Friday, September 30, 2005

Disasters!

The news of late has been full of natural and man made disasters, including the hurricanes on the Gulf Coast and an anniversary of the 9/11 horrors. In every disaster, it seems the highest priority is communication. To be sure, evacuation, food, water, shelter, and medical care are critical needs, but none of it can be delivered without communication between the government and the responding agencies. You might not be the hero who runs into a burning building to save a child, but as a knowledgeable and prepared geek you can still have a big impact. We’ll talk about some of the issues you might face and how you could use your geek skills to improve the situation.


1. Hurricane Katrina Lesson


When hurricane Katrina hit New Orleans the power was lost, cellular and wired telephones went out, and government radio repeaters were silent. The mayor and the emergency operations center had only one communications link to the outside world – the Internet. That’s right - the officials had only one Internet connection and fortunately there was a geek present who rounded up some routers and cables and hooked up a makeshift Local Area Network (LAN) with a bridge to the Internet. That’s how messages got to and from the people in charge for several days.


2. Why the Internet?


Why did the Internet survive in the face of disaster when every other major form of communication was disabled? The answer is that the Internet is not a particular medium of communications with a single point, like a telephone central switching office or trunking radio controller, that can fail and bring the whole network down. The Internet makes use of almost any communications medium available.


You can be connected to the Internet via a cable, through a dialup telephone line, DSL or cable TV modem, wirelessly by WiFi, cellular, satellite, or even ham radio. The most significant point here is that your Internet address doesn't change, no matter how you are hooked up. When telephone networks go down, your phone number is useless. When a particular government radio channel is out, the workers can’t find you. But if they send a message to your Internet e-mail account, you can pick it up a dozen different ways.


3. Hard-Wired Internet


Since most commercial and even some home Internet connections are largely run on modern, below-ground fiber optic trunks, they are not as vulnerable to damage by wind, water, or even fire. In the hotel where the New Orleans officials set up shop, there was one functioning direct-cabled Internet connection still working. The technical person in the group scared up a Network Switch to split the single Internet connection out so the officials could jack in their Laptop Computers and start communicating via e-mail. Having a Cabling Kit on hand complete with lots of CAT 5e cable, RJ-45 connectors and the necessary wire stripping and crimping tool would allow you to quickly wire up any command post.


4. Telephone Dialup


In some situations or locations, you might have to resort to a telephone dialup connection. Though too slow for streaming video or high performance Web surfing, a 28 Kilobit per second (Kbps) telephone connection can handle a lot of text e-mail. If your portable computer does not have a built-in telephone connection, you could use a USB Telephone Modem to make the connection in an emergency.


5. WiFi


WiFi, or 802.11 wireless networking is very good magic in an emergency. You don’t need to run a cable to a laptop computer if you set up an 802.11g Wireless Router. This small box splits out an Internet connection, be it hardwired, cable or DSL modem, or whatever, and provides a short-range radio connection to computers within a few hundred feet. Position the router in a clear spot so the radio signals have a chance to radiate toward the computers to be served. If the router has an external antenna or two, keep the antennas approximately vertical.


Computers can be moved around and new machines added to the network almost instantly. Many laptop computers come with WiFi built in, but for a computer that doesn’t have it, you can use a USB WiFi Network Adapter. If it is running Windows XP then just plugging it in should install the device and you can select the wireless network from the popup menu. This USB adapter comes with a USB cable extension so you can position the adapter away from your computer to better receive the radio signals from the router. Line-of-sight to the router is best, but at least get the adapter with its built-in antenna away from radio signal deflecting/absorbing objects like metal desks or file cabinets.


6. WiFi Antennas


WiFi equipment is designed for short ranges and the signals don’t penetrate walls or floors very well. You can extend the range of your wireless network by using an 802.11G Range Expander strategically positioned between the router and the computers to which you are trying to connect. Putting the range expander in a window, doorway or stairwell can spread the WiFi signals beyond a wall or floor that would normally stop them.


If you have a need in an emergency situation to go beyond the nominal range of WiFi, you can add a Range Extender Antenna to the computer, the router, or both. Keep in mind that nothing is free and a directional extender antenna can go a longer distance, but only cover a narrow angle. First, try putting an antenna on the computer end of the link and point it at the router. The omnidirectional antenna on the router can then continue to serve other computers closer to it in any direction. If you have to extend the range by using a directional antenna on both ends of the link, then use a separate router to serve the close-by computers.



