Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

How to Avoid Computer Viruses

on Thursday, 20 October 2011

There is a war being fought, often right underneath our very noses. It is a war fought not with guns, or with bombs, but by computer viruses, worms and Trojan horses. Computer viruses have been around for a long time. They’re often hidden in your e-mail inbox, among all those offers for quick cash, a bag of diamonds, enlarging this and reducing that, even spam telling you how to get rid of spam.

A worm is a type of computer virus that generally spreads and replicates itself without relying on any actions on the part of a computer user. A Trojan horse masquerades as a benign program, sometimes one that claims to get rid of viruses, when in truth it inserts a virus into your computer.

Virus attacks haven’t attracted much notice from mainstream news media, although that has begun to change. Over the past years, several viruses of varying types, such as the “Blaster” worm virus, made national and international headlines. Law enforcement has historically had a tough time dealing with cases like these. It’s tough to track down computer hackers.

In many cases, damage to individual computer users in virus attacks is minimal. Many simply exist to propagate themselves, ordering the infected machine to spread the virus to as many other systems as the computer can find. Some merely display irritating messages on your screen, tantamount to someone getting in your face and giving you the raspberry.

Some, however, can corrupt critical files that will cripple your computer, and wipe away irreplaceable data. Also, when a virus like “Blaster” comes about, which spreads with alarming speed, it can overload servers and bring entire sections of the Internet to a halt. That’s why it is very important to learn how to avoid computer viruses.

Here’s the bottom line. If you own a computer and use the Internet, you need virus protection to avoid computer viruses. It is becoming progressively easier to become infected. Computers running Microsoft Windows-based operating systems are the big targets, partly because they use the most common operating system, and also because Windows – along with its component programs – are often the most vulnerable.

One thing is to purchase an antivirus program, such as Symantec or McAfee’s, which will scan incoming e-mail and downloaded files, as well as searching your computer’s hard drives for lurking viruses. This is the first step in avoiding computer viruses, but merely buying and installing one of those programs isn’t enough. Each of those programs gives you a “subscription” to new virus definitions, which must be downloaded on a regular basis in order to avoid the newest threats.

If you use Microsoft programs such as Internet Explorer and the e-mail program Outlook or Outlook Express, you need to keep on top of Microsoft’s security updates, which have become more and more frequent. Point your Web browser to windowsupdate.microsoft.com, but be warned. If it’s been a while since you bought your computer or updated your version of Windows, you’ll have a lot of data to download. If you have a dial-up modem connection to the Internet, leave it running overnight.

Apple Macintosh computers don’t present as tempting a target to hackers and virus writers because they represent only a fraction of operating computers, which works in Mac users’ favor, since there are comparatively few computer viruses that are written to attack Macintoshes.

Also, a good rule of thumb to follow is that if you receive a file you don’t recognize, delete it immediately. Treat it as you would a ticking package – don’t even think of opening it. Even so, getting an antivirus program should be a priority for anyone who uses the Internet.

How to Choose Antivirus Software

on Thursday, 13 October 2011

Right now, at this point, you probably already know the urgency of antivirus software to guard your PC. But to decide which product best suits your needs is a whole different matter. And among so many alternatives being offered all with perplexing technical information, you need to be alert not to fall for the useless ones. In order for you to do some effective comparison, here we list 8 tips when doing an antivirus software comparison.

1. Effectiveness
Figure out how effective the software you are by checking what threats it can eliminate. In this fast moving field of antivirus and antispyware, you want to know which product is able to cope with the latest versions of computer threats. Yes, it is a basic recommendation to have an antivirus with virus, worm, and trojan protection. But if you frequently bank and shop online, you need a software that can protect your sensitive data from being stolen.

2. User friendly (Easy to use)
See whether the product provides an easy to use interface and also whether it comes with a manual or user guide. It is important because even though the software provide with complete features and breakthrough technologies, but if the customization buried deep beneath a pile of complex menus and settings, it is not worth the try.

