Sunday, September 25, 2005

Antivirus/adware & spyware/ data Backups

An ounce of prevention




Backing Up Your PC Data

Backing up your computer data can seem like a chore, but imagine what it will be like if all your data is gone and you have to start all over again. There are many ways of backing up your data and just as many types of media to use as well. This article covers the basic steps needed to backup your data easily and quickly.

1. Organize Your Files

Keeping your information organized should be one of your first priorities. This will make things much easier when the time comes to back up. Because the "My Documents" folder is the default location for many programs to store their files, it is also the most logical location to store your files. Make sub-folders in your documents folder to keep your data organized. Windows XP has already set up some for your use. It includes sub-folders such as "My Music," "My eBooks" and "My Pictures." Add sub-folders as you need them.

One of the most important sub-folders to use is a "My Downloads" folder. This is where you should store and categorize all of your Internet downloads.

If you ever need to reinstall a downloaded program, you will be glad you have this folder.

Remember, some programs do not save data to "My Documents." In this case, you should locate and note for backup the folders that these programs do use. In some cases, you may need to copy that information to your "My Documents" folder.


2. What do I Backup?

Just about anything your media will allow you to store. This means you can make copies of all your personal data, such as documents, image and media files, email, financial data, saved games, and anything else that may be important. Try to avoid having to back up the entire operating system unless you have the media that will support this type of backup.



3. Types of Backup Media

There are many types of backup media. You can use tape drives, CD-R and CD-RW drives, DVD-ROM drives or hard drives. You can also use older types of media like Iomega's Zip or Jazz drives. These are all available in both internal and external versions. Be sure to choose the right one based on how much information you would like to save.

Tip: Tape drives, hard drives as well as Zip and Jazz drives sore data magnetically. This type of storage will degrade with time and is subject to outside magnetic influences. CD-R/RW and DVD-ROM drives store data using a laser imprint on the CD/DVD media. This is far less likely to degrade over time and, as long as the disc's are not damaged, will last for many years.


4. Types of Backup Methods

There are two main types of backup methods. You can do an "incremental backup." This is where you back up specifically selected folders and data. Windows includes a fairly decent back up program or you may choose to use the program that comes with you backup hardware.

You can also do a full-system or complete backup. This is where an "image" of your entire hard drive is made. There are different types of programs to image your entire hard drive such as PowerQuest's Drive Image, Norton's Ghost or Dantz's Retrospect. Due to the shear volume of data this type of backup is usually only successful if you have a second hard drive or tape drive.



5. Where Are My Data Files Kept?

Your data files are kept in many places but here are a few locations to look for your information.

Email: Locations may vary.

In Windows XP Microsoft Outlook Express saves its files to 'C:\Documents and Settings\(user name)\Local Settings\Application Data\Identities\{indentity number}\Microsoft\Outlook Express' in files with an extension of .dbx.

Outlook saves its files to 'C:\Documents and Settings\(user name)\Local Settings\Application Data\Microsoft\Outlook\outlook.pst'. Netscape saves your files in 'C:\Program Files\Netscape\Users\(user name)\Mail'.

Your Internet Favorites or Bookmarks: Internet Explorer stores your Favorites as individual files in the C:\Windows\Favorites or C:\Documents and Settings\(User Name)\Favorites directory. Netscape saves your Bookmarks in 'C:\Program Files\Netscape\Users\(user name)\bookmark.htm'.

Other programs:


You may need to do some research on where files are saved. One good way to do this is to open up the program in question, create a temporary file and when you save the file do a 'Save as', this will prompt you to where the default location of where the program saves its files.


6. How Often Should I Perform a Backup?

In general, it is best to schedule your backup on a consistent and regular basis. How much information you add or change to your system will help you determine if this should be on a monthly, weekly or even a daily schedule. Most backup software programs allow for automatic scheduling.
.............................................................................................................


Lock Down Your PC!

Your Guide to Internet for Beginners.


Security Essentials for Home Computing


If you subscribe to Cable or DSL broadband at home, then you are likely to be casually "attacked" by hackers up to three dozen times a day. Especially if you use Windows XP or other Windows operating systems, you are a prime target for savvy hackers who will exploit your fulltime Internet connection.

