Web design premium

151 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
151
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Web design premium

  1. 1. Web_Design_Premium : Part IWhy Do I Feel Like Somebodys Watching Me?Spyware is one of the fastest-growing internet threats. According to the National CyberSecurity Alliance, spyware infects more than 90% of all PCs today. These unobtrusive,malicious programs are designed to silently bypass firewalls and anti-virus software withoutthe users knowledge. Once embedded in a computer, it can wreak havoc on the systemsperformance while gathering your personal information. Fortunately, unlike viruses andworms, spyware programs do not usually self-replicate.Where does it come from?Typically, spyware originates in three ways. The first and most common way is when theuser installs it. In this scenario, spyware is embedded, attached, or bundled with a freewareor shareware program without the users knowledge. The user downloads the program totheir computer. Once downloaded, the spyware program goes to work collecting data for thespyware authors personal use or to sell to a third-party. Beware of many P2P file-sharingprograms. They are notorious for downloads that posses spyware programs.The user of a downloadable program should pay extra attention to the accompanyinglicensing agreement. Often the software publisher will warn the user that a spywareprogram will be installed along with the requested program. Unfortunately, we do not alwaystake the time to read the fine print. Some agreements may provide special opt-out boxesthat the user can click to stop the spyware from being included in the download. Be sure toreview the document before signing off on the download.Another way that spyware can access your computer is by tricking you into manipulating thesecurity features designed to prevent any unwanted installations. The Internet Explorer Webbrowser was designed not to allow websites to start any unwanted downloads. That is whythe user has to initiate a download by clicking on a link. These links can prove deceptive.For example, a pop-up modeled after a standard Windows dialog box, may appear on yourscreen. The message may ask you if you would like to optimize your internet access. Itprovides yes or no answer buttons, but, no matter which button you push, a downloadcontaining the spyware program will commence. Newer versions of Internet Explorer arenow making this spyware pathway a little more difficult.Finally, some spyware applications infect a system by attacking security holes in the Webbrowser or other software. When the user navigates a webpage controlled by a spywareauthor, the page contains code designed to attack the browser, and force the installation ofthe spyware program.What can spyware programs do?Spyware programs can accomplish a multitude of malicious tasks. Some of their deeds aresimply annoying for the user; others can become downright aggressive in nature.
  2. 2. Spyware can:Monitor your keystrokes for reporting purposes.Scan files located on your hard drive.Snoop through applications on our desktop.Install other spyware programs into your computer.Read your cookies.Steal credit card numbers, passwords, and other personal information.Change the default settings on your home page web browser.Mutate into a second generation of spyware thus making it more difficult to eradicate.Cause your computer to run slower.Deliver annoying pop up advertisements.Add advertising links to web pages for which the author does not get paid. Instead, paymentis directed to the spyware programmer that changed the original affiliates settings.Provide the user with no uninstall option and places itself in unexpected or hidden placeswithin your computer making it difficult to remove.Spyware ExamplesHere are a few examples of commonly seen spyware programs. Please note that whileresearchers will often give names to spyware programs, they may not match the names thespyware-writers use.CoolWebSearch, a group of programs, that install through holes found in Internet Explorer.These programs direct traffic to advertisements on Web sites includinghttp://coolwebsearch.com. This spyware nuisance displays pop-up ads, rewrites searchengine results, and alters the computer host file to direct the Domain Name System (DNS)to lookup preselected sites.Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages toadvertisements. When the user follows the broken link or enters an erroneous URL, a pageof advertisements pop up.180 Solutions reports extensive information to advertisers about the Web sites which youvisit. It also alters HTTP requests for affiliate advertisements linked from a Web site.Therefore the 180 Solutions Company makes an unearned profit off of the click through
  3. 3. advertisements theyve altered.HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and isinstalled by ActiveX drive-by downloading at affiliate websites or by advertisementsdisplayed by other spyware programs. Its a prime example of how spyware can install morespyware. These programs will add toolbars to Internet Explorer, track Web browsingbehavior, and display advertisements.How can I prevent spyware?There are a couple things you can do to prevent spyware from infecting your computersystem. First, invest in a reliable commercial anti-spyware program. There are severalcurrently on the market including stand alone software packages such as Lavasofts Ad-Aware or Windows Antispyware. Other options provide the anti-spyware software as part ofan anti-virus package. This type of option is offered by companies such as Sophos,Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-timeprotection, scanning, and removal of any found spyware software. As with most programs,update your anti virus software frequently.As discussed, the Internet Explorer (IE) is often a contributor to the spyware problembecause spyware programs like to attach themselves to its functionality. Spyware enjoyspenetrating the IEs weaknesses. Because of this, many users have switched to non-IEbrowsers. However, if you prefer to stick with Internet Explorer, be sure to update thesecurity patches regularly, and only download programs from reputable sources. This willhelp reduce your chances of a spyware infiltration..And, when all else fails?Finally, if your computer has been infected with a large number of spyware programs, theonly solution you may have is backing up your data, and performing a complete reinstall ofthe operating system.NOTE: You have full permission to reprint this article within your website or newsletter aslong as you leave the article fully intact and include the "About The Author" resource box.Thanks! :-Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_PREMIUM : End of Part IWeb_Design_Premium : Part II
