This Static Spot is open for sponsor

Click Here to Sponsor MCT Eric Post in Full Page

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
Malware And Antivirus Software
by: Joel Walsh
Warning: most antivirus programs will not protect you against all forms of malignant software (often called "malware") on their own. Find out how to protect yourself.

Sure, your antivirus software will protect you against viruses. It will probably even do a good job against worms. But what Trojans, exploits, backdoors, spyware and the dozen other nasty software parasites?

Malware and Antivirus Software: a History

The war on computer viruses has led to an arms race between the designers of antivirus software and the designers of viruses (you didn't think viruses just created themselves did you?). Some years ago, virus designers responded to ever more successful antivirus software by creating the descendents of viruses, worms, which did not infect files but rather installed themselves directly on the hard drive, making them harder to detect.

The arms race has since led to a total of at least eleven distinct types of what is now called malware, a neologism meaning bad (as in malignant rather than shoddy) software. According to Wikipedia, these eleven types of malware are:

1. Virus
2. Worm
3. Wabbit
4. Trojan
5. Backdoor
6. Spyware
7. Exploit
8. Rootkit
9. Key Logger
10. Dialer
11. URL injection

There's a twelfth kind of malware: adware, which Wikipedia considers simply to be a subset of spyware.

Why Antivirus Software Isn't Enough for Malware

As you can see, makers of antivirus software have their work cut out for them if they're going to keep every instance of malware off your system. As a result, antivirus software makers have often had to pick their battles. Adware, whose makers often claim they are doing nothing illegal or even questionable, often gets treated more lightly.

Even when antivirus software makers do come out with a product that fights all twelve or so kinds of malware, responding to each new instance of malware to come on the market isn't easy. First the malware has to be identified, which means someone's computer, and probably tens of thousands of computers, will be infected first. Then, the malware has to be dissected. Then a removal program and a filter must both be written. Then the removal program and filter must be tested to make sure they work, and that they don't interfere with any other functions of the antivirus software or the computer itself. When a fix for the virus is out, it then has to be loaded into an antivirus software update and transmitted to every single computer worldwide that has the antivirus software installed.

The speed with which antivirus software makers are able to deliver updates for newly discovered malware would impress even Santa Claus. Yet there's still a crucial window of one to a few days between when the new malware has reached a critical mass of thousands of computers, and when the update is released. If your antivirus software is not set to check for updates automatically every hour or so, that window opens even wider.

Practically speaking, then, you're better off having more than one line of defense against malware. Even if two different anti-malware programs utilize the exact same database, there might be a crucial difference in the speed of getting updates. It makes sense to back up your antivirus software with anti-spyware software. When you consider that dedicated anti-spyware software developers make protection against the non-virus forms of malware their stock-in-trade, you can see why anti-spyware software is so essential. In fact, you should strongly consider having two anti-spyware programs running on your computer at all times, since the gap in updates between two anti-spyware programs can be even longer than for two antivirus programs.

After all, with a dozen kinds of malware out there, shouldn't you at least have two pieces of software to fight them?

About the author:
Joel Walsh writes for http://www.spyware-refuge.comon how to remove spyware: http://www.spyware-refuge.com?spyware adware blocker [Publish this article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: "spyware adware blocker" OR leave this bracketed message intact.]


Circulated by Article Emporium

 



©2005 - All Rights Reserved

This Static Spot is open for sponsor

Data Recovery Information

Read Articles:

Microsoft’s Spyware Fight
How to find Adware removal that is re...
Microsoft Patch Management for Home U...
Registry Cleaners: Why do you need one?
The Webdesign Business - 5 Surefire W...
How To Remove Winfixer 2005 Plus Unwa...
Adware And The Case Against Bundled S...
Protect your self from Anti-Spyware f...
5 Critical Steps to Protecting Your C...
From Spyware with love!
Can You Survive In An Online World?
Windows vs. Linux, A Comparison
You Need a Spyware Remover!
The Quickest Way I Know To Secure You...
What's in a (TLD) name?
Is Your Music Player Spying On You?
The never ending Spyware……story
The Saga of the Annoying Adware

More Article Pages 1 - 2

Data Recovery - What Not to Do!

Data recovery is a tricky thing, and if you've somehow deleted or had your important files corrupted or lost due to human error, business espionage, faulty hardware or software or any other reason; the good news is that your lost data is probably recoverable. This article will show you a few things NOT to do when an event such as this occurs.

Don't run the drive anymore, or use the device. (MP3, portable storage, camera card, whatever) If you think it won't hurt to even just poke around the internet for a solution to this mess you've made/found, you're wrong! Don't install or run anything on the drive you hope to recover data from. Only access this drive again from a healthy PC with the software solution you're going to use. Since files are overwritten in the order they've been deleted, the last files that have been excised from your drive will be the first to be lost permanently. Even just surfing, with all the cookies and temporary internet files that are always being generated will often doom the process without you even knowing about it.

Don't use tools that may reside on your computer, such as Scandisk, or a boot record utility, as these will probably overwrite exactly the files you're seeking to get back.

In short, be careful! Your data may very well be recoverable, as long as you don't do something to erase it forever! Find a good data recovery software solution, and then follow the instructions to the letter, and you'll more than likely live to see your lost data return!

Keith Thompson is the webmaster at Data Recovery Service a site cenetered around helping you get back your lost data!



©2005 - All Rights Reserved

JV Blogs Visit free hit counter