Friday, November 24, 2006

Installing hardware drivers - tips for newbies


The Device Manager (Control Panel, System, tab Hardware, button Device Manager) shows you all the detected and installed hardware and hardware drivers. The unrecognized hardware is shown as a yellow question mark, which indicates you still have to install some drivers to get it to work. Probably you received a special CD-ROM or floppy disk from the manufacturer, which you have to use to install the drivers for the unrecognized hardware. If you don't have the CD-ROM (anymore), you can almost always download the hardware drivers from the manufacturers website.
Below you see all installed hardware within the Device Manager, as you can see there are no yellow question marks anymore:
Nowadays, most hardware is recognized by Windows. If this is not the case, the installation files from CD-ROM (or downloaded from the manufacturers website) give a problem free installation. Most times, if you follow the installation instructions on a clean Windows setup, there won't be any problem.

If the installation did give an error, the best you can do is to delete the new hardware drivers from the Device Manager. Just delete the hardware entry (DEL-key). After a reboot of your computer, the hardware will be detected again, which enables you to reinstall the hardware drivers.

Make your Firefox Faster!

How to Make Firefox Load Faster
Firefox may run quickly but it loads slowly; here's how to fix it
Note: This tip is not suitable for inexperienced computer users.
You can slash Firefox's slow load time by compressing the DLLs and executables.
There are many choices for compression but I suggest you use UPX which is free, efficient and time proven.

1. Download UPX from http://upx.sourceforge.net/#download
2. Unzip upx.exe into your Firefox installation folder which is normally C:\Program Files\Mozilla Firefox.
3. Make sure Firefox is not running then shell to a command prompt in the Firefox installation directory.
4. Type in the following command in a single line and hit return: for %v in (*.exe *.dll components\*.dll plugins\*.dll) do upx "C:\Program Files\Mozilla Firefox\%v"
5. If on some later occasion you want to unpack the files, just type in the command above but add the decompression switch "-d" after "do upx."

Speed Up Your PC using MSConfig technique...partTWO

The tab Services also shows some essential services started with Windows. Most of the shown services are from Microsoft Windows, which are discussed on the page Windows XP services. It's wise, not to disable one of those, to make sure you keep out of startup troubles. However, by choosing the option to Hide All Microsoft Services. This will give you an insight in non-Windows services. Most of the time it is completely filled with the services from security software like firewalls and virus scanners. This answers the question why your quick computers rapidly turns into a slow snail.

Please make sure that the box of Hide All Microsoft Services is checked....(this is to ensure that you can avoid to disable some important system files service.

The tabs SYSTEM.INI and WIN.INI aren't that important, the tab BOOT.INI gives you some extra boot options you can turn on or off. By clicking Check All Boot Paths, you can possibly fix some boot problems. By enabling the option /NOGUIBOOT there won't be any Windows logo at startup, just a black screen (actually there is no important reason to do so......;-).

If you can see the Timeout: Box...the number currently is 30 sec. - this is the actual time which your system used to boot the Windows...it's suggest hat you can make a change for it, to at least 20 sec. which will result in faster boot.







Thursday, November 23, 2006

Try and error

Technorati Profile

Speed Up Your PC using MSConfig technique...partONE

MSConfig System Configuration Utility

If you ever realized that your PC now is becoming sluggish....very slow during startup or too much running program in background, it;s because of too many application has been forced to start during windows is boot up. Those program is truly unnecessary unless you really need it.This time I'll show you the hidden secret of Windows..yeah the real one...MSConfig.


With the utility MSConfig it is possible to analyze all the applications starting when you turn on your computer and, if you feel the need to do so, disable undesirable items. Turning off undesirable items will save system resources which will eventually result in a faster Windows. You can start the MSConfig utility by click Start, go to Run and type the command MSCONFIG and press ENTER. If you have just done a fresh Windows setup, there won't be much shocking to disable. When you have installed all your favorite software, it is time to have a look at MSConfig, whether performance enhancements are possible.

On the right side is the picture of MSConfig Utility. This time, I need you to put your focus on Startup section first.

