Archive for May, 2010

a) Adware, Spyware, Anti-virus and Their Differences
Adware, spyware and computer virus share similarities, one of which is that all three are major disturbance for computer users.
Spyware is a software that does not knowingly harm your computer, but what they do is  they create pathways where anybody aside from the computer owner can communicate with the computer. Normally spywares record the various types of web sites you visit which are later used by web advertisers to allow them to send you unwanted emails and pop-ups.

This is why spyware are usually frowned upon and greatly avoided. They are more intrusive than adware. Spyware has a separate executable programs which allow them to record your keystrokes, scan files on your hard disks and look at other applications that you use  but not limited to chat programs, cookies and Web browser settings.
The spyware then will send the information that it had gathered to the spyware author. The agent will then use this information for advertising and marketing purposes. They even sell the information to advertisers and other parties.
Adware is a  more legitimate form of freeware. Similar to spyware, adwares are advertising materials which are packaged into a software or program and are installed automatically once that particular program or software is added into the computer system. Some forms of adware, on the other hand, downloading advertising contents as a particular application is being utilized. It is quite unfortunate that most of the adware programs take the form of spywares that is, they track and report user information to program authors.
Some signs of spyware infections include pop-up ads that seem to be not related to the site you are viewing. More often than not, spyware pop-ups are advertisements about adult contents. Also if you notice your computer slowing down, there’s a big chance that spywares and its other components have found their way in your operating system. When the Windows desktop also takes a longer time to boot, its best to scan your computer for possible spyware infections.
Meanwhile, virus is a  destructive form of software. They were purely designed and created for one purpose alone: to create havoc to your computer. They destroy whatever they come in contact with and will initiate self replication and infect as many components of the computer’s operating system or network as possible.
Nowadays, a lot of anti-virus software also provides spyware and adware scanning and removal utilities. Some programs, however, are focused on located and deleting or destroying spyware and adware programs. Whether is an anti-virus software or a anti-spyware dedicated scanner, they both search your computer and identify any spyware and virus installed on your system.
They then remove it as well as the components located in the system registry among other places in your computer. It is therefore, good to regularly update your virus or spyware scanner to ensure that your computer is protected from the thousands of spyware and viruses in the internet. Never be fooled from ads that claim that their products only contain adware.
These adware maybe spyware in disguised and are just waiting to be deployed for them to gather your information. Learn to setup firewall systems and always block pop-up blockers to minimize computer infection and ensure the security of all your computer files.
b) Adware and Spyware Blockers

There is this one science school student whose thesis is about the moon so oftentimes he would google the word to come up with a ready list of online references. This proved to be useful to him and the entire process of writing his paper. After several months of doing so, he was confronted with problems like being directed to a weird page totally not related to the moon every time he types the same word.
At first he thought it was just a glitch in the internet system and then he rationalized that no it maybe a glitch in the search engine he is using but the persistent occurrence of such a thing made him think that someone bugged him. We all hate bugging people  but people we can fend of. What this science student is confronted with is a computer bug that he cannot fend off. In the first place he is not a technology savvy person and in the second place he never uses his laptop for any other things than academic research and actual writing of his papers.
The situation above is not an isolated case. There are many people who find themselves caught up in technology problems that are mind boggling but actually can be answered with two words and those two words are spyware and adware. The infamous term of spyware was first coined in the year 1995 but it was popularized in the year 2000. Spyware is a computer software innocently infiltrated in a personal computer to be able to access personal information of the user.
This is done by studying logging keystrokes, web browsing history and even scanning a user?s hard drive. Sounds like something we see only in James Bond movies but apparently we are wrong for anyone can be a victim of spyware. It is safe to use the word victim because no one wants to be monitored of all their online activities. Spyware can understandably be used to spy on criminals because such use is beneficial to society but how about the use of spyware to intercept credit card details and the like. There is simply no excuse for the lax of the use of spyware.
What ordinary people can do to protect themselves is to block spyware and all other software programs similar to it like adware and malware. This can easily be done by availing adware and spyware blocker programs online. The role of these blocking programs include to remove or disable existing spyware programs or to avoid the installation of these malicious software programs.
Spyware, adware, malware are not like virus or worms that self replicate but they can be just as hassle as their counterparts for whoever wants to be disrupted of their normal personal computer activities. One of the more popular hassles cause by these infectious software programs is the slowness of the computer which can really be annoying because when you are at work you tend to want to finish things quick not just because you are required but also because you want more done or you want to be able to go home early.
In some infections, spyware is not even evident as the bad guy so it can get away with its crime. It is best then to have a ready blocker to at least do something for preventing any infection to occur in the first place.

