Does Your PC Have Worms?

Labels: , , ,

Worms aren't just for dogs anymore. Find out how to inoculate your computer against these nasty parasites.

What Are Worms?

Worms are descended from viruses and are even nastier. Just as ever stronger doses of pesticide breed ever more resilient locusts, better and better anti-spyware software bred ever more devious viruses.

Finally, some virus designers stopped having their creations infect and take over files the way real viruses infect and take over cells. Instead, they created programs that could stand on their own and cause plenty of trouble without the help of any other software applications. Just worms are independent organisms that can infect a host directly, so do computer worms infect computers directly.

What Do Worms Do?

Worm designers are often even more sinister than virus designers, since worm designers are not just vandals. Worm designers often use their creations to achieve specific goals:

  • Backdoor creation. Worms often try to set up another kind of malware, a backdoor. A backdoor is a hidden opening in your network connection that lets the worm send data out and take data in. Practically speaking, the data it's sending out are often spam emails, and the data it takes in are instructions on spam emails to send.
  • Denial of service attack. Some worm designers really are vandals rather than profit-hungry con artists sending spam. But their vandalism can be more targeted. They use worms to send out numerous requests to remote computers, such as web servers, in order to overwhelm them and therefore shut them down. This is called a denial of service attack.
  • Spyware, Trojan, adware, and virus installation. Worms are often used simply to unleash other forms of malware on a computer that might otherwise block them.
  • Information theft and fraud.Worms can multitask in order to set up spyware that gathers sensitive information--often financial information--and then set up backdoors, Trojans, viruses, or dialers to disseminate the stolen data.

How Do Worms End Up on a PC?

Worms enter PCs just as viruses, spyware and other malware do: any way they can! Some favorite points of entry for worms:

  • Websites can actually download software to your computer without you realizing it. This software includes not only worms, but also spyware, adware, viruses, and other malware. These malware programs find their way into websites either by the deliberate design of the site owner or because hackers have installed the software on the website's server.
  • Peer-to-peer file-sharing networkscontain many nice-enough-looking files that are really worms. One of the sneakiest disguises is a filename that indicates the spyware is really a video of a beautiful actress.
  • Email, the favored route of viruses, can still be exploited by Spyware. But since new email programs usually block the automatic opening of file attachments, this is less of a problem than it used to be.
  • Any internet connection inevitably lets data flow both in and out, and so is vulnerable to attacks by worms.

How Do You Get Rid of Worms?

There's really only one good way to make sure your computer is rid of worms: scan it with multiple antivirus and anti-spyware programs using a full-system scan. Worms are tricky, so anything less than a full-system scan might let them escape. Worse, with new worms coming out all the time, some antivirus and anti-spyware packages may not even know about a new worm until after its wreaking havoc on your machine. That's why you should try using more than one antivirus program and more than one anti-spyware program to increase your odds of successfully detecting the malware.

Don't have more than one anti-spyware and antivirus software? You'd better start downloading. After all, worms won't take excuses.


by: Joel Walsh





Symantec Norton Antibot The Latest In Norton Computer Protection Software

Labels: , , ,

It seems like every other month a new “program” comes along to make our lives that much easier. For example, first we could bookmark favorites, and then RSS feed them, and then came widgets and now “bots” which are robots that do a lot of our computer work for us in the background. Examples of friendly bots are weather bots, game playing bots, instant messaging and my favorites are those on AOL Instant Messenger which do all kinds of functions for me like shop, find movie times and even give updates on the Wall Street Journal. 

Unfortunately not all bots were created “equal.” Some are friendly and some are not. The ones that are not friendly can be a form of malware that allows control of your computer to be released, providing hackers with the opportunity to access your information and spread harmful bots to others. This type of computer virus can then be used to spread spam and commit various types of identity theft and other online fraud. 

So with new threats to our computers and information, new methods of protection are required. One of the oldest and most well known software protection designers has recently released a new protection program, Symantec Norton AntiBot. This is a software product designed to prevent the hijacking of one’s personal computer by bots and uses the bots on design programs against them, to located and destroy them. 

Many people already employ some form of protection on their personal computer, such as increasing the protection level from internet information to “high.” But these cannot detect some of the most recent bot programs and may not be the most efficient means of information protection, especially with the Internet being used more and more frequently for online shopping, ticket purchases, travel and other “high risk” activities. 

A more effective method of detecting and eliminating threats caused by bots is to install software designed specifically to detect, destroy and prevent bots from having access to your computer. With Symantec Norton AntiBot software, protection against bots is enhanced several times and the threat of bot attack is greatly diminished. It’s program protects against bots by blocking bots from entering your computer through downloads and e-mail attachments (two of the common ways bots enter a personal computer), checking for any unusual behavior on your personal computer and eliminating it, and detecting malicious bot software at all levels; keeping your personal, financial and credit card information safe and stopping identify theft before it can occur. 

Because bots operate in the background and are not detectable by antivirus or antispyware programs, many computer users are completely unaware that their personal computer has become infected. Many problems caused by bots go undetected until it is too late. Warning signs that your computer may have been accessed include: slowness of computer speed and unusual or irrelevant error messages. However, many times com these symptoms are sporadic and computer users will take little notice. Many people will continue to use their personal computer, unaware that bots have hijacked their personal computer and are slowly at work; looking for credit card numbers, passwords, and logon information which can be used for identity theft and in committing other types of online crime. This program scans your personal computer on a continuous basis, closing the gaps that could allow bots to infect your personal computer and better ensuring that bots do not invade and gain control. 

