Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

How Malicious Software Attacks Your PC

By Shally Subscribe to RSS | December 1st 2011 | Views:
loading
 
  



If you have the best antivirus and spyware removal tools running on your computer, yet your computer is infected. How is that possible? To answer this question, we will be discussing some of the common ways black hat coders get their code on a computer.

Drive-By Download Sites

If you install all available software patches and update your security software regularly, you are less likely to fall prey to malicious software attacks. One of the main problems is drive-by download sites. Drive-by download sites are sites that host malicious software. These sites are always looking for vulnerabilities in browsers and add-ons.

The way drive-by download sites work is simple. When you visit a rogue site, a script is installed on your computer. The script then creates buffers, which pave the way for malware to install on your computer. You don't have to click on a link or download anything to get your computer infected. The minute you visit the web site, a script gets downloaded on your computer.

Rogue Software

The majority of attacks these days need the user's permission. Users have to give administrative approval for an application to run the first time. The second time you run the program, the application creates backdoors that allow it to install malicious software on your computer , but this time, without your permission. What are we talking about here? We are talking about software you downloaded, it was scanned for viruses and it came out clean. This software opened a back door for another malicious program to be installed on your computer and wreak havoc.

Phishing

Information can be stolen from your computer when you click on a link in an email from someone you don't know. Because you clicked that link, you have given approval for malware to download behind the scenes to your computer. Phishing sites are hosted on free servers scattered around the world, especially in Asia.

Rogue Security Software

Rogue Security software continues to be a problem. Rogue security software shows unusual alerts just to force the users to subscribe to the full version of their dubious software to remove the false threats. It is hard to suspect anything as the criminals behind it do everything within their power to make them look legit.

If you subscribe, they take your money and then discover backdoors on your computer. Through this backdoor, they can come and go as they please. If you are lucky, they may only be interested in advertising information. If you are unlucky, they may be looking for your bank information, your personal identity, and login details for websites.

It is not enough to just enable a firewall on your computer and by having the right security software. You need to make conscious efforts being selective of the software you download. You also need to avoid lesser-known security software, as any of them could be scareware.

Shally - About Author:

Welcome to share my tips, guide, tutorial articles about how to make your compute run more quickly . http://www.acebyte.com,http://www.acebyte.com/acebyte-utilities-functions.html
http://www.acebyte.com/privacy-protect.html

Hope more and more readers like my articles and my articles can help you.

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:
http://www.articleside.com/software-articles/how-malicious-software-attacks-your-pc.htm

Related Software Articles Subscribe to RSS

To select the finest warehouse software then just choose Vision Software
Published by James Blee on August 24th 2012 | Software
Here at Vision Software Solutions we have provided both blue chip and SME’s with warehouse softwar...
 
Banking software companies and their Vision and Mission
Published by Angel on May 7th 2012 | Software
Financial institutions seek the services of banking software companies to introduce novel mobile ban...
 
Protecting your PCs with the filtering software
Published by Erikhornung on May 3rd 2012 | Software
The world we are living in today has no survival without internet. This is the exact reason why it i...
 
Amazon promises software update for Kindle Fire problems
Published by Ritika Sharma on December 14th 2011 | Software
Amazon.com Inc. has said that it would soon be coming out with a software update for the Kindle as a...
 
Why should you invest in divorce software?
Published by Ivon Lerdorf on February 7th 2012 | Software
Marriages are made in heaven but the ritual is performed on Earth and has to be forwarded with legal...
 
Why your company needs inventory management software?
Published by Martin Tuner on December 8th 2011 | Software
Inventory management is an inherent element of a company that produces goods to meet the expectation...
 
Resource Planning software makes efficient forecasting of resources
Published by David Hog on August 16th 2012 | Software
A business engages in various activities like planning of resource, scheduling of activities, coordi...
 
Approaches that lead to the failure of CRM software
Published by Antony Wilmer on January 2nd 2012 | Software
Communication is one of the major keys to success of customer relationship management. Lack of a com...
 
Infosys Technologies delivers broad range of software outsourcing services in India
Published by Williemcintosh on July 7th 2012 | Software
The span of software outsourcing services features custom software development, technology and also ...
 
Why you need to use Recruitment software
Published by Maria Warne on June 17th 2012 | Software
Recruitment software has completely revolutionized the way HR department operates in any business. T...
 
Features that make Small business accounting software user-friendly
Published by Antony Wilmer on December 5th 2011 | Software
Scalability and customization of the small business accounting software package should be studied be...
 
Pre-packaged solutions from banking software companies – Prime success factors
Published by Angel on July 31st 2012 | Software
Financial institutions have started using pre-packaged products introduced by banking software compa...
 
Benefits of employee timesheet and payroll software
Published by Merlinraj on August 22nd 2012 | Computer
Time Attendance Systems-Attendance Tracking System-Employee Timeclock-Labor Time Tracker gives you t...
 
To select the finest warehouse software then just choose Vision Software
Published by James Blee on August 24th 2012 | Software
Here at Vision Software Solutions we have provided both blue chip and SME’s with warehouse softwar...
 
Fix registry errors with the registry cleaner software
Published by Hennary Joe on December 29th 2011 | Software
Windows registry is the central database of windows system which keeps all the configuration setting...
 
Project management software Software – a Perfect Mixture of Bug Tracking and Issue Management
Published by Maria Getchell on January 10th 2012 | Software
A good project management software is one that not only helps you in tracking and managing your proj...
 
Benefits of online Sales tracking and leads management software
Published by Elizabeth Cooper on March 19th 2012 | Software
The lead management software is part of the complete sales force automation process that helps in tr...
 
Stamp of industry recognized banking software solutions
Published by Angel on July 13th 2012 | Software
Financial institutions take all efforts to introduce novel mobile banking solutions built by reputed...
 
Uses of the internet monitoring software
Published by Erikhornung on February 1st 2012 | Software
Companies have to keep track of the activities of their employees, in order, to see their work perfo...
 
Adopting the use of Internet monitoring software
Published by Erikhornung on December 29th 2011 | Software
Internet monitoring software helps companies to keep a check on their employees, whether they are ma...