  4. 4. Why Do We Need Anti-Spam Software?Spam, otherwise known as junk email or unsolicited commercial email; is quickly becomingon of the most prevalent complaints of internet users. Not only is it annoying, but it is quicklybecoming a dangerous and potentially expensive problem for businesses as well asindividuals.How is it dangerous?First and foremost, spam is one of the leading causes for clogged networks and slowconnections. American Online, one of the nations largest internet service providers;transmits over 8 trillion spam email messages a year. Those messages tie up valuablebandwidth and can slow down entire networks. Although end users will rarely see asignificant change in their connections, they can rest assured that a noteworthy portion oftheir monthly bill is paying for that lost bandwidth.Most spam includes images or weblinks within it commercial content. Although some of it isbegin or at worst annoying, an increasing portion contains sexually explicit content. Spammessages frequently contain pornographic pictures or links to sex-related websites.These messages are not suited for children yet can easily be accidentally opened byminors. In addition to simple sexual content, some of the most severely sexually explicitspam can contain images of such illegal and offensive acts such as bestiality or childpornography.Aside from slowing connections or carrying unwanted pornography, spam is the leadingcause of transmitted computer viruses. Computer viruses are programs which run maliciouscode which can damage computer systems, delete files and steal personal information.These viruses are often hidden in an email messages as attachments such as a pictures.Email transmitted viruses can render entire systems inoperable and delete importantdocuments forever.How can you stop it?The easiest and most simple way to stop unwanted email is to employ a spam blocker.Spam blockers are manufactured by a variety of companies and be anywhere from free tocosting upwards of 50$.There are three basic types of spam blocking software. The first is a key-word blocker.These programs examine the header and body of an email message looking for a series ofpredefined criteria. For example, a program could be instructed to flag or block any emailmessage containing the word sex.Although seemingly straightforward, the spam blocker also has to stop any spelling variation
  5. 5. of sex such as sexx or s_e_x. Although this type of spam blocker can do very well atstopping spam, it also has a tendency to block personal emails which may or may notcontain flagged words.The second type of spam blocker is an address list blocker which blocks or flags any emailsnot coming from a predefined list of addresses (such as the users address book).Although this type of spam blocker does a very good job of not blocking personal emailsfrom friends or family, it can inadvertently delete important messages from users not on theoriginal predefined list. This can make it very easy to miss potentially important yetunexpected emails.The third type of spam blocker is actually a hybrid of the aforementioned varieties. It willfilter emails from known friendly accounts directly to the inbox while holding potentiallydangerous emails in the filter. The user can then go in and sort through emails from eitherfriendly strangers (non spam emails from unfamiliar addresses) or unfriendly strangers(spam emails from unfamiliar addresses).Although these programs do require a slight amount of user interaction, they can protectyour computer and keep you from inadvertently deleting important emails.Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_PREMIUM : End of Part IIWeb_Design_Premium : Part IIIWhy Do We Need Anti-Spam Software?Spam, otherwise known as junk email or unsolicited commercial email; is quickly becomingon of the most prevalent complaints of internet users. Not only is it annoying, but it is quicklybecoming a dangerous and potentially expensive problem for businesses as well asindividuals.How is it dangerous?First and foremost, spam is one of the leading causes for clogged networks and slowconnections. American Online, one of the nations largest internet service providers;transmits over 8 trillion spam email messages a year. Those messages tie up valuable
  6. 6. bandwidth and can slow down entire networks. Although end users will rarely see asignificant change in their connections, they can rest assured that a noteworthy portion oftheir monthly bill is paying for that lost bandwidth.Most spam includes images or weblinks within it commercial content. Although some of it isbegin or at worst annoying, an increasing portion contains sexually explicit content. Spammessages frequently contain pornographic pictures or links to sex-related websites.These messages are not suited for children yet can easily be accidentally opened byminors. In addition to simple sexual content, some of the most severely sexually explicitspam can contain images of such illegal and offensive acts such as bestiality or childpornography.Aside from slowing connections or carrying unwanted pornography, spam is the leadingcause of transmitted computer viruses. Computer viruses are programs which run maliciouscode which can damage computer systems, delete files and steal personal information.These viruses are often hidden in an email messages as attachments such as a pictures.Email transmitted viruses can render entire systems inoperable and delete importantdocuments forever.How can you stop it?The easiest and most simple way to stop unwanted email is to employ a spam blocker.Spam blockers are manufactured by a variety of companies and be anywhere from free tocosting upwards of 50$.There are three basic types of spam blocking software. The first is a key-word blocker.These programs examine the header and body of an email message looking for a series ofpredefined criteria. For example, a program could be instructed to flag or block any emailmessage containing the word sex.Although seemingly straightforward, the spam blocker also has to stop any spelling variationof sex such as sexx or s_e_x. Although this type of spam blocker can do very well atstopping spam, it also has a tendency to block personal emails which may or may notcontain flagged words.The second type of spam blocker is an address list blocker which blocks or flags any emailsnot coming from a predefined list of addresses (such as the users address book).Although this type of spam blocker does a very good job of not blocking personal emailsfrom friends or family, it can inadvertently delete important messages from users not on theoriginal predefined list. This can make it very easy to miss potentially important yetunexpected emails.The third type of spam blocker is actually a hybrid of the aforementioned varieties. It willfilter emails from known friendly accounts directly to the inbox while holding potentiallydangerous emails in the filter. The user can then go in and sort through emails from eitherfriendly strangers (non spam emails from unfamiliar addresses) or unfriendly strangers
  7. 7. (spam emails from unfamiliar addresses).Although these programs do require a slight amount of user interaction, they can protectyour computer and keep you from inadvertently deleting important emails.Hiring a web designer to come up with the custom solution that you need can set you backa few thousand bucks. But you can do the whole thing yourself and make it drag and dropsimple for mere pennies with a tool like Breezy Websites. See http://breezywebsites.comfor details!WEB_DESIGN_PREMIUM : End of Part III

×