Tips For Computer User

My Photo
Name:
Location: Shah Alam, Selangor, Malaysia

Monday, January 30, 2006

NEWS

Nyxem virus set to bite next week

Businesses have been warned to brace themselves for a possible traffic spike next week caused by the Nyxem virus.

The Nyxem virus was first reported on 16 January. It is thought to have infected more than half a million PCs, and security vendor Ironport warned on Thursday that these machines are now hard-coded to propagate the virus on Feb. 3.
Advertisement

Companies will be unlikely to be directly affected if they are running up-to-date antivirus software because the major antivirus vendors have now released patches. But Ironport warned that firms could experience secondary effects as the virus tries to propagate itself by harvesting email addresses on an infected machine.

"The knock-on effects will come as compromised PCs try to communicate with businesses. This will cause additional email and network traffic, and possible slow down email response time," said Jason Steer, technical consultant at Ironport.

Security company F-Secure has reported that Nyxem.E reached the top position in its virus statistics with 21.7 percent of all reported infections. On Saturday the Web counter used by the Nyxem worm itself showed over 510,000 infections and continued to rise, according to F-Secure.

Once active, Nyxem will delete all Word, Excel, PowerPoint, and PDF file types from a compromised PC. The multi-faceted malware will also attempt to propagate itself both through email and as a network worm, which can be particularly damaging on closed networks.

"Nyxem is certainly malicious. It can be delivered via email, but also as a network worm. It probes other PCs on a closed network to compromise them and send itself to the other computers, to infect as many hosts as possible," said Steer.

The malware hides in attachment types not typically blocked by attachment filters, IronPort said.

The Internet community will not know the scale of the February attack until it occurs. "It depends on how many hosts are infected," said Steer. "At the moment it's just sitting there quietly, and we won't know how many home users have been infected until 3 February."

Businesses should warn their employees not to open suspicious emails, and to know what these emails may look like. "The subject lines may contain some references to pornography--fairly typical stuff," said Steer.

"Be vigilant. Update your antivirus patches, and make sure your hard-disk has been scanned to detect and remove the virus," he added.

Nyxem has the potential to cause havoc throughout the year, as infected PCs are set to activate on the third day of every month, unless they are cleaned up.

sources : ZDNet UK

Sunday, January 29, 2006

SpywareBlaster 3.5.1

SpywareBlaster doesn't scan for and clean spyware--it prevents it from being installed in the first place. SpywareBlaster prevents the installation of ActiveX-based spyware, adware, dialers, browser hijackers, and other potentially unwanted programs. It can also block spyware/tracking cookies in IE and Mozilla/Firefox, and restrict the actions of spyware/ad/tracking sites. With the built-in Check for Updates feature, you can help ensure your protection is up-to-date. SpywareBlaster also includes a System Snapshot feature, which lets you take a snapshot of your computer in its clean state and later revert, undoing many changes made by spyware and browser hijackers.

Version 3.5.1 improves updating with new Turbo-Update technology, adds various feature and protection enhancements, tweaks, and optimizations. Get SpywareBlaster 3.5.1

Saturday, January 28, 2006

SPAM


THREE KEY TIPS FOR COMBATTING SPAM


Spam refers to unsolicited email, mostly commercial, advertising a product or service that is mass mailed to thousands of email addresses at a time, filling people’s Inboxes. Spam does not refer to legitimate commercial email for which consumers have given their consent. Spam is often a source of scams, viruses and offensive content.

Spam is a major problem that takes up valuable time and increases costs for consumers, business and governments. Each of us must do our part to protect ourselves and others from spam. Canada's Task Force on Spam has developed these three tips to help you protect yourself and fight spam. Read more..


E-mail

Spam, viruses, identity-theft schemes, and hoaxes are just some of the threats to e-mail users today. Get more..


Tips and help for regular users

Check out the sections below for tips and tools. Each item is marked with keyletters - W for Windows Users; M for Mac; U for UNIX/Linux; A for Any; I for Information; P for Product; S for Service; and C for Commercial. Read more..

Friday, January 27, 2006

Support Forums

These are by far Computing.Net's most popular feature. In the forums one can ask a question or offer an answer. They are the most effective technical support system used by Computing.Net to date. If you are having a problem, you should consider using the forums as a starting point. To use a forum click the link. ->Computer.Net<-

Thursday, January 26, 2006

Hardware tips and tricks for Windows, Macs and Linux PCs

This week I have more of my special tips and tricks, this time concentrating on hardware tips for all computer users.

Get rid of bad vibes. Put your computer where it won't be subject to vibration, shaking or accidental kicks. They can mess up your hard drive. If it's on top of your desk, make sure your desk can't rock (even slightly) from side to side or front to back; prop up any short legs if you need to. If it's on the floor, make a solid platform out of concrete blocks covered by a velvet cloth or an old sheet, whichever looks better.
More Source : Technofile

Tuesday, January 24, 2006

Spyware glossary

Adware
Typically, adware components install alongside a shareware or freeware application. These advertisements create revenue for the software developer and are provided with initial consent from the user. Adware displays Web-based advertisements through pop-up windows or through an advertising banner that appears within a program's interface. Getting pop-up advertisements when you’re working on your computer is very annoying.

Spyware
Spyware often installs as a third-party component bundled with a freeware or shareware application, just like adware, making the distinction between the two somewhat vague. Spyware includes code used to gather and transmit information about the user or his or her behaviour to a third party. This statistical data often is collected without the knowledge or consent of the user.

Hijackers
Often installing as a helpful browser toolbar, hijackers may alter browser settings or change the default home page to point to some other site.

Trojan horses
Trojan horses slip into an individual’s system and run without the user’s knowledge. They can have many functions. For example, some use a computer's modem to dial long-distance, generating huge phone bills for the computer owner. Unlike viruses and worms, Trojan horses do not make copies of themselves.

Tracking cookies
Internet browsers write and read cookies, files with small amounts of data (such as site passwords and settings) based on instructions from Web sites. In many cases, cookies provide a benefit to users. However, in some instances cookies are used to consolidate and track user behaviour across different sites, which provides marketers with private information about an individual.

Tips Buy Computer

Buying a computer can be a daunting task. Once you get it, you will have fun exploring all of the programs. But the actual purchasing of it, well, that's always difficult. These days, there are so many brands to choose from. Once you decide on a brand, you have to decide on which computer within that brand is right for you. Then, you might have to make even more decisions as many companies allow you to choose what components you want included with it. If you have never purchased a computer before, or if you haven't in quite some time, you will find that keeping up with what's up-to-date is challenging. Here's a basic breakdown of what to look for when you are buying a computer. more :

Computer Security and the Internet

Read "Computer Security and the Internet" at Scientific American. Subscribe and receive 12 issues home-delivered or instant digital access to all issues from 1993 through today.
www.scientificamerican.com

Computer Security Software Reviews

Reviewed and rated one of the top Internet security softwares, by 6 Star Reviews. Don't buy anything before you read this.
adware-spyware-removal.6starreviews.com

Personal Security Suite

All-in-one security solution from Kaspersky Labs protects against viruses, spyware, adware, hackers and spam. Hourly antivirus database updates. Free evaluation copy.
www.kaspersky.com

Looking for Computer Security Info?

Get the latest computer security-related news, discussion threads, white papers, and much more. Visit IT toolbox Security today.
security.ittoolbox.com

Security For Computer Hardware Trial

Stop hackers from getting into your computer. Block unauthorized access to your personal files, get protection from identity theft and nasty viruses with Privacy Wall". Download free trial.
free.aol.com