Preventing Spyware Attacks On Your PC

§ February 7th, 2015 § Filed under Computers § No Comments

malwareAs a coder the last thing I want to spend energy on is preventing OTHER people’s malicious code from getting onto my computer. The level of spyware these days has gotten rather advanced as I’m sure you know, and the threats are a bit more grim as far as what these people can steal and otherwise mess up on your PC. The fact that simply getting a few names and a credit card number can often be enough for full-fledged identity theft is enough to scare me into making sure my computer has full walls and a moat.

What’s the best way to go when it comes to prevention? I think one of the strongest things is a program that has a strong company behind it that will definitely be able to keep up with the changes in spyware and all the new malicious software that’s getting put out there on the internet on an hourly basis. So I would definitely go with a company that is actively promoting their product. I don’t know about “free” software because where’s the incentive to really update it all the time? Can you really trust that it’s being updated on schedule?

Another thing to look at is how the software itself is coded. You know as well as I do that as soon as you start using a program you can tell how well it is coded. If it’s a memory hog or slow then I throw it in the trash. I also look for a clean user interface and a good amount of options to keep this nerd happy.

I recently started using this program called Spyhunter 4. It’s an excellent tool that has something that I really find appealing: the ability to start the PC in a secure OS in case of a rootkit attack or injection. This is a pretty nifty feature and not all programs are as equipped to deal with a genuine rootkit attack as this one. Plus it’s supported by Enigma software so I’m pretty confident they are updating it, especially as it has a user-network where new threats are sent to the company to be added to the database.  It’s a safe and effective way to ensure your privacy and safety.

Usually I have relied on Norton 360 for my security needs but lately I haven’t been convinced that it’s a full all around protection for all spyware and malware. Viruses, yes, but I like to have two lines of defense as I’m rather paranoid about these things.

The other thing I can tell you to do is to only browse safe internet locations. I know that ANY website can be compromised, but let’s be honest: there are some internet neighborhoods that are much more dangerous than others. You know what I’m talking about. And be careful what you’re downloading and where you’re downloading it from. Ensure that when you install a new program you make sure that you read every menu as they like to sneak adware and other software programs onboard – even with well regarded software tools.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Computer Science Into The Future

§ December 19th, 2013 § Filed under Computers § No Comments

How has our relationships with computers changed over time?  It can be hard to say for certain.  There are a few elements that we definitely know are different; the way we get our news, the way we communicate with our friends, and the way we spend our free time.

Facebook And News

I know that I personally use Facebook primarily on my computer as well as my phone.  And I have stopped checking the local news outlets to get my news for the day.  If anything crazy happens, I know that SOMEBODY will post about it.  Therefore, I get all my news from Facebook.  However, I have noticed something distressing lately, and that is the fact that people have begun posting bogus news stories from sensationalist blogs that are merely trying to get clicks to drive traffic and presumably make money or push some agenda.  I’m speaking specifically about the news story that was circulating about radiation from Japan that was mistakenly using a tsunami wave graph as evidence for the spread of nuclear waste.

Defending Your Identity

There are some other things that have been worrying me lately as well…such as the evidence that malware could even turn on your webcam without the light going on, allowing others to spy on you.  I found this revelation to be terrifying, and I have since covered my lens with a band-aid.  The importance of protecting your computer from malware is even more prominent today than ever before.  Blogs such as StevenCahill.net and other similar sites have helped me figure out just how I should protect my computer from the outside elements.

312470_596784360351021_2101875571_nEntertainment

Does anyone watch TV anymore?  I don’t think so.  All my friends now watch Netflix.  It’s an addiction and you have everything that you want, when you want it.  You could binge watch an entire TV series in a few days.  I’m not so sure this is such a great thing, but que sera sera.  It’s the future, and the future is now.  Personally I’ve been watching episodes of New Girl on the regular as it is a nice relaxing break for me.

 

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Miley Cyrus – Absurd

§ August 26th, 2013 § Filed under Entertainment § Tagged , , , , § No Comments

The recent VMA’s were a three ring circus, with the most absurd award going to Miss Miley Cyrus.  What an embarrassment.  I felt completely uncomfortable watching this, as I’m sure many others did as well.  Did anyone actually LIKE the performance?  The reactions from the crowd say: no.  Unless you were in the pit and ORDERED to wave your hands in the air by the producers.  And what was with the girls running around with stuffed bears?  And the way that Cyrus kept sticking out her tongue was forced and gross.  Get off the Meth Miley!

miley-cyrus-2013-vma-tongue-out-1024x573

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

Why You Need to Protect Your Computer From Virus and Malware Attacks

§ August 26th, 2013 § Filed under Computers § Tagged , , , , § No Comments

Thanks to the Internet we have information at our fingertips, however we also have a host of rogue software available waiting to worm it’s way into our computer and ruin our lives. Some of these programs are tiny pieces of code which can be picked up just by browsing the wrong websites. Others can be picked up from files which have been downloaded. The problem is, there are several different types of these programs including Spyware, Trojans, Worms and outright Viruses. Plus, there are millions of these software problems in existence and more are created every day.

The more common term in use today for this type of software is malware, but it really doesn’t describe what this software can actually do you your computer or your life. In fact, there is no easy description because every infected computer can be a little bit different. Some common symptoms include windows opening unexpectedly, the computer lagging or running slower than normal. Almost any unexpected computer behavior could be an indication of a malware infection and the only real way to be sure is to run software designed to detect these types of rogue programs.

Another type of troublesome software is often called spyware. These programs are usually designed to track your computer usage or watch your web habits. However, they can serve numerous other purposes including watching keystrokes and tracking passwords which can lead to identity theft. However, spyware removal is usually as easy as running a couple of trusted programs designed specifically for this task.

The hardest task in computer security is changing your computing habits. Many of the things we do are the very things which cause our problems in the first place. For example, browsing the web for adult content is an easy method of contracting a computer bug. Likewise, downloading and running illegal software can be another. Sometimes, just visiting the websites which offer these types of files can be enough and the infection is just as quiet and sneaky as their real life counterparts. The best defense is to avoid them completely, but there are other requirements including the use of a firewall to prevent unauthorized access through the wire. Also, be sure you run some sort of anti-virus software, even if it is only the free edition of the name brand programs available.

The Variance Net news and review site is a helpful compendium of information on new and classic software programs that can help you to deal with malware in an effective way.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS