Monthly Archives: January 2008

Vishing – The New Scam on the Block!

internet-crime-center.jpgAccording to the Internet Crime Complaint Center, a partnership between the U.S. Federal Bureau of Investigation (FBI) and the U.S. National White Collar Crime Center, Vishing attacks are on the increase.

Yes, you’ve heard of Phishing, but what’s this Vishing you ask?

The IC³ (Internet Crime Complaint Center) describes Vishing as an attempt to persuade consumers either by email, text message, or a telephone call, purportedly from their credit card/debit card company, to divulge their Personally Identifiable Information (PII), claiming their account was suspended, deactivated, or terminated.

In one scenario, recipients are asked to contact their bank by calling a telephone number provided in the e-mail, or alternatively, by an automated telephone recording. When the potential victim calls the telephone number, they’re greeted with “Welcome to the bank of …” and then requested to enter their card number in order to resolve a pending security issue.

In the email scam attempt, in order to persuade the recipient that it is not a scam, the fraudulent e-mail sets out all the caveats the potential victim should be aware of in dealing with this type of email. Who would consider that a scam artist would warn you that a bank would not contact customers to obtain their PII by e-mail, mail, and instant messenger?

To further convince the recipient of the validity of the email, it goes on to state that the recipients should not provide sensitive information when requested in an e-mail, and not to click on embedded links, claiming they could contain “malicious software aimed at capturing login credentials.”

Would this convince you that this email was genuine? It just might.

A new version of this scam recently reported to IC³ involves the sending of text messages to cell phones claiming the recipient’s on-line bank account has expired. The message instructs the recipient to renew their on-line bank account by using the link provided.

These types of attacks against financial institutions, and consumers, are occurring with such frequency that IC³ has called the situation “alarming”.

Minimum safety precautions you should take.

·        Consider every email, telephone call, or text message requesting your PII as a scam

·        Never click on embedded email or cell phone links

·        When contacting your bank; use a telephone number from your statement, a telephone book, or another independent source

You can read more on this issue at www.ic3.gov.

4 Comments

Filed under Internet Safety, Living Life, Malware Advisories, Online Banking, Online Safety, Privacy, Safe Surfing, Windows Tips and Tools

Are You Being Tracked? – Get Snoop Free Privacy Shield

snoopfree.jpgWith the more powerful computing systems many of us have today it’s becoming increasingly more difficult to tell if a computer is infected with malware, based on system slow down alone. Back in the days of less powerful systems, when 128 Meg of RAM and a Pentium 3 running at 665 MHz was considered the height of computing power, system slow down or a slow Internet experience, was suggestive of a malware infection.

Today, the most dangerous and most finely crafted malware, will not generally impact your system resources in such a way as to cause noticeable slow down. This type of malware is designed to remain undetected and to be as stealthy as possible, so that it can get on with its designated task, which most often results in identity theft and the compromising of your financial data.

One of the most insidious of this type of malware, one I have always made sure to guard against, is the keylogger.

A keylogger, or system monitor, is a small program (not always malware) that monitors every keystroke a user types on a computer’s keyboard. A keylogger program does not require physical access to the user’s computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer, or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse.

A malware keylogger typically consists of two files: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke and uploads the information over the Internet.

Luckily, there is a remedy for this type of malware threat.

SnoopFree Privacy Shield is a powerful application that guards your keyboard, screen and open windows from all spy software. It makes it  virtually impossible for any spy program to work on your computer; since SnoopFree Privacy Shield’s  unique protection works against spy software in real time.

I have been using this application for quite some time, and I have been amazed at the number of programs that have requested access to my keyboard and screen, particularly programs that I was in the process of installing. Since I test a lot of applications, I see this type of program behavior frequently. Unless there are valid reasons for this type of access, I don’t allow it. Surprisingly, in most cases the application installs correctly. Curious!

If you’re serious about privacy, then this free application is a must have addition to your security toolbox.

