The Nimda Virus...

/p> Because of the increased activity over the Internet, viruses and worms have become serious pests. As the Internet advances, these pests are becoming much more sophisticated. There capacity to spread across the Internet in just a matter of hours can cause serious floods of payloads to systems. One recent virus that caused, and still is causing, an up-roar across the Internet is the 'Nimda'. What is Nimda? Nimda is a computer virus appearing first on September 18, 2001 when it caused massive ...
Read more »

Malware Protector 2008 or Malware Infector?

Malware Protector 2008 is one more rogue (fake) anti-spyware program making its rounds.  It is a clone of other spyware programs like Advance XP Defender and MalwarePatrolPro.  Malware protector 2008 will torment you with pop-ups, trying to coax you into wasting your money on a program that actually installed malware on your computer for you.The program invades your system through Trojan Zlob or Vondu.  The most common way to come across a Trojan is through downloading videos from ...
Read more »

What is Spyware and Malware? and Risk of Data Theft

Many people are pulling their hair out because their computers doesn't seem to work the way they want it to. For some reason, their PCs seem to have a life of their own. Chances are, their computer systems have already been infected with spyware or malware, without realizing it. So what exactly is spyware and malware, and why is it a hair pulling experience for the user? Spyware is a type of application that is installed into the computer system without the user's knowledge. It is meant to ...
Read more »

Vista Prone to Hacking?

Can it really be possible? Windows Vista, the newly released operating of Microsoft, is vulnerable to hacking? Yes, you heard it right. It is possible, according to Microsoft itself. Well, it appears that an audio podcast has the capability of hacking Windows Vista's speech recognition feature. By using recorded audio commands, hackers can run malicious programs. Based on an initial investigation conducted by Microsoft, Vista's speech recognition feature can allow an attacker to execute ...
Read more »

Hacking - A Fullstop on E-system

Passion or Madness: Now days, it has become a passion to learn about hacking and information security. Sometimes I do not understand that whether it is a passion or a kind of madness. This passion has resulted due to several news articles, media stories and the excitement showing hacking related thrills in films. But, on the other hand there is a fact also that very few peoples know anything in-depth about the topic of hacking and information security. So, I would suggest that without adequate ...
Read more »

9 Tips to Keep Your Computer Free From Spyware and Malware

In these economically strained times, computer crime such identity theft from spyware runs rampant. Adding insult to injury, many malware can permanently disable your computer. Here are some tips for how to keep your computer up and running and free of spyware, adware and other malware. • Run a spyware removal tool. Remember that many software that claims to remove spyware is actually spyware in disguise, so be wary and download antispyware only from reputable sources. • Avoid Microsoft ...
Read more »

Windows 2000 Security

I was asked recently to go to a car dealership and do a security analysis on their Windows Server 2000 machine. This is what I recommend doing to any Windows 2000 machine where applicable. Make sure that the guest account is disabled. It comes disabled by default. A problem I notice allot is when I go to companies, lots of accounts are still active for employees who no longer work there. They should be removed when the employee is terminated or leaves on their own accord. Disgruntled employees ...
Read more »

Is your network security and user access in the right balance?

b>The whole meaning of networking is to share programs, but granting others to access a computer device reveals an open window for those with foul motives, too. In the early days networks were quite secure because they were closed in systems, and to do any harm you had to get physical access to a server wired to the LAN. Remote access and Internet possibility to hook up has changed that. Broader availableness and less cost of broadband (DSL and cable) connections means that even home computers ...
Read more »

Security Measures for your PC

Data on a PC needs vigilance. With Internet access, data is at considerable risk from spy ware and other browsers. Eliminate risks by securing your PC. Anonymity of the net is not enough protection. Many can gain access and steal data, implant data, or dangerous viruses as well as Trojan horses. Simple steps ensure good system protection and peace of mind. * Set effective passwords for all users. It should be of minimum seven characters and contain upper case, lower case, as well as be ...
Read more »

How to Use Technology to Better Prepare Students for the

Technology is becoming more and more prevalent in our everyday lives as well as the workforce. Recent studies predict that by the year 2010 almost every job in the American workplace will require some use of technology. This influx in technology has caused changes in the way the computer is being used in the workplace and in the way computer literacy needs to be taught in our schools. When the personal computer was first introduced in the 1980’s, people had to learn how to operate it, program ...
Read more »