Information Technology

Your PC and The Internet

Posted by cosmic  •  Filed under InformationTechnology, Internet

Your PC and the Internet

Check Your PC

When a computer connects to a network and begins communicating with other computers, it is essentially taking a risk. Internet security involves the protection of a computer's internet account and files from intrusion of an unknown user.

Some apparently useful programs also contain features with hidden malicious intent. Such programs are known as Malware, Viruses, Trojans, Worms, Spyware and Bots.

* Malware is the most general name for any malicious software designed for example to infiltrate, spy on or damage a computer or other programmable device or system of sufficient complexity, such as a home or office computer system, network, mobile phone, PDA, automated device or robot. While it is sometimes software, it can also appear in the form of script or code.

* Viruses are programs which are able to replicate their structure or effect by integrating themselves or references to themselves, etc into existing files or structures on a penetrated computer. They usually also have a malicious or humorous payload designed to threaten or modify the actions or data of the host device or system without consent. For example by deleting, corrupting or otherwise hiding information from its owner.

* Trojans (Trojan Horses) are programs which may pretend to do one thing, but in reality steal information, alter it or cause other problems on a system such as a computer or programmable device. One of the most insidious types of Trojan horse is a program that claims to rid a computer of viruses but instead introduces viruses onto the computer. Trojans may also allow a hacker remote access to the computer system. Once a Trojan has been installed, the hacker can access the computer remotely and perform various operations.

* Worms are programs which are able to replicate themselves over a (possibly extensive) computer network, and also perform malicious acts that may ultimately affect a whole society/economy.

* Spyware includes programs that surreptitiously monitor keystrokes, or other activity on a computer system and report that information to others without consent. While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits, a history of visited sites, and user logins and passwords. Spyware can also interfere with user control of a computer in other ways, such as installing additional software or redirecting Web browsers. Some spyware can change computer settings, resulting in slow Internet connection speeds, loss of Internet connection, or functionality of other software. Sometimes, spyware is included along with genuine software, and may come from an official software vendor.

* Bots are programs that take over and use the resources of a computer system over a network without consent, and communicate those results to others who may control the Bots.

The above concepts overlap and they can obviously be combined. The terminology, along with the dangers involved, are constantly evolving.

Antivirus programs and Internet security programs are useful in protecting a computer or programmable device/system from malware.

Such programs are used to detect and usually eliminate viruses. Anti-virus software can be purchased or downloaded via the internet. Care should be taken in selecting anti-virus software, as some programs are not as effective as others in finding and eliminating viruses or malware.

When downloading anti-virus software from the Internet, one should be cautious as some websites say they are providing protection from viruses with their software, but are really trying to install malware on your computer by disguising it as something else.

We present a number of Free Utilities that can help you block, detect and remove unwanted script & software to enhance your internet experience. If you can not afford Internet Security Software, these alternatives will meet your requirements.


« Back To Article Index