123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Protect Your Notebook From Spyware And Viruses

Profile Picture
By Author: Tim Childree
Total Articles: 3764
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Notebook computers bring a tremendous convenience to personal computing. Just sit within range of a wireless hotspot and you can connect to your office or home network, access your email, and complete important projects for work. However, roaming from one unsecured wireless network to another can leave your computer vulnerable to malicious software attacks.

Spyware and Viruses

If you are connected to a wireless network without its own firewall, hackers can easily intercept the signals you send and receive across the airwaves. Malicious individuals can also install spyware and viruses on your computer.

Spyware refers to an application designed to track a computer user's internet activities, keep note of sites visited, and gather other information. The term, "spyware," can also refer to any non-viral malicious software, including software that takes over your internet connection, pops up unwanted advertisements, or even blocks your internet connection. A tracking program is technically labeled as spyware only if the computer user does not consent to the download or installation.

Spyware collects ...
... information and sends it back to the spyware controller. The owner of the spyware program usually sells gathered information to marketers. For instance, spyware can get a computer user's email information, using that information to bombard the user with advertisements and spam. Spyware is also known as "malware" (Malicious Software), as it can be used to aid identity theft and fraudulent activities (some spyware programs mine credit card information and other sensitive financial information). Keylogging programs, used to steal credit card information and passwords by monitoring everything a user types, fall under the umbrella of spyware/malware.

Viruses are another type of malicious software. A virus is a piece of code that attaches itself to a program, a file, or your boot sector. These malicious programs are called viruses because they work much like a viral infection - they spread to other files, programs, and even computers, and they are designed explicitly to damage your files and destroy your applications.

Protecting Your Notebook from Spyware and Viruses

Protecting your notebook computer from spyware and viruses protects you against fraud and protects your privacy, too.

The first thing that you need to do is install a secure web browser. Internet Explorer is particularly vulnerable to unauthorized scripts which could be run and installed on your computer without your knowledge. Instead of using Internet Explorer, you can try using Mozilla Firefox, one of the most secure web browsers around. Firefox will always inform you about any download or installation, inform you about suspect sites, and update your browser automatically to continually improve security.

Aside from using Firefox, it is important that any computer user install a personal firewall to block unauthorized access attempts. For Windows XP users, Comodo Personal Firewall is a free option (there is an Alpha version of Comodo Personal Firewall Version 3, which adds Vista support, but this would not be a stable option until they reach the final release). Even the best firewall can sometimes allow spyware through, however, so scan your computer with a free program like Spybot: Search & Destroy or Ad-Aware SE, two of the very best anti-spyware programs available. You should not neglect to install anti-virus software, too. If you have an anti-virus program you already use, stick with it, but the free home edition of Avast and the open-source (free) anti-virus product ClamWin are two excellent options. Be sure to keep your security software updated (most programs will automatically update themselves, but they will sometimes prompt you for your permission) to give yourself the very best protection against malicious software.

This article may be republished freely as long as this copyright notice and box of resource links are included at the bottom.

Copyright © 2007 MALIBAL, lLc

Total Views: 251Word Count: 630See All articles From Author

Add Comment

Computers Articles

1. How To Develop An App From Scratch In 13 Steps
Author: goodcoders

2. 7 Steps To Create A Safe Mobile App
Author: goodcoders

3. Why Do Businesses Need Vendor Management Software?
Author: Kiran

4. React Native App Development By Alvi Software
Author: Alvi Software

5. Custome
Author: Owner

6. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

7. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

8. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

9. The Rise Of User Centered Web Design
Author: goodcoders

10. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

11. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

12. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

13. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

14. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

15. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: