» HOME PAGE

  » BUSINESS SERVICES

  » HOME SERVICES

  » FAQ

  » WEB DESIGN

  » CONTACT


Frequently Asked Questions

1.What is a firewall?

2.Why do I need a firewall?

3.What is a Computer Virus?

4.Do I really need an Anti-virus?

5.What is Ad-ware?

6.Is Ad-ware dangerous?

7.What is Spyware?

8.What is a Trojan?

9.How can Spyware end up in my computer?

10.What are the consequences of Spyware activity?

11.Do I need an Anti-Spyware?


What is a firewall?

When your computer is connected to the Internet, it receives traffic from a wide range of sources, most of it benign. Your instant messaging client alerts you that a friend has signed on; your mail client finds new mail waiting for you and downloads it; a weather site refreshes its rainfall map by telling your web browser to reload a page. All of this traffic is handled invisibly by your computer, which is listening to a large number of "ports." A port is a specific connection point through which applications on your computer connect to the Internet. And a hacker only needs one open port through which to mount an attack.

A firewall is a piece of software that monitors all incoming network traffic and allows in only the connections that are known and trusted.

You could manually grant or restrict access to each of the 65,535 ports available under the Internet Protocol. Every time you add a new program that requires Internet access, you would need to determine which port(s) it uses, and reconfigure your computer accordingly. There are better ways to spend your time.

Firewall software takes on this burden for you, allowing access to the ports you need open, and closing off those you don't. It also makes your computer "invisible" on the Internet; if hackers can't find you, they will have a hard time attacking you.

More advanced firewall software also monitors outgoing traffic. This is crucial since malicious code spreads by accessing the Internet and pushing copies of itself to other computers (often those of your friends and family!). Outbound protection can keep even brand-new Trojan horses and spy-ware from doing their damaging work. The ultimate protection is program-level control, so that only those applications that you trust are allowed to access the Internet.

Back to top

Why do I need a firewall?

Without a firewall, your computer is operating under an "open door" policy. Bank account information. Passwords. Credit card numbers. Documents and photos that you don't want to share with the world. They are all available to anyone with bad intentions and basic computer skills. Hackers can get in, take what they want, and even leave open a "back door" so they use it to attack other computers.

Every minute that your computer is connected to the Internet, either through a dial-up (modem) connection or through a broadband (DSL or cable) service, it is at risk.

Back to top

What Is a Computer Virus?

A computer virus is a program that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file and are spread as files that are copied and sent from individual to individual.

Besides replication, some computer viruses have something else in common: a "damage routine", i.e. a piece of software, that can deliver the virus payload. While payloads may only display messages or images, they can also destroy files, reformat your hard drive, or cause other kinds of damage. If the virus doesn’t contain a damage routine, it can still cause trouble by taking up storage space and memory, and downgrading the overall performance of your computer.

Back to top

Do I really need an Anti-virus?

Virtually, no one who uses Windows-based computers is immune from viruses. Every time your computer handles a new file, chances are that it could be infected. In particular, that is the case when you open attachments in your emails, when you download a program from the Internet or when you copy a file from one computer to another. Unless your computer is completely isolated from the outside world, which would make it pretty useless, the risk of infections are quite high.

There are 60,000 to 70,000 active viruses and worms, with 10,000 new ones appearing every year. Nearly all are designed to infect Windows PCs. That means that Mac users don't need anti-virus protections because their machines can not run any program written for Windows, including viruses.

At the moment, it's safe to say that a Mac user would need an anti-virus only when a Windows emulator like Virtual PC is used. That would be required to protect the Windows environment only, because Windows-viruses can not run and damage OS X.

Back to top

What is Ad-ware?

"Ad-ware" or "advertising-supported software" is any software application in which advertisements are displayed while the program is running. These applications include additional code that displays the ads in pop-up windows or through a bar that appears on a computer screen. Ad-ware helps recover programming development costs, and helps to hold down the price of the application for the user (even making it free of charge)--and, of course, it can give programmers a profit, which helps to motivate them to write, maintain, and upgrade valuable software.

Some ad-ware is also "shareware", in that users are given the option to pay for a "registered" or "licensed" copy, which typically does away with the advertisements.

Some ad-ware programs have been criticized for occasionally including code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge. This practice has been dubbed "spy-ware".

Back to top

Is Ad-ware dangerous?

While Ad-ware may be a great concept, the downside is that very often the advertising companies also install additional tracking software on your system, which is continuously "calling home", using your Internet connection and reports statistical data to the "mothership". While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.

It is safe to say that not all ad-ware products are spy-ware, but the vast majority are. When ad-ware becomes spy-ware your privacy is at risk.

Back to top

What is Spyware?

Strictly speaking, "spy-ware" is computer software that gathers information about a computer user without the user's knowledge or informed consent, and then transmits this information to an organisation that expects to be able to profit from it in some way. Data-collecting programs installed with the user's knowledge are not, technically speaking, spy-ware, if the user fully understands what data is being collected and with whom it is being shared.