Download at:   SnoopFree Privacy Shield

2 Comments

Filed under Anti-Keyloggers, Anti-Malware Tools, Freeware, Internet Safety Tools, Malware Advisories, Online Safety, Privacy, Safe Surfing, Software, System Security, Windows Tips and Tools

Why You’re Not a Savvy Computer User! – Another View

typical-user-2.jpgCoauthored by Wendell Dryden

I’m often critical, on this Blog, of the typical computer user’s lessez faire attitude toward security, particularly on the Internet. 

For example, I recently wrote an article entitled “FaceBook – A Scam/Spam/Phishing Factory?”   which included  the following quote from an earlier article, “The Unsecured Internet Super Highway – Are You Licensed to Drive? – Get Up to Speed Here!

“Being involved in computer security, I am amazed at the lack of knowledge exhibited by typical computer users, and most importantly, the lack of knowledge concerning the need to secure their machines against the ever increasing risks, previously noted, on the Internet. I’m not talking about unintelligent people here. I am talking about people who are intelligent in every other aspect of life, but who view computers like cavemen who saw fire for the first time.” 

Wendell Dryden, http://wendell-communitylit.blogspot.com/ a fellow Blogger from Saint John, New Brunswick, Canada, whose quality and style of writing I admire, commented on the FaceBook article and it certainly gave me food for thought. 

Those of us who have a high level of knowledge in various aspects of technology, including computer security, often forget that issues surrounding technology are rarely as simple as they sometimes appear to us. 

Wendell raised some challenges for me in my thinking patterns surrounding the typical computer user and security. 

See what you think.

My perception is that most people still see the computer as a kind of entertainment device, with an attached cell-phone like feature.  Computers are for playing, chatting, watching short clips, listening to tunes…. 

If people don’t take internet security (or pc maintenance) seriously, it’s because they don’t think of the computer as a serious device. 

Some of this is related to our cultural laziness around safety and prevention.  People are routinely reckless with automobiles, decline to clean out the lint catch, and mishandle loaded guns. 

But, mostly, I think computers are thought of like television or boom boxes… fun while they work. 

My frustration is with government, health and educational institutions that push people to use the internet as though it were as secure and straight forward as a hard-line telephone.  I also think an extra burden of responsibility should be placed on any company or organization that promotes, and then facilitates, monetary transactions. 

In short, an outfit like FaceBook has no business asking – or even allowing a place for – things like street addresses, date of birth or credit card numbers on its hyper-connective site.  If people choose to post those things on their wall… well, that’s a different matter.  But otherwise, there ought to be a legal responsibility to not ask for certain kinds of private information. 

Idealistic, or what! 

I tend to think that Wendell has a good grasp of some of the real issues surrounding the lack of concern for computer security that a typical user exhibits. 

What’s your view?

2 Comments

Filed under FaceBook, Internet Safety, Living Life, Online Safety, Personal Perspective, Privacy, Safe Surfing, Windows Tips and Tools

Warning! – Valentine’s Day Storm Worm – Be Prepared

valentines-day-2.jpgI remember last February thinking the whole world had suddenly fallen in love with me. I use 5 different email services, all for different purposes, and each of my mailboxes was overflowing with Valentine’s Day greeting cards. 

Now I’m a nice guy, (I think), but nice enough to have my inboxes stuffed with Valentines? I don’t think so now, and I didn’t think so then. I mean, how many emails are you likely to get stating, “Falling in love with you”, “Sending you my love”, “Memories of you” or “I Love You Soo Much”? 

Of course what was really happening was we were faced with an avalanche of “romantic” emails seeded with the Storm Worm. The worm delivers rootkits which, if downloaded, takes control of a system via peer-to-peer communications, potentially making compromised systems a tool in identity theft and financial loss. 

The body of the email contains a link to an IP address-based website, which is actually one of the many PCs in the storm network of compromised computers. The website displays a large red heart, while installing malware onto your computer. It’s estimated that this year, 8 per cent of “romantic” emails, or one in every 12 emails, is likely to contain malware. 