The most important tab, is the last one: Startup. Here you can disable (and enable again....) startup items. If you are not sure, you better leave the item untouched, but you are free to experiment (you can always turn them on again).

If you have been infected by a virus, most times you can find the virus
here. To disable a virus you better run MSCONFIG in Windows safe mode (press F8 while restarting Windows), else the still active virus will reactivate your
action.

Above is shown how the automatic startup of the Windows Messenger has been disabled. The Command column shows the location of the application (which can give you information about what's the application for). The Location column tells you where you can find the place to delete the item permanently, most of the times it will be in the Windows Registry. It is important to realize what every item does, and to ask yourself the question whether you need that item. Many applications you will install place a link here (most of the times unasked), to make them fast accessible in the system tray.


Disk Cleanup: deleting unnecessary files

To free some space on your hard disk for better purposes, you have to do a disk cleanup. With the Disk Cleanup utility (Start Menu, All Programs, Accessories, System tools) you have a build in tool to remove many unnecessary files from your hard disk. Select the C: drive and on the first tab check all items to delete.
However, the cleaning is not thorough, especially the 'temporary (internet) files' folders (used files from the last few days will not be cleaned)! It is better to clean them yourself as well, as shown below. Most files are system files and/or hidden, so make sure you can see those type of files in the Windows Explorer (Tools, Folder Options, tab View, enable Display the content of system folders, enable Show hidden files and folders, disable Hide extensions for known file types and disable Hide protected operating system files).

Nice Tips for MS Word 2003 Office - Part 1

Listed here is some very useful tips for daily using of MS Word 2003. This is the part 1 which is really useful for workign with texts and paragraphs.

p/s: for those newbies to the PC....how to use these tips..press Ctrl button first, hold on and press also the another key i.e for shortcut purpose


Shortcut : Functions
Ctrl+A : Select all text in a document
Ctrl+Shift+A : Format selected text as all caps
Ctrl+B : Bold the selected text
Ctrl+C : Copy the selected text or object
Ctrl+Shift+C : Copy the format of the selected text
Ctrl+D :Display the Format Font dialog box
Ctrl+E : Center the selected paragraph
Ctrl+Shift+H : Apply hidden text formatting to the selected text
Ctrl+I : Italicize the selected text
Ctrl+J : Justify the selected paragraph
Ctrl+K : Insert a hyperlink within the selected text
Ctrl+Shift+K : Format select text as small caps
Ctrl+L : Left align the selected paragraph
Ctrl+M : Indent the selected paragraph from the left
Ctrl+Q : Remove paragraph formatting from selected paragraph
Ctrl+R : Right align the selected paragraph
Ctrl+T : Apply a hanging indent to the selected paragraph
Ctrl+U : Underline the selected text
Ctrl+Shift+D : Double-underline the selected text
Ctrl+Shift+W : Underline the selected words but not spaces
Ctrl+V : Paste cut/copied text or object
Ctrl+Shift+V : Paste copied format
Ctrl+0 : Add/Remove one line space before the selected paragraph
Ctrl+1 : Apply single-space lines to the selected text
Ctrl+2 : Apply double-space lines to the selected text
Ctrl+5 : Apply 1.5-space lines to the selected text
Ctrl+Spacebar : Remove selected text's manual character formatting

Wednesday, November 22, 2006

Sign of Spyware....


If your computer starts to behave strangely or displays any of the symptoms listed below, you may have spyware or other unwanted software installed on your computer

- You can see pop-up advertisements all the time.
Some unwanted software will bombard you with pop-up ads that aren't related to a particular
Web site you're visiting. These ads are often for adult or other Web sites you may find objectionable. If you see pop-up ads as soon as you turn on your computer or when you're not even browsing the Web, you may have spyware or other unwanted software on your computer.

- My settings have changed and I can't change them back to the way they were.
Some unwanted software has the ability to change your home page or search page settings. This means that the page that opens first when you start your Internet browser or the page that appears when you select "search" may be pages that you do not recognize.
Even if you know how to adjust these settings, you may find that they revert back every time you restart your computer.

