What are Trojans, Worms, Virus' , Spyware and browser Hijackers?
The following articles have been made by copying from other sites, and information from companies I have to state I never worked for!
The answers are out there on line, you have the world at your finger tips with the internet, if all else fails SEARCH
What are Trojan's?
What are Spyware & Browser Hijacker's?
The Cleaner (Free Trojan remover)
AD-AWARE (free Spyware remover)
What are Worm's?
Spyware Guard (free Spyware remover)
How to Eliminate a Computer Virus
Hijackthis (free browser hijack remover)
... not my 1st choice for inexpirenced users
The Stinger (free removal tool for some
virus' & worm's)
Spybot (free Spyware remover)
What are Virus'?
AVG (free antivirus program)
Norton's Latest Virus Threats
My computer is
being "HACKED" what do I do?
How easy it is to get my information?
As you can see .. just visiting this website, with a small html code I have some of your information! If you would like to see if your browser is safe you can check it at Browser Check
|Browser Check will show you holes you have in IE browser security and will also explain how to close them|
RegSupreme (RegSupreme is the superior standalone, ultra fast and lightweight registry cleaner. With its brand new technology registry cleaning engine the RegSupreme represents a new generation of Windows registry cleaners) This can be good to use after using other removal tools just in case something is left behind.
Easy Cleaner is a terrific system cleaner at a great price (it doesn't get better than free!). It includes a registry cleaner (deleting invalid registry entries can speed up your computer), duplicate and unnecessary file finder (temp, 0-byte, gid, cookies, etc.) (deleting these files saves hard drive space), and start menu cleaner.
Spyware Tools (several removal tools for Spyware and browser hijackers)
Types of Other Threats
Tools used by a hacker to gain unauthorized access to your computer. One example of a hack tool is a keystroke logger -- a program that tracks and records individual keystrokes and can send this information back to the hacker.
Usually an email that gets mailed in chain letter fashion describing some devastating, highly unlikely type of virus. Hoaxes are detectable as having no file attachment, no reference to a third party who can validate the claim, and by the general tone of the message.
* If you receive an email that WARNS of a virus' please check before forwarding it. Norton has a hoax site you can look up the information on a HOAX type the name of the hoax in the search and hit enter.
Programs that use a system, without your permission or knowledge, to dial out through the Internet to a 900 number or FTP site, typically to accrue charges.
Programs that change or interrupt the normal behavior of your computer, creating a general distraction or nuisance. Harmless programs that cause various benign activities to display on your computer (for example, an unexpected screen saver).
Programs that allow another computer to gain information or to attack or alter your computer, usually over the Internet. Remote access programs detected in virus scans may be recognizable commercial software, which are brought to the user's attention during the scan
An individual outside your organization who may be a threat. This person is technically unskilled or unsophisticated.
An individual inside your organization who may be a threat. This person is technically unskilled or unsophisticated.
A threat that tends to be technically unskilled or unsophisticated.
To send a file from one computer to another via modem, network, or serial cable. With a modem-based communications link, the process generally involves the requesting computer instructing the remote computer to prepare to receive the file on its disk and wait for the transmission to begin. Also see download.
A Windows NT file that contains information that identifies a user to Windows NT. This includes the user name and password, groups in which the user account has membership, and the rights and permissions that the user has for using the system and accessing its resources.
A Windows NT utility that enables users with administrative privileges to edit and define individual user accounts and privileges for the local workstation.
New strains of viruses that borrow code, to varying degrees, directly from other known viruses. The variants are usually identified by a letter, or letters, following the virus family name; for example, VBS.LoveLetter.B., VBS.LoveLetter.C, and so on.
I had Yahoo as my start page. Every time I start Internet Explorer, I get a different Start page. Why?
You have a browser hijacker on your system. The program has changed your Start page and has made some changes so that even if you change it back manually, the next time you start your computer the hijacker resets it to what it wants you to see. Get a Spyware Removal program to remove this
I can't get to a search page like Google. OR When I try to search for a web site, all I get are porn sites. What can I do?
You have a browser hijacker on your system. This kind of hijacker has changed all of your search options so that you only get to see the search results it wants you to see. Get a Spyware Removal program to correct this.
My Internet connection seems very slow. Pages sometimes load, and sometimes they show "This page cannot be displayed". Do I need to call my Internet Service Provider?
Checking with your ISP is not a bad idea, just to make sure that your settings are correct. But sporadic page loading indicates that your Internet Settings are fine - something is keeping you from getting to the pages. Chances are good that there are programs trying to connect to other sites without you being aware of it, and they are using up your bandwidth (Internet connection speed).
A Firewall can help prevent these programs from getting Internet access since it will alert you to their existence. But if these programs are integrated with your Internet Browser, you will need to track them down and get rid of them.
I keep getting messages popping up on my screen telling me that my computer is broadcasting its Internet address. These don't look like popup ads that I see when I am surfing, they look like Windows warning messages. How do I stop them?
If the popups have a blue title bar and a grey body like a Windows message, then you need to turn off the Messenger Service to stop them. An explanation of this service, and how to disable it, is found here.
Messenger Service is designed to let a network administrator send a 'broadcast'
message to everyone on the network. This service pops up a message on every
computer connected to the network so that everyone will see it right away. In a
call center environment, this is a very helpful thing to have. On a home
computer, it is just one more way for people to hit you with ads.
I have yet to figure out the logic behind the message they use to pop up and tell me that for a certain fee, they could sell me something that would stop these popups. Some people just don't make sense! How Do I fix this?
My whole computer seems slow. It takes a long time to start up and programs take a long time to load. Can I speed things up again?
There could be a number of things happening here, and the best way to figure out what is slowing things down is to try a two-step approach. Task Manager
I have DSL (or Cable) Internet. Ads pop up even when I am not surfing on the Web. How do I stop them?
You probably have a Spyware
program on your computer. Even tough you are not actively surfing the Net, you
are using an 'always on' connection that allows the popups to come to you even
when you are not doing anything Internet related.
Get a Spyware Removal Program and run it - you might be surprised at the number of nasties it catches!
My computer starts to dial up to the Internet even when I am not trying to go online. Is there something I can do to stop this?
You have a
Dialer program on your PC. Lucky You!
The purpose of these programs is to call long distance numbers (usually 900 numbers) so that the program's author can get the proceeds while you get stuck with the bill. There are a couple of things you can do to prevent this from happening.
Unless you explicitly give the program permission to access the Internet, it cannot connect.
Spyware Removal Program.
This will remove the program from your computer.
I just got an e-mail from Microsoft with an attachment that says it is the latest security patch. Should I install it?
Viruses can be disguised as official-looking messages that claim to have an important security patch.
Microsoft never sends patches to users. The only safe way to get a Microsoft patch is from the Microsoft Windows Update web site. Don't be tricked into infecting your own system by these "social engineering" tactics!
Computer Virus Timeline If your interested in the History time line of Virus' this is from 1949 to 2004
|Preventive Maintenance of a PC||What are Eastereggs?|
|Windows XP FAQ's and XP links||Tweak's Boot Disks|
|Windows 98 FAQ's and Links||Understanding Hardware|
|Bluetooth (wireless)||Bud Light Presents Mp3's|
|BIOS Passwords||Tech Humor|
|I Always Wanted to Know|
|The Windows Registry|
|Outlook Express, Internet Explorer & Word|