Roleplay Makers
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Roleplay Makers

Create & participate in RPG's
 
Homepage  Latest imagesLatest images  HomeHome  GalleryGallery  Donations  List of BB codes  RegisterRegister  Log inLog in  Global Rules  

 

 How to keep your Computer Safe

Go down 
3 posters
AuthorMessage
Henry
Graphics Team
Graphics Team



Male Number of posts : 70
Age : 31
Location : England
Infractions :
How to keep your Computer Safe Left_bar_bleue0 / 70 / 7How to keep your Computer Safe Right_bar_bleue

Registration date : 2008-09-28
RP gold : 2848000
Reputation : 0

RPG Character Select
Hp:
How to keep your Computer Safe Left_bar_bleue10/9999How to keep your Computer Safe Empty_bar_bleue  (10/9999)
Level: 1
Exp:
How to keep your Computer Safe Left_bar_bleue0/99999How to keep your Computer Safe Empty_bar_bleue  (0/99999)

How to keep your Computer Safe Empty
PostSubject: How to keep your Computer Safe   How to keep your Computer Safe Icon_minitimeFri Oct 03, 2008 1:56 pm

Well guys, I just got bored so I wanted to share how to keep your computer safe and what a Virus or what a Trojan horse can do to your computer. Yet, I will also explain Spyware and Malware.

But, to start off with, I am going to explain a very dangerous Trojan horse. This is known as the "ProRat" (Professional Remote Administration Tool). It can do all sorts of damage to your computer and is almost impossible to remove without the up-to-date Anti-Virus software. It is known that if you do not have an all up-to-date Anti-Virus software, it is undetectable. A Firewall won't block it either.

ProRat is a Microsoft Windows based backdoor Trojan horse. As with other trojan horses it uses a "Client" and "Server". ProRat opens a port on the computer which allows the client to perform numerous operations on the server.

Well, that's enough with the ProRat, time to explain what normal Trojan horses can do to your computer if you are misfortunate enough to receive one.

Effects of a Trojan horse


    Remote Access.
    Data Destruction.
    Downloader.
    Server Trojan (Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
    Security software disabler.
    Denial-of-service attack (DoS).
    Erasing or overwriting data on a computer.
    Re-installing itself after being disabled.
    Encrypting files in a cryptoviral extortion attack.
    Corrupting files in a subtle way.
    Upload and download files.
    Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context.
    Falsifying records of downloading software, movies, or games from websites never visited by the victim.
    Allowing remote access to the victim's computer. This is called a RAT (remote access trojan like the ProRat).
    Spreading other malware, such as viruses (This type of Trojan horse is called a 'dropper' or 'vector').
    Setting up networks of zombie computers in order to launch DDoS attacks or send spam.
    Spying on the user of a computer and covertly reporting data like browsing habits to other people.
    Making screenshots.
    Logging keystrokes to steal information such as passwords and credit card numbers.
    Phishing for bank or other account details, which can be used for criminal activities.
    Installing a backdoor on a computer system.
    Opening and closing CD-ROM tray.
    Playing sounds, videos or displaying images.
    Calling using the modem to expensive numbers, thus causing massive phone bills.
    Harvesting e-mail addresses and using them for spam.
    Restarting the computer whenever the infected program is started.
    Deactivating or interfering with anti-virus and firewall programs.
    Deactivating or interfering with other competing forms of malware.
    Randomly shutting off the computer.
    Randomly installing a Virus.



Computer Virus

A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or the Internet, or by carrying it on a removable medium such as a floppy disk, CD, or USB drive. Meanwhile viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm can spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a file that appears harmless. Worms and Trojans may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when executed. In general, a worm does not actually harm either the system's hardware or software, while at least in theory, a Trojan's payload may be capable of almost any type of harm if executed. Some can't be seen when the program is not running, but as soon as the infected code is run, the Trojan horse kicks in. That is why it is so hard for people to find viruses and other malware themselves and why they have to use spyware programs and registry processors.

Most personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware.

Some malware is programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Other malware programs are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio messages. Even these less sinister malware programs can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, much malware is bug-ridden, and these bugs may lead to system crashes and data loss. Many CiD programs are programs that have been downloaded by the user and pop up every so often. This results in slowing down of the computer, but it is also very difficult to find and stop the problem.