To further complicate matters, according to PandaLabs, Panda Security’s laboratory for detecting and analyzing malware, it has detected two new worms, Nuwar.OL and Valentin.E, which use Valentine’s Day email messages to spread. Basically, these two new worms mimic the behavior of the Storm Worm. 

You know what to do, right?

  • Don’t open emails that come from unknown sources. 
  • Don’t click on any links included in email messages, even though they may come from reliable sources. Instead, type link in the address bar.
  • Don’t run attached files that come from unknown sources; especially these days.
  • Stay alert for files that claim to be Valentine’s greeting cards, romantic videos, etc.
  • Make sure you have an effective security solution installed, capable of detecting both known and new malware strains.

1 Comment

Filed under Email, Internet Safety, Living Life, Malware Advisories, Online Safety, Privacy, Safe Surfing, Windows Tips and Tools

So You Think You Need a New Computer – But Do You?

If you’re considering buying a new computer it’s probable that it’s due to one of the following.

Your computer takes a long time to boot and operates slowly.

Your Hard Drive is full.

Your Internet experience is slow.

 

 

Let me start by saying, I test new software on an almost daily basis, and I do the majority of that testing on a Dell OptiPlex 110 with 512 Meg of memory, running Windows XP Professional. Surprisingly, this is a 6 year old computer and 90%+ of the software and Internet testing that I perform, runs smoothly and adequately on this platform.

So keep in mind that for everyday work, word processing, spreadsheets, e-mail, and general Internet surfing you don’t need the latest, greatest, and most expensive computer.

If your current operating system is Windows XP (and 93% of us run XP), read the requirements that Microsoft set out as the minimum requirements for a computer to run Windows XP when the operating system was released.

These requirements were taken directly from the Microsoft website.

Here’s What You Need to Use Windows XP Home Edition

 

· PC with 300 megahertz (MHz) or higher processor clock speed recommended; 233-MHz minimum required;* Intel Pentium/Celeron family, AMD K6/Athlon/Duron family, or compatible processor recommended

· 128 megabytes (MB) of RAM or higher recommended (64 MB minimum supported; may limit performance and some features)

· 1.5 gigabyte (GB) of available hard disk space.

· Super VGA (800 × 600) or higher resolution video adapter and monitor

· CD-ROM or DVD drive

· Keyboard and Microsoft Mouse or compatible pointing device

I have seen, even quite recently, machines which meet only these minimum requirements satisfy the needs of their users.

This article is not all encompassing, but let’s take a look at some of the alternatives you have before you replace what may be a perfectly functional computer which meets your current needs. If you do decide however, that upgrades to the system are required, a good rule of thumb is to purchase a new system if the upgrades total 50% or more of the cost of a new computer.

Your computer takes a long time to boot and operates slowly.

PCs don’t slow down without a reason. All computers have characteristic operating patterns that lead to predictable, but preventable issues. Simple maintenance, practiced regularly, which is easy even for a non-expert, can keep an older PC running smoothly at peak performance for years.

  • Disk fragmentation, especially on intensively used systems, will degrade performance over time. This is a good task to automate by using a third-party tool like Auslogics Disk Defrag. This application is free and it does a great job. Download:
  • Keep your computer clean and dust free and perform a periodic full system cleaning. Elsewhere on this Blog there is a comprehensive article on cleaning your computer.

 

Your Hard Drive is full.

A full Hard Drive will not function efficiently.

  • You require at least 2 – 3MB of free space for programs to run smoothly. If you lack this much free space, you should uninstall unused programs on your primary drive. A superior program to uninstall programs from your computer is Revo Uninstaller. This free program with its advanced and fast algorithm scans before, and after you uninstall an application.After the program’s regular uninstaller runs, you can remove additional unnecessary files, folders and registry keys that are usually left over on your computer. This feature is a definite plus since it recaptures additional space. Download
  • Running Disk Cleanup will optimize systems by emptying the Recycle Bin, Temporary Setup Files, Downloaded Program Files, Temporary Internet Files, Old Chkdsk Files, Temporary Files, Temporary Offline Files, Offline Files, and so on.
  • For a full and through cleanup, I highly recommend Glary Utilities. Download
  • As well, you should consider copying archived files such as pictures and music, to CD’s or DVD’s to free space on the Hard Drive.

