Jump to content
Lara Croft Online Tomb Raider Forum

LARA CROFT ONLINE HOME PAGE

Recommended Posts

Posted (edited)

Originally posted By Mike:

Q: What is Spyware, Adware?

A: Spyware is a general term used for software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent. You might have spyware or other unwanted software on your computer if:

- You see pop-up advertisements even when you're not on the Web.

- The page your Web browser first opens to (your home page) or your browser search settings have changed without your knowledge.

- You notice a new toolbar in your browser that you didn't want, and find it difficult to get rid of.

- Your computer takes longer than usual to complete certain tasks.

- You experience a sudden rise in computer crashes.

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information. That does not mean all software which provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but "pay" for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

Other kinds of unwanted software will make changes to your computer that can be annoying and can cause your computer slow down or crash. These programs have the ability to change your Web browser's home page or search page, or add additional components to your browser you don't need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them. These types of unwanted programs are also often called spyware.

The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer.

There are a number of ways spyware or other unwanted software can get on your system. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program. Whenever you are installing something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of unwanted software in a given software installation is documented, but it may appear at the end of a license agreement or privacy statement.

Source

mslogoblk5zb.gif

Also, an imformative video about Spyware.

5452032x32consecplayvideo2va.gif

Q: What can I do about Spyware?

A: You'll need some Anti-Spyware tools (All free)

*Windows Defender

ssc1downloadnow2ly.gif

*Ad-Aware SE 1.06:

ssc1downloadnow2ly.gif

*Spybot Search & Destroy 1.4:

ssc1downloadnow2ly.gif

CWShredder 2.19

ssc1downloadnow2ly.gif

HijackThis 1.99.1:

ssc1downloadnow2ly.gif

P.S. NEVER, EVER, FIX anything without posting your log at one of these forums. (This only applies for HijackThis)

Here is a good Spyware Prevetion tool. (This tool DOES NOT get Spyware off your system, it helps prevent it from being installed.)

*SpywareBlaster 3.5.1:

ssc1downloadnow2ly.gif

You should not only have a good Anti-Virus, but also should occasionally run one or all of these online virus scans.

You must have an active connection to the Internet:

5kkkk3pr.gif

541lk0dd.gif

23kjm7kw.png

Windows Live Safety Center

wlsafety20icon6ph.gif

You should always have a firewall especially if you are on Broadband. If you do not then you're just asking for a virus, hacker, and other trouble. Here are some free firewalls, but ONLY use one:

*ZoneAlarm Personal Firewall:

ssc1downloadnow2ly.gif

Sygate Personal Firewall:

ssc1downloadnow2ly.gif

Always have an updated Anti-Virus. Here is a free and great Anti-Virus:

*AVG Anti-Antivirus

ssc1downloadnow2ly.gif

avast! 4 Home Edition
ssc1downloadnow2ly.gif

If you decide to chose an Internet Security Suite .(Anti-Virus Protection, Firewall, Anti-Spyware, Anti-Spam, etc..) Here are some great Secuirty Suites to use:

e.gif

* Kasperky Internet Suite

ssc1downloadnow2ly.gif

e.gif

e.gif

e.gif

McAfee Internet Security Suite 2007

ssc1downloadnow2ly.gif

After all the above is done, then mabye you should get a browser called Mozila Firefox. Spyware repellent - so they say.

Firefox 2.0.0.3

ssc1downloadnow2ly.gif

You can upgrade to Internet Explorer 7.0 for added protection

(* Requires Windows XP SP2. It is already included in WIndows Vsita)

Thanks for reading this. I hope it helps. If you have any questions reply in this post, or you're welcome to email me at Mike162006 @ hotmail.com.

* = My Personal Favorite

Revised: 5/19/07

Mike's LCO Security Centre © 2004-2007 by Michael Walters. All rights reserved.

Edited by Mike
Posted (edited)

TOPIC Q: "Why is my computer sooooooo slow"?

A: That could be many problems effecting how slow a computer is, but I am going to talk about the MAIN reasons why a computer could be slowing down:

Programs starting up with Windows

Go to RUN, type in MSCONFIG, and click on START UP, and you should have most of them UNCHECKED; just check the ones that are necessary to have at Sysinfo.org

Processes in the background

Press ALT + CTRL + DEL, click on Processes, and go here and search every program to make sure you can SAFELY end it.

WARNING: Do NOT end a process that you're not sure of, as a result of lost data.

Also make sure that you do not have any viruses/spyware, which can cause low performance, so be sure to get these free tools, and update, scan with them weekly.

RAM (Random Access Memory)

Not having enough RAM can be an important reason why your computer freezes, slows down, etc.

I recommend that if you use the internet, email, IM that you have at least 1GB of RAM, and if you are a gamer that you have 1GB-2GB of RAM.

Go here to learn more about RAM.

System maintenance

I use a free utility called CCleaner (Crap Cleaner).

Also go into Control Panel to Add/Remove Programs, and remove any programs that you do not use, need, or want anymore.

Most importantly do a Defrag. There's a free defragmenter called Diskeeper Lite that does the job quite well. Additionally if you are running Windows XP SP2 or Windows Vista, there is a built in Defragmenter already included.

