Tag Archives: symptoms

Video Game Addiction – True or False?

Let’s cut to the chase immediately – video game addiction is a real addiction, just as Internet gambling is a real addiction; just as an addiction to Internet pornography is a real addiction.

The question that needs to be explored more thoroughly however is: is video game addiction the kind of serious problem that the media would have us believe?

Or, do the media, for the sake of sensationalism, take isolated instances of computer addiction and create a frenzy of concern that is unwarranted and not supported by the facts?

The media and the “facts” – an oxymoron if there ever was one!

This past week, in a small city just outside of Toronto, Canada (where I live), a fifteen year old boy, Brandon Crisp, disappeared following an argument with his parents over his access to his Xbox, and the video game Call of Duty 4.

According to the boy’s father, Brandon was exhibiting what some psychiatrists consider classical signs of addiction, since he reportedly began to skip school, stay up all night, and steal money.

This tragic case is still unresolved, and the boy remains missing as of today’s date – October 25, 2008, despite a massive effort by both Police, and hundreds of volunteer searchers.

According to the CBC (one of Canada’s national television networks), Microsoft (the developers of the Xbox), has now become involved, and has added $25,000 to an existing reward pool of $25,000 bringing the total to $50,000. In addition, reports indicate that Microsoft is cooperating with authorities in providing information regarding the 200 or so Xbox gaming site contacts, that may be relevant to the investigation of Brandon’s disappearance.

I have a problem however, with how this tragic story has been reported in the mainstream media. Uninformed news reporters, and editors (both print and T.V.), who have little experience with the Internet or technology, except perhaps as casual users, have used this story as an illustration of how video game addiction is a major hidden problem.

For example, according to news report in the Toronto Star, Bruce Ballon, a psychiatrist with the Centre for Addiction and Mental Health (CAMH) in Toronto, is quoted as stating “We’ve been receiving at least a couple of calls a week asking, ‘How do you deal with Internet addiction?’ Ballon goes on to say “(Society is) just starting to realize – oh my God, it’s so huge. This is why people have been afraid to open the doors.”

Sorry Dr. Ballon, but there seems to be a major disconnect here. Consider, “a couple of calls a week” versus “oh my God, it’s so huge.” I’m not a mathematician, but I do know this, the number “two” is hardly “huge”.

A more balance reporting of the facts surrounding Internet, computer, or gaming addiction, would have included those of Dr. Jerald J. Block, M.D., who, in an editorial published on The American Journal of Psychiatry website earlier this year, made the point that 86 per cent of “internet addicts”, including gaming addicts, also have some other form of a mental disorder.

Dr. Block goes on to say, in his editorial, that Internet addiction is an “increasingly commonplace compulsive-impulsive disorder” and should be included in psychiatry’s official guidebook of mental disorders, the DSM-V.

For those who are unfamiliar with DSM-V, it is an American psychiatric handbook that lists categories of mental disorders, and the criteria for diagnosing them.

Despite its controversy in certain quarters; controversy, in part, caused by a perceived need to add new mental illnesses, it is used worldwide by clinicians and researchers as well as insurance companies, pharmaceutical companies and policy makers.

There is no doubt that mental illness is a complex and mystifying subject that includes a multitude of variables. My real problem is with those people (including the mainstream media), who use, or more properly misuse, isolated examples of tragic events to achieve their own ends. In this case, to generate additional readership in the guise of providing a public service i.e. computer gaming addiction is a major hidden problem.

We now live in a highly reactive society; one in which there are individuals, groups, and organizations waiting in the wings ready to pounce with great gusto on established, or emerging technologies.

If you think that statement is excessive, then consider this published comment (just one of many like it), I came upon recently, regarding computer gaming:

“I have a direct experience with the subject and can tell you that with this opponent you can not win. Online gaming industry is investing a lot of money to find the most addictive ways to hook their customers as addiction = profit.

It is even more problematic then other addictions as it is not recognized as a vice by the general public. Parents easily succumb to requests to allow it and peer pressure is enormous as it is not controlled in any way. I see only radical solutions to this, either tax it so it becomes uneconomical as a source of entertainment or ban it all together”.

Computers/connected devices will always be the target of modern day Luddites – a term used to describe those opposed, in some form, to technological progress and technological change.