 

Your Internet is slow.

Even the fastest Internet connection is a lot slower than any relatively modern PC, so make sure your Internet settings are properly optimized.

  • An excellent free Internet connection optimizer (Ashampoo Internet Accelerator 2) is available for download at CNET
  • Open the system and verify that all connections feel solid and are placed correctly. Double-check any accessory cards for a snug setting and good connections. Make sure cable tensions are appropriate. Having too much strain on a cable or connection can damage the cable, device, jack/node, or the computer. Be sure that there is plenty of slack in the cables on the device and computer ends. Excess strain may cause intermittent performance issues.

 

It’s possible of course, that the performance of your computer has been adversely affected by malware infections. If you believe that’s the case read my article on this Blog, The top 10 best free security applications your security toolbox can’t be without!

Once you have removed system-clogging clutter, ensured your Internet settings are properly optimized, are satisfied your system is not infected with malware, and performed the other simple maintenance, your old PC should satisfy you with its capabilities.

2 Comments

Filed under Do you need a new computer, Living Life, Personal Perspective, Software, Web Development, Windows Tips and Tools

Hazard Shield – Another Contender for Best Anti-malware Application?

hazard-shield.jpgIn the already overcrowded anti-malware application market, we have yet another free anti-malware contender. On the other hand, it’s always a plus to have another free and effective security application to choose from. 

Orbitech, the developer of Hazard Shield describes this application as “a fast anti-malware program that scans for any and every threat we can get our hands on. These include malicious items such as malware, viruses, spyware, Trojans, backdoors, dialers and much more. Hazard Shield also comes with Real-time protection! Hazard Shield’s Real-time monitor can protect your computer by removing threats before they can do damage. Hazard Shield’s Real-time monitor is free and uses very little system resources.” 

There’s no question that Hazard Shield is fast. In testing, I found it completed scanning approximately 20GB in just over 6 minutes. It did not find any malware on my machines. However, I have heard from other users who have tested this application, that it has detected and removed a number of infections missed by other anti-malware programs including Norton and Webroot Spy Sweeper. 

A definite plus, particularly for less experienced users, is the interface which is simple and straightforward. There’s no learning curve involved here. With a couple of simple clicks you can scan for threats, and remove them from both local and network drives. 

Included in the application are a number of integrated tools including a file killer. This can be particularly important in removing locked or in-use files. Additional tools include an uninstall manager, a process manager, and a scheduled task manager. 

If you’re looking to strengthen your anti-malware resources, this application might be one that’s worth taking a look at. 

Operating Systems: Windows XP

Requirements: NET framework 2.0 

Download at: Orbitech

3 Comments

Filed under Anti-Malware Tools, Freeware, Internet Safety Tools, Privacy, Software, System Security, Windows Tips and Tools

FaceBook – A Scam/Spam/Phishing Factory?

facebook-3.jpg

Recently I received the following two messages in my email, and they certainly got me thinking. Curiously enough, I was at the time actively considering that perhaps the time had come to close my own FaceBook page; for the same reasons as noted in these emails.

 

 Take a look. 

Hey Bill, 

I’m just wondering about FaceBook. I’m starting to think it’s very dangerous and I’m thinking about deleting my account. There’s some weird stuff happening on there. 

Hey Bill, 

I got this message from FaceBook. I don’t know this person and I don’t have a pic; it’s a question mark. 

Sic

            Jessie sent you a message. 