7. Amateur Radio WinLink 2000

Licensed radio amateurs (not to be confused with unlicensed Citizen's Band “CB” radio) have a long tradition of providing communications assistance during disasters. In fact, the Amateur Radio Relay League got started relaying messages copied by hand from radio operator to radio operator. The concept was very much like the Internet where messages could pass through the network of stations by many different paths making it much more robust than commercial communications systems.


Radio amateurs (also known as “hams”) have recognized the value of the Internet and have developed a method of relaying Internet packets over their radios called WinLink 2000. A radio operator outside the disaster area can act as a gateway station to connect to the rest of the Internet. Small portable stations can be brought into the disaster area to provide a link even if all other forms of Internet connection are gone. You can help out by earning an amateur radio license and joining a local emergency radio organization like the ARES or RACES. Check the ARRL Web site to see how you can extend your geek skills even further.



8. Power to the People

In the emergency command post or even a shelter set up in a school gym, you will have a cluster of folks helping out, and they need power for their laptops and all the geek gadgets that it takes to hook them up. Don’t take power and the availability of outlets for granted. Use a Power Strip with Surge Protection to split out the end of an extension cord. You need the surge protection because there may be lightning storms and wind that can short power lines causing spikes on the line.


In the worst case, you might be running your equipment off a portable generator. For an evacuation shelter, you would want a Medium Duty UPS while a command post should have a bigger backup with a Heavy Duty UPS. Generators have to be shut down for refueling and the Uninterruptable Power Supply will keep your computer and network equipment running for several minutes while the generator is down. Also, the output of most portable generators is very “dirty” and the surge protection built into the UPS will protect your valuable equipment.


9. Internet Takes Over for Newspapers


It’s not only government officials and rescue agencies who are resorting to the Internet in times of disaster. Newspapers in the path of hurricane Rita announced that they were limiting or suspending publication of their hardcopy newspapers, but that readers could continue to get news via their web sites. The Galveston County Daily News wanted to protect their employees by keeping delivery personnel off the streets. The Port Arthur News cancelled publication and abandon their offices, but updated their web site news. Again, this is an example of the independence of the Internet from physical plant and particular locations. If you are waiting out the storm, you might want to have a PDA with Bluetooth to connect to the Internet via your cell phone to keep up on the news and weather reports.

Final Words


A little preparation can put you in a position to help yourself, your family, and your community in the case of a disaster. Stock up on canned food, water, and flashlight batteries, but don’t forget the capabilities of the Internet at providing communications in time of need. As an experienced geek, you can get it together when the crunch comes. Speaking of getting it together, having a Transport Case handy with a list of the equipment and accessories you need can make packing quick when you can’t afford to forget anything, and when there are no local stores left open for last-minute pickup.

Tuesday, September 27, 2005

computer market dictatorship

Computer Market Relegated to Prefab and Hypnosis

http://osviews.com/

I have noticed these days that the computer market is either falling into some sort of dictatorship or some other power of influence that is forcing the computer market into a no choice market where the choice is handpicked by either some monopoly or by a misperception made by the wrong decision makers in today's computer industry. The computer market of today as we know it is being prefabricated by influence while hypnotizing the public of that influence. --

The Microsoft Windows Monopoly

The biggest problem today in the computer market falls on the shorts of Microsoft and its Windows monopoly. The dominance of Windows has caused a shortsightedness in the computer industry spurred by the old adage of "IBM or PC compatible" that seems to haunt the vast competitive landscape not selling Windows on the desktop. Microsoft has been able to take advantage of the misperception made by the public and how computers interact today. Most people new to computing don't realize that the compatibility problems that plagued interoperability during the '80s have pretty much been eradicated since the advent of the World Wide Web other than the proprietary standards being pushed by companies like Microsoft who instead of thinking of what is best for its customers, goes out of its way to protect its padlock on current and future markets. Microsoft is not the only one guilty of this, but is one of the biggest players in this market, which means it has a major impact on the industry as a whole.

