Bigbruin.com
Home :: Reviews & Articles ::
Forum :: Info :: :: Facebook :: Youtube :: RSS Feed
Battlefield Home - Network Security
Author: Brian Anderson, CISSP
Manufacturer: N/A
Source: Bigbruin.com
Purchase: PriceGrabber
Comment or Question: Post Here
Page: 4 of 7 [ 1 2 3 4 5 6 7 ]
Battlefield Home - Network Security
October 08, 2006

Spyware Protection:

Another growing concern is spyware. Some spyware isn't really as bad as it sounds, most of it is even worse. While some of it does the mundane task of anonymously sending back what websites you visit to the software developer; others capture everything you do including: user names, passwords, web sites, e-mail address, etc. and send it back for the developer to do everything from steal your identity to send you spam that you "might" be interested in.

How do you get spyware? Sometimes it is in a freeware/shareware application that you download and install. Popular ones like Gator even promise to be a helpful application, and "occasionally" pop up ads on your computer. Remember, with rare exception is anything in life free. Another common spyware application is Comet Cursors that gives you "free" mouse cursors, themes, etc. These are just a couple of examples of ones that you either download and install directly, or come bundled in a freeware/shareware application you install. Another way to get spyware is from a web page. If you have ever been to a website and you get a pop-up that ask you to click "OK" with the promise of free software, money, prizes, etc., these are more often than not asking you to click OK to authorize spyware (or even a virus or trojan) to be installed. If you ever get a pop-up that you don't expect and it asks you to click OK, NEVER click OK. Always use the X in the corner of the window to close it (be careful here as well, as some of the pop-ups will display a X in the corner to make it look like the real one).

So how do you protect yourself from these applications? Well again, a good anti-virus application will protect you from some, but not a lot of them. You will need to deploy a two pronged approach to this one (luckily some of the applications have this built in). You will need a Pop-up blocker, and anti-spyware software. You need to be very careful in choosing these types of applications, because there are many applications that claim to protect you from both pop-ups and spyware; but they themselves are spyware/pop-up displayers. Nice huh? So how about a list of ones you can trust:


Anti-Spyware:

» Ad-Aware

» Spybot

» SpywareBlaster

» Windows Defender

Also, check with the maker of the anti-virus software you use, as most of them offer these type of applications. There are many forms of pop-up blockers. You can get things like the Google Toolbar, browsers (such as Firefox, or IE plug-ins like Crazy Browser), and many of the anti-spyware/virus applications have them built in as well. Please remember that many of the freeware toolbars send information back to the developer, so carefully check their license agreements to be sure you not only understand, but are ok with, the information they are sending.

Firewall:

First you may ask, exactly what is a "Firewall"? A firewall is either a piece of hardware, or software that is designed to allow approved network traffic on to your network or into your computer. There are varying ways in which a firewall does this. The first and cheapest is the NAT / PAT type of "firewalls". While they do not offer a true firewall, they do offer a good deal of basic protection. Next you have the newer, and sometimes more expensive Stateful Packet Inspection (SPI) firewalls. While a SPI firewall is more preferred, if it is not done correctly it can cause major problems for the home user. To those with more money, and the need there are more advanced firewalls (such as Proxy Firewalls) that can get really deep into the OSI layer and offer greater levels of protection. however for most home users these devices are much more expensive than they can afford and more complicated then they will ever need.

Both the hardware and software firewalls have their advantages and disadvantages, so let's take a brief look what those are.

« Back :: 1 :: 2 :: 3 :: 4 :: 5 :: 6 :: 7 :: Next »
Recent Content
» Content Index

Advertisement

Recent Discussions
» Forum Index

Bruin Tracks
» Ship Car Bonita Springs Florida
» Mostly Useless Free Image Host
» eBay - Shop Victoriously!
» New and Interesting Finds on Amazon
» Bigbruin.com on Facebook
» Bigbruin.com Content RSS Feed
» Other Links
Contact Us :: On Facebook :: On Youtube :: Newsletter :: RSS Feed :: Links :: Sponsors :: Privacy Policy
Copyright © 2000 - 2023 Bigbruin.com - All rights reserved