This Static Spot is open for sponsor

Click Here to Sponsor MCT Eric Post in Full Page

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
Malware And Antivirus Software
by: Joel Walsh
Warning: most antivirus programs will not protect you against all forms of malignant software (often called "malware") on their own. Find out how to protect yourself.

Sure, your antivirus software will protect you against viruses. It will probably even do a good job against worms. But what Trojans, exploits, backdoors, spyware and the dozen other nasty software parasites?

Malware and Antivirus Software: a History

The war on computer viruses has led to an arms race between the designers of antivirus software and the designers of viruses (you didn't think viruses just created themselves did you?). Some years ago, virus designers responded to ever more successful antivirus software by creating the descendents of viruses, worms, which did not infect files but rather installed themselves directly on the hard drive, making them harder to detect.

The arms race has since led to a total of at least eleven distinct types of what is now called malware, a neologism meaning bad (as in malignant rather than shoddy) software. According to Wikipedia, these eleven types of malware are:

1. Virus
2. Worm
3. Wabbit
4. Trojan
5. Backdoor
6. Spyware
7. Exploit
8. Rootkit
9. Key Logger
10. Dialer
11. URL injection

There's a twelfth kind of malware: adware, which Wikipedia considers simply to be a subset of spyware.

Why Antivirus Software Isn't Enough for Malware

As you can see, makers of antivirus software have their work cut out for them if they're going to keep every instance of malware off your system. As a result, antivirus software makers have often had to pick their battles. Adware, whose makers often claim they are doing nothing illegal or even questionable, often gets treated more lightly.

Even when antivirus software makers do come out with a product that fights all twelve or so kinds of malware, responding to each new instance of malware to come on the market isn't easy. First the malware has to be identified, which means someone's computer, and probably tens of thousands of computers, will be infected first. Then, the malware has to be dissected. Then a removal program and a filter must both be written. Then the removal program and filter must be tested to make sure they work, and that they don't interfere with any other functions of the antivirus software or the computer itself. When a fix for the virus is out, it then has to be loaded into an antivirus software update and transmitted to every single computer worldwide that has the antivirus software installed.

The speed with which antivirus software makers are able to deliver updates for newly discovered malware would impress even Santa Claus. Yet there's still a crucial window of one to a few days between when the new malware has reached a critical mass of thousands of computers, and when the update is released. If your antivirus software is not set to check for updates automatically every hour or so, that window opens even wider.

Practically speaking, then, you're better off having more than one line of defense against malware. Even if two different anti-malware programs utilize the exact same database, there might be a crucial difference in the speed of getting updates. It makes sense to back up your antivirus software with anti-spyware software. When you consider that dedicated anti-spyware software developers make protection against the non-virus forms of malware their stock-in-trade, you can see why anti-spyware software is so essential. In fact, you should strongly consider having two anti-spyware programs running on your computer at all times, since the gap in updates between two anti-spyware programs can be even longer than for two antivirus programs.

After all, with a dozen kinds of malware out there, shouldn't you at least have two pieces of software to fight them?

About the author:
Joel Walsh writes for http://www.spyware-refuge.comon how to remove spyware: http://www.spyware-refuge.com?spyware adware blocker [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "spyware adware blocker" OR leave this bracketed message intact.]


Circulated by Article Emporium

 



©2005 - All Rights Reserved

This Static Spot is open for sponsor

All About Software

Read Articles:


 Link Building Software

 Fleet Maintenance Software Reviews -

 Twelve Things You Should Know to Save on Comput...

 Link Directory Software

 The Need for Executive Recruiting Software -

 How To Use Spyware Elimination Software

 Malware And Antivirus Software

 Preventive Maintenance Software Companies -

 Medical Practice Software Simplifies the EMR Pr...

 What is Fleet Maintenance Software? -

 7 Tips for Choosing the Right Blog Software for...

 Do you need computer training?

 Correctional Institution Preventive Maintenance...

 25 Things Mapping Software Can Do For You

 Free or paid webhosting for blogging service

 Benefits of Integrating Online Chat Software wi...

 Adware Installation Stealth Tactics

 Link Popularity Software

 Computer Hygiene - Take Out The Trash!

 Jungo Joins Texas Instruments' Third Party DSP ...

 Healthcare Preventive Maintenance Software -

 9 Steps to Protect your MS Windows System from ...

 What Is Adware?

 Software Outsourcing - Benefits

 The Interactive Map Meets the Data Visualizatio...

 Is Web Ranking Software Right For You?

 Causes of ERP Failures

 Nucleus Kernel for FAT and NTFS

 How companies are fighting spyware together.

 3 Ways to Publish RSS

More Article Pages 1 - 2 - 3

 

Software Evolution
 by: Rafael Sosa

As Internet connections become more permanent with broadband access, software will be able to evolve into a more efficient and personalized medium. Currently, most software run from our hard drives and require installations that alter our system configurations, many times slowing down our computers. Because software occupies space and processing power, there is a limited amount of software that can run in our PCs. On the business side, current software systems require many companies to produce a system of distribution (Compac Discs), customer support, and is usually not compatible with all customers, thus limiting its customer base further.

A software evolution is ocurring and it is going to benefit both customers and businesses immensly. Software will no longer come as a packet that needs to be installed on a PC, but rather it will be completely Web based. Web based software will become the default way of reaching customers. Customers will have advantages such as, using unlimited amount of software, using applications regardless of where the person is or which computer he/she is using, software can be personalized and upgraded to meet specific needs to each individual. Businesses will be able to, reduce costs, reach a larger customer pool, taylor its software to diverse markets, repair bugs more rapidly and easily, understand its customer and the way they use their software, etc.

In order for this software revolution to occur in whole, there needs to be a central point. Like Miscrosoft’s DOS in the 80’s, which became the standard choice of operating system to centralize and organize our computer operations, there needs to be an online operating system. As of now, Microsoft has built an empire because of its vision and their dominance in the OS market. However, now there is a window of opportunity to take a large chunk of that empire and possibly eliminate Microsoft’s monopoly of the Operating System. While there are many companies and organizations (Apple, Linux, Lindows) out there trying to take a bite out of Microsoft by competing on the same turf, PC users are accostumed to Windows and will most likely not switch. The opportunity to eliminate this monopoly is to create an Online Operating System. PC users will inevitably move completely online.

An Online Operating System will be the central point of every user in the future. There are online companies who have an inside advantage to this, such as Yahoo!, Google, and AOL, but it can be anyone’s medal, even to a fairly unknown competitor, as was Microsoft when they introduced DOS to the world. In this new concept of Operating System, there can be a larger space of diversity and can be shared by more companies, unlike the current status.



©2005 - All Rights Reserved

JV Blogs Visit free hit counter