As good as Microsoft products are, they are also obsessively targeted by hackers around the world. Small Microsoft "holes" perforate your computer, including: your administrator account, your ICF firewall service, your guest logon, your shared folders, your messaging services, your Identifier Broadcasts, your port openings, and your Encrypted File Services... all of these obscure points are absolute candy for hackers!

Yes, this is frightening. But all is not lost... most of these security holes in Microsoft are easily patched by an hour of reading and an hour of configuring your PC.

Good home security is about vigilance, knowledge, and meticulous attention to detail. We here at About.com want to help you with that, so we have provided dozens of free articles explaining security holes and how best to plug them.

Welcome to the exciting and challenging world of anti-hacker and anti-virus defense! What follows next are explanations of firewalls, packet filter routers, toggling Windows services to prevent external access, configuring WiFi networks for privacy, and overall blocking of hackers on Cable and DSL networks.

.......................................................................................................................
Spyware 101: Understanding The Biggest Internet Threat of 2005

How Rogue Software Works.

What is “Spyware”?


(July, 2005)

Forget spam, viruses, and hacker attacks..."spyware" is now the single largest problem facing Internet users today. These nasty little rogue programs have become so widespread and so viral, their volume far outstrips spam and regular virus infections. The spyware problem has grown to such an immense breadth and depth, we cannot even agree on what to call it.

Most people historically call these rogue programs "spyware", because the problem originated in the 1990's with programs that secretly observed and logged your web surfing habits. The problem, however, has now evolved into dozens of other malicious forms, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms

Today, spyware is being redefined as a much larger category of rogue software called "malware", or malicious software programs. At its most basic definition, spyware/malware is when insidious little software programs covertly install themselves on your computer, and then perform secret operations without your permission. Once in place, malware programs may do hundreds of nasty things to your computer. They will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.

What does Spyware/Malware specifically do to my computer?

Malware will perform a variety of nasty activities, ranging from simple email advertising all the way to complex identity-theft and password-stealing. New nasty functions are created every week by malware programmers, but the most common malware functions are:

1. Malware steals your personal information and address book (identity theft and keystroke-logging).
2. Malware floods your browser with pop-up advertising.
3. Malware spams your inbox with advertising email.
4. Malware slows down your connection.
5. Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.
6. Malware uses your computer as a secret server to broadcast pornography files.
7. Malware slows down or crashes your computer.

Where does Spyware/Malware come from?

Spyware/malware programs are authored by clever programmers, and then delivered to your computer through covert Internet installs. Usually, malware will piggyback on innocent-looking web page components and otherwise-benign software such as game demos, MP3 players, search toolbars, software, free subscriptions, and other things you download from the web. Subscribing to online services is especially bad for getting malware. In particular, whenever you sign up for a so-called "free" service or install new software, you must accept an "end user license agreement" (EULA). The fine print of the EULA will often include the phrase "the vendor is allowed to install third-party software on your computer". Since most users don't bother to read this EULA fine print, they naively click "accept", and install malware out of sheer ignorance.

What kind of personal information does Spyware/Malware steal?

This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.

Next: How to Detect and Destroy Spyware/Malware on Your Computer.

How to Detect and Destroy Spyware!
(continued from previous page)

How Do I Protect Myself from this 2005 Epidemic of Spyware/Malware?

Answer: Avoiding and destroying spyware is not instant, and it is not a one-time event like an innoculation. Instead, stopping spyware/malware is a long-term game that is exactly like cleaning dirt out of your home. You need constant vigilance, and a regular habit of cleaning malware out of your computer every week.

Note: Additionally, as an educated user, you must also adopt a "buyer beware" attitude whenever you install new software from the Net or even from CD...you need to read every end user license agreement on your screen before you click "accept".

Here is the checklist for detecting and destroying malware

1. Install two or three different anti-spyware programs ("spyware cleaners") on your computer, and update their definition lists regularly. Because every anti-spyware cleaner is imperfect, it is necessary to use combinations of these programs to catch the greatest breadth of malware. Also, the anti-spyware manufacturers regularly add new entries to their "definition" lists, just like anti-virus software. Make sure to keep your spyware cleaners updated with these lists!

Click here for 5 recommended anti-spyware programs.