Windows XP: Click Start, Programs, Accessories, System Tools, Disk Defragmenter.

Windows Vista: Click Start, and type in Disk in the Search box and you should see the Disk Defragmenter

NOTE: If you have not done a defrag recently, then you should do it overnight, because it could take 1-6 hours to complete depending on your hard drive and various other factors.

Hard drive or other hardware problem.

It is possible, though not likely, that your hard drive is failing. Slowness is one symptom of this. It is also possible that one of your RAM chips has gone out and

your computer is running with insufficient RAM.

The only way to determine this is to address the other causes first, and them getting some help if none of them seem to work. As a general computer rule, if

you fix the software and still have a problem it's probably the hardware.

You can run Check Disk to see if any errors are on your hard drive.

Tweak for Windows XP/Vista.

On your keyboard press the Windows key + Pause Break key, click on the tab Advanced, under Performance, click Settings then click Advanced. Here, make sure that under Processor Scheduling that Programs is checked, and under Memory Usage that Programs are also checked. Under Virtual Memory, click Change. Make sure that Custom Size is checked. Your total amount of RAM size should be in the first box, and the second box should have 1.5 times your RAM (Ex: 384 should be in there if you have 256MB of RAM). Click Set. Click OK. Click YES to restart your computer.

Processor speed

Nowadays most computers come with an Intel Core Duo 2 Processor 2.5GHz or at least an AMD Athlon 64 X2 Dual Core 2.4Ghz. However, if you have at least 1.5 GHz with a dual core you should be just fine.

Updated: 5/20/07

Edited by Mike
Posted

What Is Malware?

This guide uses the term malware (an abbreviation of the phrase "malicious software") as a collective noun to refer to viruses, worms, and Trojan horses that intentionally perform malicious tasks on a computer system.

So what exactly is a computer virus or a worm? How are these different from Trojan horses? And will antivirus applications only work against worms and Trojan horses or just viruses?

All these questions stem from the confusing and often misrepresented world of malicious code. The significant number and variety of existing malicious code makes it difficult to provide a perfect definition of each malware category.

For general antivirus discussions, the following simple definitions of malware categories apply:

? Trojan horse. A program that appears to be useful or harmless but that contains hidden code designed to exploit or damage the system on which it is run. Trojan horse programs are most commonly delivered to users through e-mail messages that misrepresent the program's purpose and function. Also called Trojan code. A Trojan horse does this by delivering a malicious payload or task when it is run.

? Worm. A worm uses self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. A worm can take harmful action, such as consuming network or local system resources, possibly causing a denial of service attack. Some worms can execute and spread without user intervention, while others require users to execute the worm code directly in order to spread. Worms may also deliver a payload in addition to replicating.

? Virus. A virus uses code written with the express intention of replicating itself. A virus attempts to spread from computer to computer by attaching itself to a host program. It may damage hardware, software, or data. When the host is executed, the virus code also runs, infecting new hosts and sometimes delivering an additional payload.

What Is Not Malware?

A variety of threats exist that are not considered malware because they are not computer programs written with malicious intent. However, these threats can still have both security and financial implications for an organization. For these reasons, you may wish to understand the threats they represent to your organization's IT infrastructure and the productivity of your IT users.

Joke Software

Joke applications are designed to produce a smile or, at worst, a waste of someone's time. These applications have existed for as long as people have been using computers. Because they were not developed with malicious intent and are clearly identified as jokes, they are not considered malware for the purposes of this guide. There are numerous examples of joke applications, producing everything from interesting screen effects to amusing animations or games.

Hoaxes

Generally, it is easier to trick someone into doing something for you than it is to write software that does it without their knowledge. Therefore, a large number of hoaxes are seen in the IT community.

Like some other forms of malware, a hoax uses social engineering to attempt to trick computer users into performing some act. However, in the case of a hoax there is no code to execute; the hoaxer is usually simply trying to trick the victim. Hoaxes have taken many forms over the years. However, a particularly common example is an e-mail message that claims a new virus type has been discovered and to warn your friends by forwarding the message. These hoaxes waste peoples time, take up e-mail server resources, and consume network bandwidth.

Scams

Virtually every form of communication has been used, at one time or another, by criminals in an attempt to trick people into acts that will provide the criminal some financial gain. The Internet, Web sites, and e-mail are no exception. An e-mail message that attempts to trick the recipient into revealing personal information that can be used for unlawful purposes (such as bank account information) is a common example. One particular type of a scam has become known as phishing (pronounced ?fishing,? and is also referred to as brand spoofing or carding).

Examples of phishing include cases in which senders mimic well-known companies such as eBay to try and gain access to user account information. Phishing scams often use a Web site that copies the look of a company's official Web site. E-mail is used to redirect the user to the fake site and trick them into entering their user account information, which is saved and used for unlawful purposes. These types of cases should be handled seriously and reported to local law enforcement authorities.

Spam

Spam is unsolicited e-mail generated to advertise some service or product. This phenomenon is generally considered a nuisance, but spam is not malware. However, the dramatic growth in the number of spam messages being sent is a problem for the infrastructure of the Internet that results in lost productivity for employees who are forced to wade through and delete such messages every day.