The Open and Closed Internet

I recently noticed one of my favorite sports team websites get a makeover, and a makeover for the worst because the website was very web browser unfriendly. After trying to view the website using various web browser with no luck, it was evident that the website was created to be only accessed by Internet Explorer 6. I emailed the web master of this site to inform them of the problems I experienced and I even sent them screenshots of the problems I encountered. After a couple of weeks and no reply to at least say; "we're looking into it" I figured maybe this guy (or gal) gets so many emails that he may have overlooked my particular email, so I sent another email and sent a carbon copy to the actual web design company responsible for this mess, but I still have not heard a word. It seems that they either do not care, or feel that catering to all computer users is just too much a hassle, even though there is web development technology out there today that is web standards compliant and covers the basis of all computer users.

The other problem that alarmed the W3C Group was FEMA and their not so easily accessible website for those needing to fill out online applications and utilize other such services, which apparently only worked for Windows users. This seems to fall short of the promise made by the E Government Act of 2001 that was put in place to get rid of such problems. The US Copyright Office is also affected by such problems.

The Internet and the World Wide Web was originally designed to be very open and accessible by everyone, not just Windows users, who don't realize that Microsoft's monopoly is hurting the computer industry in so many ways and is affecting computerized harmony on the web and beyond.

Open Standards versus Closed Standards

The Commonwealth of Massachusetts has finalized its decision to go with open standard file formats (hence OpenDocument), which will ensure that all its government agencies and its own citizens will have ease of access to online documentation and other such services which until now, was restricted to proprietary formats not accessible by everyone. The CAGW (Citizens Against Government Waste) have been criticizing the move saying it will hurt the competitive bid process. I'm not sure of their motive, but I disagree with that notion because if there is an open format supported by multiple technology vendors, then the bidding process will come down to price and technical merit of the very product supporting that open file format, which goes a long way and the Massachusetts State Government avoids any sort of lock-in by a single vendor because their data is not housed inside some proprietary file format or standard keeping competitors from being chosen in the bidding process in the future because of the complexities of translating data from one format to another.

The Google Threat Will Liberate

Microsoft is very worried about Google creating the computerized harmony that the world wants to embrace. If Microsoft loses control of its Windows dominance, the World Wide Web may eventually return the old days as an open to all experience where no one is discriminated against and information is accessible to all. Google has been using a more open approach to its business strategy by making sure all computer users can utilize its software and services, either directly and/or indirectly so that all computer users can enjoy the Google experience. If Google wins out over Microsoft and maintains a dominant position, it will benefit all computer users as well as the computer market as a whole. Imagine being able to use whatever computer system you want, whether it was Windows, Mac, Linux, Amiga and etc... to seamlessly interoperate over the Internet with no inhibitions created by some proprietary and other lock-in mechanisms that keep absolute choice and freedom at bay. Google seems bent on delivering such a paradise where all computers users are served, not just Windows users!

Prefab and Hypnosis

The Prefab...

Many of those in the Windows developer community have gone out of their way to push the world into a Windows-only world, hoping that the alternatives in the market will just go away. Since Microsoft's grand plan to totally dominate the computer market has failed, the Pro-Microsoft camp have resorted into prefabricating the market by locking out competitors, purposely or not. You'll notice websites that offer services only to Windows users like Yahoo, Napster and so on have helped create this prefabrication, which in the end helps protect Microsoft's desktop monopoly from any competitive threat! Of course this is not to say they're doing it for Microsoft's benefit, but maybe it's because they're either too lazy or too cheap to provide a seamless cross-platform compatible and interoperable approach to their products and services, so only Windows users need apply for such products and services while non-Windows users can take their business elsewhere.

The Hypnosis...

Of course part of this strategy to wipe out choice in the computer market and lock the world into a Windows-only strategy, are those of influence that utilize psychological tactics to sway the computer market to their own way of thinking. It's gotten to the point of name calling by some very not-so-professional, yet childish tech analysts and other so called experts who are either receiving blood money under the table to spread such FUD or have their own vendetta and want to taint the market with their not-so-educated opinions and ill advice. Coining the terms like "cult" and "zealot" and whatever the like to make anything non-Windows sound like the devil while creating falsehood of normalcy for their cause and wallet is amusing at best, but seems to have some eating up their rhetoric like candy. Those of great influence inside and outside of Microsoft are doing their best to steer the computing world into a locked box that will only benefit Microsoft and those directly connected monetarily and/or politically (computer industry wise).

