Showing posts with label internet explorer. Show all posts
Showing posts with label internet explorer. Show all posts

Wednesday, July 04, 2007

SpywareBlaster 3.5

SpywareBlaster can help keep your system spyware-free and
secure, without interfering with the “good side” of the web.

Spyware, adware, browser hijackers, and dialers are some
of the fastest-growing threats on the Internet today.

By simply browsing to a web page, you could find your
computer to be the brand-new host of one of these unwanted
fiends!

The most important step you can take is to secure your
system.

SpywareBlaster is the most powerful protection program
available.

Prevent the installation of ActiveX-based spyware, adware,
browser hijackers, dialers, and other potentially unwanted
software.

Block spyware/tracking cookies in Internet Explorer and
Mozilla/Firefox.

Restrict the actions of potentially unwanted sites in
Internet Explorer.

SpywareBlaster can help keep your system spyware-free and
secure, without interfering with the “good side” of the web.

And unlike other programs, SpywareBlaster does not have to
remain running in the background.

Get yours from:
http://www.majorgeeks.com/SpywareBlaster_d2859.html

SpywareBlaster is freeware for personal and educational use.

Monday, May 21, 2007

Browser Cache Size and Using CCleaner

Browsers cache settings give your pc the ability to store
frequently visited web pages and also checks for newer web
pages when you navigate to those sites.

Most computers cache setting is left at the default
setting, which can be anything from 250MB to over 1024MB,
which generally speaking is far too high. You can safely
reduce this to as little as 10 - 20MB. You may find that
you frequently download large files, for example a file of
50MB, so you would need to adjust you cache size to 60MB so
that if the download is interrupted it will pick up from
where it left off using the cache memory rather than
starting over again.

To adjust the IE cache size:
Start Internet Explorer
Select Tools Internet Options General tab
Under Temporary Internet Files click the Settings button.
In the box for the amount of disk space to use, enter a
value between 25 and 50 megabytes.
Click OK to accept the changes.

To adjust the Netscape Navigator cache size:
Start Netscape Navigator
Select Edit Preferences Advanced Cache.
In the box for Disk Cache, enter a value between 5120 and
51200 kilobytes.
Click OK to accept the changes.

By making this simple adjustment, you will save lots of
hard drive space for better uses and it will improve the
overall performance of Internet Explorer.

If you want to have a large cache size, then I recommend
that you clean your cache out regularly. I do a lot of
browsing and clean mine several times a day, but rather
than go through Internet Properties and start clicking on
various buttons I use ccleaner available for free from
http://www.filehippo.com/download_ccleaner/

CCleaner is a freeware system optimization and privacy
tool. It removes unused files from your system - allowing
Windows to run faster and freeing up valuable hard disk
space by automatically cleaning the cache when run. It also
cleans traces of your online activities such as your
Internet history. It also only takes a few seconds to run
and remove these unwanted files from your pc.

There have been over 55 million downloads of this program

Internet Explorer
Temporary files, URL history, cookies, Autocomplete form
history, index.dat.

Firefox
Temporary files, URL history, cookies, download history.

Opera
Temporary files, URL history, cookies.

Windows
Recycle Bin, Recent Documents, Temporary files and Log
files.

Registry cleaner
Advanced features to remove unused and old entries,
including File Extensions, ActiveX Controls, ClassIDs,
ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files,
Application Paths, Icons, Invalid Shortcuts and more...
also comes with a comprehensive backup feature

Third-party applications
Removes temp files and recent file lists (MRUs) from many
apps including Media Player, eMule, Kazaa, Google Toolbar,
Netscape, MS Office, Nero, Adobe Acrobat, WinRAR, WinAce,
WinZip and many more...

This software does NOT contain any Spyware, Adware or
Viruses.

I set mine up as follows:
Click on the Cleaner Tab on the left and under Windows I
tick all boxes in Internet Explorer, Windows Explorer and
System. Under Advanced tick only the first 2 boxes. Then
click on the Applications tab and tick all.

Issues tab:
Unless you are competent at dealing with the registry then
leave this one alone and DO NOT run it.

Tools tab:
Here you will find a list of Uninstall options to remove
programs from your pc, use with caution. I prefer to use
the Add/Remove function or the programs own uninstaller.

Startup:
Lists all programs that are set to run when you boot up,
if you are unsure about deleting any of these then leave it
as it is.

Options tab:
Settings - Choose your language, untick Run CCleaner when
the computer starts, tick the next 3 boxes, then look at
the Secure Deletion, tick the radio button 'Secure file
deletion (Slower) and set it to NSA (7 passes)

Cookies - entirely up to the individual, but I don't save
any cookies.