The source for the term spam is disputed, but regardless of its origin there is no doubt that spam has become one of the most persistent irritations in Internet-based communications. Many consider spam to be so significant an issue that it now threatens the health of e-mail communications around the world. However, it should be noted that except for the load endured by e-mail servers and anti-spam software, spam is not actually capable of replicating or threatening the health and operation of an organization's IT systems.

Malware has often been used by spam originators (so called spammers) to install a small SMTP e-mail server service on a host computer, which is then used to forward spam messages to other e-mail recipients.

Spyware

This type of software is sometimes referred to as spybot or tracking software. Spyware uses other forms of deceptive software and programs that conduct certain activities on a computer without obtaining appropriate consent from the user. These activities can include collecting personal information, and changing Internet browser configuration settings. Beyond being an annoyance, spyware results in a variety of issues that range from degrading the overall performance of your computer to violating your personal privacy.

Web sites that distribute spyware use a variety of tricks to get users to download and install it on their computers. These tricks include creating deceptive user experiences and covertly bundling spyware with other software users might want, such as free file sharing software.

Adware

Adware is often combined with a host application that is provided at no charge as long as the user agrees to accept the adware. Because adware applications are usually installed after the user has agreed to a licensing agreement that states the purpose of the application, no offense is committed. However, pop-up advertisements can become an annoyance, and in some cases degrade system performance. Also, the information that some of these applications collect may cause privacy concerns for users who were not fully aware of the terms in the license agreement.

Note: While the terms spyware and adware are often used interchangeably, it is only unauthorized adware that is on a par with spyware. Adware that provides users appropriate notice, choice, and control is not deceptive and should not be classified as spyware. You should also note a spyware application that claims to perform a particular function, while it is in fact doing something else, is acting like a Trojan horse.

Internet Cookies

Internet cookies are text files that are placed on a user's computer by Web sites that the user visits. Cookies contain and provide identifying information about the user to the Web sites that place them on the user computer, along with whatever information the sites want to retain about the user's visit.

Cookies are legitimate tools that many Web sites use to track visitor information. For example, a user might shop for an item in an online store, but once he or she has placed the item in their online shopping cart, they may want to move to another Web site for some reason. The store can choose to save the information about what products were in the shopping cart in a cookie on the user's computer so that when the user returns to the site, the item is still in the shopping cart and ready for the user to buy if he or she wishes to complete the sale.

Unfortunately, some Web site developers have been known to use cookies to gather information without the user's knowledge. Some may deceive users or omit their policies. For example, they may track Web surfing habits across many different Web sites without informing the user. The site developers can then use this information to customize the advertisements the user sees on a Web site, which is considered an invasion of privacy. It is difficult to identify this form of targeted advertising and other forms of "cookie abuse," which makes it difficult to decide if, when, and how to block them from your system. In addition, the acceptable level of shared information varies among computer users, making it difficult to create an "anti-cookie" program that will meet the needs of all of the computer users in your environment.

Posted
P.S. NEVER, EVER, FIX anything without posting your log at one of these forums. (This only applies for HijackThis)

I always do it by myself, and I don't understand why I shouldn't, in addition, I use Spybot to search and delete when threads tell me not to, but if Spybot has a delete function, why can't I use it?

I am pretty much a newbie when it comes to creating and understanding spyware logs and even HijackThis itself!

Posted
I always do it by myself, and I don't understand why I shouldn't, in addition, I use Spybot to search and delete when threads tell me not to, but if Spybot has a delete function, why can't I use it?

I am pretty much a newbie when it comes to creating and understanding spyware logs and even HijackThis itself!

If Spybot says it's spyware i'd delete it meself. Those programs are dead reliable and even if they make mistakes, they're usualy easy enough to recover. I suppose it's deleting stuff manually that people need to be careful about.

  • 2 months later...
Posted
I always do it by myself, and I don't understand why I shouldn't, in addition, I use Spybot to search and delete when threads tell me not to, but if Spybot has a delete function, why can't I use it?

I am pretty much a newbie when it comes to creating and understanding spyware logs and even HijackThis itself!

Hi!

Like I wrote that only applies to HijackThis. A powerful tool, with one wrong click your computer may become unstable. That's why I recommend posting your HijackThis log on those specific forums.

Thanks.

Posted

Another thing; is to go in Control Panel to Add/Remove Programs, remove any programs that you do not use, need, or want anymore..

How do you determine what programs are safe to remove?? I thought about doing this but didn't want to remove something that may be important...

  • 6 months later...
Posted

Seond post has been updated. It had been over 2 years since I wrote that post. A lot of things were out of date - back then I recommended 256MB of RAM, now it's 1GB of RAM.

Also A LOT of grammar issues are fixed.

Posted
Another thing; is to go in Control Panel to Add/Remove Programs, remove any programs that you do not use, need, or want anymore..

How do you determine what programs are safe to remove?? I thought about doing this but didn't want to remove something that may be important...

What program did you need help with on removing?

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...