Monday, March 12, 2007

Remove Adware Components Forum

Just signed up on the Spybot Search & Destroy forum as a new user. They have an impressive range of topics, and seem to be pretty independent, despite the fact they have an (excellent) product to sell. Used a trial copy of SEO Elite to identify this forum as a key link to my Remove Adware Components site. If it continues to work this well, I will definitely make the purchase.

Andy at:

Remove Adware Components

Wednesday, September 20, 2006

Computer Worms: The Greatest Threat You've Never Seen

Remove Adware

If you worry about computer security, then worms are probably near the top of your list. Although much has been done to combat the threat posed by spyware and adware, computer worms and viruses pose a constant, and constantly changing threat. The following information contains useful background from the fine contributors to Wikipedia and may help you avoid this potent danger.

In short, a computer worm is a self-replicating computer program. It uses a network to send copies of itself to other systems and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. In general, worms always harm the network and consume bandwidth, whereas viruses always infect or corrupt files on a targeted computer.

Email worms spread via email messages. Typically the worm will arrive as email, where the message body or attachment contains the worm code, but it may also link to code on an external website. Poor design aside, most email systems requires the user to explicitly open an attachment to activate the worm, but "social engineering" can often successfully be used to encourage this; as the author of the "Anna Kournikova" worm set out to prove. Once activated the worm will send itself out using either local email systems or directly using SMTP. The addresses it sends to are often harvested from the infected computers email system or files, which can be embarrasing and compromise personal identity. Therefore recipients of email worms should assume that they are not sent by the person listed in the 'From' field of e-mail message (sender's address).

Instant messaging worms spread via instant messaging applications by sending links to infected websites to everyone on the local contact list. The only difference between these and email worms is the way chosen to send the links.

With IRC worms, chat channels are the main target and the same infection/spreading method is used as above: sending infected files or links to infected websites. Infected file sending is less effective as the recipient needs to confirm receipt, save the file and open it before infection will take place.

File-sharing networks worms copy themselves into a shared folder, most likely located on the local machine. The worm will place a copy of itself in a shared folder under a harmless name. Now the worm is ready for download via the P2P network and spreading of the infected file will continue.

Internet worms are those which target low level TCP/IP ports directly, rather than going via higher level protocols such as email or IRC. A classic example is "Blaster" which exploited a vulnerability in Microsoft's RPC. An infected machine aggressivly scans random computers on both its local networ and the public internet attempting an exploit against port 135 which, if successful, spreads the worm to that machine.

Users need to be wary of opening unexpected email, and certainly should not run attached files or programs, or visit web sites which such email link to. However, as the ILOVEYOU showed long ago, and phishing attacks continue to prove, tricking a percentage of users will always be possible.Anti-virus and anti-spyware software are helpful, but must be kept up-to-date with new pattern files every few days at least.

Tuesday, September 19, 2006

Like Adware and Spyware? Try Internet Explorer

Despite efforts to close security loopholes with Microsoft Internet Explorer, problems abound. USA Today reports in a recent article entitled, "Security risks swell for Microsoft's Explorer", that using Microsoft's Internet Explorer Web browser to surf the Internet has become a marked risk, even with the latest security patches installed.

Other media outlets have followed suit. The British journal The Inquirer reported that the US Government has sent out a warning out to internet users through its Computer Emergency Readiness Team (US-CERT), pleading users to stop using Microsoft's Internet Explorer. Furthermore, in a vulnerability note released by US-CERT, it says "there are a number of significant vulnerabilities in technologies relating to the IE domain" and that "it is possible to reduce exposure to these vulnerabilities by using a different web browser." Well, they're right.

So what do you do if you need to surf the Web and don't want to use Internet Explorer? It may be time to give Firefox a try. Firefox is an award-winning, free Web browser from Mozilla, the folks who brought you Web browsing before Microsoft jumped on the bandwagon.

According to the latest release notes, "Firefox protects you from viruses, spyware and pop-ups. Enjoy improvements to performance, ease of use and privacy. It's easy to import your favorites and settings and get started." Specific adware and spyware prevention features of the latest edition of Firefox include automatic updates, pop-up blocking, and stronger overall security enforcement.

Supporting automatic updates, the new Software Update feature makes it easy to get the latest security and feature updates to Firefox. Firefox automatically downloads these small updates in the background and prompts you when they are ready to be installed. It is easy to forget to check a Web site to download new versions of software or install security patches.

If you have ever been annoyed by pop-ups, Firefox's built-in pop-up blocker has been enhanced to block more unwanted pop-up and pop-under ads.

And speaking of stronger security, Firefox keeps you more secure when you're browsing the Web, closing the door on spyware, worms, and viruses. The Firefox community of developers and security experts works around the clock to monitor security issues and release updates to better protect you.

Finally, an overlooked security issues (particularly on shared computers) is the exposure of private data like credit-card and social security numbers. Firefox protects your privacy with the new Clear Private Data tool. With a single click, you can delete all personal data, including browsing history, cookies, Web form entries and passwords.

So if you're tired of adware and spyware issues with Internet Explorer, I'd recommend switching to Firefox, or at least trying it in parallel for a while. I've made the switch and I wouldn't go back.

Remove Adware Components

Monday, September 18, 2006

Remove Adware Components

Remove Adware Components

Welcome to my blog describing the latest tips for removing adware and spyware, as well as how to remove adware components. Check back often for computer security tips and articles on malware topics including worms and viruses.