3. Virus definition and scanning engine updates
As new type of viruses and other malicious software keeps mutate in an alarming rate every day, it is mandatory that a good antivirus software offers a routine virus definition and scanning engine update. For virus definition, daily update has become a general requirement these days. So check if the software offers daily update.

4. Real-time Scanning
Using a product that provides ‘real-time scanning' means that a virus or other malicious software will be automatically detected as soon as it tries to get onto your system. And it will continue run in the background to keep you safe from any threat.

5. System resources consumption
Regarding its vigorous and extensive activity in the background when running real-time scanning, it is better for you to find an antivirus that has low-impact on system resources. Because noticeably, some products may slow down your general computer processes.

6. Know Your Needs
Nowadays, antivirus vendors usually offer various type suite of protection. From basic product that offers protection against viruses, worms, and trojans to the all-in-one security solution that offers protection against all malicious software there are. Not only that, some product even offer online data backup and even PC tune up. But of course the more features a product offers, the more expensive it will be. So the key here is to know exactly what is your need. If you're computer are rarely online, then even the free basic antivirus can accommodate your security need. I recommend AVG Antivirus (Free Version) for this. But if you online all the time and do business with it like banking or shopping, then an internet security suite is a must.

7. Technical support
Find out what kind of supporting services it provides, such as a live chat service, 24/7 call service, or even remote assistance. It is important, because in case the software miss one threat that make problems to your computer (yes, nothing's perfect),you could get help in no time. Or it could be useful when you want to ask about customizing the software to be more-suited your needs.

8. Have a taste before you make a purchase
You should test for yourself whether or not the antivirus of your choice meet their promises. Furthermore, what might seems good to someone, does not necessarily feel quite good for the other. So this is why you should test it out first. And fortunately nowadays, most of antivirus vendors offer trial version of all their security software. These trial software usually have 30 days limited time. But it is enough for you to make a decision.

Now you can make a comparison based on these 8 simple tips I have discussed. Comparing price is logical, but when it comes to choosing antivirus software, it is not just about the price. But one thing to remember is that the more expensive a product is does not necessarily mean better. But it is always a welcome when we found an affordable security products with a solid performance. Regarding this matter, you can check this list of discount antivirus and internet security.

How to download Youtube Videos with Google Chrome - No Extension Needed

on Wednesday, 12 October 2011

1. Go to the Youtube video page you want to download.

2. Set the quality of the video you want to download.

3. Right Click on the page.

4. Click on Inspect Element

5. Then go to the Resources Tab

6. Click on Enable Resource Tracking

7. Go to the Others tab.

8. Find "videoplayback" on the resources list. This is the one usually with the longest bar. Then double cllick it, or drag it into the window.

9. Your download will start. Usually, the download will be instant, since the video started to load.

10. Rename your downloaded file, and put a .flv extension to it.

Important

Make sure you have permisssion to download the video and it is not covered by Copyright Law.

How to hide friend list on Facebook from Everyone

on Tuesday, 11 October 2011

Facebook is a most popular Social Networking site which helps you to share photos,videos,news and status updates with friends and relatives.There are so many Facebook users who like to share information with everyone and there are few users who would like keep some detail within themselves including friends list.This will help for those users who would like to use facebook for personal use.

This simple tutorial will tell you how to “hide facebook friends from everyone”







1) Go to www.Facebook.com and sign in with your facebook account.

2) On the top right corner of your page click Account and then Privacy settings.
3) Now under Connecting on Facebook section, click View Settings.
4) Scroll down and look for the See your friend list option.On the drop down list click customize, then custom privacy box is displayed.
5) Now under the label Make this visible to select Only Me.
6) That’s all now save the settings for changes to take effect.
Now when friends visit your profile,it will look like this :

How To Solve a Csrss.exe Problem

on Monday, 10 October 2011



A csrss.exe, also known as the Client/Server Runtime System, pertains to a component of the Windows operating system, particularly Windows NT. It is responsible for the user mode of the Win32 console windows, mainly on the graphical user interface (GUI) and threading of transactions.


This is a very important component in your computer, hence, if you see that there is a problem pertaining to the csrss.exe on your computer according to a virus scan, do not delete it immediately. This issue is relatively common as some computers do not detect this as an integral program file. But there is also a worm that creates a file of the same name.


If you encounter a csrss.exe problem, here are the steps that you should take.




  • Scan your computer. It is important that you ensure that your computer is free from malware and other viruses. These can corrupt the data you have and cause your computer to malfunction. Install virus scanning applications in your computer. You can download programs like these online, or you can purchase an installer from most computer shops. Having a virus scan can help you identify if the csrss.exe file you have has been corrupted or has been mislabeled.
  • Locate your csrss.exe file. If your anti-virus reported a problem with this file, check if you have duplicate files first. Click the “Start” button on the lower left portion of your screen and go to “My Computer”. Click the “Tools” command on the upper menu bar, then, select “Folder Options”. Enable the display of hidden files and folders by ticking the radio button. Then go to “My Computer” again. Select drive “C” and the “Windows” folder. Locate “System32” from the list of folders and find out how many csrss.exe files are placed here.
  • Know what a csrss.exe looks like. This file is an executable program and should have the appropriate icon in place. If the csrss.exe program you see appears to be a start-up folder or others, delete it.
  • Investigate other folders. If you only have one csrss.exe file under the System32 folder, search for similar files on other folders. This can easily be done by using the Search function of your computer. Click on the “Start” button and type in “csrss.exe” on the field to start a search. If the result displays a file of the same name, but is not located inside the System32 folder, delete this.
  • Search for related worms and delete them. Use the Search feature again of your computer, search for the files “iemsg.dllcsrss.exe” and “iemsg.dll”. Delete both.
  • Restart your computer. After doing all the steps above and making sure that the csrss.exe problem has been resolved, restart your computer. Wait for it to boot completely and run the anti-virus scan again.
  • Remember to delete all the contents of your Recycle Bin afterwards. Also, make it a habit to run thevirus scan application at least once a week to save your computer from being infected by worms and viruses. If you are to plug in any external disks into your computer, run a scan first before sharing any files with it.

How to Become Anonymous on the Internet Using Tor

on

The internet is a scary place, and if you're like me, you don't want anyone tracking you or learning your search habits. It's a blatant invasion of privacy for companies to do this, but at least we have methods of fighting back—one of which is Tor.
Tor stands for The Onion Router. It operates by donated bandwidth from its users. Tor encrypts your traffic, then forwards it through multiple nodes, like the layers of an onion, hence the name "The Onion Router". It protects you by masking your IP (Internet Protocol) address, which is synonymous to your home address. It also protects you by tunneling all of your traffic automatically, as if you had set up a VPN, or SSH tunnel. Most of the time, Google Sharing, a Firefox plugin by Moxie Marlinspike, will suffice. But sometimes I need to be fully anonymous.

Now, be forewarned, Tor isn't fully anonymous. Some things are left to the user to fix, such as changing your User Agent. A User Agent reveals your OS (operating system) and browser information. I'm a privacy nut, so I don't like people having that either. Also, you probably shouldn't be logging onto Facebook, as that will obviously reveal your information.

In this Null Byte, we're going to go briefly go over how to set up Tor, after which I will forward my traffic through it to show you that it's working. The methodology is the same on Windows and Linux, but I'll use Windows to avoid confusion.

Download & Configure Tor

  1. Download Tor
  2. Install Tor.
  3. Navigate to the Data/Vidalia folder, and comment out the Browser line with "#" prefacing it.
  4. Run Tor.
  5. Download Torbutton.
  6. Restart Firefox and click the Torbutton, and it will run using Tor.
Related Posts Plugin for WordPress, Blogger...