Bureaucracy As Usual

The public is being played the fool in today's computer world, while monopolies go unchallenged while creating a misperception in the eye of the consumer driven by IT bureaucracy that originated from long ago and has yet to be shaken from the psyche of a more technological advanced generation still thinking in the "IBM or PC Compatible" mode. Until the public is better educated and the computer industry is no longer being held captive by a shortsighted mindset, then we'll remain victims of our own doing. It's time to open the computer market and let it roam free with competition and great compatibility and interoperability. At the end of the day, we want absolute choice in any free market and the computer market should be no different. ::

Sunday, September 25, 2005

Antivirus/adware & spyware/ data Backups

An ounce of prevention




Backing Up Your PC Data

Backing up your computer data can seem like a chore, but imagine what it will be like if all your data is gone and you have to start all over again. There are many ways of backing up your data and just as many types of media to use as well. This article covers the basic steps needed to backup your data easily and quickly.

1. Organize Your Files

Keeping your information organized should be one of your first priorities. This will make things much easier when the time comes to back up. Because the "My Documents" folder is the default location for many programs to store their files, it is also the most logical location to store your files. Make sub-folders in your documents folder to keep your data organized. Windows XP has already set up some for your use. It includes sub-folders such as "My Music," "My eBooks" and "My Pictures." Add sub-folders as you need them.

One of the most important sub-folders to use is a "My Downloads" folder. This is where you should store and categorize all of your Internet downloads.

If you ever need to reinstall a downloaded program, you will be glad you have this folder.

Remember, some programs do not save data to "My Documents." In this case, you should locate and note for backup the folders that these programs do use. In some cases, you may need to copy that information to your "My Documents" folder.


2. What do I Backup?

Just about anything your media will allow you to store. This means you can make copies of all your personal data, such as documents, image and media files, email, financial data, saved games, and anything else that may be important. Try to avoid having to back up the entire operating system unless you have the media that will support this type of backup.



3. Types of Backup Media

There are many types of backup media. You can use tape drives, CD-R and CD-RW drives, DVD-ROM drives or hard drives. You can also use older types of media like Iomega's Zip or Jazz drives. These are all available in both internal and external versions. Be sure to choose the right one based on how much information you would like to save.

Tip: Tape drives, hard drives as well as Zip and Jazz drives sore data magnetically. This type of storage will degrade with time and is subject to outside magnetic influences. CD-R/RW and DVD-ROM drives store data using a laser imprint on the CD/DVD media. This is far less likely to degrade over time and, as long as the disc's are not damaged, will last for many years.


4. Types of Backup Methods

There are two main types of backup methods. You can do an "incremental backup." This is where you back up specifically selected folders and data. Windows includes a fairly decent back up program or you may choose to use the program that comes with you backup hardware.

You can also do a full-system or complete backup. This is where an "image" of your entire hard drive is made. There are different types of programs to image your entire hard drive such as PowerQuest's Drive Image, Norton's Ghost or Dantz's Retrospect. Due to the shear volume of data this type of backup is usually only successful if you have a second hard drive or tape drive.



5. Where Are My Data Files Kept?

Your data files are kept in many places but here are a few locations to look for your information.

Email: Locations may vary.

In Windows XP Microsoft Outlook Express saves its files to 'C:\Documents and Settings\(user name)\Local Settings\Application Data\Identities\{indentity number}\Microsoft\Outlook Express' in files with an extension of .dbx.

Outlook saves its files to 'C:\Documents and Settings\(user name)\Local Settings\Application Data\Microsoft\Outlook\outlook.pst'. Netscape saves your files in 'C:\Program Files\Netscape\Users\(user name)\Mail'.

Your Internet Favorites or Bookmarks: Internet Explorer stores your Favorites as individual files in the C:\Windows\Favorites or C:\Documents and Settings\(User Name)\Favorites directory. Netscape saves your Bookmarks in 'C:\Program Files\Netscape\Users\(user name)\bookmark.htm'.

Other programs:


You may need to do some research on where files are saved. One good way to do this is to open up the program in question, create a temporary file and when you save the file do a 'Save as', this will prompt you to where the default location of where the program saves its files.


6. How Often Should I Perform a Backup?

In general, it is best to schedule your backup on a consistent and regular basis. How much information you add or change to your system will help you determine if this should be on a monthly, weekly or even a daily schedule. Most backup software programs allow for automatic scheduling.
.............................................................................................................


Lock Down Your PC!

Your Guide to Internet for Beginners.