Spyware

Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party. Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.


========================================================================

Enough with the effects, let me explain to you recommended Anti-Virus software and Firewalls.

Top 10 Anti-Virus Software

Shield Deluxe - 5 Stars
CA - 4 Stars
BitDefender - 4 Stars
Norton - 4 Stars
Kaspersky - 3 Stars
NOD32 - 3 Stars
Panda - 2 Stars
McAfee - 2 Stars
Trend Micro - 2 Stars

Recommended Firewalls

ZoneAlarm Pro
Outpost Firewall
Norman Firewall
EConceal Pro
Webroot Desktop
Injoy Firewall
SurfSecret Firewall

Closing Message

Anyway, thanks for reading this guide. I did not write all of this, so I will give credits to Wikipedia, Personal Firewall Review, 2009SoftwareReviews and me for the generosity of sharing this with the community.
Back to top Go down
ilikecorn5
Administrator
Administrator
ilikecorn5


Male Number of posts : 1848
Age : 29
Custom Title : TeH FrienCH AdmINz
Location : In my house... WHY DO YOU WANT TO KNOW!!!!!
Infractions :
How to keep your Computer Safe Left_bar_bleue0 / 70 / 7How to keep your Computer Safe Right_bar_bleue

Registration date : 2008-08-18
RP gold : 2868673
Reputation : 12
Acheivments Score : 15

RPG Character Select
Hp:
How to keep your Computer Safe Left_bar_bleue10/10How to keep your Computer Safe Empty_bar_bleue  (10/10)
Level: 1
Exp:
How to keep your Computer Safe Left_bar_bleue0/99999How to keep your Computer Safe Empty_bar_bleue  (0/99999)

How to keep your Computer Safe Empty
PostSubject: Re: How to keep your Computer Safe   How to keep your Computer Safe Icon_minitimeFri Oct 03, 2008 3:40 pm

Or just get AVG and NORTON anti-virus/Firewall

Oups sorry... i didn't see Norton on there...

Add AVG to the list... thats what i use (And a few others). And i don't have any problems
Back to top Go down
Dex3
Global Moderator
Global Moderator
Dex3


Male Number of posts : 788
Age : 29
Custom Title : Ken is c00l
Location : In my Doll House
Infractions :
How to keep your Computer Safe Left_bar_bleue0 / 70 / 7How to keep your Computer Safe Right_bar_bleue

Registration date : 2008-08-20
RP gold : 2867210
Reputation : 9
Acheivments Score : 15

RPG Character Select
Hp:
How to keep your Computer Safe Left_bar_bleue10/9999How to keep your Computer Safe Empty_bar_bleue  (10/9999)
Level: 1
Exp:
How to keep your Computer Safe Left_bar_bleue0/99999How to keep your Computer Safe Empty_bar_bleue  (0/99999)

How to keep your Computer Safe Empty
PostSubject: Re: How to keep your Computer Safe   How to keep your Computer Safe Icon_minitimeFri Oct 03, 2008 4:29 pm

Thanks for the advise. My computer recently had to be repaired. It used to be SO SLOW. Turns out it had 146 viruses, most of them being Trojan. Twisted Evil It used to make my computer restart without notice, makes Youtube videos always stop early, and sometimes brought me to the wrong website (mostly from Google links). Infact, there were a few times it brought me to porn sites. Wasn't happy about that AT ALL!

Anyways, my computer is fixed, and we have Norton installed. Thanks for the advise!
Back to top Go down
http://hyrulefield.forumotion.net/forum.htm
Henry
Graphics Team
Graphics Team



Male Number of posts : 70
Age : 31
Location : England
Infractions :
How to keep your Computer Safe Left_bar_bleue0 / 70 / 7How to keep your Computer Safe Right_bar_bleue

Registration date : 2008-09-28
RP gold : 2848000
Reputation : 0

RPG Character Select
Hp:
How to keep your Computer Safe Left_bar_bleue10/9999How to keep your Computer Safe Empty_bar_bleue  (10/9999)
Level: 1
Exp:
How to keep your Computer Safe Left_bar_bleue0/99999How to keep your Computer Safe Empty_bar_bleue  (0/99999)