Custom - You can drag and drop files or folders into the
window or browse for them and on the next run they will be
securely deleted.

Advanced - Untick boxes 1-3 tick all others.

Finally click on the Cleaner tab on the left and you have
the option to Analyze or Run Cleaner. When you are
comfortable using this program you won't use Analyze, but
initially do use it to see what can be deleted and the
approximate size of files to be deleted.

Important
This will remove any saved passwords and usernames that
you have, so make sure that you have a copy of them all
before proceeding to clean.

Open a text document, enter the URL, username and
password, save this to floppy, external drive or print it
off. Do NOT save this text file to your hard drive.

There is an excellent program for saving your passwords
etc available from http://www.roboform.com/
I will cover this in more detail another time.

As always, back-up your system or create a restore point
before making any changes.

To your safety and security online
cotojo

Tuesday, April 03, 2007

Why Do I Feel Like Somebody’s Watching Me?

Spyware is one of the fastest-growing internet threats. According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today. These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the user's knowledge. Once embedded in a computer, it can wreak havoc on the system's performance while gathering your personal information. Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate.

Where does it come from?
Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user's knowledge. The user downloads the program to their computer. Once downloaded, the spyware program goes to work collecting data for the spyware author's personal use or to sell to a third-party. Beware of many P2P file-sharing programs. They are notorious for downloads that posses spyware programs.

The user of a downloadable program should pay extra attention to the accompanying licensing agreement. Often the software publisher will warn the user that a spyware program will be installed along with the requested program. Unfortunately, we do not always take the time to read the fine print. Some agreements may provide special "opt-out" boxes that the user can click to stop the spyware from being included in the download. Be sure to review the document before signing off on the download.

Another way that spyware can access your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations. The Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads. That is why the user has to initiate a download by clicking on a link. These links can prove deceptive. For example, a pop-up modeled after a standard Windows dialog box, may appear on your screen. The message may ask you if you would like to optimize your internet access. It provides yes or no answer buttons, but, no matter which button you push, a download containing the spyware program will commence. Newer versions of Internet Explorer are now making this spyware pathway a little more difficult.

Finally, some spyware applications infect a system by attacking security holes in the Web browser or other software. When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.

What can spyware programs do?
Spyware programs can accomplish a multitude of malicious tasks. Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.

Spyware can:

1. Monitor your keystrokes for reporting purposes.

2. Scan files located on your hard drive.

3. Snoop through applications on our desktop.

4. Install other spyware programs into your computer.

5. Read your cookies.

6. Steal credit card numbers, passwords, and other personal information.

7. Change the default settings on your home page web browser.

8. Mutate into a second generation of spyware thus making it more

difficult to eradicate.

9. Cause your computer to run slower.

10. Deliver annoying pop up advertisements.

11. Add advertising links to web pages for which the author does not get paid. Instead, payment is directed to the spyware programmer that changed the original affiliate's settings.

12. Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove.

Spyware Examples
Here are a few examples of commonly seen spyware programs. Please note that while researchers will often give names to spyware programs, they may not match the names the spyware-writers use.

CoolWebSearch, a group of programs, that install through "holes" found in Internet Explorer. These programs direct traffic to advertisements on Web sites including coolwebsearch.com. This spyware nuisance displays pop-up ads, rewrites search engine results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites.

Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.

180 Solutions reports extensive information to advertisers about the Web sites which you visit. It also alters HTTP requests for affiliate advertisements linked from a Web site. Therefore the 180 Solutions Company makes an unearned profit off of the click through advertisements they've altered.

HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs. It's a prime example of how spyware can install more spyware. These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.

How can I prevent spyware?
There are a couple things you can do to prevent spyware from infecting your computer system. First, invest in a reliable commercial anti-spyware program.

I recommend you follow this link http://www.linkbrander.com/go/34613 and read more and you can also scan your PC for free. There are several others on the market including stand alone software packages such as Lavasoft's Ad-Aware available for free at http://www.lavasoft.de/products/ad-aware_se_personal.php or Windows Antispyware. Other options provide the anti-spyware software as part of an anti-virus package. This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any found spyware software. As with most programs, update your anti virus software frequently.

As discussed, the Internet Explorer (IE) is often a contributor to the spyware problem because spyware programs like to attach themselves to its functionality. Spyware enjoys penetrating the IE's weaknesses. Because of this, many users have switched to non-IE browsers. However, if you prefer to stick with Internet Explorer, be sure to update the security patches regularly, and only download programs from reputable sources. This will help reduce your chances of a spyware infiltration.

And, when all else fails?

Finally, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.

Add to Technorati Favorites