- My Web browser contains additional components that I don't remember downloading.
Spyware and other unwanted software can add additional toolbars to your Web browser that you don't want or need. Even if you know how to remove these toolbars, they may return each time you restart your computer.

- My computer seems sluggish.
Syware and other unwanted software are not necessarily designed to be efficient. The resources these programs use to track your activities and deliver advertisements can slow down your computer and errors in the software can make your computer crash. If you notice a sudden increase in the number of times a certain program crashes, or if your computer is slower than normal at performing routine tasks, you may have spyware or other unwanted software on your machine.
So, are you the victim?

Syware News!....Belive it or Not..

This is the report based on the most of the analysis on the Net....Nine out of ten PCs are infected with spyware, new research has found.
After a fall in 2005, spyware infection rates have risen again to their highest level since 2004, thought to be spyware's heyday, according to a recent report by anti-spyware company.

According to the Webroot Company, during the second quarter of 2006, Webroot researchers found that 89 per cent of consumer PCs were infected with an average of 30 pieces of spyware, a slight increase from the first quarter of 2006.

New online channels, more sophisticated spyware technology and consumer reliance on free anti-spyware applications are all contributing factors.
Spyware has found fertile ground to propagate among new victims in social networking sites such as MySpace, according to the report.

Meanwhile spammers recognise the extra profitability of adding spyware to their email scams, and criminals are flooding the internet with an increased number of spyware websites to ensnare new victims.

With many PC users still relying on free anti-spyware, new generations of malware are able to avoid detection using more advanced technology, such as rootkits, Trojan downloaders, key-loggers and driver-level installers.

I bet, that consumers are not alone in suffering from an increase in spyware infections. More than 40 spyware-related security breaches were reported by companies during the past quarter.

Despite analyst estimates that 70 per cent of corporations use anti-spyware applications, infection rates among organisations suggest that these solutions may be inadequate.

The reports has shown that the number of this Spyware cases are quite scary...the UK has the worst infection rate in Europe with an average of 30.5 instances of spyware per PC. The global average is 24.5.

Latest Virus Threats!!!

Sorry for the late update....Listed below are the latest threats....

Just found it some days ago...these are the "top of the line" virus that really threatening during last weeks....

Win32: Warezov family
Win32: Banker family
Win32: Tenga
Win32: Zlon-JN
Win32: Kapucen
Win32: Zlob-JO
Win32: Poli
Win32/ELF:BI
Win32:Neget
JS:Feebs family

Till this moment, I'd tested it with Avast Virus Cleaner...and it's very useful to fight with these kind of virus..I'll be back soon with more update on Avast Virus Cleaner..and also on How To Configure Your Antivirus....

Tuesday, November 21, 2006

Email Tips Part 2

31.Don't send email attachments to mobile devices. If you know that a colleague will be using their mobile device to check email for an extended period of time, avoid sending him or her attachments. Send a snippet of text instead, if possible, or a URL where they can download when they have access to a laptop or desktop.

32. Use mobile email sparingly. Cellular wireless data plans often have a monthly bandwidth cap. Sending attachments (or receiving them) can be hazardous to your wallet. Some mobile email services function by letting you see that you have attachments, but others will automatically download. So for the sake of you and your colleagues wallets save the attachments for later. Productivity, Folders, and FilteringEmail is only a useful technology if it remains an efficient means of communicating. The dual threats of spam and disorganization make email less efficient, so overcoming those deficiencies is the theme of this section.

33. Respond promptly. Don't leave email unread for more than two days. Look at it immediately and either respond to it immediately, or -- after reading it -- move it to a "must respond" folder.
34.Repond promptly, part 2. Acceptable email response time for personal emails is 24 hours. Acceptable professional response time varies by industry. Know your expected response time and check your email accordingly.

35. Respond promptly, part 3. If someone sends you an excessively long email and you do not have time to respond to the entire email, respond with a brief email acknowledging its receipt and your intent to reply in more detail.