Security Essentials for Home Computing


If you subscribe to Cable or DSL broadband at home, then you are likely to be casually "attacked" by hackers up to three dozen times a day. Especially if you use Windows XP or other Windows operating systems, you are a prime target for savvy hackers who will exploit your fulltime Internet connection.

As good as Microsoft products are, they are also obsessively targeted by hackers around the world. Small Microsoft "holes" perforate your computer, including: your administrator account, your ICF firewall service, your guest logon, your shared folders, your messaging services, your Identifier Broadcasts, your port openings, and your Encrypted File Services... all of these obscure points are absolute candy for hackers!

Yes, this is frightening. But all is not lost... most of these security holes in Microsoft are easily patched by an hour of reading and an hour of configuring your PC.

Good home security is about vigilance, knowledge, and meticulous attention to detail. We here at About.com want to help you with that, so we have provided dozens of free articles explaining security holes and how best to plug them.

Welcome to the exciting and challenging world of anti-hacker and anti-virus defense! What follows next are explanations of firewalls, packet filter routers, toggling Windows services to prevent external access, configuring WiFi networks for privacy, and overall blocking of hackers on Cable and DSL networks.

.......................................................................................................................
Spyware 101: Understanding The Biggest Internet Threat of 2005

How Rogue Software Works.

What is “Spyware”?


(July, 2005)

Forget spam, viruses, and hacker attacks..."spyware" is now the single largest problem facing Internet users today. These nasty little rogue programs have become so widespread and so viral, their volume far outstrips spam and regular virus infections. The spyware problem has grown to such an immense breadth and depth, we cannot even agree on what to call it.

Most people historically call these rogue programs "spyware", because the problem originated in the 1990's with programs that secretly observed and logged your web surfing habits. The problem, however, has now evolved into dozens of other malicious forms, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms

Today, spyware is being redefined as a much larger category of rogue software called "malware", or malicious software programs. At its most basic definition, spyware/malware is when insidious little software programs covertly install themselves on your computer, and then perform secret operations without your permission. Once in place, malware programs may do hundreds of nasty things to your computer. They will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.

What does Spyware/Malware specifically do to my computer?

Malware will perform a variety of nasty activities, ranging from simple email advertising all the way to complex identity-theft and password-stealing. New nasty functions are created every week by malware programmers, but the most common malware functions are:

1. Malware steals your personal information and address book (identity theft and keystroke-logging).
2. Malware floods your browser with pop-up advertising.
3. Malware spams your inbox with advertising email.
4. Malware slows down your connection.
5. Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.
6. Malware uses your computer as a secret server to broadcast pornography files.
7. Malware slows down or crashes your computer.

Where does Spyware/Malware come from?

Spyware/malware programs are authored by clever programmers, and then delivered to your computer through covert Internet installs. Usually, malware will piggyback on innocent-looking web page components and otherwise-benign software such as game demos, MP3 players, search toolbars, software, free subscriptions, and other things you download from the web. Subscribing to online services is especially bad for getting malware. In particular, whenever you sign up for a so-called "free" service or install new software, you must accept an "end user license agreement" (EULA). The fine print of the EULA will often include the phrase "the vendor is allowed to install third-party software on your computer". Since most users don't bother to read this EULA fine print, they naively click "accept", and install malware out of sheer ignorance.

What kind of personal information does Spyware/Malware steal?

This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.

Next: How to Detect and Destroy Spyware/Malware on Your Computer.

How to Detect and Destroy Spyware!
(continued from previous page)

How Do I Protect Myself from this 2005 Epidemic of Spyware/Malware?

Answer: Avoiding and destroying spyware is not instant, and it is not a one-time event like an innoculation. Instead, stopping spyware/malware is a long-term game that is exactly like cleaning dirt out of your home. You need constant vigilance, and a regular habit of cleaning malware out of your computer every week.

Note: Additionally, as an educated user, you must also adopt a "buyer beware" attitude whenever you install new software from the Net or even from CD...you need to read every end user license agreement on your screen before you click "accept".

Here is the checklist for detecting and destroying malware

1. Install two or three different anti-spyware programs ("spyware cleaners") on your computer, and update their definition lists regularly. Because every anti-spyware cleaner is imperfect, it is necessary to use combinations of these programs to catch the greatest breadth of malware. Also, the anti-spyware manufacturers regularly add new entries to their "definition" lists, just like anti-virus software. Make sure to keep your spyware cleaners updated with these lists!