Despite the possible negative psychological effects of video game playing for those who already struggle with some form of a mental disorder, overall there are many positive effects associated with video game playing, but that’s an issue for a future article.

If you’re a concerned parent, how do you determine if your child qualifies as an Internet, or computer gaming addict?

It is generally agreed that exhibiting any of the following symptoms while online, or offline; excessive gaming, sexual preoccupations or excessive email or text messaging, meets at least one, or more, of the criteria needed to establish Internet or gaming addiction.

However, the following symptoms must also be in evidence:

Withdrawal – including feelings of anger, tension, and/or depression when the computer is inaccessible.

Tolerance – including the need for better computer equipment, more software, or more hours of use.

Negative Repercussions – including arguments, lying, poor achievement, social isolation, and fatigue.

For another view on this topic check out “Is Your Inner Child Addicted to the Internet” by my good buddy, TechPaul.


Filed under Interconnectivity, Internet Safety for Children, Online Gaming, Parenting Help, Personal Perspective, Windows Tips and Tools

Think You Have A Virus? – Some Solutions

You may, or you may not, have a virus so don’t panic. If your system has a virus then following the steps below will, in most cases, remove the infection from your system. But first, let’s start with the definition of a computer virus so that you know what you could be up against.

A virus is a computer program that can copy itself and infect a computer operating system without permission, or the knowledge of the user. The original virus may modify the copies, or the copies may modify themselves, making the virus more difficult to find.

Not all symptoms that mimic those of a virus infection are in fact produced by a virus. However, if your computer begins to act strangely, or if it is unable to do things it has always done in the past, it may be infected with a virus.

Symptoms including longer-than-normal program boot time, unpredictable program behavior, baffling changes in file sizes, inability to boot, may indicate that a virus is on your system. However, it is important to distinguish between virus symptoms and those that come from corrupted system files, which can look very similar.

Rule out more standard causes before suspecting a virus. In some cases software related problems, such as program execution errors and corrupted files, can create symptoms that appear to be virus-related. If you just installed new software for example, try uninstalling it and see if the problems disappear.

If you regularly engage in any of the following activities, you have substantially increased the risk of your system problem being a computer virus.

  • You download files and software through file-sharing applications such as BitTorrent, eDonkey, KaZaA and other such programs.
  • You click links in instant messaging (IM) that have no context or are composed of only general text.
  • You downloading executable software from web sites without ensuring that the site is reputable.
  • Using your USB stick on public computers, or other computers that are used by more than one person.
  • Opening email attachments from people you don’t know.
  • You make a practice of opening email attachments without first scanning them for viruses.
  • You open email attachments that end in a file extension of .exe, .vbs, or .lnk.
  • You run your Windows computer as an administrator.

Next Steps:

Launch Task Manager by hitting Ctrl-Alt-Delete which will give you a list of all current running process. Be aware however, that many viruses are smart enough to bypass Task Manager.

A better solution here would be to use the free service, ProcessScanner, from ProcessLibrary.com, (a Microsoft Gold Certified Partner), which not only scans your Windows computer for all running processes, but in addition tells you what’s running, what each process is associated with, and most importantly, a risk analysis of each process. You may find the answer to the problem here. If not, then proceed to the next step.

In Windows XP, open the Control Panel, Administrative Tools, Services, which will give you a detailed description of the services Windows is running. If you find something that’s unfamiliar, or causes you concern, Google that service/services on the Internet.

Proceed then to select Run from the Start Menu, and type “msconfig” in the box. With this tool you not only see the services running, but most importantly, the programs that your system is launching at startup. Again, if you find something that’s unfamiliar, or causes you concern, Google it on the Internet.

There are a number of online virus scanners that are, in my view, better at detecting malware than locally installed applications. I recommend that you next scan your machine at Trend Micro Online Scanner, and in addition scan it again at Panda Online Scanner. In this situation two is definitely better than one.

Most cases of infection and compromise should be cleaned, and your machine returned to its previous condition, by employing the above methods. But unfortunately, this is not always the case and you’re then faced with performing a full reinstall of the operating system. Since there is always the risk of an un-repairable system, this reinforces the need to ensure you have a realistic backup policy in place.

Security risks on the Internet you need to be aware of.