36. I go to pieces. If you receive an email which must be responded to in its entirety but requires a substantial investment in time to respond to, respond to it in parts. Quote each original point that you are responding to, so it is clear what you are referring to. Make it clear that you are responding in parts, or else the recipient may wonder if you missed the latter part of their message.

37. Exercise discipline. Check your email at regular intervals. Whether its every 5 minutes or
every 5 days, people need to be able to rely upon your response time, so come up with a schedule that works for you and stick with it.

38. Organize by Urgency. Email clients and web-mail applications like Hotmail and Gmail will allow you to sort your emails in the order with which you need to respond to them. Consider making 'Urgent', 'Must Respond', 'Personal', 'Information' and 'Misc' folders. Then move inbox messages accordingly. You can make this sorting process more automatic by applying filters to email addresses, so that your email client will do the sorting for you.

39. Be selective. Not every email you receive requires a response. 'FYI' and group emails, for instance, should be read and filed. Non-work-related email from strangers should be forwarded to your home email address for later consideration.

40. Be quick. Email you send at work should consist of questions if you need information, or declarative sentences if you are supplying it. At work, email is best used for the transfer of knowledge - chatty banter and essays are best saved for other venues.

41. Know your limits. Don't subscribe to dozens of free "tips" sites if you don't have time to read the items. If you feel must do this, for whatever reason, use a freebie email address for this or consider an RSS feed instead.

42. Cut to the chase. Sometimes a text chat is the best way to resolve a communication quickly, instead of sending a dozen emails back and forth. By keeping the bank and forth emails to a minimum, you keep your inbox under control and prevent the need to declare email bankruptcy and starting all over.

43. Do what the Gurus do. There are a number of great writers who focus almost exclusively on tips to keep you technologically organized. Some Gurus of note: Merlin Mann of 43-Folders, mentioned elsewhere in this article, and David Allen, author of Getting Things Done are good examples.

44. GTD - get things done. Don't move anything from your main inbox into a folder if you haven't read it yet. It's likely to stay that way. Read it, respond, and file it. That way, your main inbox holds only unread messages. Or at worst, those you haven't responded to yet. This makes it easier to "get things done" more efficiently, in terms of email-triggered tasks.

45. Be specific with email titles. An email's subject line is what enables its recipient(s) to appropriately handle it. The famed 'Re:' standing alone on a subject field is either spam, or a response to one of your less-informative titles. Specificity not only facilitates easy filing, but makes locating a given email in your sent box months after the fact (when you need to prove something, or again find that bon mot) a heckuva lot less time-consuming.

46. Use freebie accounts. Always use freebie accounts for all those "free" subscriptions you sign up for. No matter what they tell you, you will get unsolicited mail as a result, at some point in the future. And it'll clutter your inbox, making you less productive.

47. Blacklist Spam emails. Don't just delete the spam you get sent, blacklist it. By blocking the sender of spam emails you can drastically cut down on the total amount of spam you get. Surprisingly, a good amount of spam is from repeat senders, so a few months of diligent blacklisting can keep spammers at bay.

48. Enable spam filters. Most email clients, including freebie webmail types, have spam filtering that can be turned on or off. They are not 100% accurate, so you should make a habit of visually scanning your spam folder to ensure you haven't missed anything important. But that inconvenience is still worth leaving the filter on.

49. Ditch your spammed out email account. If you have a freebie account that is loaded with incoming spam, save all your important contact info, backup desired emails, then ditch the email address. Get another one and then notify all your contacts. Don't forget to update any websites where your address is published.

50. Prevent email overload. Kaitlin Duck Sherwood has a handy, quick guide to preventing email overload. One that is simple but effective is to say "no need to respond", or some such, if a response is not necessary.Email AttachmentsThe ability to attach documents has revolutionized the way in which we do business. Despite its benefits, however, attachments are one of the least standardized parts of emailing.

Hacking Email: A lot of Tips to make you more secure and productive - Parts 1

When people read out a phone number, they use "phone rhythm." No one has to explain "phone rhythm," we all just seem to do it automatically, "…713...555...12…34". Similarly, when we answer a phone call we all say, "Hello." No one taught us to do that, but somehow we all seemed to pick it up.