Click here for 5 recommended anti-spyware programs.

2. Build a weekly habit of "scan and detect". Like cleaning house, this should be done every few days. At the very least, this should be done whenever you install new software. Many anti-spyware programs can be set to automatically perform scan-and-detect nightly.

3. Carefully read every EULA (end user license agreement) before clicking "accept". If you see the phrase "3rd-party software may be installed", make sure to follow the software install with a spyware cleaning.

4. Educate yourself on the latest strains of malware. In particular, start visiting these recommended anti-spyware sites, and update yourself on the latest malicious programs.

* Antivirus/Antispyware at About
* Network Security at About
* PestPatrol.com database
* Spywareguide.com
* SpywareWarrior.com
* SurferBeware.com
* Cexx.org

5. Save your data, and backup often! As much as it sounds like broken-record preaching, backing-up is how an intelligent user prepares for the worst. Backing up means: keep your original software CDs in a safe accessible place, constantly save copies of your important work files on CD or separate drives, and presume you will actually need them one day. This way, if you ever experience the extreme spyware circumstance of having to reformat your hard drive, you can at least recover your important work.



There you go, fellow Internet users. Your lives now have an extra complexity as you add one more cleaning habit to your weekly routine. The goods news is: once you build a regular scan-and-detect habit, then spyware and malware will be reduced to a mere annoyance, and you can get back to business of enjoying the Internet! Personally, I think of it as having one more room in my house to dust and vaccuum.

Keep the faith, fellow webbies... the Internet is too important to let these malware programmers win!

More: Some Related Spyware/Malware Resources For You:
Here is some follow-up information for further reading:

* Top 5 Spyware Defense Programs

* Five Steps To Defending Against Spyware
...................................................................................................................................
The Top 5 Anti-Spyware Programs, 2005

From ,Your Guide to Internet for Beginners.
Numbers 5 and 4
July, 2005


Stopping spyware (“malware”) is more than a one-time inoculation, folks. This is about a weekly habit of cleaning "nasty dust bunnies" from your personal computer. In much the same way you clean your home with your favorite broom and your favorite cleaning solvents, you will also need good tools to clean spyware out of your PC.

Here is our suggestion list. After collating the opinions of several About readers and the About writing staff, we believe that these five anti-spyware tools (aka "spyware killers") will give you maximum value for your money.


Editor’s Comment: as good as these following tools are, they are also imperfect. In particular, these tools vary in their detection algorithms and their signature/definition vocabularies. Accordingly, we suggest you use two or three of these anti-spyware programs as a combination defense.



* Number 5: PestPatrol for Home Users
Cost: Free to try, $39.95USD to buy
About.com Rating: 3.5 stars out of 5
Editor’s comment: What used to be cutting-edge features in 2003 (i.e. detailed explanation of each spyware infection, easy interface, automated nightly cleaning, realtime protection) is now just par. Furthermore, PestPatrol has missed several Trojans and given me false positives lately. PestPatrol was a big player two years ago, but now it has been outstripped by its competitors, despite its solid quality. If only PestPatrol was free, it would earn more points with us users. Otherwise, this tool earns 3.5 stars for being a solid performer.

* Number 4: Webroot’s Spy Sweeper 3.5
Cost: Free to try, $29.95 to buy
About.com Rating: 4 stars out of 5
Editor’s comment: This product ties with the Number 3 product on this list. It has tremendous features, including a friendly interface, realtime “show as it goes” notification of catching infections as they happen, and detailed explanations of each infection threat. Spy Sweeper is a thorough cleaning tool with a good look and good definition list support. No, it's not freeware, but at 30 bucks, Spy Sweeper is a good value.


Next: The Top 3 Anti-Spyware Programs of 2005

The Top 3




* Number 3: Spybot Search & Destroy
Cost: Free
About.com Rating: 4 stars out of 5
Editor’s comment: Being freeware, Spybot doesn’t have a 24-hour help line to call. And no, it does not proactively monitor for spyware infections -- you need to manually launch Spybot every couple of days. Nevertheless, this PepiMk’s product is a trusted friend that just keeps on getting better. It shreds files for you, offers you email opt-out lists, and it catches 99% of spyware threats out there. Most of all, Spybot does this for the ultimate price tag: $0.00. There is no excuse for not installing this excellent spyware killer!