            Subject: hey, cool name.  i’m Jessie 

“hey *****, nice pic.  you seem like you’re pretty cool.  i’m trying to chat with you, but i dont think you can here on facebook, so could you come over to the other site i go to, http://snipurl.com/1sjqn my username’s spice_gal.” 

You’ll notice that in this case, the URL has been modified by using snipurl, a redirection service that turns long URLs into ones that are much shorter. Another URL snipper, tinyurl, is aware their service has been abused in redirecting people to malicious links and now has a section on their site, TinyURL Preview, which will disclose the real URL. 

According to the web site Best Security Tips, FaceBook is currently dealing with phishing scam attacks which gather users’ login information and passwords. Best Security Tips goes on to say, users have been tricked into logging onto fake FaceBook links which then captured their personal data.

If you’re a regular reader of this Blog, you are probably aware that just last week I wrote an article about the knowledge level of typical computer users “The Unsecured Internet Super Highway – Are You Licensed to Drive? – Get Up to Speed Here!”

If you haven’t had a chance to read it, here are a couple of snippets from that article:

“Would requiring a license from the “Department of Computer Literacy”, protect us from the ever increasing exposure we all face to Trojans, Spyware, Virus’, Phishing Scams, Identity Theft, ….. the list goes on.” 

The article goes on to say: 

“Being involved in computer security, I am amazed at the lack of knowledge exhibited by typical computer users, and most importantly, the lack of knowledge concerning the need to secure their machines against the ever increasing risks, previously noted, on the Internet. I’m not talking about unintelligent people here. I am talking about people who are intelligent in every other aspect of life, but who view computers like cavemen who saw fire for the first time.”

Here we come to the crux of the problem. Typical computer users make assumptions that sites like FaceBook and other social networking sites are essentially safe and harmless. That FaceBook, and others, are looking out for their users interests. The old expression, slightly modified, covers it “they simple don’t know what they don’t know.” 

John Dvorak, one of the better techno journalists on the Internet, has written an excellent article, It’s Time for Universal Computer Education, on PCMagazine, in which he states “There’s a huge knowledge gap in this country when it comes to computers and technology in general. How many normal people out there know how hackable everything is? You know it. I know it. Does Aunt Tina know it? I doubt it”. 

“Get it straight, people: Everything is hackable. Genuine universal computer literacy—for everyone, not just the geeks—should be a top priority in the U.S.” 

Given the state of the current, and increasing malware dangers on the Internet, it’s difficult to argue with this view. It’s almost certain that exposures to malware on the Internet will continue to escalate, and with it, the dangers that this presents. 

It’s my view that FaceBook has an obligation to ensure its users are protected. If this means that the company has to undertake, as well as implementing other security safeguards, to educate users in the safe and prudent use of its product, then they need to get on with it. FaceBook’s continued success, and its future longevity, lies in a sound foundation and not in its continuing hype. 

FaceBook has a window of opportunity, right now, to increase value added to its users, by educating them in the safe and prudent way to utilize the services offered by the company. Otherwise, it is only a matter of time before FaceBook’s lack of security and questionable content policy, will be rejected by the very market they wish to cultivate. 

What will happen to its fifteen billon dollar valuation then?

2 Comments

Filed under FaceBook, Internet Safety, Living Life, Malware Advisories, Online Safety, Personal Perspective, Privacy, Safe Surfing, Windows Tips and Tools

Don’t Have McAfee Site Advisor? Then How Do You Know Where You Are on the Net?

mcafee-site-advisor.gifWould you wander through a neighborhood that you were unfamiliar with? One which might possibly be full of predators? Well of course you wouldn’t.

However, if wander through the Internet without the aid of SiteAdvisor, a free Internet service from McAfee, (the plug-in is available for Internet Explorer/ Firefox) that tests web sites you are visiting for spyware, spam, viruses and online scams, this is close to what you are doing.

According to McAfee, this service is based on a huge database with detailed test results for more than 100,000 pieces of software, and which covers more than 90% of the world’s Web traffic. The service integrates with search engine results from popular search engines such as Google, Yahoo, etc.

