Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

How Malicious Software Attacks Your PC

By Shally Subscribe to RSS | December 1st 2011 | Views:
loading
 
  



If you have the best antivirus and spyware removal tools running on your computer, yet your computer is infected. How is that possible? To answer this question, we will be discussing some of the common ways black hat coders get their code on a computer.

Drive-By Download Sites

If you install all available software patches and update your security software regularly, you are less likely to fall prey to malicious software attacks. One of the main problems is drive-by download sites. Drive-by download sites are sites that host malicious software. These sites are always looking for vulnerabilities in browsers and add-ons.

The way drive-by download sites work is simple. When you visit a rogue site, a script is installed on your computer. The script then creates buffers, which pave the way for malware to install on your computer. You don't have to click on a link or download anything to get your computer infected. The minute you visit the web site, a script gets downloaded on your computer.

Rogue Software

The majority of attacks these days need the user's permission. Users have to give administrative approval for an application to run the first time. The second time you run the program, the application creates backdoors that allow it to install malicious software on your computer , but this time, without your permission. What are we talking about here? We are talking about software you downloaded, it was scanned for viruses and it came out clean. This software opened a back door for another malicious program to be installed on your computer and wreak havoc.

Phishing

Information can be stolen from your computer when you click on a link in an email from someone you don't know. Because you clicked that link, you have given approval for malware to download behind the scenes to your computer. Phishing sites are hosted on free servers scattered around the world, especially in Asia.

Rogue Security Software

Rogue Security software continues to be a problem. Rogue security software shows unusual alerts just to force the users to subscribe to the full version of their dubious software to remove the false threats. It is hard to suspect anything as the criminals behind it do everything within their power to make them look legit.

If you subscribe, they take your money and then discover backdoors on your computer. Through this backdoor, they can come and go as they please. If you are lucky, they may only be interested in advertising information. If you are unlucky, they may be looking for your bank information, your personal identity, and login details for websites.

It is not enough to just enable a firewall on your computer and by having the right security software. You need to make conscious efforts being selective of the software you download. You also need to avoid lesser-known security software, as any of them could be scareware.

Shally - About Author:

Welcome to share my tips, guide, tutorial articles about how to make your compute run more quickly . http://www.acebyte.com,http://www.acebyte.com/acebyte-utilities-functions.html
http://www.acebyte.com/privacy-protect.html

Hope more and more readers like my articles and my articles can help you.

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:
http://www.articleside.com/software-articles/how-malicious-software-attacks-your-pc.htm

Related Software Articles Subscribe to RSS

Advantages of Offshore software development
Published by Roger Lopez on January 17th 2012 | Software
This article mentions advantages and disadvantages of offshore software development.

...
 
Importance of a software development company in website building
Published by Jon on December 20th 2011 | Software
Whenever you go to expand your business over the web, your website would be the best recommended way...
 
Understanding what caching is within software development as well as exactly what is available together with it
Published by Waltersloan on May 25th 2012 | Software
What is considered to be crucial in newer software development program is usually concurrency. Concu...
 
Why you need to use Recruitment software
Published by Maria Warne on June 17th 2012 | Software
Recruitment software has completely revolutionized the way HR department operates in any business. T...
 
Best wav converter software free download
Published by Andrew Caleb on May 10th 2012 | Software
How to convert music files to wav with advanced mp3 converter software, Wav converter saving the sou...
 
Benefits of using scrap recycling software
Published by Angel on February 9th 2012 | Software
A recycler who wants to take his scrap business to greater heights ought to implement scrap recyclin...
 
All software Keys
Published by Seoonlineshopp on February 2nd 2012 | Computer
This is my blog if you want better know me you have to read out this full blog. Here you can find th...
 
Get the best marine software
Published by Ruchi Roy on November 29th 2011 | Software
In order to get the best marine software, there are a few things that should be kept in mind. First ...
 
All you need to know about the top antivirus software for Windows 7
Published by Alexs on June 27th 2012 | Software
Computer systems running on the Windows 7 operating system requires only the best antivirus protecti...
 
Why make use of recruiting software?
Published by Rogger on November 29th 2011 | Software
In this competitive world, organizations look to streamline their business processes with the aid of...
 
Points to consider before implementing scrap metal software
Published by Angel on May 11th 2012 | Software
The enthusiast who wants to take his scrap metal business to greater heights ought to implement the ...
 
Recruitment software making base for recruitment agencies
Published by Maria Warne on July 24th 2012 | Software
Recruitment software comes in a number of packages with various designs. When trying to upgrade or i...
 
Port locker – a Data leakage prevention software
Published by Vivekraj on February 20th 2012 | Software
Data Leakage Prevention or DLP Software is one that prevents leakage of data stored in the system. I...
 
There are numerous solutions that a software development company can furnish to various forms of business in recent times
Published by Williemcintosh on June 29th 2012 | Software
Some of the solutions which outsourced businesses can provide. Various of these solutions incorporat...
 
Selection of software that recovers the lost video
Published by Wonderseo on January 18th 2012 | Software

Sometimes it happened that videos are lost suddenly by its user. You may lose your videos some t...
 
Email marketing is an important aspect of your online strategies and getting bulk email software can ease your way in to success
Published by Jack on May 29th 2012 | Computer
Nowadays, internet consumers recognize the power and relevance of online marketing. Businesses are n...
 
Utilizing Complimentary Federation Support Computer software for Extending Verification Solutions with AD FS
Published by Leila on May 21st 2012 | Computer
Organizations have identified out the most efficient and successful way obtainable for them to exten...
 
How does an antivirus software work?
Published by Alexs on February 24th 2012 | Software
An antivirus software is a computer program that is used to scan files that will locate and remove c...
 
Recruitment software needs an upgradation
Published by Maria Warne on April 29th 2012 | Software
Recruitment tracking software is well complemented by an up to date applicant tracking system, helpi...
 
Things to consider before buying antivirus software?
Published by Alexs on July 4th 2012 | Software
Attacks by malicious software programs such as viruses, worms, Trojans and spyware can be incessant ...