How to Protect Your PC Grayware Adware, Malware, Spyware.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Free Software Alternatives: Avast! Anti-virus
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Explorer Browsing & Windows XP Service Pack 2 What is Service Pack 2? The newest update for Windows XP which aims to make your computer more secure.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Security for Seniors SeniorNet Help Desk
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 19 INTERNET SECURITY
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Safe Surfing Through the World Wide Web Safe Surfing Through the World Wide Web The World Wide Web connects people from all over the world. The Web allows.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
1 Malware, Adware, Spyware, Viruses, BHO. 2 Malware A generic term increasingly being used to describe any form of malicious software like viruses, trojan.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Internet Security and Your Computer Welcome to Boot Camp.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Computer Security Keeping you and your computer safe in the digital world.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Managing Windows Security
Fix Gmail Temporary Error 500 Call Gmail Helpline.
Risk of the Internet At Home
Spyware. By: Katheryn L. Gaston.
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

How to Protect Your PC Grayware Adware, Malware, Spyware

Grayware – Grayware encompasses spyware, adware, dialers, joke programs, remote access tools, and any other unwelcome files and programs apart from viruses that can harm the performance of computers on your network. Grayware refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization. Adware - software that displays advertising banners, re-directs you to websites, and otherwise conducts advertising on your computer (not to be confused with popup ads, which come from the websites that you visit). Annoying software and Malicious Software Malware - malicious software that is intended to do harm to your computer or software, including viruses, Trojans, and worms. Spyware - software that gathers information about you, your browsing and Internet usage habits, as well as other data.

How does grayware get onto my computer?  Grayware can get onto your computer several ways If you install a peer-to-peer file-sharing system, grayware is often “bundled” in the install process. This is also common with other downloads/installs. Be suspicious of programs “enhancing” your computer. These could be tricky ways to get you to install grayware onto your computer. Examples are “smileys” for your , new mouse cursors, screen savers, etc. If your PC is not properly protected, it is possible for grayware and other unwanted files to be installed onto your computer without your knowledge.

What can I do to prevent “Grayware?”  Update your PC security! grayware authors know and attempt to exploit security “holes” in software. Be sure to keep all of your software up to date, especially your operating system, firewall, & anti-virus. Browse wisely. You can change your internet browser settings (Internet Explorer, Firefox) with a few clicks. A good site for information is:  Download programs ONLY from sites you trust.  Use grayware detection programs, such as firewalls, anti-virus protection, and adware/malware scanners.  Read the fine print! Many programs, security warnings, and privacy statements contain critical information, including what you are installing.

Grayware Protection Options

E-avesdropping: Web Bugs  Unfortunately, Ad-aware can't isn’t a sure fix. “Net snoops” might also track your surfing habits through Web bugs, clear images that send back your ISP address, telling others that you are viewing their page or content. Not all Web bugs are bad. Some companies use clear image files to count how many readers visit a particular page. Guard-IE is one particular product that alerts you to the presence of Web bugs on a site, then lets you block them if you choose. Guard-IE also removes Web referrers, tags that tell Web sites the last site you visited. Finally, Guard-IE removes your Internet cookies, browser history, and any temp files created on your hard drive…a good way to keep your surfing habits from prying eyes.  As good a privacy tool as Guard-IE is, only Internet Explorer users will benefit. For a good, all-around, ad-blocking and privacy-enhancing product for both Netscape and Internet Explorer, a good tool is AdSubtract Pro.  Source: C|NET

E-avesdropping:  Someone could be reading your . Consider this: Your program probably sends your mail as an alphanumeric text file. That means that anyone, whether at your company or at your Internet service provider, could intercept, open, and read your mail with a text editor such as Windows Notepad. Sharing banana- bread recipes online? You probably don't have much to worry about. But if you discuss business deals via , you'll need extra protection.  A few products can encrypt the contents of your mail. If you're looking for a free program to do encrypted , the selection is limited, if you want to integrate with Outlook. Thunderbird+Enigmail+GnuPG or GPG4Win does integrate with Outlook 2003

Resources  Set Internet browsers securely  McAfee Home Edition l.cfm?NewsID=124