* Number 2: Lavasoft’s Ad-Aware SE, Personal Edition
Cost: Free
About.com Rating: 4.5 stars out of 5
Editor’s comment: Lavasoft has been the benchmark spyware-defense tool for years. Their Ad-Aware product has won the trust of millions of users. Although it doesn’t have the nifty shredding and email opt-out lists of Spybot, Ad-Aware does perform realtime protection, and it auto updates its definition lists to remain current. Up until 2005, combining Spybot and Ad-Aware was the smartest (and the cheapest) way to defend your compute against spyware. Things are different now, because Number 1 below has set the high bar even higher for 2005.

* Number 1: Microsoft Windows AntiSpyware 2005 Beta
Cost: Free for legal owners of Windows operating systems
About.com Rating: 4.75 stars out of 5
Editor’s comment:To be quite frank, I think Microsoft does a great job 85% of the time. And this is one of those times.

At first met by skepticism, this new Microsoft AntiSpyware has now won the affection of millions of computer users. Microsoft built Antispyware Beta by combining the work of purchased subisidiary company, Giant Software, with native Microsoft code. The result: Antispyware Beta performs all the realtime protection of Ad-Aware, using the most agile and in-depth definition vocabulary of any spyware defense today. Moreover, Antispyware Beta adds in several other small tools. It will thoroughly explain every discovered threat and its modus operandi. It will shred history files for you. It will subscribe you to the dynamic SpyNet network for advanced protection help.

As with any new product, there some downsides to this tool. For one, you will hear many critics complaining that the product is Microsoft-centered (i.e. it does not shred Opera or Firefox history files, and it likes to keep your home page locked on Microsoft's MSN). Secondly, the Antispyware autoscan is reversed by default: it runs at 2am, but updates its definition lists at 3am. Thirdly, hackers and programmers are already targeting Antispyware with trojans (after all: Microsoft is the Goliath to topple if you are an anarchist).

But when it comes down to the core job of cleaning spyware, Microsoft has a 99% successful tool here. In three weeks of tests on my two home and eight work machines, Antispyware Beta has consistently detected threats that were missed by McAfee, Spybot, and Ad-Aware. In 16 separate trials, Antispyware has yet to give me a false positive, even when I tried to bait the tool with toolbars, PurityScan and Bonzi. This product is multi-featured, extremely user-friendly, very detailed in its reporting and infection explanations, packed with neat little perks like shredding and hijack recovery, powered by a very comprehensive detection vocabulary, and is clean-looking to boot. It's certainly not a perfect tool, but as a beta release with thorough cleaning results, this is a new benchmark in full-featured and user-friendly spyware defense.

Expect the competitors to now measure themselves against this new Microsoft standard. If you don't mind another Microsoft tool on your computer, then Antispyware Beta is an excellent first choice for your spyware defense. The price is absolutely right, too.
..................................................................................................................................
Protect Yourself From Spyware

From Your Guide to Internet / Network Security.

5 Easy Steps To Help You

If its not one thing, its another. That is one of those ridiculous phrases that pretty much goes without saying. Like "wherever you go, there you are." But, in this case it seems appropriate.

Allow me to elaborate. Computers on the Internet are almost constantly bombarded with viruses and other malware- so users employ antivirus software to protect themselves. Email inboxes are constantly flooded with pathetically useless spam- so users employ anti-spam programs and techniques to protect themselves. As soon as you think you have things under control you find out your system has a myriad of spyware and adware programs silently running in the background monitoring and reporting on your computer activity. Hence, "if its not one thing, its another."

The more benign spyware and adware simply monitors and tracks your the sites you visit on the web so that companies can determine the web-surfing habits of their users and try to pinpoint their marketing efforts. However, many forms of spyware go beyond simple tracking and actually monitor keystrokes and capture passwords and other functions which cross the line and pose a definite security risk.

How can you protect yourself from these insidious little programs? Ironically, many users unwittingly agree to install these programs. In fact, removing some spyware and adware might render some freeware or shareware programs useless. Below are 5 easy steps you can follow to try to avoid and, if not avoid, at least detect and remove these programs from your computer system:

1. Be Careful Where You Download: Unscrupulous programs often come from unscrupulous sites. If you are looking for a freeware or shareware program for a specific purpose try searching reputable sites like tucows.com or download.com.

