99% of all internet problems can be attributed to the wrong set of Web browser and Email clients in coordination of the
AV/ Spyware / Firewall software.
Get the following, all are free for a safe surfing experience, with proven track records and do not take up
system resources like Norton or McAffee.
install in SAFE mode with networking ( hit F-8 at boot time ), run them all in SAFE mode
with networking as you'll need it for the updates all the programs below will need.
Turn off RESTORE and the RECYLE BIN temporarily as virii can regenerate / reinfect even if you delete
them with both services on. After all the scanning and cleaning after a 2nd reboot and one last
scan do you turn both of them back on.
ANTI VIRAL
AVG (free) http://free.grisoft.com/
FIREWALL
ZoneAlarm http://www.zonelabs.com/store/content/company/products/znalm/freeDownload.jsp
WEB BROWSER - http://www.mozilla.org/products/firefox
EMAIL use thunderbird. It has a good built in spam filter and learns when you teach it. http://www.mozilla.org/products/thunderbird
SPYWARE
http://www.lavasoftusa.com/software/adaware/
http://www.safer-networking.org/en/index.html
Once you set it all up create 3 email accounts..
a hotmail or yahoo account for web "verification", this account you will not care if it get spammed
a sub account ( from the master account )to your ISP that you use for logons, this is the one you use for personal
emails only to trusted people and banking, ebay and paypal. Never use the account for anything else than that,
you find spam is low to non existant if you follow this rule, and even if it does become spam laden, then you
can delete the account and create a new sub account and do all the email updates to ebay, paypal, banks and your
freinds.
finally your master account from your ISP, this one you NEVER use, it's only kept for creating sub accounts since
changing the master account is a real pain.
and if you have a wireless router follow these tips,
1. Use WPA encryption (WPA-PSK) it's less crackable then WEP.
2. Make a passphrase that is upper & lower case and has some numbers thrown in there as well, again harder to crack.
some like mAkE1t5eCurE0rel53 and as long as possible.
3. Use MAC access control so only you or authorized PC's can connect (even if you do have encryption turned on)
4. Turn off DHCP use static addresses.
5. Turn off SSID (and change it) unless your card really needs it (some do)
6. Change username/password of access unit front end
7. Ensure you have the usual firewall enabled on your PC.
8. Paranoia rules, turn WLAN off if your not using it :)
one last tip
control panel---administrator tools--services--messenger
right clik on it
stop the service
then disable it
save changes
********** sidebar ****************
You've seen the Internet ads: Click here to get your free laptop computer, iPod, trip to Bermuda . . .
Ever wondered what would happen if you tried to claim the freebie?
Generally, you'd end up earning the reward by answering surveys, completing product offers or referring friends.
The free iPod that costs you
you respond to a free iPod ad. After several requests to sign up for various services, you'll realize that the free iPod was not free at all. The killing part is, you end up actually committing to a few services and will be billed for them, but because you get caught in a loop of pop-up windows and surveys, you then become frustrated and will not follow through to get the free iPod.
Free cell phone! What free cell phone?
After going through 11 questionnaires and saying no to all, you finally get to the last, and they say you must at least pick two items in order to be able to get whatever they are giving away.
For instance, If you answer a free cell phone ad and go through 11-12 questionnaires and at first it says no obligation to buy anything, but when you get to the last , it will say you must at least try magazines for 30 days and they're hoping you'll will forget to cancel before the 30 days. And the kicker was once you agree to the free trial of magazines, they never ever mentioned the free cell phone again, and then you will be watching and waiting to see what they do to your credit card and if I get the phone. By the way, once you give one company your credit card number you get charged $1 to $4.95 on your card, for other items you never heard of before and have to take the time to call them and get them to remove it.
Free spam! Act now!
Yes, they are all scams. There is always a 'short' questionnaire. You always have to answer many, many questions if you want this or that. You always have to give your e-mail address and other information. You always have to check 'yes' for at least one in order to qualify and continue. If you ever get to the end after 45 minutes or so -- yeah, short -- you end up having to buy or sign up for something or your name is put into a lottery for a chance to win. I, in my stupidity, have done this several times. Always thinking maybe this one is legit. Not! You'll have never get the free product or the free gift card, groceries, movie tickets, etc. Then your e-mail is bombarded with hundreds of advertisements that you can never seem to stop unless you change your e-mail address. What a deal. Moral of this story is: Nothing is free.
If you filled out the questionnaire online for a $50 gift certificate for dinner at a well-known restaurant chain. They ask for your name and the rest of your personal information and e-mail address. Then the questionnaire opens up a new page and asks you if you would be interested in e-mails for specials on items that you could use in your life. You fill that page out then here comes another page with more questions. After about five pages I gave up. It just wouldn't quit. It was like a stupid carrot that they had hanging out there that you could never reach. I turned my computer off and said, 'Forget that!' After that you'll check your e-mail for about a week and when you do you'll had over 200 spam messages, even sex ones. You'll never get a dinner certificate. You'll end up had to closing that e-mail account because the spam garbage will not quit. Moral of the story: There is no free lunch on the Internet.
After you give your e-mail address and answered all the questions, you'll be informed that you have to order (buy) one item from several areas in order to receive the freebie. So you end canceling the 'adventure' and then you'll be inundated with junk mail ever since. Never again. Big scam for addresses to sell, etc.
