Showing posts with label antivirus. Show all posts
Showing posts with label antivirus. Show all posts

Annoying Spyware And Its Elimination


Nowadays, you might have noticed of a threatening word "Spyware". Spyware software is becoming annoyance for the companies. Spyware is likely to be verified as a great damager to the companies. It is not so noticeable like spam and virus assaults to the systems. Spyware could be destructive and cause financial losses.

Spyware is almost an invisible software programs that collects and transmits personal or company's important data through the Internet without being noticed. The transferred data could be used for smashing up your company's credit or might hard hit its profits. Spyware is also commonly acknowledged as Adware, Malware, Sneakware and Snoopware.

Entry point of Spyware: It could enter your network by auto-download software that automatically downloaded to your network, even without user's acknowledgement. It could also enter with software, which is downloaded by user that includes Spyware program. Most common entry of this software is pop-ups, which appears while opening any site. The pop-ups are very attractively designed to allure user to click it.

The Spyware software is not even blocked by firewall programs, as user itself allows it, of-course, due to unawareness. Similarly, the usual antivirus programs are also unable not block it, due to they don't seem as wicked as viruses.

Safeguard against Spyware: User should completely read and understand the license agreement before downloading any software. Avoid downloading unknown and fallacious software from the internet. Keep away from clicking pop-up that put forward mouthwatering offers.

The constant use of anti-Spyware software: Often use of anti Spyware could prevent entering such harmful programs to your network. The best precautious step is that, a user could apply to block Spyware access via gateway security solutions like the NetApp Internet access and security (IAS) solution, which stops admittance to Web sites offering Spyware.

There are several anti-spyware programs available out there. These programs search and eliminate Spyware and adware. They can detect and sweep off huge number of adware files and modules.

Firewall and Anti-Virus adequate


There are absolute essentials such as Firewall, Anti-Spyware, Anti-Virus that a PC or server requires against Internet threats such as Hacking, Viruses and so on. From my observation, most corporate PCs or servers had installed Anti-Virus and firewall only. That's it. What other areas that are equally essential ?

I will not cover the essential of firewalls. These are a must or else anybody can sail through the network. It is like a house with the front door wide open with a sign, rob me !

Assumed Firewall, Anti-Virus installed..... What about folders and files ? Are you sure those sensitive files are not able to be accessed by all of your office staff but only trusted Sr. Managers or yourself. Say a technical savy personnel happen to have some knowledge of hacking, high possibility that your most valuable data in your server may be compromised.

Further, the vendor that installed the server and application, does he/she has the admin password ? What services are installed in the server ? Intruders may exploit the services vulnerabilities to gain access into the server.

It is difficult to to know where or who is the Intruder. Are they the intruders from the Internet only ? These are attackers that need to break into your firewall and IPS (Intrusion Prevention System) before getting their hands on the servers. There are those that can break into even the most advance security systems. Fortunately, the numbers are not many. However if they are your personnel, temporary staff, vendors, contracts, dispatch personnel. This will be easier as it is an insider job. Someone that have knowledge of your application, server or network. You will never know.

Windows Hacking Checkout this video on how a basic penetration is done using Windows. http://www.youtube.com/watch?v=sSHIVCkqrlw There are many more ways of doing this for those with Linux/Unix machines