internet, the phrases "computer tampering" and "network intrusions" (commonly known as "hacking" or "cracking") have taken on several new meanings. The Hawaii Penal Code has been updated to include the realm of cyberspace.

Breaking into someone's computer may seem like fun, but the consequences are not: Under Hawaii law, breaking into someone's computer and causing damage may result in a prison sentence of up to ten-years and a $25,000.00 fine. Merely accessing a computer and obtaining information could result in a prison sentence of up to ten-years and a $25,000.00 fine.
The Department of the Prosecuting Attorney takes computer-related crimes very seriously. As criminals have become more high-tech, so has law enforcement. The Department of the Prosecuting Attorney has access to considerable resources, including investigators trained in computer forensic examination who assist us with a criminal prosecution.


Telecommunication Fraud


The telecommunications industry is booming, as is the amount of fraud associated with it. Although there is no guaranteed fix to stop this type of fraud and abuse, some fraud can be prevented by adopting the following procedures, both at home and the office:

  • Insist everyone use common sense when using the telephone.
  • Catch problems early by reviewing your telephone bill immediately after your receive it.
  • Question long calls, calls with high costs-per-minute or calls made late at night or after business hours.
  • Monitor your total telecommunications usage/costs each month, and if there is a sudden increase, investigate it.
  • If you receive a call about free cable television, free cellular phone, free long distance or any other telecommunications deal that sounds too good to be true, most likely it is too good to be true.

Prevention

"Spam Scam" – Spoofing You Out Of Personal Information


Consumers should be on the alert for sophisticated "spoof" e-mails that trick unwary and unsuspecting Internet users into giving personal information that can be used to drain bank accounts, fraudulently get credit cards and commit other crimes.

The scam is commonly called "spoofing" because the spam mail sent uses familiar or legitimate-sounding names of companies to gain personal information. This scam capitalizes on names that are close to the real one. In a recent example, instead of the real Earthlink.net, the spam mail used an URL like www.earthlinkservice.com. Small and large companies have been spoofed, such as Bank of America, Best Buy, PayPal and Ebay.

Consumers may be sent e-mails that seemingly come from a company with which they've done business or be sent by hyperlink to a phony web site - designed even to look like the legitimate business web site. One victim reported getting a seemingly authentic e-mail from what appeared to be his Internet Service Provider telling him his credit card had expired and new information was needed. He was asked to provide a credit card number and to give his bank account number and ATM PIN number.
Another name for "spoofing" is "phishing". In "phishing" scams, "phishers" send millions of bogus e-mails with the hope of luring victims to a fraudulent (or spoofed) website where the Internet user would then be tricked into divulging personal information, such as passwords, account numbers, or credit card information. According to Kiplinger's Magazine, up to five percent of e-mail recipients respond to phishing e-mails, leaving them vulnerable to credit card fraud and identity theft.



Tuesday, September 15, 2009

How to Update your Computer with Latest Computer Accessories

Author: Vinnit

Are you a technology driven person Do you want to pool in whatever is latest and exciting in your computer or laptop Well, if such is the case with you, then you must be looking for extremely proficient, smart and handy computer accessories. With the latest technology hailing in, the computing standards of an individual have undergone a drastic change – for the better! Computing is no more a story of working with traditional computer sets as today it demands a list long of additional accessories to add flair in one’s ways of computing.

Talking about the list of computer accessories, there is a lot available which a person wishes to buy. But an individual should always heed to the factor that as to what he actually requires at his domicile. There are numerous computer peripherals that one can get along with his computer such as speakers, printers etc. but one has to see whether these things are actually needed or not.

Connectors play a vital role in your day to day computing needs. But without the availability of basic computer peripherals it stands almost as a handicap. To make it work efficiently, you should buy latest computer accessories like parallel port, serial port, Ethernet network, universal serial busmodem, PS2 port etc. Consider those connectors which deliver a good air flow as they help in proper functioning of your computer devices.

Flash products come next in the list of products driven by latest technology among computer accessories. These products are used to store your digital data and which can be retained for daily use. The alluring advantage is that they can be easily plugged in to any computer and are effortless to deal with. These latest computer accessories are included in the list of vital purchases for the simple reason that they are easy to carry. You can buy them as pen driver, USB driver, thumb driver, key driver etc. They feature a bulk of storage capacity and are advantageous to take in use for data storage needs.

The crucial need of transferring data from one computer to another is best dealt by the switch boxes. These are used in case computers do not function good in swapping the devices like monitors and PS2. If done so, they can harm the functioning of other computer. One can buy latest Computer Accessories online as well, to increase the functionality of their PC and enjoy new dimensions like never before!

About the Author:

Vinnit Alex is well known author has written article on Acer Laptops, Computer Store, UPS, Online Shopping and many other subjects.

Article Source: ArticlesBase.com - How to Update your Computing with Latest Computer Accessories