2. Build a weekly habit of "scan and detect". Like cleaning house, this should be done every few days. At the very least, this should be done whenever you install new software. Many anti-spyware programs can be set to automatically perform scan-and-detect nightly.

3. Carefully read every EULA (end user license agreement) before clicking "accept". If you see the phrase "3rd-party software may be installed", make sure to follow the software install with a spyware cleaning.

4. Educate yourself on the latest strains of malware. In particular, start visiting these recommended anti-spyware sites, and update yourself on the latest malicious programs.

* Antivirus/Antispyware at About
* Network Security at About
* PestPatrol.com database
* Spywareguide.com
* SpywareWarrior.com
* SurferBeware.com
* Cexx.org

5. Save your data, and backup often! As much as it sounds like broken-record preaching, backing-up is how an intelligent user prepares for the worst. Backing up means: keep your original software CDs in a safe accessible place, constantly save copies of your important work files on CD or separate drives, and presume you will actually need them one day. This way, if you ever experience the extreme spyware circumstance of having to reformat your hard drive, you can at least recover your important work.



There you go, fellow Internet users. Your lives now have an extra complexity as you add one more cleaning habit to your weekly routine. The goods news is: once you build a regular scan-and-detect habit, then spyware and malware will be reduced to a mere annoyance, and you can get back to business of enjoying the Internet! Personally, I think of it as having one more room in my house to dust and vaccuum.

Keep the faith, fellow webbies... the Internet is too important to let these malware programmers win!

More: Some Related Spyware/Malware Resources For You:
Here is some follow-up information for further reading:

* Top 5 Spyware Defense Programs

* Five Steps To Defending Against Spyware
...................................................................................................................................
The Top 5 Anti-Spyware Programs, 2005

From ,Your Guide to Internet for Beginners.
Numbers 5 and 4
July, 2005


Stopping spyware (“malware”) is more than a one-time inoculation, folks. This is about a weekly habit of cleaning "nasty dust bunnies" from your personal computer. In much the same way you clean your home with your favorite broom and your favorite cleaning solvents, you will also need good tools to clean spyware out of your PC.

Here is our suggestion list. After collating the opinions of several About readers and the About writing staff, we believe that these five anti-spyware tools (aka "spyware killers") will give you maximum value for your money.


Editor’s Comment: as good as these following tools are, they are also imperfect. In particular, these tools vary in their detection algorithms and their signature/definition vocabularies. Accordingly, we suggest you use two or three of these anti-spyware programs as a combination defense.



* Number 5: PestPatrol for Home Users
Cost: Free to try, $39.95USD to buy
About.com Rating: 3.5 stars out of 5
Editor’s comment: What used to be cutting-edge features in 2003 (i.e. detailed explanation of each spyware infection, easy interface, automated nightly cleaning, realtime protection) is now just par. Furthermore, PestPatrol has missed several Trojans and given me false positives lately. PestPatrol was a big player two years ago, but now it has been outstripped by its competitors, despite its solid quality. If only PestPatrol was free, it would earn more points with us users. Otherwise, this tool earns 3.5 stars for being a solid performer.

* Number 4: Webroot’s Spy Sweeper 3.5
Cost: Free to try, $29.95 to buy
About.com Rating: 4 stars out of 5
Editor’s comment: This product ties with the Number 3 product on this list. It has tremendous features, including a friendly interface, realtime “show as it goes” notification of catching infections as they happen, and detailed explanations of each infection threat. Spy Sweeper is a thorough cleaning tool with a good look and good definition list support. No, it's not freeware, but at 30 bucks, Spy Sweeper is a good value.


Next: The Top 3 Anti-Spyware Programs of 2005

The Top 3




* Number 3: Spybot Search & Destroy
Cost: Free
About.com Rating: 4 stars out of 5
Editor’s comment: Being freeware, Spybot doesn’t have a 24-hour help line to call. And no, it does not proactively monitor for spyware infections -- you need to manually launch Spybot every couple of days. Nevertheless, this PepiMk’s product is a trusted friend that just keeps on getting better. It shreds files for you, offers you email opt-out lists, and it catches 99% of spyware threats out there. Most of all, Spybot does this for the ultimate price tag: $0.00. There is no excuse for not installing this excellent spyware killer!

