Author Archives: Cooper

Malware or Spyware

Malware is a new term used to describe malicious “mal” software “ware” that has no other purpose other than to destroy or disrupt a computer. Spyware and adware are considered to be malware. There is only one reason for spyware to be put on your computer, and that’s to make money, and no, not money…

More info

Virus Overview

Computer Viruses are one of the biggest “bogeyman” of the Internet, and with attacks by Melissa, ILoveYou, Nimda, and Michelangelo, there are damage estimates and virus warnings all over the Internet. But what are they really? A virus is a program that spreads to other computers. Like all forms of malware, it both runs without…

More info

Malware!

The five types of malware are: Virus: A virus is a computer program that has been coded to replicate itself and infect a computer without the user’s knowledge. A virus spreads from computer to computer by infecting network files as well as CDs, USB drives, and other forms of removable media.The best free anti-virus is…

More info

Backdoor Programs

It’s the ultimate nightmare for a computer user, the idea that someone outside the computer can take over. The official “technical” term is Remote Administration, but hackers are more likely to use the word Backdoor. With Windows XP, remote administration comes pre-installed. Windows XP has an option called Remote Assistance, where an XP technician can…

More info

Adware Overview

Adware is advertising delivered directly to your computer. Generally, a program puts ads on the screen at some regular interval. In some cases, this program can be installed without the user’s knowledge, but not always. Many programs clearly state on install that “this program is supported by advertising, and if you turn off the advertising,…

More info

Spyware Overview

Imagine a program that watches your computer. It sits in memory, watching everything the computer does–the websites it displays, the passwords used to get into them, the advertisements that get clicked on. This program silently and secretly gathers all of this information, without the user’s knowledge. Then, at some point, it connects to a server…

More info