So why is it that when it comes to emails, there are no accepted standards? Even though 6 billion emails are sent every day, almost no one agrees about simple things like email etiquette, how to organize a note, or whether emails are considered private or not.
The 99 tips in this article make up the best in email practices. From how to ethically use the ‘BCC:' to what attachments will make your mobile emailing compatible with everyone else's, this list covers everything you need to know about emailing.EtiquetteWe're all guilty of bad manners once in a while, but when it comes to emailing, some people are downright clueless.

1. Don't send private messages with the company account. If you want to send personal messages from work (and you should probably try to minimize this), use a freebie account like Hotmail, Gmail, Yahoo!, or Excite, if your office permits it. The content of your emails is less visible to employers through these accounts, so the private messages you send will stay private.

2. Use BCC if necessary. If you must send a group email to people who do not know each other, don't add their addresses to the form's CC field; this is one method spammers use to harvest email addresses. Instead, use BCC (Blind Carbon Copy) for their addresses, and put your own email in the form's "to" field.

3. Don't send form letters. Its impolite to send form letters, especially to your friends and colleagues unless they are all part of a group that is expecting them.

4. Don't forward chain letters. Just don't do it. Enough said. That includes the email that says that if you don't forward it to 10 people you'll die. I don't care how superstitious you are, don't send them.

5. Be professional. Ensure your work emails don't contain 'u', 'afk', 'ty', 'jk' and/or several million other texting @ chatroom acronyms. These developed because cell phones' keypads aren't well-suited to writing fully-formed words, sentences and paragraphs. In business communications, however, they may give the impression of childishness and illiteracy.

6. Be professional, part 2: Check tone. Be aware of the professional (or not) relationship between yourself and the recipient before starting an email. Use that to gauge what topics are appropriate to write or not, as well as the tone of your writing. This may be common sense to most, but you’d be surprised at how often the rule is ignored.

7. Be careful. Email is not private; it can be intercepted anywhere en route to its recipient. In addition, it can live on for years in recipient email boxes, later to return to its sender in choice quotations. Think before sending email you will later regret.

8. Cut down on sigs. Signature files, especially in business, should contain as few lines as possible. Four lines is a figure generally agreed-upon. Email that consists of a two-line statement and a ten-line signature will have its recipients rolling their eyes.

9. May I quote you? When you respond to an email, the original email is quoted. Cut the most relevant sentence from the message to which you are responding, preface it with a '>' (if it's not already there) and paste the quote above your response. Delete the rest of the original email from your response, unless you are responding to other points in the original.

11. Get clarification. If someone sends you an email that upsets you, make sure you haven't misunderstood. As mentioned previously, emotion and tone do not always carry over well in email. Instead of responding angrily, in your response, quote the portion of text that you are unsure of and ask the sender to clarify. Indicate what you think it means, if you like, then ask if you've misunderstood.

12. Don't spam friends. Occasionally, company mail servers go on the fritz and send forty-five copies of the same email to the recipient (personal experience). Even if it's not your fault, it is polite to apologize profusely to your friend, family, or roommate.

13. Consider the quirks of other email systems. For example, say that you have a friend with a Hotmail account and want to send a list of hyperlinks. Hotmail doesn't handle hyperlinks inside of an email very well. For example, you cannot easily copy the actual URL, without a bit of effort. So anyone used to tabbed browsing, such as with all recent web browsers (including, finally, IE7.x), may find it frustrating trying to open a link in a new tab or window. It's hard to know about all types of email systems, but some awareness reduces frustrating situations for recipients.

14. Respond to group email appropriately. If someone has sent a group email that requires a response, but only to the sender or a couple of parties, don't copy everyone on your reply.

15. Don't respond to every group email. More specifically, it is alright to sit out a thread of group conversation if you are not being addressed directly. However, read the emails carefully to make sure that you are not being expected to respond.

