Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

How Malicious Software Attacks Your PC

By Shally Subscribe to RSS | December 1st 2011 | Views:
loading
 
  



If you have the best antivirus and spyware removal tools running on your computer, yet your computer is infected. How is that possible? To answer this question, we will be discussing some of the common ways black hat coders get their code on a computer.

Drive-By Download Sites

If you install all available software patches and update your security software regularly, you are less likely to fall prey to malicious software attacks. One of the main problems is drive-by download sites. Drive-by download sites are sites that host malicious software. These sites are always looking for vulnerabilities in browsers and add-ons.

The way drive-by download sites work is simple. When you visit a rogue site, a script is installed on your computer. The script then creates buffers, which pave the way for malware to install on your computer. You don't have to click on a link or download anything to get your computer infected. The minute you visit the web site, a script gets downloaded on your computer.

Rogue Software

The majority of attacks these days need the user's permission. Users have to give administrative approval for an application to run the first time. The second time you run the program, the application creates backdoors that allow it to install malicious software on your computer , but this time, without your permission. What are we talking about here? We are talking about software you downloaded, it was scanned for viruses and it came out clean. This software opened a back door for another malicious program to be installed on your computer and wreak havoc.

Phishing

Information can be stolen from your computer when you click on a link in an email from someone you don't know. Because you clicked that link, you have given approval for malware to download behind the scenes to your computer. Phishing sites are hosted on free servers scattered around the world, especially in Asia.

Rogue Security Software

Rogue Security software continues to be a problem. Rogue security software shows unusual alerts just to force the users to subscribe to the full version of their dubious software to remove the false threats. It is hard to suspect anything as the criminals behind it do everything within their power to make them look legit.

If you subscribe, they take your money and then discover backdoors on your computer. Through this backdoor, they can come and go as they please. If you are lucky, they may only be interested in advertising information. If you are unlucky, they may be looking for your bank information, your personal identity, and login details for websites.

It is not enough to just enable a firewall on your computer and by having the right security software. You need to make conscious efforts being selective of the software you download. You also need to avoid lesser-known security software, as any of them could be scareware.

Shally - About Author:

Welcome to share my tips, guide, tutorial articles about how to make your compute run more quickly . http://www.acebyte.com,http://www.acebyte.com/acebyte-utilities-functions.html
http://www.acebyte.com/privacy-protect.html

Hope more and more readers like my articles and my articles can help you.

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:
http://www.articleside.com/software-articles/how-malicious-software-attacks-your-pc.htm

Related Software Articles Subscribe to RSS

Web based remote access software: Helping you to achieve a relaxed work lifestyle
Published by James on February 8th 2012 | Software
An entrepreneur can detach himself or herself from the standard eight to four workplace environment ...
 
Time sheets software for proper records and functionalities
Published by Ashish Pandey on April 8th 2012 | Software
The time sheets software can be of a great help to the employer as well as the employees. It can hel...
 
How scrap software brings extra value to a recycler
Published by Angel on February 17th 2012 | Software
The recycler involved in the scrap business has to record important details of transactions, which g...
 
FAQs about the effectiveness of Recycling software
Published by Angel on May 9th 2012 | Software
The recycling unit that wants to register profitable results can find an able ally in the form of ro...
 
All about the legal billing software
Published by Ivon Lerdorf on February 8th 2012 | Software
Billing is a very important & is a tedious activity for a lawyer. Introducing the legal billing soft...
 
Why should you choose ERP software for your organisation?
Published by Antony Wilmer on December 23rd 2011 | Software
Customization, integration capacity and brand are three major fields of concern while Enterprise res...
 
Factors of Offshore software product development
Published by Calsoft Inc on April 4th 2012 | Software
Today every IT organization are looking for offshore software development, today in Offshore IT comp...
 
Protect your system with the filtering software
Published by Erikhornung on February 1st 2012 | Software
The use of internet has become a lot, these days and almost, people belonging to all age groups use ...
 
Why should you invest in divorce software?
Published by Ivon Lerdorf on February 7th 2012 | Software
Marriages are made in heaven but the ritual is performed on Earth and has to be forwarded with legal...
 
Advantages of Offshore software development
Published by Roger Lopez on January 17th 2012 | Software
This article mentions advantages and disadvantages of offshore software development.

...
 
Offshore software Development is the New Normal!
Published by Elan Technologies on December 2nd 2011 | Software
Offshore software development primarily referred to cheap labor and involved maintenance work predom...
 
Ease your recruitment task with recruitment software
Published by Maria Warne on April 9th 2012 | Software
With the recruitment software the whole recruitment process can be made quite easy and quick. This w...
 
Get the best marine software
Published by Ruchi Roy on November 29th 2011 | Software
In order to get the best marine software, there are a few things that should be kept in mind. First ...
 
Role of web extraction software in data acquisition
Published by Newprosoft on December 6th 2011 | Computer
Data contained on the internet is virtually limitless and this has necessitated the development of s...
 
3 Things to consider before implementing recycling software
Published by Angel on June 1st 2012 | Software
The enthusiastic recycler who wants to enhance business procedures and improve his recycling busines...
 
In 2012, US IT managers are looking to replace their offshore software development providers by nearshore ones.
Published by Yeleny Lopez on January 24th 2012 | Software
We have built customized tools for automating software development phases, maximizing the power leve...
 
Why use scrap recycling software
Published by Angel on March 2nd 2012 | Software
Recyclers have realized the potential of scrap recycling software, which is built to simplify busine...
 
All software Keys
Published by Seoonlineshopp on February 2nd 2012 | Computer
This is my blog if you want better know me you have to read out this full blog. Here you can find th...
 
Library software at its best from 247lib.com
Published by James Blee on July 25th 2012 | Computer
There is also a web based supervisor which means that help is always available making this library s...
 
Become DJ for an evening with karaoke software
Published by Sherman Barber on May 17th 2012 | Software
Today's jukebox machines are state-of-the-art. They include everything from video displays to karaok...