The plug-in’s icon, which is added to your browser toolbar, displays a color rating for each site you visit, which indicates whether a site is safe to use, or should be used with caution.

Site Ratings:

  • Green – Safe: McAfee has tested the site and didn’t find any significant problems.
  • Yellow – Caution: McAfee has tested the site and advise there are some issues you should consider.
  • Red - Warning: McAfee has tested the site and found some serious issues that you need to carefully consider before using this site.
  • Grey – McAfee has not yet tested the site, or the site is in the process of being tested.

 

According to McAfee’s own research, 90% of U.S. consumers on the Internet make use of search engines, and 80% of Web site visits originate from these search queries. Additionally, McAfee stated their May 2006 Search Engine Safety study revealed, search engines expose users to dangerous sites posing security risks including spyware, spam, and scams.

Surf more securely by adding this browser add-on which will provide you with an in-depth site analysis based on real world test results. Always keep in mind however, that you are your own best protection. Stop · Think · Click

Download this browser add-on at McAfee

3 Comments

Filed under Anti-Malware Tools, Firefox Add-ons, Internet Explorer Add-ons, Internet Safety Tools, Online Safety, Safe Surfing, Windows Tips and Tools

So You Want FREE Online Backup? Now You’ve Got It With Mozy!

online-backup.jpgJust like death and taxes are a certainty, the fact that your computer’s Hard Drive will crash one day and refuse to respond, is every bit as certain.

Computer industry statistics seem to indicate that the real-world annualized failure rate (average percentage of disks failing per year), was much higher than the manufacturer’s estimate – an average of 3% vs. the estimated 0.5 – 0.9%. The cost of recovering data from a failed hard drive can exceed $7,500, and success is never guaranteed.

So when that inevitable day arrives, what will you do?

If you are one of the few, out of the ordinary, computer users who regularly and faithfully backup, you will have a lot of work ahead of you but you will recover.

However, if you haven’t backed up, you have lost everything including:

  • operating system
  • applications
  • correspondence
  • pictures
  • music
  • customized settings
  • email accounts, rules/filters, folders and messages
  • data including, letters, graphics, music, databases/other projects

 

The operating system and applications can be replaced, if you have the original install media. But not all computers with preinstalled operating systems have the original operating system installation media supplied with the computer.

The message here then is: everything that can not be replaced needs to be backed up.

It’s now easier than ever to backup giving the large choice of relatively inexpensive media, including CDs, DVDs, USB sticks, external Hard Drives, and increasingly gaining popularity, Online Backup Services.

Perhaps the most popular of these free Online Backup Services is Mozy: Free Online Backup.

Mozy, which requires a broadband connection, is a free and easy to use, software service that gives you 2GB of space allowing you to backup your data over the Internet. When needed, the backed up files can be restored over the Internet.

Mozy includes a Windows Explorer context menu which makes restoring files very easy. Right click on the file you want to restore, and Mozy gives you a list of all previous versions of the file. As well, Mozy incorporates a virtual drive explorer in Windows that allows you to view the files you’ve backed up without having to access the Internet.

If you are not familiar with backup software, or you’re not comfortable with XP’s version, then Mozy might well be the ideal tool for you. Check it out.

Mozy Quick Facts:

  • Open/locked file support
  • 448-bit Blowfish encryption
  • 128-bit SSL encryption
  • Automatic or scheduled backups
  • New and changed file detection
  • Block level incremental backups
  • Bandwidth throttling
  • File versioning
  • Public or private key encryption

 

Download at: Mozy

Additional Free Online Backup Sites:

XDrive - XDrive supplies you with 5 GB of space. The backup software runs on Windows, and provides automatic backups of your data.

IDrive Basic - 2 GB of backup space Free Online Backup, Encrypted, Secure and Automated.

Humyo – Humyo allows you to store up to 25 GB of media files (photos, videos, music) and 5 GB for non-media files.