16. Respect email laws and regulations. Some countries have very specific rules about bulk emailing. If you use email to promote your business, you need to know the laws for not only your country but probably wherever you are emailing to. It's a tall order, given the global village of the Internet, but its importance cannot be overstated.
Communicating & EffectivenessNow that we've covered the basics of emailing with manners, it's important to make sure your intended message is actually getting across.

17. Use meaningful subject lines. Write something "meaningful" in the subject line, to give recipients a clue as to what your email is about. This is increasingly necessary to distinguish legit emails from spam. The latter's subject lines are are often deceptive.

18. Be brief. Do not send excessively long emails if at all possible. Try to summarize your information so that your recipients are more likely to read the email and actually respond. When possible, break long emails into numbered point form so that recipients can respond by reference number.

19.
Summarize. Precede a long email with a short summary.

20. Cheat with templates. In his Five Fast Email Productivity Tips, author Merlin Mann recommends 'cheating' -- using templates and form letters - when you find yourself answering (or asking) the same questions repeatedly. A good percentage of first-year college students learn to do this when writing email to family, friends, and significant friends back home.

21. Use 'Reply All' when necessary. Usually, the common advice is to not use "reply all" if other recipients of a group email do not need your response. But forgetting to use "reply all" when appropriate is simply inefficient. If the vast majority of a group needs to hear a message, writing in individual emails addresses will waste your time and increase the chances that you’re going to leave someone important out of the email.

22. Remember the telephone. Unless you need a written record of a given communication (or if the person you're communicating with is long distance), consider calling (or sending a letter to) your intended recipient instead of an email. People often default to writing an email because it is quick and easy; but sometimes a handwritten letter or phone call can provide the personal touch your communication really needs.

23. If it's urgent, say so. Writing 'URGENT' in front of your email's subject will make it stand out from the crowd, and most likely get timely attention from the recipient. Make certain it is urgent, however; remember how much attention was paid to the boy who cried wolf when his cries really mattered.

24. On vacation? If you will be out of your office for a lengthy period of time, set up an autoresponder to inform whomever emails you of your absence and your expected return. This is polite (the message is only sent to a given email once), and it prevents a lot of "I'm waiting for your response" emails. A quick warning, however, to not use an autoresponder for your home email; you shouldn't advertise an empty house.

25. Use smileys. If you think that something you've written might be misunderstood in tone or emotion, use the appropriate smiley. It should be obvious, but this tip does not apply to work or other professional emails, or if the person doesn't know you already.

26. Proofread. There is a difference between typos and poor writing. Poor writing improves with practice. Typos stay typos unless you take the time to eliminate them. If you are applying for a job or freelance gig, it's especially important to prufreed before you send that email. And as if you needed another reason to be concise, remember that the chance of typos is directly proportional to the length of your email.
Mobile Email

27. Know your limitations. Mobile email is best for very dexterous people. It isn't always the most productive way to communicate for everyone. Reading emails via mobile is fine, but if you don't have the thumb dexterity to use the keypad to respond, save your thumb the pain and just handle your emails on a computer.

28. Use voice-to-text. There are mobile applications out there that will convert your spoken word to text, which you can then use for mobile email responses. Because this technology is just starting to go mainstream, if you want it you are going to have to shop for phones specifically with voice-to-text capability.

29. Duplication of email, or lack thereof. If you plan to access email from both a mobile device and a computer, keep in mind that some email servers and client software download each email to the device you are using, and delete it from the server. This could be hazardous to your career, if you access with a mobile device, read it, and then delete it with the intent of responding from a computer later. So make sure that you know how your client handles the mobile/computer divide.

30. Be exclusive. It's best to set up a separate email account for your mobile devices. If you plan to be away from a laptop or desktop for an extended period, you can redirect your regular email, with full filters on. Use this email account only for your mobile device. By having to separate accounts you can make sure to send all your subscriptions and other large regular emails to your main account. You can also sign up for new products with the computer account to make sure you won't get spammed, before you have those emails come to your mobile account.