The use of Symantec Norton AntiBot to determine what a harmful or useful bot and allows you to continue using those bots you love and have come to depend on for information and services. It can be used in addition to several other antivirus and antispyware programs. Its compatibility is not limited to only Norton products. 

The cost of this software is $29.95 for one year of service. It was awarded PC Magazine’s Editor’s Choice Award (2007) and underwent rigorous testing which included using AntiBot on computers with existing threats as well as allowing threats to try to access the computer after installation. 

With the growing threat of identity theft and credit card fraud Symantec Norton AntiBot offers an additional level of protection needed to combat the threat of bots and prevent them from turning one’s personal computer into a robotic that turns into an instrument of destruction to both your personal and financial well-being. 

by: Lisa Carey




Internet And Business Online – The Act Of Interdependence

Labels: , , ,

The best role of business online is that of interdependency. We’ve all heard the old saying, “No man is an island.” When it comes to online business this is especially true. 

If a business owner who takes their business into the online world determines they will be self reliant and never accept the help of anyone then that individual will not be in business long enough to change their minds. 

It is accepted fact that the greatest tool for long-term exposure to your website is through Search Engine Optimization (SEO). Without it potential customers can’t find you. It is unreasonable to expect that you can adequately develop a website without optimizing your website for the best possible search engine ranking. 

Search engines also place a high value on sites that have links placed on existing sites. These ‘backlinks’ demonstrate to search engines that others trust your site. By placing your link on their website these other businesses indicate a trust and recommendation for your site. 

In effect the two strategies listed above rely exclusively on what others can do for you when it comes to your online business. 

Shirley Temple once proclaimed in her movie Rebecca of Sunnybrook Farm, “I’m very self-reliant.” American westerns are filled with lines dealing with pulling yourself up by your bootstraps and holding down the fort. Many of us have grown up to believe if we want something done right we have to do it ourselves. 

This thinking is in opposition to the rules associated with an online business. 

The online world can only exist because people share. Individuals share technology, but the also share links, reviews, blogs, forums and a wide range of other marketing strategies that find a commingling of interdependency. 

In online business you are as dependent on others as they may be on you. Unlike the word ‘dependent’, the term interdependent indicates a mutual dependency. In other words you are depending on others to help provide links back to your site while they are equally dependent on you (or others) for the success of their business. 

Have you really taken a proactive approach to networking? It’s possible you are reading this today and you’ve never considered asking someone else to place a link to your site on his or her online business site. 

It can feel awkward depending on others to achieve online success especially if you’ve been lead to believe reliance on others is also a sign of imposing on their otherwise brilliant generosity. 

I suppose it could be a deep-seated sense of pride that makes it hard to consider the need to ask others for help. However, the truth is depending on others is really what has made the Internet possible. The growth of this online world is comprised of a link of computers, networks and servers that are connected in a way that provides the maximum benefit for all. 

Building an online business can feel a bit like trying to build a house of cards. Without the ability to rely on the other ‘cards’ around you it is virtually impossible to build. 

Interdependence. This is the essence of online business. 

by: Scott Lindsay




Web Development And The Big Time Out

Labels: , ,

One of the great debilitators in online business is simply the perceived (or real) lack of time. Business owners are used to moving forward. An online web presence can make them feel tied to an office chair learning skills they aren’t sure they want to know. 

It’s not uncommon for those who deal in full time web design to have individuals contact them for a site design, but have absolutely no idea what they want. Furthermore when the designer questions them the response might be, “I don’t know, just make it look nice.” 

Let’s not forget the core values or mission of the business. Many business owners have no idea how to answer those kinds of questions. They may stare blankly for a moment or two and there’s no more time for further deep thought so they go back to action – without answers. 

In many cases it is possible to answer some of the questions needed, but it may require taking time away from a familiar setting. It may also require more time than you think you want to give. 

If you can get to a place of concentrated contemplation you are likely to find yourself stripping ideas to their core to find out what your business is trying to accomplish and what your ultimate goals might be. 

As with almost any project you can turn frustration around if you will just take the time to come to terms with your vision. 

Sometimes we spend so much time ‘doing’ we never stop to ask the question, “Why?” 

This process can be a bit like taking a bus that drives around the park. You keep looking at the flowers and the park bench and long to sit in the quiet shade of a tree and just absorb the calming atmosphere. You know they will have a positive effect on you, but for some reason you just can’t seem to find the energy to get off the bus. 

It seems to me there are some sites that are misguided or rarely guided that could benefit from the process of self-evaluation. These sites may look nice, but there is a sense of disconnection that may not be easy to identify, but it’s fairly obvious to visitors. 

Creative energy is at a minimum while business owners simply tackle what seem to be the most urgent details. 

As more people gravitate to online business there needs to be a shift in the thinking of how one goes about doing business online. In many ways it can’t be approached in the same way a traditional business is developed, yet that is typically the way many new web commerce ventures choose to tackle the subject. 

You may discover your business will be more successful if you take some time for rigorous reflection. The time set aside can be a bit like an architect that takes the time to develop plans for a new building. You wouldn’t expect the architect to simply tell a construction crew to, “Go out there and build – something.” 

Work at ‘building’ your online business in a comprehensive way. Your effort can develop a firm foundation for long-term success. 

by: Scott Lindsay