What are Viruses - Worms - Trojan Horses - Adware - Spyware -
Firewalls - Spam - Popups
What are viruses?
Viruses - A virus is a software program that is capable of
replicating with little or no user intervention, and the
replicated programs also replicate further. Viruses piggyback on
real programs. For example, a virus may attach itself to a
program such as a spreadsheet program. Each time the spreadsheet
program runs, the virus runs as well, and it has the opportunity
to reproduce by attaching to other programs. The purpose of a
virus can be anything from erasing files, formatting your hard
drive, to replacing text in your document Viruses are often
disguised as games or images with clever titles such as
"Pictures of ME". E-mail Viruses - An email virus moves around
in e-mail messages, and usually replicates itself by
automatically mailing itself to the people in the victim's
e-mail address book.
Worms - A worm is a virus that spreads by creating duplicates
of itself on other drives, systems, or networks. Worms may send
copies of themselves to other computers across network
connections, through e-mails, through infected web pages, or
through instant messages. Trojan Horses - This program may claim
to do one thing (such as claiming to be a game) but instead does
damage when you run it. Trojan horses are not technically
viruses, since they do not replicate.
What is adware?
Adware is added to your computer generally without your
knowledge when you download anything free over the Internet.
This method of downloading is known as "stealth software" or
"drive-by downloads". Your computer could have been infected by
mal-ware during online activities such as downloading music,
pictures, shareware programs like screensavers and animated
cursors, popup ads, email attachments or by even visiting some
websites that use Active X coding to insert parasites onto your
computer. Pay particular attention to the fine print when
downloaing anything over the Internet. Some programs include
brief information in the Terms and Conditions related to serving
you targeted ads based on your shopping habits.
What is Spyware,
Spyware is software that gathers user information through the
user's Internet connection usually without his or her knowledge,
typically for advertising purposes. Spyware is downloaded
through the Internet. Once installed, the spyware monitors user
activity on the Internet and transmits that information in the
background to someone else. Spyware can also gather information
about email addresses and even passwords and credit card numbers.
What are hackers?
Firewalls keep people from accessing your computer with
malicious intent when you are connected to the internet. A
firewall allows "good" data traffic and will block all "bad"
data traffic. An example of good traffic would be surfing the
web, downloading reputable files, chatting, etc. The things you
enjoy doing on your computer. The bad traffic is what hackers
enjoy doing on your computer such as stealing files, using a
Trojan to control your computer, and disrupting your connection
or network. Each computer contains ports which are entrances for
hackers to invade your computer. A firewall goes to each of
these ports and monitors everything that is going in and out of
your computer, it makes sure that the proper ports that allow
the "good" data are opened, and it closes the ports to "bad"
data.
What is identity theft?
Adware programs gather information from your computer for
marketing purposes. The information is used to decide, for
instance, which advertisements to display when you are on a
specific Web site or which advertisements to display in pop-up
windows on your desktop.
What is spam?
Spam is unsolicited email, not unwanted email. If you have
signed up for an email list and receive an email that is not
spam. If you unsubscribe to that list and continue to receive
emails then that becomes spam. While spam is annoying it is
generally not dangerous to you or your PC. In January of 2004
the federal Can Spam law took effect with broad reaching
requirements and penalties. Tip: if you see a company name and
address at the bottom of an email, that generally means you can
use the remove link and it will be honored as they are following
the Can Spam law. If you do not see an address and only a remove
link, then it is not a good idea to use that link as that would
indicate a live email address to the spammers.
What are popups?
Popups There are two distinct typeds of popups. Browser based
popups - when you are visiting a website and the website
generates a popup. Adware based popups - when you are not
"moving around" the internet and just start getting popups. Both
tend to be annoying but may not be dangerous. Copyright