[Wikipedia-l] Learn about Spyware & Business Computers - John Schrerer

paul.kholer paul.kholer paul.kholer at gmail.com
Tue Jul 3 12:46:37 UTC 2007


John Schrerer


I. BACKGROUND

Spyware is typically not a virus, so many anti-virus programs are not
equipped to block, detect, or eliminate it. Spyware is not typically a
cookie that you can simply delete through your browser tools.

Often installed on your computer without your consent, spyware will:

A. Monitor your computer activity and then report it to third parties.

B. Actually and physically control your computer use.

C. Send you pop-up ads.

D. Redirect your computers automatically to undesirable websites.

E. Record your keystrokes and report them to third parties as a prelude to
identity theft.

II. SPYWARE SIGNS

All business computer users should understand the signs of spyware, and then
take the appropriate steps to delete it. The clues that spyware resides on
your business computers include:

A. A barrage of pop-up ads.

B. A hijacked browser.

C. A sudden or repeated change in your computer's Internet home page.

D. New and unexpected toolbars.

E. New and unexpected icons at the bottom of your computer screen.

F. Keys that no longer seem to work.

G. Random error messages.

H. Sluggish or slow performance when opening programs or saving files.

III. IMMEDIATE ACTION STEPS

If a business suspects its computers might contain spyware, it should
immediately take three steps:

A. Get anti-spyware software, such as Spybot Search & Destroy or Ad-Aware.

B. Use the software to perform an immediate scan.

C. Delete any software programs the anti-spyware program suggests.

D. Set it to automatically scan on a regular weekly basis.

IV. THE GOOD NEWS

The good news is that a business can prevent spyware installation. You
should consider taking the following steps:

A. Update your operating system and Web browser software. Your operating
system vendor may offer free software "patches" to close holes in the system
that spyware exploits.

B. Download free software only from sites you know and trust. It can be
appealing to download free software like games, peer-to-peer file-sharing
programs, customized toolbars, or other programs that may change or
customize the functioning of your computer. Be aware, however, that some of
these free software applications bundle other software, including spyware.

C. Don't install any software without knowing exactly what it is. Take the
time to read the end-user license agreement (EULA) before downloading any
software. If the EULA is hard to find — or difficult to understand — think
twice about installing the software.

D. Minimize "drive-by" downloads. Make sure your browser security setting is
high enough to detect unauthorized downloads, for example, at least the
"Medium" setting for Internet Explorer. Keep your browser updated.

E. Don't click on any links within pop-up windows. If you do, you may
install spyware on your computer. Instead, close pop-up windows by clicking
on the "X" icon in the title bar.

F. Don't click on links in spam that claim to offer anti-spyware software.
Some software offered in spam actually installs spyware.

G. Install a personal firewall to stop uninvited users from accessing your
computer.

H. A firewall blocks unauthorized access to your computer and will alert you
if spyware already on your computer is sending information out.
http://www.videoprofessor.com


More information about the Wikipedia-l mailing list