James Murray is a successful writer and online gambling expert providing valuable tips and advice for those interested in gambling and online gambling strategies. His numerous articles found on the Internet ,provide useful and factual gambling information and insight.

Westchester, IL (PRWEB) March 16, 2009 —Social engineering is evolving so rapidly that technology solutions, security policies, and operational procedures alone cannot protect critical resources. Even with these safeguards, hackers commonly are able to get employees into compromising corporate security. Victims, most often than not, unknowingly provide the sensitive information needed to bypass network security and at times even unlock workplace doors for strangers. While attacks on human judgment is a possibility for even the best network defence systems, companies can mitigate the risk of social engineering with an active security culture that evolves as the threat landscape changes. Gartner reported in 2004 that the greatest security risk over the next 10 years will be the increased use of Social Engineering (SE) to bypass IT security defences. Most have seen the proliferation of SE attacks especially when it comes to phishing and its many variants. And with many high profile cases like Paris Hilton’s cell phone, Sarah Palin’s email account, Madoff’s ponzi scheme and the campaigns of both Obama and McCain being compromised, the predictions are proving to be correct.

A security-aware culture must include ongoing training that consistently informs employees about the latest security threats, along with policies and procedures that reflect the overall vision and mission of corporate information security. This emphasis on security helps employees understand the potential risk of social-engineering threats, how they can prevent successful attacks, and why their role within the security culture is so important to corporate health. Employees who are aware of security issues are better equipped to recognize and avoid the rapidly changing and increasingly sophisticated social-engineering attacks, and hence are more willing to take ownership of security responsibilities.

So ChicagoCon is introducing this bi-annual security event which has this completely original, highly technical and simplified, relevant 5-Day course, the Social Engineering Master Class (http://www.chicagocon.com/2009s/semasterclass.html), developed and taught by world-renowned social engineers, Chris Nickerson of TruTV’s Tiger Team and noted expert and international speaker, Mike Murray.

ChicagoCon (http://www.chicagocon.com) is a security event with 2 distinct components, training and a conference, both of which have a focus on Ethical Hacking. Ethical Hacking is defined as Ethical hacking is also known as penetration testing, intrusion testing, and red teaming. It is conducted by ethical hackers to find possible problems in the system.. The Spring Edition is set for May 2009. And without an exhibit hall full of vultures, the attendees are free to learn from the pros and network with peers to advance their practical knowledge and ultimately their careers.

Here’s the schedule in a nutshell:

Friday May 8

2:00 PM – Keynote: Raffael Marty, Chief Security Strategist for Splunk
3:00 PM – Ryan Jones, Lares Consulting
4:00 PM – Tim Rosenberg, White Wolf Security
5:00 PM – Pizza Party
6:00 PM – CtF Sponsored by Core Security

Saturday May 9

9:00 AM – Keynote: Dr. Marc Rogers, Cyber Forensics Program at Purdue
10:00 AM – Chris Gates (CG) & Vince Marvelli (g0ne), Full Scope Security
11:00 AM – Craig Heffner & Derek Yap, SourceSec Research Group
12:00 Noon – Ryan Linn & Brian Wilson, The Ethical Hacker Network
1:00 PM – Lunch
2:00 PM – 5:00 PM – Exotic Liability Live!
6:00 PM – Closing

And the Extra-Curriculars…

  • Workshop: Hacking the Web 2.0 with HP’s Rafal Los (Starts at 2:30 on Sat)
  • “The Doctor Is In” Career Counseling with Mike Murray (All Day Sat)
  • “Lock Picking 101″ with Defcon Veteran Karen Maeda (All Day Sat)
  • Evening Entertainment

Conference Only Tickets are available for just $100. Click here for Conference Details and Registration (http://www.chicagocon.com/2009s/conference.html).
To reach this highly targeted market, please review the sponsorship opportunities (http://www.chicagocon.com/2009s/sponsorshipops.html).
About The Digital Construction Company:
TDCC is a Chicagoland business with a mission to educate and push the careers of IT professionals through its properties including The Ethical Hacker Network and ChicagoCon. ChicagoCon is a Service Mark of TDCC.
Contact:
Donald C. Donzal, CISSP, MCSE, CEH, Security SME
708-837-3002 begin_of_the_skype_highlighting              708-837-3002      end_of_the_skype_highlighting
The Digital Construction Company
###

This press release has been reprinted from PRWEB per the terms and conditions of the copyright notice.