Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

How Malicious Software Attacks Your PC

By Shally Subscribe to RSS | December 1st 2011 | Views:
loading
 
  



If you have the best antivirus and spyware removal tools running on your computer, yet your computer is infected. How is that possible? To answer this question, we will be discussing some of the common ways black hat coders get their code on a computer.

Drive-By Download Sites

If you install all available software patches and update your security software regularly, you are less likely to fall prey to malicious software attacks. One of the main problems is drive-by download sites. Drive-by download sites are sites that host malicious software. These sites are always looking for vulnerabilities in browsers and add-ons.

The way drive-by download sites work is simple. When you visit a rogue site, a script is installed on your computer. The script then creates buffers, which pave the way for malware to install on your computer. You don't have to click on a link or download anything to get your computer infected. The minute you visit the web site, a script gets downloaded on your computer.

Rogue Software

The majority of attacks these days need the user's permission. Users have to give administrative approval for an application to run the first time. The second time you run the program, the application creates backdoors that allow it to install malicious software on your computer , but this time, without your permission. What are we talking about here? We are talking about software you downloaded, it was scanned for viruses and it came out clean. This software opened a back door for another malicious program to be installed on your computer and wreak havoc.

Phishing

Information can be stolen from your computer when you click on a link in an email from someone you don't know. Because you clicked that link, you have given approval for malware to download behind the scenes to your computer. Phishing sites are hosted on free servers scattered around the world, especially in Asia.

Rogue Security Software

Rogue Security software continues to be a problem. Rogue security software shows unusual alerts just to force the users to subscribe to the full version of their dubious software to remove the false threats. It is hard to suspect anything as the criminals behind it do everything within their power to make them look legit.

If you subscribe, they take your money and then discover backdoors on your computer. Through this backdoor, they can come and go as they please. If you are lucky, they may only be interested in advertising information. If you are unlucky, they may be looking for your bank information, your personal identity, and login details for websites.

It is not enough to just enable a firewall on your computer and by having the right security software. You need to make conscious efforts being selective of the software you download. You also need to avoid lesser-known security software, as any of them could be scareware.

Shally - About Author:

Welcome to share my tips, guide, tutorial articles about how to make your compute run more quickly . http://www.acebyte.com,http://www.acebyte.com/acebyte-utilities-functions.html
http://www.acebyte.com/privacy-protect.html

Hope more and more readers like my articles and my articles can help you.

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:
http://www.articleside.com/software-articles/how-malicious-software-attacks-your-pc.htm

Related Software Articles Subscribe to RSS

Custom software services are best offered in Scottsdale
Published by Liza Andy on January 24th 2012 | Software
In case, we are selling mass products under the banner of mass marketing, thus, there are no doubts ...
 
Emerging businesses need recruitment software
Published by Maria Warne on June 15th 2012 | Software
To smaller businesses, buying recruitment software may seem a bit of luxury but in fact it is a dedi...
 
Protecting your PCs with the filtering software
Published by Erikhornung on May 3rd 2012 | Software
The world we are living in today has no survival without internet. This is the exact reason why it i...
 
The Advantages of Looking for Free software
Published by Saima Triphor on January 2nd 2012 | Software
Downloading free software to our system, according to the requirement does help us at times. Diagnos...
 
Why your company needs inventory management software?
Published by Martin Tuner on December 8th 2011 | Software
Inventory management is an inherent element of a company that produces goods to meet the expectation...
 
Why having SaaS software a better choice for your business
Published by Coles Gold on February 2nd 2012 | Software
You can still find a number of businesses still going with the same old story as they are not aware ...
 
Wedding software for Mac a solution to all the hassles
Published by Ashish Pandey on January 12th 2012 | Software
Wedding software for Mac can be a very essential tool for those who wish to organize a perfect weddi...
 
In 2012, US IT managers are looking to replace their offshore software development providers by nearshore ones.
Published by Yeleny Lopez on January 24th 2012 | Software
We have built customized tools for automating software development phases, maximizing the power leve...
 
An open source software testing- Selenium automated testing
Published by Roger Lopez on February 24th 2012 | Software
In this article, there is a brief description on selenium automated testing. In addition to this var...
 
3 Things to consider before implementing recycling software
Published by Angel on June 1st 2012 | Software
The enthusiastic recycler who wants to enhance business procedures and improve his recycling busines...
 
What does the ideal applicant tracking software allow you to do?
Published by Martin Tuner on January 4th 2012 | Software
Organizations have started to make good use of applicant tracking software to identify and pick the ...
 
Why make use of recruiting software?
Published by Rogger on November 29th 2011 | Software
In this competitive world, organizations look to streamline their business processes with the aid of...
 
All about the real estate software
Published by Ivon Lerdorf on February 7th 2012 | Software
Real estate deals are time taking and should be done meticulously. Due to advancement of technology ...
 
Why you need to use Recruitment software
Published by Maria Warne on June 17th 2012 | Software
Recruitment software has completely revolutionized the way HR department operates in any business. T...
 
Library software and library management software
Published by Julia Roger on March 23rd 2012 | Computer
Library software and library management software is an excellent way to categories all of your libra...
 
How scrap software brings extra value to a recycler
Published by Angel on February 17th 2012 | Software
The recycler involved in the scrap business has to record important details of transactions, which g...
 
Penny auction software
Published by Remmy Sterio on February 11th 2012 | Software
Penny auction software is a fully-featured, powerful and scalable auction script that helps create o...
 
Port locker – a Data leakage prevention software
Published by Vivekraj on February 20th 2012 | Software
Data Leakage Prevention or DLP Software is one that prevents leakage of data stored in the system. I...
 
Learning School employs administration software
Published by Brandon Munson on December 30th 2011 | Software
The school registration software is easy to use, responsive and flexible. The school and district of...
 
Protect your computer with reliable effective antivirus software
Published by Alexs on February 15th 2012 | Software
Computer security is essential for the prevention and detection of any unauthorized use of your comp...