10 Comments

Filed under Freeware, Online Backup, Productivity Software, Software, USB, Windows Tips and Tools

My Computer Has a Virus – Now What?

 

computer_virus.jpgYou may, or you may not, have a virus so don’t panic. Following the steps below will, in most cases, remove the infection from your system, if in fact your system has a virus. But first, let’s start with the definition of a computer virus so that you know what you’re up against.

A virus is a computer program that can copy itself and infect a computer operating system without permission, or the knowledge of the user. The original virus may modify the copies, or the copies may modify themselves, making the virus more difficult to find.

Not all symptoms that mimic those of a virus infection are in fact produced by a virus. However, if your computer begins to act strangely, or if it is unable to do things it has always done in the past, it may be infected with a virus.

Symptoms including longer-than-normal program load times, unpredictable program behavior, inexplicable changes in file sizes, inability to boot, may indicate that a virus is on your system. However, it is important to distinguish between virus symptoms and those that come from corrupted system files, which can look very similar.

Rule out more standard causes before suspecting a virus. In some cases software related problems, such as program execution errors and corrupted files, can create symptoms that appear to be virus-related. If you just installed new software for example, try uninstalling it and see if the problems disappear.

However, if you regularly engage in any of the following activities, you have substantially increased the risk of your system problem being a computer virus.

  • You download files and software through file-sharing applications such as BitTorrent, eDonkey, KaZaA and other such programs.
  • You click links in instant messaging (IM) that have no context or are composed of only general text.
  • You downloading executable software from web sites without ensuring that the site is reputable.
  • Using your USB stick on public computers, or other computers that are used by more than one person.
  • Opening email attachments from people you don’t know.
  • You make a practice of opening email attachments without first scanning them for viruses.
  • You open email attachments that end in a file extension of .exe, .vbs, or .lnk.
  • You run your Windows computer as an administrator.

 

Next Steps:

Launch Task Manager by hitting Ctrl-Alt-Delete which will give you a list of all current running process. Be aware however, that some viruses are smart enough to bypass Task Manager.

A better solution here would be to use the free service, ProcessScanner, from ProcessLibrary.com, (a Microsoft Gold Certified Partner), which not only scans your Windows computer for all running processes, but in addition tells you what’s running, what each process is associated with, and most importantly, a risk analysis of each process. You may find the answer to the problem here. If not, then proceed to the next step.

In Windows XP, open the Control Panel, Administrative Tools, Services, which will give you a detailed description of the services Windows is running. If you find something that’s unfamiliar, or causes you concern, Google that service/services on the Internet.

Proceed then to select Run from the Start Menu, and type “msconfig” in the box. With this tool you not only see the services running, but most importantly, the programs that your system is launching at startup. Again, if you find something that’s unfamiliar, or causes you concern, Google it on the Internet.

There are a number of online virus scanners that are, in my view, better at detecting malware than locally installed applications. I recommend that you next scan your machine at Trend Micro Online Scanner, and in addition scan it again at Panda Online Scanner. In this situation two is definitely better than one.

Most cases of infection and compromise should be cleaned, and your machine returned to its previous condition, by employing the above methods. But unfortunately, this is not always the case and you’re then faced with performing a full reinstall of the operating system. Since there is always the risk of an un-repairable system, this reinforces the need to ensure you have a realistic backup policy in place.

Security risks on the Internet you need to be aware of.

Trojan horse programs

Back door and remote administration programs

Denial of service

Being an intermediary for another attack

Unprotected Windows shares

Mobile code (Java, JavaScript, and ActiveX)

Cross-site scripting

Email spoofing

Email-borne viruses

Hidden file extensions

Chat clients

Packet sniffing

Security Checklist: Actions you can take to protect your computer system.

Don’t open unknown email attachments

Don’t run programs of unknown origin

Disable hidden filename extensions

Keep all applications (including your operating system) patched

Turn off your computer or disconnect from the network when not in use

Disable Java, JavaScript, and ActiveX if possible

Disable scripting features in email programs

Make regular backups of critical data

Make a boot disk in case your computer is damaged or compromised

Turn off file and printer sharing on the computer.

