Internet Security Issues

How to protect your computer

Most people know them as viruses but there are different kinds of programs that can infect your computer. Some of them are deliberately malicious to your computer system but most nowadays are designed to be invisible, so they can use your system to perform other tasks.
The collective name for these programs is Malware.

Internet Security Issue: Malware

Examples of Malware are:

  • Keylogging software that reads your keyboard strokes and sends them to a hacker – this is a way to get password and personal information directly from your computer
  • Zombie programs that use your system to send spam emails to others, store illegal images on your computer or overload websites in an extortion attempt
  • Spyware programs that collect information about the sites you visit for advertisers

Internet Security Issue: Trojan Horses

Trojan horses are not types of Malware, strictly speaking – they’re a method for getting Malware on to your computer. They work by concealing themselves in other programs that you might choose to download and run.

To protect yourself from these you need:

  • Good anti-virus and firewall software
  • Don’t click on pop-ups
    • Often clicking a button on a pop-up will run the program the Trojan resides in. Some of these are cleverly designed to make you think they are from a legitimate source – like Microsoft, your anti-virus, internet banking etc. A recent virus that looked like an anti-virus company detecting a virus in people’s computers caused havoc amongst many people who hadn’t encountered anything like it before. Legitimate websites don’t use questionable ethical tactics to attract their business.
  • Read the terms and conditions. Sometimes the Trojan will be listed as a term of use, thereby making you responsible for installing it into your own computer! This is largely used for information-gathering, selling your details on – this is one of the easiest ways to start getting spam.

Anti-virus and firewall software is big business – you simply must have them to use the internet safely. There are a variety of free packages available that do a great job. Look for an impartial comparison webpage to help yourself choose one. Cnet is a reliable comparison website that has reviews from its editors as well as its thousands of subscribers http://download.cnet.com/windows/

Internet Security Issue: Firewall Software

Firewall software is now often packaged with anti-virus software. A firewall stops unauthorised connections between your computer and other computers on the internet. Using a firewall prevents other programs collecting information from your computer or using your computer for other tasks. A firewall literally stops nasty programs before they infect your computer. Each Anti-Virus program will have various settings for your firewall based on your internet use.computer-virus

With our lives revolving around the internet these days the stakes are high for hackers to gain access to our computers. We need to be be more savvy than ever when it comes to internet security and that means using multiple means of protection.

 

Other Articles you might be interested in

internet security key

What is a DDos Attack?

A Distributed Denial of Service (DDoS) attack is where a group of computers flood another website with a large number of messages, so that the website … [Read More...]

internet-or-data-concept

What’s the Difference Between Web Hosting Packages?

Shared web hosting vs Dedicated web hosting vs VPS web hosting We can often become overwhelmed with the number of options available when it comes to … [Read More...]

About Robin Jennings

I'm a creative web designer that specialises in designing and marketing websites for small business owners, community groups and creative types. I'm based in regional Victoria but work with clients Australia-Wide as well as a healthy sprinkling of overseas clients through my Web Design Agency: Explainafide

Comments

  1. Great article. We must teach people on security if we want this to stop. Zombie programs are especially a problem for DDoS, it’s uses hundreds of zombie computers to flood a server. Groups like Anonymous use those all the time.

Speak Your Mind

*