2. Read the EULA: What is an EULA you ask? End User License Agreement. It's all of the technical and legal gibberish in that box above the radio buttons that say "No, I do not accept" or "Yes, I have read and accept these terms". Most people consider this a nuisance and click on "yes" without having read a word. The EULA is a legal agreement you are making with the software vendor. Without reading it you may be unwittingly agreeing to install spyware or a variety of other questionable actions that may not be worth it to you. Sometimes the better answer is "No, I do not accept."

3. Read Before You Click: Sometimes when you visit a web site a text box might pop up. Like the EULA, many users simply consider these a nuisance and will just click away to make the box disappear. Users will click "yes" or "ok" without stopping to see that the box said "would you like to install our spyware program?" Ok, admittedly they don't generally come out and say it that directly, but that is all the more reason you should stop to read those messages before you click "ok".

4. Protect Your System: Antivirus software is somewhat misnamed these days. Viruses are but a small part of the malicious code these programs protect you from. Antivirus has expanded to include worms, trojans, vulnerability exploits, jokes and hoaxes and even spyware and adware. If your antivirus product doesn't detect and block spyware you can try a product like AdAware Pro which will protect your system from spyware or adware in real time.

5. Scan Your System: Even with antivirus software, firewalls and other protective measures some spyware or adware may eventually make it through to your system. While a product like AdAware Pro mentioned in step #4 will monitor your system in real time to protect it, AdAware Pro costs money. The makers of AdAware Pro, Lavasoft, also have a version available for free for personal use. AdAware will not monitor in real time, but you can manually scan your system periodically to detect and remove any spyware. Another excellent choice is Spybot Search & Destroy which is also available for free.

If you follow these five steps you can keep your system protected from spyware proactively and detect and remove any that does manage to get into your system
...................................................................................................................
How to remove adware & spyware

From Mary Landesman,Your Guide to Antivirus Software.

Getting stubborn adware and spyware off your PC can be frustrating. However, there are steps you can take to make the process easier and more effective. First, make sure you have an up-to-date anti-spyware scanner. Do not rely on your antivirus program to do the job. (See Top Spyware Scanners). Before running a scan, shutdown all open browser windows and applications (including email) and then disconnect your PC from the Internet. If accessible, the easiest thing to do is just remove the phone line or cable connecting the PC to the modem.

Scan, reboot, repeat
Scan the system with the anti-spyware scanner and allow it to remove any adware/spyware it finds. Then reboot the PC, regardless of whether you were prompted to do so by the scanner. After the reboot, and before reconnecting to the Internet, scan again. If the scanner still reports signs of infestation, allow it to remove any traces and reboot again. After the reboot, scan a third time. If the scanner still reports signs of spyware and adware, or you still feel there are traces not being detected by the scanner, the following tips will help.

Use Safe Mode
Spyware and adware vendors often use resuscitators, files that work to keep the adware/spyware infection active no matter how hard you - or the scanners - try to remove it. Booting into Safe Mode causes allows only the most essential processes to activate. While this won't guarantee all adware/spyware resuscitators will be killed, it does ensure the vast majority will be. (See How to Boot Into Safe Mode). Once in Safe Mode, open your anti-spyware scanner and run a complete scan, allowing it to remove any traces of infection found.

Undo the Damage
After removing the active infection, you'll need to make sure it won't simply reintegrate itself when the system is reconnecting to the Internet.

* After the scan is complete, reset your browser start and home pages. (See Resetting Internet Explorer Settings).
* Next, ensure your HOSTS file hasn't been hijacked. (See Protecting the HOSTS file)
* Make sure undesirable websites haven't been added to your Trusted Sites Zone. (See How to Check Your Trusted Sites List)
* Check the Add/Remove Programs and uninstall any applications you recognize as being associated with the adware and/or spyware.

After following the tips above, reconnect the phone line or cable to the modem, reboot the PC normally, and access the Internet. If you still feel you are infected with adware or spyware, use HijackThis to capture a log of pertinent system areas. TomCoyote.org provides a tutorial on how to use HijackThis, as well as providing a direct download link for the program. Depending on your level of experience, you can either review the log looking for signs of infection or post the log to the TomCoyote forum for assistance.

An ounce of prevention
The best spyware and adware remedy is avoiding the infestation to begin with