Install a personal firewall on the computer.

Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet.

Ensure the anti-virus software scans all e-mail attachments.

Be proactive when it comes to your computer’s security; make sure you have adequate software based protection to reduce the chances that your machine will become infected.

The free software listed below, in my view, provides better than average malware protection.

avast! 4 Home Edition

www.avast.com

This anti virus app is a real fighter, scanning files on demand and on access, including email attachments. Let’s you know when it detects mal-ware through its shield function. An important feature is a boot-time scan option which removes mal-ware that can’t be removed any other way.

AVG Anti-Virus Free Edition

www.free.grisoft.com

Similarly, this program scans files on access, on demand, and on schedule. Scans email; incoming and outgoing. For those on Vista, your in luck, it’s Vista-ready. I have been using this application since its release and it now forms part of my front line defenses. I recommend this one highly.

SpyCatcher Express

www.tenebril.com

SpyCatcher does a good job of cleaning out spy-ware and at stopping further infestation. In my view however, it’s not as reliable as AVG Anti-Spyware.

Ad-Aware 2007

www.lavasoftusa.com

In my view, Ad-Aware 2007 Free is the best free spyware and adware remover available. It does a relatively good job of protecting against known data-mining, Trojans, dialers, malware, browser hijackers and tracking components. The only downside with the free version; real-time protection is not included.

ThreatFire 3

www.threatfire.com

ThreatFire 3 blocks mal-ware, including zero-day threats, by analyzing program behavior and it does a stellar job. Again, this is one of the security applications that forms part of my front line defenses. I have found it to have high success rate at blocking mal-ware based on analysis of behavior. Highly recommend this one!

Comodo Firewall Pro

www.comodogroup.com

The definitive free firewall, Comodo Firewall protects your system by defeating hackers and restricting unauthorized programs from accessing the Internet. I have been using this application for 6 months and I continue to feel very secure. It resists being forcibly terminated and it works as well, or better, than any firewall I’ve paid for. This is one I highly recommend. Amazing that it’s free!

ZoneAlarm

www.zonelabs.com

The free version of ZoneAlarm lacks the features of ZoneAlarm Pro’s firewall. Its program control asks you regularly whether to allow programs; for some this can get to be intrusive and annoying. But it’s been around forever it seems, and it can’t be shut down, or out, by mal-ware.

WinPatrol

www.winpatrol.com

Do you want to get a better understanding of what programs are being added to your computer? Then WinPatrol is the program for you. With WinPatrol, in your system tray, you can monitor system areas that are often changed by malicious programs. You can monitor your startup programs and services, cookies and current tasks. Should you need to, WinPatrol allows you to terminate processes and enable, or disable, startup programs. There are additional features that make WinPatrol a very powerful addition to your security applications.

Sandboxie

www.sandboxie.com

Surfing the Internet without using Sandboxie is, to me, like jumping out of an airplane without a parachute. Deadly! This application creates a “Sandboxed” protected environment on your machine within which you browse the net. Data that is written to your hard drive is simply eliminated, (or not, your choice), when the sandbox is closed. Utilizing this application allows you to surf the web without the risk of infecting your system with mal-ware or other nasties. This is another security application I have been using for over 6 months and it has yet to let me down. Highly recommended.

Snoop Free Privacy Shield

www.snoopfree.com

Snoop Free Privacy Shield is a powerful application that guards your keyboard, screen and open windows from all spy software. I have been using this application for quite some time, and I have been amazed at the number of programs that have requested access to my keyboard and screen. Particularly, programs that I am in the process of installing. If you’re serious about privacy, this is a must have addition to your security toolbox.

10 Comments

Filed under Anti-Malware Tools, Freeware, Internet Safety, Internet Safety Tools, Malware Advisories, Online Safety, System Security, Windows Tips and Tools