Avoiding and Removing Rogue Programs? Here’s how

If you frequently visit security discussion boards, you are sure familiar with Eric L. Howes’ – Rogue/Suspect Anti-Spyware Products & Web Sites. We visit that webpage to keep ourself familiar or be aware on antispyware products that might give us more problem than a fix or protection. Eric is also listing the domain names of the offending antispyware programs. In Calendar of Updates, we try to keep everyone inform by posting additions and delisted (if any) programs. Example: see the calendar entry few weeks ago. Visiting the above webpage of Eric L. Howes will help to avoid installing a deceitful program or a suspect … Continue reading Avoiding and Removing Rogue Programs? Here’s how

Is Beta software safe use?

Some of us will notice in the vendor sites a “Beta” released.  Beta means the program or service is still being tested which may have known and unknown problems.  Most users asks, “Is it safe to use a beta software or service?”, “Is it important?”  

Why do you need anti-spyware software?

Spyware – also known as Adware or Parasite.  It is in installed in a system to secretly gather information about the user and relay it to advertisers or other interested parties.  Spyware is usually bundled in a software that are offered as free program or shareware and website service. Security Issue – A spyware has all privileges of the user who installed it.  Spyware cause conflict with an operating system and applications.  It can slow down the system.  It can delete, read, write, download, install another software, change or edit users’ preferences.  Others can even format the hard-drive! The above PC … Continue reading Why do you need anti-spyware software?

How to protect your system or network from Zero-day attacks?

Zero-day or 0-day attacks is an incident in which a vulnerability was exploited in the wild before it is reported to the vendor or security community.  This means the vendor hasn’t identify the security hole.  Zero-day attacks arrives as a worm or virus.  How to protect your system or network from Zero-day attacks? Update your antivirus software – an up-to-date antivirus program can help to protect the system.  Any malware behavior that act like the known malware in its database will trigger the antivirus program to stop the malicious activity.  You can find free antivirus program here or check the special … Continue reading How to protect your system or network from Zero-day attacks?

What Browser to Use?

What is a Browser? A browser is a software that allow you to read and interact on the World Wide Web. Below are some of the browsers available: Internet Explorer Mozilla or Firefox Opera Safari Lynx Netscape Do you need more than one (1) browser? It is not bad to install or use more than one browser.  You do not need to uninstall or remove the existing browser to make the other browser work.  You can configure your system on which browser will be your default browser.  You should only review the System Requirements of the software prior installing. How … Continue reading What Browser to Use?

How to stay clear from vulnerabilities?

Vulnerabilities or security holes is defined as any weakness that could be exploited to violate a system or the information that it contains.  An example of a vulnerability exploit is Buffer Overrun in JPEG Processing (GDI+).  A problem that was detected in many products that uses gdiplus.dll. Another example is Vulnerability in WordPerfect Converter – if a user is logged on with administrative privileges, an attacker who successfully exploited this vulnerability could take complete control of the affected system. One more example is  AOL Instant Messenger aim:goaway URI Handler Buffer Overflow, that  can allow attackers to execute arbitrary code.  There are security holes in many products.  … Continue reading How to stay clear from vulnerabilities?

How to combat SPAM and phishing out from your mailbox?

SPAM – junk, unwanted e-mails that are sent in HTML e-mail message, embedded with images and pictures that secretly send information to the sender (the Spammer) to confirm that your e-mail address is active (this means more SPAM is coming on your way).  SPAM are sent to large number of people to promote a product or service without the recipients approval (subscription). PHISHING – spoofed e-mail message that is designed to convince the recipient to reveal personal or financial datas such as credit card number, username, password, social security number and others that will let them hijacked your account and steal your money … Continue reading How to combat SPAM and phishing out from your mailbox?

Top 5 Reasons to install Windows XP Service Pack 2 (SP2)

Microsoft published Top 10 Reasons to Install Windows XP Service Pack 2 (SP2) which should convinced Windows XP users to install the latest Service Pack which is SP2.  Here’s my Top 5 reasons on why you as an XP user should upgrade to SP2: 1.  The Internet Explorer with Windows XP SP2 now offers security Pop-up Blocker – you do not need 3rd party pop-up blocker, it is now built-in with Internet Explorer in Windows XP SP2.  You can configure which sites that you trust is allowed to show any pop-ups.  Select whether you want to hear a sound when it blocked a pop-up … Continue reading Top 5 Reasons to install Windows XP Service Pack 2 (SP2)