User talk:Trolololololguy96

Computer Virus

A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk.Computer viruses are frequently spread by attachments in email messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message or you are expecting the email attachment. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in pirated software or in other files or programs that you might download.

Hacking

In some situations, you may see new programs or files to the computer. If you are the only user on the computer and new programs are installed, this could be an indication of a hacked computer. However, there are also several legitimate reasons why a new program may appear on the computer, as listed below.Operating system or other program received updates that included new programs or files.When installing a new program it may have installed other programs. For example, it is common for plug-in and other free programs to have a check box asking if it is ok to install a new Toolbar or antivirus on your computer. If these boxes are checked, new programs are installed. Any other person who logs on your computer could install new programs.Below is a listing of programs that may indicate a hacker has been on the computer.Backdoors and Trojans are by far the most common programs to be installed on the computer after it has been hacked. These programs allow the hacker to gain access to the computer. IRC clients are another common way for a hacker to get into a computer or remotely control thousands of computers. If you have never participated in a IRC chat, your computer may have been hacked.Spyware, rogue antivirus programs, and malware can be an indication of a hacker. However, are more commonly a sign that your computer has been hijacked while on the Internet.

Anti virus

Antivirus is software used to prevent, detect and remove malware such as: computer viruses, adware, backdoors, malicious BHOs, dialers, fraudtools, hijackers, key loggers, malicious LSPs, rootkits, spyware, trojan horses and worms. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malware threats, rather than computer security implemented by software methods. A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code, or slight variations of such code, in files. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions. No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance. Inexperienced users may also have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.One example of some antivirus software is Microsoft security essentials its free to the public on a windows based pc.

Firewalls

A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.

Passwords

Another thing which is important are passwords because if you have an easy password, it will get hacked easier than if you had a password. Which contained a capital letter and numbers. you should change your password every month because a hacker can get your password over time which he will access your bank details or your address.

Spyware

Spyware is a type of malware installed on computers that collects information about users without them knowing. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as key loggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. Sometimes, spyware is included along with genuine software, and may come from an official software vendor. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

Malware

Malware includes computer viruses, worms, Trojan horses, spyware, adware, and other malicious programs. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Malware is not the same as defective software, which is software that has a legitimate purpose but contains harmful bugs that were not corrected before release. However, some malware is disguised as genuine software, and may come from an official company website. An example of this is software used for harmless purposes that is packed with additional tracking software that gathers marketing statistics. Malware has caused the rise in use of protective software types such as antivirus, anti-malware, and firewalls. Each of these is commonly used by personal users and corporate networks in order to stop the unauthorized access by other computer users, as well as the automated spread of malicious scripts and software.

Spamming

Spamming involves sending unwanted electronic communication and is often considered junk e-mail. Spammers lure individuals to read e-mails through enticing words in the subject line. The majority of spam is related to commercial advertising promoting questionable products or services. Often, sending spam is an attempt to commit identity theft or other types of fraud over the Internet. To stop spamming download any unnecessary films or games. It can’t be trusted and will send you nothing but emails.The less threat in the computing world are Spamming which is a threat which a advertisement that keeps sending you emails constantly to persuade you to apply for a new prize or technology or they can just send you stupid emails like fitness DVD's and pornographic images to get you to sign up for the website. To simply to stop this all you need to do is ignore and delete the emails you have been receiving or you can block the contact which stops them sending a big amount of emails to you and you wont receive them.

Identity Fraud Identity fraud occurs to an individual when a person's personal information is used by someone else without their knowledge to obtain credit, goods or other services fraudulently. It can even extend to securing a passport in their name. In the UK alone there are 4.3 million victims of identity fraud to date. As such, it is important that you understand how fraudsters can get their hands on your information so you can take steps to protect yourself and your family. This by reporting it to the police and can be taken to court.

Cyber Bullying

Cyber Bullying is the main personal feature which is very much hated a lot. Many schemes have been set up to stop cyber bullying as its very harmful to people emotions. Cyber bullying is basically when someone is being called inappropriate names online on social websites such as facebook and twitter. Facebook has had many complaints from the public to stop the Bullying instantly by detecting the language been said.

Phishing

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

Clean Up Tools

Disk clean up is a computer maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive. The utility first searches and analyzes the hard drive for files that are no longer of any use, and then removes the unnecessary files. There are a number of different file categories that Disk Cleanup targets when performing the initial disk analysis:Compression of old files, Temporary Internet files, Temporary Windows files, Downloaded program files, Recycle Bin,Removal of unused applications or optional Windows components, Setup log files and Off-line files