* Number 2: Lavasoft’s Ad-Aware SE, Personal Edition
Cost: Free
About.com Rating: 4.5 stars out of 5
Editor’s comment: Lavasoft has been the benchmark spyware-defense tool for years. Their Ad-Aware product has won the trust of millions of users. Although it doesn’t have the nifty shredding and email opt-out lists of Spybot, Ad-Aware does perform realtime protection, and it auto updates its definition lists to remain current. Up until 2005, combining Spybot and Ad-Aware was the smartest (and the cheapest) way to defend your compute against spyware. Things are different now, because Number 1 below has set the high bar even higher for 2005.

* Number 1: Microsoft Windows AntiSpyware 2005 Beta
Cost: Free for legal owners of Windows operating systems
About.com Rating: 4.75 stars out of 5
Editor’s comment:To be quite frank, I think Microsoft does a great job 85% of the time. And this is one of those times.

At first met by skepticism, this new Microsoft AntiSpyware has now won the affection of millions of computer users. Microsoft built Antispyware Beta by combining the work of purchased subisidiary company, Giant Software, with native Microsoft code. The result: Antispyware Beta performs all the realtime protection of Ad-Aware, using the most agile and in-depth definition vocabulary of any spyware defense today. Moreover, Antispyware Beta adds in several other small tools. It will thoroughly explain every discovered threat and its modus operandi. It will shred history files for you. It will subscribe you to the dynamic SpyNet network for advanced protection help.

As with any new product, there some downsides to this tool. For one, you will hear many critics complaining that the product is Microsoft-centered (i.e. it does not shred Opera or Firefox history files, and it likes to keep your home page locked on Microsoft's MSN). Secondly, the Antispyware autoscan is reversed by default: it runs at 2am, but updates its definition lists at 3am. Thirdly, hackers and programmers are already targeting Antispyware with trojans (after all: Microsoft is the Goliath to topple if you are an anarchist).

But when it comes down to the core job of cleaning spyware, Microsoft has a 99% successful tool here. In three weeks of tests on my two home and eight work machines, Antispyware Beta has consistently detected threats that were missed by McAfee, Spybot, and Ad-Aware. In 16 separate trials, Antispyware has yet to give me a false positive, even when I tried to bait the tool with toolbars, PurityScan and Bonzi. This product is multi-featured, extremely user-friendly, very detailed in its reporting and infection explanations, packed with neat little perks like shredding and hijack recovery, powered by a very comprehensive detection vocabulary, and is clean-looking to boot. It's certainly not a perfect tool, but as a beta release with thorough cleaning results, this is a new benchmark in full-featured and user-friendly spyware defense.

Expect the competitors to now measure themselves against this new Microsoft standard. If you don't mind another Microsoft tool on your computer, then Antispyware Beta is an excellent first choice for your spyware defense. The price is absolutely right, too.
..................................................................................................................................
Protect Yourself From Spyware

From Your Guide to Internet / Network Security.

5 Easy Steps To Help You

If its not one thing, its another. That is one of those ridiculous phrases that pretty much goes without saying. Like "wherever you go, there you are." But, in this case it seems appropriate.

Allow me to elaborate. Computers on the Internet are almost constantly bombarded with viruses and other malware- so users employ antivirus software to protect themselves. Email inboxes are constantly flooded with pathetically useless spam- so users employ anti-spam programs and techniques to protect themselves. As soon as you think you have things under control you find out your system has a myriad of spyware and adware programs silently running in the background monitoring and reporting on your computer activity. Hence, "if its not one thing, its another."

The more benign spyware and adware simply monitors and tracks your the sites you visit on the web so that companies can determine the web-surfing habits of their users and try to pinpoint their marketing efforts. However, many forms of spyware go beyond simple tracking and actually monitor keystrokes and capture passwords and other functions which cross the line and pose a definite security risk.

How can you protect yourself from these insidious little programs? Ironically, many users unwittingly agree to install these programs. In fact, removing some spyware and adware might render some freeware or shareware programs useless. Below are 5 easy steps you can follow to try to avoid and, if not avoid, at least detect and remove these programs from your computer system:

1. Be Careful Where You Download: Unscrupulous programs often come from unscrupulous sites. If you are looking for a freeware or shareware program for a specific purpose try searching reputable sites like tucows.com or download.com.