More broadly, the term spy-ware is applied to a wide range of related "mal-ware" products which are not spy-ware in the strict sense. These products perform many different functions, including the delivery of unrequested advertising (pop-ups in particular), harvesting private information, re-routing page requests to illegally claim commercial site referral fees, hijacking the web browser homepage and installing stealth phone dialers.

Back to top

What is a Trojan Horse?

A Trojan Horse is a particular category of spy-ware. A Trojan is a program that infects your computer and allows a hacker to take control of your machine behind your back. A Trojan infection can allow total remote access to your computer by a third party.
Unlike virus and worms, Trojans do not replicate themselves so to get infected you must, one way or another, have downloaded the program onto your computer. This most commonly occurs when you download a program that pretends to be one thing while it is actually another. Hence the origin of the "Trojan" name.

The most common types of Trojans include such functions as the ability to steal all passwords cached or not (this is done using key logging technology), run files, do serious damage to your machine and do pretty much whatever the intruder wants.

However these days most Trojans are being used to turn your computer into a Zombie. In other words the hacker will be able to use your computer and a bunch of other infected computers like yours and turn them into an army of zombies to attack a more important target. This way the intruder can hide his or her own trace and use your computer as a front. This means the victim's firewall will show your Internet address in the log as the attacker's address and you may end up with several complaint letters to your ISP and even lose your account as a result.

So just because you think you have nothing important on your computer doesn't mean your computer itself and your bandwidth is not valuable to hackers. In fact they are quite valuable and worth the hacker's time.

Back to top

How can Spyware end up in my computer?

Spyware is normally installed through either one of two common methods. The first is to hide a spy-ware component within an otherwise apparently useful program. Often, the containing program is made available for download free of charge, so as to encourage wide uptake of the spy-ware component. The second common method is to take advantage of security flaws in Internet Explorer. Sometimes they arrive as an automatic download from a website you are surfing. Spyware can also be installed on a computer by a virus or an e-mail Trojan program, but this is not common.

The HTTP cookie (e.g. a packet of information) is a well-known mechanism for storing information about an Internet user on their own computer, often used to assign website visitors an individual identification number for subsequent recognition. However, the existence of cookies and their use is generally not concealed from users, who can also disallow access to cookie information. Nevertheless, to the extent that a Web site uses a cookie identifier to build a profile about the user, who does not know what information is added to this profile, the cookie mechanism could be considered a form of spy-ware. For example, a search engine website could assign a user an individual ID the first time he visits and store all search terms in a database with this ID as a key on all subsequent visits (until the cookie expires or is deleted). This data could be used to select advertisements to display to that user, or could—legally or illegally—be transmitted to third parties.

Another cause is granting permission for web-based applications to integrate into your system. These "browser helper" object embeds itself as part of your web browser.

Spyware is usually installed by some stealthy means. If you read the user agreements for the software you download and install, references (sometimes vague) are cited for allowing the issuing company of the software to record your Internet usage and website surfing. Some software vendors allow you to buy the same product without this overhead.

Back to top

What are the consequences of Spyware activity?

Unprotected Windows-based computers, particularly those used by children or credulous adults, can rapidly accumulate a great many spy-ware components—several hundred individual instances is common. The consequences of a moderate to severe spy-ware infection (privacy issues aside) generally include a substantial loss of system performance (over 50% in severe cases), and major stability issues (crashes and hangs). Difficulty connecting to the Internet is another common symptom.

Spyware infection is now (as of 2004) responsible for more visits to professional computer repairers than any other single cause. In more than half of these cases, the user is unaware of the spy-ware problem and initially assumes that the system performance, stability, and/or connectivity issues are related to hardware, Windows installation problems, or a virus.

Some spy-ware products have additional consequences. Dialers attempt to connect directly to a particular telephone number rather than to the user's own Internet Service Provider: where the number in question is overseas, this can result in massive telephone bills which the user has no choice but to pay.

Much worse than your computer performances, is the violation of your privacy. The very essence of spy-ware is to collect as much information as possible to identify your behaviours for marketing purposes. The websites you visit and the time of the day when you browse the Internet are only a couple of examples. As a matter of fact, there is no limit to the type of information that spy-ware can be programmed to transmit.

Particularly worrisome spy-ware programs are the so called "key-loggers". They log keystrokes and mouse clicks on the computer where they are installed and write them to a file. Usually they have the option of encrypting and decrypting the log files and the option of sending the file to a destination across the Internet. Software key-loggers, as opposed to hardware's, are practically impossible to track once installed. However, key logging can be effectively prevented by adopting good security practices. While key-loggers have many perfectly legal applications, their common utilization in espionage speaks volumes about the implications on the target's privacy.

Back to top

Do I need an Anti-Spyware?

If you are very careful not to use your computer in any way that could allow your identification or if you don't care about your privacy, you certainly don't need it. Millions of people are using advertising supported "spyware" products and could not care less about the privacy hype; in fact, some "Spyware" programs are among the most popular downloads on the Internet.

On the other side, if you use your own identity while browsing the Internet, shop on-line using your credit card, use Internet banking or have at least one email account that could identify you, just to mention but a few examples, it really comes down to how much you value your privacy.

Back to top