Tuesday, December 8, 2009
Computer Cookies

A computer cookie is a tiny text file that is saved to your hard drive by a website programme. This file contains information about your searches and behaviour on the website. It is saved without your consent or knowledge meaning you really have no computer privacy. Whenever you next visit the site, it identifies you by looking-up your cookie. This is how many sites are able to 'greet' you when you return, to remember your password, or to recommend products just for you.
Computer cookies are programmed to collect certain information about you. For Google, your cookie file could contain search terms, a unique identification number, and your IP address. It's designed to monitor your movements and report back to the host website.
What Are Computer Cookies Used For?
As they gather and record your information, computer cookies are creating a valuable record of your behaviour and your statistics. Online companies use them to carry out behavioural targeting.
Behavioural targeting is a method which enables companies to identify trends and predict your actions. When you, like thousands of others, were searching for driving directions using Google, the search engine giant identified a common need and quickly established 'Google Maps'. If enough of us were to boycott 'Google Maps', clicking on another direction provider, Google would probably recognise this trend and relegate Google Maps to a minor page.
What Should I Do About Computer Cookies?
When cookies were first introduced, nobody knew they were there, and nobody was able to stop them - no one realised they threatened computer privacy. But this soon changed when people in-the-know started to kick up a fuss, and eventually cookie controls were added to most browser programmes. Because cookies gather so much personal information, and particularly because you don't always know what that includes, we recommend taking action to protect yourself against cookies for your computer privacy. There are a few ways to fool the system - the first action is essential for anyone using the web
What is a Computer Worm?
Common Computer Viruses
Spybot

Spybot-S&D also recently added an anti-rootkit function.
The TeaTimer module can be optionally enabled, providing a level of active, real-time protection from undesirable registry changes and the like. This comes in the form of pop-ups which alert the user to registry changes, and ask for approval before allowing the change. Registry changes only tend to be made when programs are installed/uninstalled/updated, so random changes can indicate the presence of malicious software.
Some programs ship with attached spyware or adware and refuse to run when the undesired co-programs are removed; newer versions of Spybot replace the spyware binaries with inert dummies (designed to fool programs which require the spyware's presence).
In order to efficiently detect recently created programs, detection updates are released weekly along with other improvements such as added languages and better heuristicsalgorithms. These updates are downloaded from within the software from a variety of mirrors and are then automatically installed.
Spybot-S&D is available for all versions of Windows from Windows 95 and up, and offers more than two dozen different languages and several skins to users. Instructions are available on the website to enable users to design their own skins.
What is a Trojan Horse Virus?

A Trojan Horse virus works byhiding within a set of seemingly useful softwareprograms. Once executed orinstalled in the system, this type of virus will startinfecting other files in the computer.
A Trojan Horse Virus is also usually capable of stealing important information from the user's computer. It will then send this information to Internet servers designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through thisTrojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash.
A Trojan Horse virus can spread in a number of ways. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users.
These emails contain attachments. Once the user opens the attachment, the Trojan Horse Virus immediately infects the system and performs the tasks mentioned above.