2. Read the EULA: What is an EULA you ask? End User License Agreement. It's all of the technical and legal gibberish in that box above the radio buttons that say "No, I do not accept" or "Yes, I have read and accept these terms". Most people consider this a nuisance and click on "yes" without having read a word. The EULA is a legal agreement you are making with the software vendor. Without reading it you may be unwittingly agreeing to install spyware or a variety of other questionable actions that may not be worth it to you. Sometimes the better answer is "No, I do not accept."

3. Read Before You Click: Sometimes when you visit a web site a text box might pop up. Like the EULA, many users simply consider these a nuisance and will just click away to make the box disappear. Users will click "yes" or "ok" without stopping to see that the box said "would you like to install our spyware program?" Ok, admittedly they don't generally come out and say it that directly, but that is all the more reason you should stop to read those messages before you click "ok".

4. Protect Your System: Antivirus software is somewhat misnamed these days. Viruses are but a small part of the malicious code these programs protect you from. Antivirus has expanded to include worms, trojans, vulnerability exploits, jokes and hoaxes and even spyware and adware. If your antivirus product doesn't detect and block spyware you can try a product like AdAware Pro which will protect your system from spyware or adware in real time.

5. Scan Your System: Even with antivirus software, firewalls and other protective measures some spyware or adware may eventually make it through to your system. While a product like AdAware Pro mentioned in step #4 will monitor your system in real time to protect it, AdAware Pro costs money. The makers of AdAware Pro, Lavasoft, also have a version available for free for personal use. AdAware will not monitor in real time, but you can manually scan your system periodically to detect and remove any spyware. Another excellent choice is Spybot Search & Destroy which is also available for free.

If you follow these five steps you can keep your system protected from spyware proactively and detect and remove any that does manage to get into your system
...................................................................................................................
How to remove adware & spyware

From Mary Landesman,Your Guide to Antivirus Software.

Getting stubborn adware and spyware off your PC can be frustrating. However, there are steps you can take to make the process easier and more effective. First, make sure you have an up-to-date anti-spyware scanner. Do not rely on your antivirus program to do the job. (See Top Spyware Scanners). Before running a scan, shutdown all open browser windows and applications (including email) and then disconnect your PC from the Internet. If accessible, the easiest thing to do is just remove the phone line or cable connecting the PC to the modem.

Scan, reboot, repeat
Scan the system with the anti-spyware scanner and allow it to remove any adware/spyware it finds. Then reboot the PC, regardless of whether you were prompted to do so by the scanner. After the reboot, and before reconnecting to the Internet, scan again. If the scanner still reports signs of infestation, allow it to remove any traces and reboot again. After the reboot, scan a third time. If the scanner still reports signs of spyware and adware, or you still feel there are traces not being detected by the scanner, the following tips will help.

Use Safe Mode
Spyware and adware vendors often use resuscitators, files that work to keep the adware/spyware infection active no matter how hard you - or the scanners - try to remove it. Booting into Safe Mode causes allows only the most essential processes to activate. While this won't guarantee all adware/spyware resuscitators will be killed, it does ensure the vast majority will be. (See How to Boot Into Safe Mode). Once in Safe Mode, open your anti-spyware scanner and run a complete scan, allowing it to remove any traces of infection found.

Undo the Damage
After removing the active infection, you'll need to make sure it won't simply reintegrate itself when the system is reconnecting to the Internet.

* After the scan is complete, reset your browser start and home pages. (See Resetting Internet Explorer Settings).
* Next, ensure your HOSTS file hasn't been hijacked. (See Protecting the HOSTS file)
* Make sure undesirable websites haven't been added to your Trusted Sites Zone. (See How to Check Your Trusted Sites List)
* Check the Add/Remove Programs and uninstall any applications you recognize as being associated with the adware and/or spyware.

After following the tips above, reconnect the phone line or cable to the modem, reboot the PC normally, and access the Internet. If you still feel you are infected with adware or spyware, use HijackThis to capture a log of pertinent system areas. TomCoyote.org provides a tutorial on how to use HijackThis, as well as providing a direct download link for the program. Depending on your level of experience, you can either review the log looking for signs of infection or post the log to the TomCoyote forum for assistance.

An ounce of prevention
The best spyware and adware remedy is avoiding the infestation to begin with

No comments: