Request Help

Request Help

We would love to hear from you! Please fill out this form or call us
Call: 866-438-6932

Spyware, Viruses, Malware (Part 2)

Spyware, Viruses, and Malware – What you may not know.
(Part 2 – How they work and how to locate them.)

Welcome back to my series of articles that pertain to Spyware, Malware, and Viruses and what you may not know about them. In my first article, I gave you and overview and some information on the history of these 3 nasty applications or bots that infect most computers at some time or another. There is a TON of information availible on these subjects on the Internet, so if there is anything more specific that you are curious about or that you didn’t understand from this article you can usually go to http://www.google.com and you can reference it there. In this article, I am going to be discussing what Viruses and Spyware are, and how you locate them on your PC.

The first thing that you have to understand is how these malicious applications get onto your systems. Studies show that the number one way to catch a virus or to obtain Spyware on your system is through P2P (Peer to Peer) file sharing applications like Napster, Limewire, Bit Torrent, and any other program of that variety. You may think you are downloading a harmless MP3 file, or you may think you are getting the latest MPEG for free, but the fact is that over 40% of all files that are transferred through P2P programs are actually viruses or Spyware and key loggers that are camouflaged as the file you are looking for. Remember this ONE rule about the Internet, if you only remember ONE thing from this article, and that is there is NO SUCH THING as FREE on the P2P applications. No matter how perfect or scamless the situation may seem, if it is FREE and on the P2P programs than you can guarantee that there are strings attached. So try to stay as far away from P2P programs and applications as you can, because no matter how hard you try and no matter how much protection your system has, you are bound to override your protection to view a file that you shouldn’t because of infection, and you will sooner or later end up destroying your system.

I’m sure as you are reading this article you are thinking that you are probably secure, and that you have Antivirus and Antispyware software on your system, so none of this applies to you. But remember this, those programs are only good if you do updates to their data files at least once a day, and they can only stop what you tell it to stop. So if you try and access a website that you THINK is safe, and your Antivirus software tries to tell you it is not, and you bypass your antivirus software and access the site anyway, then you may have just let a Trojan or key logger onto your system and your Antivirus software can now do nothing about it. Understand that protection software is only as good as it owner. It also only takes ONE piece of Spyware or Malware to get onto your system to corrupt your Antivirus or Antispyware programs so that they cannot detect future attacks against your system. The first thing a virus or piece of spyware does, is look for the services and applications that run your Antivirus software, and disable them, or even worse, cloak themselves so that your antivirus software thinks everything is running smoothly when in all reality, your system is being destroyed one piece at a time. A lot of viruses and Trojans will disguise themselves as system services and then they become nearly impossible even by a trained professional to remove from your PC without formatting the computer. There are so many different variations of spyware, Trojans, key loggers, malware, and backdoors that can attack your system, that you have to be on the lookout for strange occurrences at ALL times when surfing the Internet.

Your best bet for protection is to follow the steps in my next article and try to stick to the rule of Internet thumb, and that is if you don’t know the website or file your are downloading and cannot verify its integrity, then DON’T go to that site or download that file. It is a very simple rule, but end users seem to forget it a lot, I myself am included in that statement.

So check back later this week for my last installment of, “Spyware and Malware protection and removal and what you MAY not know!”, which will explain how to understand, locate, and eliminate spyware, malware, and viruses.

Data Recovery

Tags:

7 Responses to “Spyware, Viruses, Malware (Part 2)”

  1. Dave May 23, 2008 3:26 pm #

    Looking foward to the next article.

  2. IT Training June 20, 2008 2:25 am #

    You have to be extremely careful in deciding where you download from. Applications like Limewire are known to have a lot of spam that may attack your system in the form of a virus. Having a good anti-virus software definitely helps.

  3. Esteban September 10, 2008 11:35 pm #

    Hello, interesting post I am not a programmer or software engineer, but understand some things.sorry about my english only two quesitons if you have the time: writting from OSK.

    A brief, a vaio notebook, affected with, a long beep on POst, disable keys, “5,6,7,t and y”, boot very slowly, when finished a beep beep, then a repeated, “66666666666666666666666666..”, I already format the HD,flash the bios,reinstall all from a clean recovery disk, clear cmos, fixmbr, do a fix boot, do a low level format, take off the rams, but what ever it is … is there….I thing resides in the BIOS, something like the EPROM or flash memory..the only thing have no perform is a flash from DOS (shutdown).Finally no antivirus.or anti- malware or rootkit detect anything…

    Q1. What other hardware retains memory, that if I can change the BIOS chip and HD.

    Q2 Have you an advice on this?

    PS. I have found 3 results on the web about this issue, all of them said the same,
    you are done (fffff..kd)

    ty if you have any advice.

  4. Esteban October 1, 2008 9:24 pm #

    About the issue I already described above, FIXED.

    No malware,virus or worms… is a HARDWARE issue, i replace the keyboard with a new one and that FIX the problem, no matter how many time and data lost..at least
    I learned much things, I hope this help to anyone with that sympthoms.

Trackbacks/Pingbacks

  1. Spyware, Viruses, Malware (Part 2) - May 21, 2008

    […] Spyware Removal Tools wrote an interesting post today onHere’s a quick excerpt Spyware, Viruses, and Malware – What you may not know. (Part 2 – How they work and how to locate them.) Welcome back to my series of articles that pertain to Spyware, Malware, and Viruses and what you may not know about them. In my first article, I gave you and overview and some information on the history of these 3 nasty applications or bots that infect most computers at some time or another. There is a TON of information availible on these subjects on the Internet, so if […]

  2. Spyware, Viruses, Malware (Part 2) - May 21, 2008

    […] Go to the author’s original blog: Spyware, Viruses, Malware (Part 2) […]

  3. which is the best p2p software - May 24, 2008

    […] to my series of articles that pertain to Spyware, Malware, and Viruses and what you may not know abohttp://www.dtidata.com/resourcecenter/2008/05/21/spyware-viruses-malware-part-2/Convert your torrent files with Torrent2exe About.comWhether you’re a seasoned torrent user or just […]

Leave a Reply