How to keep your Computer Safe Empty
PostSubject: Re: How to keep your Computer Safe   How to keep your Computer Safe Icon_minitimeSat Oct 04, 2008 5:09 am

No problem. Also, AVG is no good. As stated by McAfee, it sometimes "falsely" detects. It also has a very low detection rate therefore it shall NOT be added to my brilliant list. I would recommend Avast Home Edition instead. Mr. Green
Back to top Go down
ilikecorn5
Administrator
Administrator
ilikecorn5


Male Number of posts : 1848
Age : 29
Custom Title : TeH FrienCH AdmINz
Location : In my house... WHY DO YOU WANT TO KNOW!!!!!
Infractions :
How to keep your Computer Safe Left_bar_bleue0 / 70 / 7How to keep your Computer Safe Right_bar_bleue

Registration date : 2008-08-18
RP gold : 2868673
Reputation : 12
Acheivments Score : 15

RPG Character Select
Hp:
How to keep your Computer Safe Left_bar_bleue10/10How to keep your Computer Safe Empty_bar_bleue  (10/10)
Level: 1
Exp:
How to keep your Computer Safe Left_bar_bleue0/99999How to keep your Computer Safe Empty_bar_bleue  (0/99999)

How to keep your Computer Safe Empty
PostSubject: Re: How to keep your Computer Safe   How to keep your Computer Safe Icon_minitimeSat Oct 04, 2008 10:49 am

Henry wrote:
No problem. Also, AVG is no good. As stated by McAfee, it sometimes "falsely" detects. It also has a very low detection rate therefore it shall NOT be added to my brilliant list. I would recommend Avast Home Edition instead. Mr. Green

Well that's fine... but i'm just saying my computer has no problems
Back to top Go down
Henry
Graphics Team
Graphics Team



Male Number of posts : 70
Age : 31
Location : England
Infractions :
How to keep your Computer Safe Left_bar_bleue0 / 70 / 7How to keep your Computer Safe Right_bar_bleue

Registration date : 2008-09-28
RP gold : 2848000
Reputation : 0

RPG Character Select
Hp:
How to keep your Computer Safe Left_bar_bleue10/9999How to keep your Computer Safe Empty_bar_bleue  (10/9999)
Level: 1
Exp:
How to keep your Computer Safe Left_bar_bleue0/99999How to keep your Computer Safe Empty_bar_bleue  (0/99999)

How to keep your Computer Safe Empty
PostSubject: Re: How to keep your Computer Safe   How to keep your Computer Safe Icon_minitimeSat Oct 04, 2008 12:03 pm

OK, no problem. Mr. Green
Back to top Go down
ilikecorn5
Administrator
Administrator
ilikecorn5


Male Number of posts : 1848
Age : 29
Custom Title : TeH FrienCH AdmINz
Location : In my house... WHY DO YOU WANT TO KNOW!!!!!
Infractions :
How to keep your Computer Safe Left_bar_bleue0 / 70 / 7How to keep your Computer Safe Right_bar_bleue

Registration date : 2008-08-18
RP gold : 2868673
Reputation : 12
Acheivments Score : 15

RPG Character Select
Hp:
How to keep your Computer Safe Left_bar_bleue10/10How to keep your Computer Safe Empty_bar_bleue  (10/10)
Level: 1
Exp:
How to keep your Computer Safe Left_bar_bleue0/99999How to keep your Computer Safe Empty_bar_bleue  (0/99999)

How to keep your Computer Safe Empty
PostSubject: Re: How to keep your Computer Safe   How to keep your Computer Safe Icon_minitimeSat Oct 04, 2008 12:53 pm

Henry wrote:
OK, no problem. Mr. Green

Nope.... i'm glad we're finally getting allong
Back to top Go down
Sponsored content





How to keep your Computer Safe Empty
PostSubject: Re: How to keep your Computer Safe   How to keep your Computer Safe Icon_minitime

Back to top Go down
 
How to keep your Computer Safe
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
Roleplay Makers :: Misc. :: Social Hotel :: Technical Support-
Jump to: