Network Security Software Network Security Software Wireless Network Software Wireless Network Software Network Search Utilities Network Search Utilities Marketing Software Marketing Software
  Nsauditor   BlueAuditor   Network Sleuth   Domain Name Search Software
  Freeware Network Security Softwares           Smart Ad-Wrapper
Network Monitoring Products Network Monitoring Products Password Recovery Products Password Recovery Products Product Key Recovery Product Key Recovery Text Utilities Text Utilities
  ShareAlarmPro   SpotAuditor   Adobe Product Key Finder   Text Template Parser
  NetShareWatcher   SpotDialup   Remote Password Recovery  


  NBMonitor Network Bandwidth Monitor   SpotMSN  

Product Key Explorer

      SpotFTP   Backup Key Recovery    
Remote Network Tools Remote Network Tools   SpotIM   Product Key Finder    
  RemShutdown   SpotIE        



To help you protect your computer, it is helpful to understand how you get viruses, worms, trojans, and other bad software. First I would like to provide some terms which will speed this process.

  • Attack - An attempt to gain unauthorized control of someone's computer.

  • Vulnerability - Typically, a software bug or misconfiguration which affects the operation of an operating system or other program run on a computer allowing it to be more easily accessed.  Hackers, worms, viruses, and trojans use vulnerabilities to gain access to computer systems without the user's knowledge.

  • Virus - Malicious software that spreads by attaching itself to files or creating files that may be executed in some way.  Usually it is sent to users as an email attachment.  It may require a computer software vulnerability to spread depending on the type of program it uses to spread.

  • Worm - Spreads without the user taking any action and usually best gaming graphics card exploits a bug (or vulnerability) in an operating system or some other program that may be running on a computer.  This requires a computer software vulnerability to spread.

  • Trojan - A program which is usually given away for free which has a hidden purpose.  It may be some type of file such as a video that user's may be interested in.  The user would normally install and run this program although the installation would be so simple the user would be unaware of it.  This program may or may not use a vulnerability to spread.

  • Hacker (for this discussion) - A person who best laptop computer deliberately attempts to manually break into other systems and use them without the knowledge of the owner.  Usually hackers exploit computer software vulnerabilities on the victim's computer, however once they have control of a system it is not possible to be sure they are denied access again without reformatting the hard drive and re-installing the operating system.

  • Spyware - Spyware is not as serious a security concern as viruses, trojans,worms, and even hacker attacks, but many free programs contain spyware such as the current popular freezip program.  Spyware is mainly a privacy concern than a security concern.  Spyware does not take control of a computer system, but sends information to the spying entity about how the computer system is being used such as what web sites are being visited.  The biggest concern with spyware or any other potentially malicious software is that it may download other code and install it on the user's system.  Additionally it may hide itself from the user to prevent it from being removed.

  • Firewall - Firewalls in simple terms are used to limit remote access to specific parts of the operating system or programs running on the system.  They may block incomming attempts to connect to an application or exploit a vulnerability.  Firewalls remove many of the possible methods of breaking into a computer without permission.  It will help prevent hackers, viruses, worms, and trojans.  It may also block spyware from contacting the spying entity.

  • Backdoor - A program which allows an unauthorized user to have access to a victim's computer.


These are basic and simple security requirements which must be followed in order to have a computer be anything close to secure.

  1. Every computer that connects to the internet in any form MUST have a personal firewall or be behind a corporate firewall.  The type of connection is not important.  A personal firewall is required for dial in connections, cable modem, DSL, ISDN, T1 and others.  The ONLY exception is when there is some type of firewall already existing between the computer and the internet.  Get a personal firewall and configure it according to the maker's instructions.

  2. Every computer must have virus protection and updates to the virus list database should be done at least twice a week.  A full virus scan should be done at least once per week.

If you do not at least take the two measures listed above then you should not connect your computer to the internet.  In the past I believed that I could just keep my system updated with security updates and did not need a personal firewall.  This was a perfect formula for getting trojans, viruses, and backdoors and I ended up with four of them and had to reformat my hard drive and re-install my system.

There are also other security recommendations but the two above requirements are critical to all systems.  The other security practice that should be done includes:

  • Updating your systems with security updates and service patches when they are considered stable, but this can be a technical decision.  See the below paragraph about updating your system.

It is best to read a e-mail discussion group postings to determine the state of current patches and vulnerabilities.  Microsoft and other vendors issue postings about security patches and vulnerabilities when they come out.  One of the best mail listings to subscribe to for learning about Windows vulnerabilities and patches is at

A couple of  additional practices related to your computer which may be lifesavers are:

  • Back up your data - This should be done regularly to one or more of another computer, a writeable CD ROM drive, a zip drive, or tape drive.  Remember if you should lose your data, everything you have done since your last backup will be lost lalafan.  If you should find it necessary to re-install your system in the event of a security lalafanfan duck dibujo breach you will be glad you have done this.  Also I have seen several hard drives fail and cause complete loss of data to users.

  • Create an emergency boot floppy for your operating system - You should learn how to do this for the operating system you are using paper duck tik tok print.  Instructions in this area are beyond the scope of this document.



Why do I need a firewall?

It would seem that if you keep your anti-virus definitions update with your virus protection program and you keep your system patched with the latest updates you would not need a personal firewall.  Viruses would be immediately caught by your antivirus program, and your vulnerabilities would not exist since you always patch them immediately.  This does not work for the following reasons:

  1. Viruses begin to spread before they are identified.  The only way they are identified is when someone discovers their computer is behaving incorrectly and then they realize they have a virus.  Then the virus updates are posted to anti-virus vendor websites such as Symantec.  Therefore the virus can spread to you before it is identified and your system may be compromised and other unwanted items such as hacker backdoors may be placed on your system before the virus is removed.  A firewall can also help prevent additional item from being placed on your system if you should get an unknown virus.

  2. Firewalls typically block most of the routes that viruses, trojans, worms, and hackers will try to use to gain access to your computer.  A computer with a firewall is thereby much better protected than one without.

  3. It is likely that some vulnerabilies may not be patched before the attack occurs.

  4. Vulnerabilities like viruses must also be discovered.  If a hacker discovers the vulnerability or someone writes a virus program to use an undiscovered vulnerability, a firewall may still be able to prevent the attack.

Even with all these measures there is no guarantee that your system cannot be compromised by a virus, worm, or hacker, but it is very likely that you will have much less trouble.  Remember there is no guarantee that your hard drive will not break tomorrow so you should also back up your data to another computer, tape, or CD periodically when possible.