Monday, November 20, 2006

What is Browser Hijackers

Browser Hijacking is caused by malicious code which can alter your browser settings without your knowledge. Browser Hijackers are extremely common.Here's a list of the typical effects a Browser Hijacker can have on your system.
* Altering the Homepage, Search Page of your browser.* Changing various options in your Internet settings.* Blocking access to certain functions (parts or all of the internet options screen, registry editor etc)* Changing to reset (iereset.inf) file to prevent user being able to reset web settings within the internet explorer options screen.* Automatically add sites to your trusted zone* Hijack of URL prefixes, therefore if you enter a site in your browser without a prefix (ie google.com), internet explorer automatically appends http:// to the address.* This function can be abused to redirect you to any site if you omit the prefix* Altering your winsock list of providers used to resolve domain names.* Adding a proxy server so all your traffic could be intercepted.* Altering your user stylesheet (normally used for visually impaired users), thereby changing the way websites appear.

What is Viruses

A piece of programming code usually disguised as something else that causes some unexpected and, for the victim, usually undesirable event and which is often designed so that it is automatically spread to other computer users. Viruses can be transmitted by sending them as attachments to an e-mail note, by downloading infected programming from other sites, or be present on a diskette or CD. The best protection against a virus is to know the origin of each program or file you load into your computer or open from your e-mail program.

What is Trojans

A program that comes in secretly and quietly, but it carries a destructive payload. Once you become infected by the worm or virus that that Trojan carries into your computer, it can be very difficult to repair the damage. Trojans often carry programs that allow someone else to have total and complete access to your computer. Trojans usually come attached to another file, such as an .avi, or .exe, or even a .jpg. Many people do not see full file extensions, so what may appear as games.zip in reality could be games.zip.exe. Once the person opens up this file, the Trojan goes to work, many times destroying the computer's functionability. Scary, eh? You can read more about this here, on our Trojans, Viruses, and Worms reference page. Your best line of defense is to NEVER accept files from someone you don't know, and if you have any doubts, then do NOT open the file. Get and use a virus detection program, such as Inoculate and keep it updated regularly.

What is Adware

Adware is usually a freeware displaying advertising banners within the program interface. The developer creates revenue by selling advertising space in the software product, instead of you having to pay for it. Occasionally, some Adware will also act as spyware which includes information gathering code to send non-sensitive information back to third parties. Some people think that Adware are same as spyware, but Adware isn't necessarily spyware. While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement, there is almost no way for the user to actually control what data is being sent. In addition to privacy concerns, frequent downloading of advertisement banners and other ads while the user is browsing can slow down the system immensely and for users paying for dialup services by time used, ad-loading and hidden communications with servers can be very costly.Most of the time, if you prefer a "non advertised" product, you have the option to purchase a version that does not display any banners.

What about Spyware

Spyware is defined loosely as any program that secretly gathers information about you and or your computer use through your Internet connection. Typically, a Spyware program gathers information about you by monitoring your computing activities and then transmits it across the Internet to a central server for onward distribution to interested parties for advertising purposes. These programs can also download files, run other programs in the background, and change your system settings.In addition to violating your privacy and potentially damaging your system, Spyware can slow your computer down by stealing processing time from the CPU. Even though the name may indicate so, Spyware is not an illegal type of software in any way as yet. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product.Another potential problem is that many are poorly written, may contain programming bugs and errors and can cause problems with the normal operation of your computer. One of the causes of your web browser hanging and crashing frequently with those "General Protection Faults" may be due to one of those badly written Spyware programs interfering with its normal operation.

What is Malware

What is Malware, Malware -short for MALicious softWARE- is a term used to broadly classify a form of software which is installed in a computer system mostly without the owners permission with malicious intentions. It includes Trojans, viruses, key loggers, malicious active content, rogue programs and dialers among others.There is another form of software which may be termed as "Trackware", -because they track, store and analyze your browsing patterns thereby compromising your privacy on the World Wide Web. They are probably less malicious, but unwanted at the same time. It includes Spyware, Web bugs, tracking cookies, and "forced" adware.