Complete the never-ending survey
If you try to win a few of those free products, butsoon you'll be convinced they are the biggest fraud out there. For example, you'll spend three hours filling out questionnaires only to find out they never end, and the couple of times you'll get to the end , and they will want you to buy something and you know what that means: They are asking for your credit card information.
Free (with shipping and handling)
If you purchase some software from a company that advertises if you pay for shipping you get four software titles for free.
A few weeks later you'll get a $49 charge to your account. If you look up the company on the Web and none of the links you'll find will go to the company. If you try the phone number that showed up on your statement and they simply tell you they are not available and to try back later before they hang up on you. So you'll be dissatisfied, and searched the Internet a little more only to find you're were not the only one to be scammed. Turns out that they never tell you that you are signing up for a subscription but send you software and you have a short time frame to return it or be charged. Total scam.
Free (with Social Security and credit card numbers)
Free (with purchase)
"If Your dumb enough you'll answer ads for 'free' products." Please note the quote marks -- they're intentional. Many of the Internet freebies have extremely long forms to fill out, complete with a host of ads you need to reply 'not interested' to or else you'll receive hundreds of solicitations from various companies.
The 'gift certificates' offered for sometimes hundreds of dollars almost always involve purchasing something, somewhere along the line or becoming a trial member of something. At which point you need to pay for your subscription or membership upfront, with the caveat it's 'fully refundable' within strict parameters. As the saying goes, there's no such thing as a free lunch!
2007-04-21 07:57:02
·
answer #1
·
answered by Anonymous
·
0⤊
0⤋
I will give a brief answer to the question, I am sure that someone will post a detailed version soon.
Trojans come in all shapes and sizes they have many ways of wondering on your computer. Back in the day when I played w/ them I used a program called Sub 7 to attach the virus to any type of Program, Pictures, or just any type of file. The basic one's would be two files a client and a server, you would send your target the client while you have the server once they have it you can connect and do what was intended.
Now I have seen many versions like spyware and others you can pick up off of websites or just being on the same network as an effected computer.
Best way to keep safe is a good spyware scanner and virus scanner. Also look into a good Trojan remover for those rare ones. I hope this helps some, if you need more information on them just contact me or wait for someone else to answear :)
2007-04-21 14:59:28
·
answer #2
·
answered by c82.phillips 1
·
0⤊
0⤋
The majority of trojan horse infections occur because the user was tricked into running an infected program. This is why it is advised to not open unexpected attachments on emails -- the program is often a cute animation or a sexy picture, but behind the scenes it infects the computer with a trojan or worm. The infected program doesn't have to arrive via email, though; it can be sent to you in an Instant Message, downloaded from a Web site or by FTP, or even delivered on a CD or floppy disk. (Physical delivery is uncommon, but if you were the specific target of an attack, it would be a fairly reliable way to infect your computer.) Furthermore, an infected program could come from someone who sits down at your computer and loads it manually. The chances of receiving the virus through an instant message are very low. It is usually received through a download. You can be infected by visiting a rogue websiteoad.
2007-04-21 14:55:30
·
answer #3
·
answered by Nasrudin H 5
·
1⤊
0⤋
According to your question, you are Not asking "How to remove Trojan Horse", I assume you already knows how to remove it.
I had studied the "Trojan Hose" & Evaluated it few years ago.
Here is my OWN WORD about it I want to share.
The terminology "Trojan Horse" in Computer is defined as Virus. Usually, it is a tool that Hacker cheat on the victim (pretend it is just a normal software for the victim to install). E.G. Combine the Trojan Horse with other software, when you run the software, both the regular software will be installed and the Trojan horse will be installed also in the background.
Trojan Hose will then open a "BackDoor" ( A Specific Port). Then every time the victim computer goes online, the hacker will be notice by e-mail, IM, or other contact method. So he can connect to the victim's computer and do any things that the remote control software can do.
The most common Trojan Horse software in the History is "SubSeven" & "NetBus".
2007-04-21 14:58:58
·
answer #4
·
answered by www.PCinvent.Info 2
·
0⤊
0⤋
I have used AVG Anti Virus, Zone Alarm Firewall, Spy-bot Search and Destroy and Ad Aware both spyware killers for years. They are all free for personal use and I have had no trouble with Viruses Trojans etc. AVG does not slow the system down as much as some other products and Zone Alarm allows a lot of personal configuration unlike the Windows Firewall. They can all be downloaded from the following link. http://www.computeractive.co.uk/ On the home page select downloads and then the appropriate category.I also use Windows Defender from the Microsoft site. It is safe to use two anti-spy products but never use more than one A/V as it can cause conflicts. You should run A/V and anti spy weekly. Hope this helps.
2007-04-21 15:28:54
·
answer #5
·
answered by Anonymous
·
0⤊
0⤋
Every time you load anything on to your computer - Download a file, email, load a floppy disk - Just about anything - So make sure you have anti virus software that checks the media BEFORE it's accepted on the computer system.
2007-04-21 14:54:58
·
answer #6
·
answered by Sparky 2
·
0⤊
0⤋
bad people put them on the internet for u to download
lol
2007-04-21 14:54:12
·
answer #7
·
answered by hawkman 3
·
0⤊
0⤋