Wednesday, May 13, 2009

Privacy:10%; Public:100%

All the fighting had taken place outside the walls of Troy, but at last the Greeks found a way to enter the city. They built a huge wooden horse and filled its hollow body with armed men. Leaving it before the city gate, the Greek forces sailed away. Believing the horse to be an offering to Athene, the Trojans took it into the city so as to gain the goddess's favor for themselves. During the night the armed men came out of the horse and opened the gate for the rest of the Greeks, who had sailed back after dark. Troy was destroyed, and Helen was restored to Menelaus.


Imagine if the people in the city of Troy would have had a way to remove the Trojan horse from inside their walls after they realized that it was full of Greek soldiers. This would have saved their city and their lives. Today, many of us are faced with a situation where we have a Trojan horse virus that exists on our computer. These viruses tend to wreak havoc wherever they are installed. Not only can they cause our systems to malfunction and sometimes even crash, but they can also steal our personal information and cause a whole host of other problems. If you have been affected by a Trojan virus then not all is lost. There are ways that you can remove one of these viruses from your system.
Some of these viruses that are in existence are easily removed. If they have been around long enough and are notorious enough someone will have written a program that will automate the process of removing it from your system. The problem with Trojans is that they are very easy for even a beginner hacker to write. Many times the antivirus software that we have on our computers is not updated fast enough in order to be able to catch any new threats that are in the wild. If one of these viruses should happen to find a way into our computer then we could be in for some real trouble.
If you're trying to remove the virus yourself, you will need to do several things. Trojan viruses do not have a remove program installed into their software so you will need to do some pretty fancy computer work in order to get them off of your system. There are some free software programs out there, such as one called Hijack This, that will help you to be able to analyze what is running on your computer. Since many spyware programs are memory resident they will constantly be running, even if they are not causing a problem at the moment. By using a program such as Hijack This you will be able to see any of these programs that are loaded into your computer's memory system.
One of the problems with trying to decipher the information from software programs is that many of us are not computer literate enough to be able to understand what they say. There are many computer forums out there that will help you to be able to decipher the results from these programs. You will then be able to take a step-by-step approach in order to clean your system and have it back up and running as it was before you got the virus. If you have difficulty being able to do some of the things that are listed in these instructions, such as editing the registry, you may need to enlist some outside help. Most of us have a friend or relative that is able to handle such a task. If you are unable to do it and nobody can help you then you may need to seek some professional assistance.


Has your computer ever become so slow that you can fix yourself a snack in the time it takes your word processor to open? Perhaps spyware is to blame.
Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer's processing power. They're designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. According to some estimates, more than 80 percent of all personal computers are infected with some kind of spyware [source: FaceTime Communications]. But before you chuck your computer out the window and move to a desert island, you might want to read on. In this article we'll explain how spyware gets installed on your computer, what it does there and how you can get rid of it.
Some people mistake spyware for a computer virus. A computer virus is a piece of code designed to replicate itself as many times as possible, spreading from one host computer to any other computers connected to it. It usually has a payload that may damage your personal files or even your operating system.
Other PC Dangers
Trolls
Trojan Horses
­10 Worst Computer Viruses
­ Spyware, on the other hand, generally isn't designed to damage your computer. Spyware is defined broadly as any program that gets into your computer without your permission and hides in the background while it makes unwanted changes to your user experience. The damage it does is more a by-product of its main mission, which is to serve you targeted advertisements or make your browser display certain sites or search results.
At present, most spyware targets only the Windows operating system. Some of the more notorious spyware threats include Trymedia, Nuvens, Estalive, Hotbar and New.Net.Domain.Plugin [source: CA].Has your computer ever become so slow that you can fix yourself a snack in the time it takes your word processor to open? Perhaps spyware is to blame.
Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer's processing power. They're designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. According to some estimates, more than 80 percent of all personal computers are infected with some kind of spyware [source: FaceTime Communications]. But before you chuck your computer out the window and move to a desert island, you might want to read on. In this article we'll explain how spyware gets installed on your computer, what it does there and how you can get rid of it.
Some people mistake spyware for a computer virus. A computer virus is a piece of code designed to replicate itself as many times as possible, spreading from one host computer to any other computers connected to it. It usually has a payload that may damage your personal files or even your operating system.
Other PC Dangers

No comments:

Post a Comment