Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

How Malicious Software Attacks Your PC

By Shally Subscribe to RSS | December 1st 2011 | Views:
loading
 
  



If you have the best antivirus and spyware removal tools running on your computer, yet your computer is infected. How is that possible? To answer this question, we will be discussing some of the common ways black hat coders get their code on a computer.

Drive-By Download Sites

If you install all available software patches and update your security software regularly, you are less likely to fall prey to malicious software attacks. One of the main problems is drive-by download sites. Drive-by download sites are sites that host malicious software. These sites are always looking for vulnerabilities in browsers and add-ons.

The way drive-by download sites work is simple. When you visit a rogue site, a script is installed on your computer. The script then creates buffers, which pave the way for malware to install on your computer. You don't have to click on a link or download anything to get your computer infected. The minute you visit the web site, a script gets downloaded on your computer.

Rogue Software

The majority of attacks these days need the user's permission. Users have to give administrative approval for an application to run the first time. The second time you run the program, the application creates backdoors that allow it to install malicious software on your computer , but this time, without your permission. What are we talking about here? We are talking about software you downloaded, it was scanned for viruses and it came out clean. This software opened a back door for another malicious program to be installed on your computer and wreak havoc.

Phishing

Information can be stolen from your computer when you click on a link in an email from someone you don't know. Because you clicked that link, you have given approval for malware to download behind the scenes to your computer. Phishing sites are hosted on free servers scattered around the world, especially in Asia.

Rogue Security Software

Rogue Security software continues to be a problem. Rogue security software shows unusual alerts just to force the users to subscribe to the full version of their dubious software to remove the false threats. It is hard to suspect anything as the criminals behind it do everything within their power to make them look legit.

If you subscribe, they take your money and then discover backdoors on your computer. Through this backdoor, they can come and go as they please. If you are lucky, they may only be interested in advertising information. If you are unlucky, they may be looking for your bank information, your personal identity, and login details for websites.

It is not enough to just enable a firewall on your computer and by having the right security software. You need to make conscious efforts being selective of the software you download. You also need to avoid lesser-known security software, as any of them could be scareware.

Shally - About Author:

Welcome to share my tips, guide, tutorial articles about how to make your compute run more quickly . http://www.acebyte.com,http://www.acebyte.com/acebyte-utilities-functions.html
http://www.acebyte.com/privacy-protect.html

Hope more and more readers like my articles and my articles can help you.

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:
http://www.articleside.com/software-articles/how-malicious-software-attacks-your-pc.htm

Related Software Articles Subscribe to RSS

Leading company offering Custom software development services to its clients
Published by Coloprilreview on November 25th 2011 | Software
Unique Solutions of Advanced Technologies has exceptional skill and expertise to provide Custom soft...
 
Why make use of recruiting software?
Published by Rogger on November 29th 2011 | Software
In this competitive world, organizations look to streamline their business processes with the aid of...
 
Wedding software for Mac a solution to all the hassles
Published by Ashish Pandey on January 12th 2012 | Software
Wedding software for Mac can be a very essential tool for those who wish to organize a perfect weddi...
 
Advantages of Offshore software development
Published by Roger Lopez on January 17th 2012 | Software
This article mentions advantages and disadvantages of offshore software development.

...
 
Use software’s for improving your computer and internet speed
Published by Jahna Sebastian on January 11th 2012 | Software
In today’s highly competitive world, every individual need computer and internet for their work or...
 
Online booking software – stay ahead of the competition
Published by Julia Roger on December 16th 2011 | Computer
If you own a guest house, B&B or an independently run hotel then you might be realising that more an...
 
Role of web extraction software in data acquisition
Published by Newprosoft on December 6th 2011 | Computer
Data contained on the internet is virtually limitless and this has necessitated the development of s...
 
Selection of software that recovers the lost video
Published by Wonderseo on January 18th 2012 | Software

Sometimes it happened that videos are lost suddenly by its user. You may lose your videos some t...
 
An introduction to music writing software
Published by Angie Turner on June 16th 2012 | Software
If you are part of the current crop of young musicians and songwriters then chances are that you wil...
 
FAQs about the effectiveness of Recycling software
Published by Angel on May 9th 2012 | Software
The recycling unit that wants to register profitable results can find an able ally in the form of ro...
 
Pre-packaged solutions from banking software companies – Prime success factors
Published by Angel on July 31st 2012 | Software
Financial institutions have started using pre-packaged products introduced by banking software compa...
 
To select the finest warehouse software then just choose Vision Software
Published by James Blee on August 24th 2012 | Software
Here at Vision Software Solutions we have provided both blue chip and SME’s with warehouse softwar...
 
Is scrap metal software the perfect solution for recyclers?
Published by Angel on March 21st 2012 | Software
In an effort to automate his scrap metal business, a recycler implements scrap metal software to reg...
 
Understanding what caching is within software development as well as exactly what is available together with it
Published by Waltersloan on May 25th 2012 | Software
What is considered to be crucial in newer software development program is usually concurrency. Concu...
 
Use of recruitment software in HR works
Published by Maria Warne on July 5th 2012 | Software
Recruitment software simplifies the communication between the recruiters, HR manager and the applica...
 
Why should you invest in divorce software?
Published by Ivon Lerdorf on February 7th 2012 | Software
Marriages are made in heaven but the ritual is performed on Earth and has to be forwarded with legal...
 
Five strong pillars of RoHS software
Published by Angel on May 24th 2012 | Software
...
 
Just what software developer at present need to give consideration to in relation to software outsourcing?
Published by Josechaney on May 28th 2012 | Software
Each and every developer should give some thought to that in software outsourcing, it could imply ad...
 
Is it difficult for a recycling unit to find the best recycling software
Published by Angel on May 16th 2012 | Software
While a recycling unit wants to implement the best recycling software, it becomes difficult for the ...
 
Mlm software, Australian Binary, Level Binary Plan, Matrix plan, Uni-Level Plan, Growth Plan, Board Plan
Published by Sankalp on December 20th 2011 | Software
Sankalp providing mlm software solutions for network marketing business, direct selling marketing, b...