• Trojan horse programs

• Back door and remote administration programs

• Denial of service

• Being an intermediary for another attack

• Unprotected Windows shares

• Mobile code (Java, JavaScript, and ActiveX)

• Cross-site scripting

• Email spoofing

• Email-borne viruses

• Hidden file extensions

• Chat clients

• Packet sniffing

Security Checklist: Actions you can take to protect your computer system.

• Don’t open unknown email attachments

• Don’t run programs of unknown origin

• Disable hidden filename extensions

• Keep all applications (including your operating system) patched

• Turn off your computer or disconnect from the network when not in use

• Disable Java, JavaScript, and ActiveX if possible

• Disable scripting features in email programs

• Make regular backups of critical data

• Make a boot disk in case your computer is damaged or compromised

• Turn off file and printer sharing on the computer.

• Install a personal firewall on the computer.

• Install anti-virus and anti-spyware software and ensure it is configured to automatically update when you are connected to the Internet.

• Ensure the anti-virus software scans all e-mail attachments.

Be proactive when it comes to your computer’s security; make sure you have adequate software based protection to reduce the chances that your machine will become infected.

The free software listed below, in my view, provides better than average malware protection.

avast! 4 Home Edition


This anti virus app is a real fighter, scanning files on demand and on access, including email attachments. Let’s you know when it detects mal-ware through its shield function. An important feature is a boot-time scan option which removes mal-ware that can’t be removed any other way.

AVG Anti-Virus Free Edition


Similarly, this program scans files on access, on demand, and on schedule. Scans email; incoming and outgoing. For those on Vista, your in luck, it’s Vista-ready. I have been using this application since its release and it now forms part of my front line defenses. I recommend this one highly.

SpyCatcher Express


SpyCatcher does a good job of cleaning out spy-ware and at stopping further infestation. In my view however, it’s not as reliable as AVG Anti-Spyware.



In my view, Ad-Aware Free is the best free spyware and adware remover available. It does a relatively good job of protecting against known data-mining, Trojans, dialers, malware, browser hijackers and tracking components. The only downside with the free version; real-time protection is not included.

ThreatFire 3


ThreatFire 3 blocks mal-ware, including zero-day threats, by analyzing program behavior and it does a stellar job. Again, this is one of the security applications that forms part of my front line defenses. I have found it to have high success rate at blocking mal-ware based on analysis of behavior. Highly recommend this one!

Comodo Firewall Pro


The definitive free firewall, Comodo Firewall protects your system by defeating hackers and restricting unauthorized programs from accessing the Internet. I have been using this application for 6 months and I continue to feel very secure. It resists being forcibly terminated and it works as well, or better, than any firewall I’ve paid for. This is one I highly recommend. Amazing that it’s free!



The free version of ZoneAlarm lacks the features of ZoneAlarm Pro’s firewall. Its program control asks you regularly whether to allow programs; for some this can get to be intrusive and annoying. But it’s been around forever it seems, and it can’t be shut down, or out, by mal-ware.



Do you want to get a better understanding of what programs are being added to your computer? Then WinPatrol is the program for you. With WinPatrol, in your system tray, you can monitor system areas that are often changed by malicious programs. You can monitor your startup programs and services, cookies and current tasks. Should you need to, WinPatrol allows you to terminate processes and enable, or disable, startup programs. There are additional features that make WinPatrol a very powerful addition to your security applications.



Surfing the Internet without using Sandboxie is, to me, like jumping out of an airplane without a parachute. Deadly! This application creates a “Sandboxed” protected environment on your machine within which you browse the net. Data that is written to your hard drive is simply eliminated, (or not, your choice), when the sandbox is closed. Utilizing this application allows you to surf the web without the risk of infecting your system with mal-ware or other nasties. This is another security application I have been using for over 10 months and it has yet to let me down.

Snoop Free Privacy Shield


Snoop Free Privacy Shield is a powerful application that guards your keyboard, screen and open windows from all spy software. I have been using this application for quite some time, and I have been amazed at the number of programs that have requested access to my keyboard and screen. Particularly, programs that I am in the process of installing. If you’re serious about privacy, this is a must have addition to your security toolbox.


Filed under Anti-Keyloggers, Anti-Malware Tools, Free Security Programs, Freeware, Interconnectivity, Internet Safety, Online Safety, Safe Surfing, Security Rating Applications, Software, Spyware - Adware Protection, System File Protection, System Process Scanners, System Security, Windows Tips and Tools