Category Archives: AntiVirus

Why Pay for your Anti-Virus Software?

There are many commercial anti-virus programs out there. Some are good and others are not so good.

Generally speaking the average user will chose the anti-virus package that comes pre-installed on their new PC with a ‘free’ but very short subscription. When the subscription ends the user pays for the full subscription without looking at the options. The PC manufacturers do this for a good reason: They get paid by the anti-virus software company to pre-install their software. A lot of these commercial anti-virus packages are overloaded with unnecessary bells and whistles and will slow your PC down substantially.

There are, however, good free alternatives to the commercial anti-virus packages. Some of the free packages do not have all of the protection you would get from a commercial one, for example Parental Controls, Email Protection and Web browser protection may not be included. This considered you need to make sure the free anti-virus covers you sufficiently. If you are a knowledgeable and cautious PC user these extras may not be required, but if you are the trusting sort with limited computer experience they may be essential. I’ve constructed a table of all the popular free anti-virus programs and what they protect you against.

The table below gives a summary of the features offered by the 4 most commonly used anti-virus programs. There are other products available but the ones included below are the products I would recommend. I have provided a brief explanation of each of the column headings under the table and if you click on the product name in the table it will take you to its download page.

 

 

Free Anti-Virus
Product

 

File System Protection

Website Protection

Rootkit Detection and Protection

Scans Emails

Instant Messaging Protection

Peer to Peer Protection

Spyware Protection

Boot-Time Scan


Avast!


Yes

Yes

Yes 1


Yes

Yes

Yes

Yes

Yes


AVG


Yes

Yes

No

No 2

No
3

No
4


Yes

Yes


Avira


Yes

No

No

No 2

No
3

No
4


Yes

No


Microsoft Security
Essentials
*


Yes

No

Yes

No 2

No
3

No
4

Yes

No

1 Has an additional application that comes with Avast! Called GMER. If you suspect you have a rootkit this program can be run to try to identify a Rootkit infection.

2 Does not scan emails as they come into your inbox but will be able to identify malware if as you open or save the infected attachment

3 No direct protection, although any file opened on the PC will be scanned so any malware from Instant Messaging file transfers will be detected when opened

4 No direct protection, although any completed Peer to Peer file download that is opened on the PC will be scanned so malware will be detected when opened

* Microsoft Security Essentials is not compatible with Windows 8

Filesystem Protection

Real-time protection against viruses and other malware threats. The anti-virus software Scans files as they run on your computer to detect malware and remove it. This is the most basic level of protection offered by anti-virus software.

Website Protection

Scans webpages when you open them for malicious scripts, and prevents them from infecting your computer, though they can still be used (for example, a clickable button.). This functionality may also flag known bad websites in the results page of Internet Search Engines such as Google. Rootkit Protection/Detection

Rootkit Protection/Detection

Rootkits are more difficult to detect and remove than normal viruses. This column confirms the product can detect them, although I have found that this protection is not to be relied upon. If your computer is doing odd things and your Anti-Virus software is not detecting anything I would recommend seeking professional help.

Scans Emails

Will scan incoming emails for Viruses. This applies to Email programs such as Microsoft Outlook, Outlook Express, Windows Mail and not Web based email such as Google Mail (although web based email often has its own anti-virus protection)

Instant Messaging Protection
Will scan files as they are transferred by Instant Messaging programs such as Microsoft Instant Messaging.

Peer to Peer Protection

Peer to Peer file sharing is a common source of Malware. The Anti-virus software will scan the files as they are being transferred and stop them if the file is infected

Spyware Protection

Will detect and remove spyware infections

Boot Time Scan

Capability of running a scan when Windows starts and before a virus or rootkit has had a chance to load its anti-detection or anti-removal countermeasures. If a virus is detected while you are in Windows that can only be removed with a boot time scan the anti-virus software will schedule a boot time scan automatically and ask you to reboot immediately.

Some advice to help you protect yourself on your PC

Some advice to help you protect yourself on your PC

In this article I will give you a few tips to help reduce the chances of you becoming a victim of the Internets dangers. I’ve been a victim of fraud once and if you follow these tips it should greatly reduce the chance of you joining me.

Personal Security

Identity theft is a big risk in this day an age. A simple definition of identity theft is somebody using your personal information to complete a transaction you have not authorised. For an indivivual to steal your identity they need very little information. You should make sure you are very careful with the following information:

Full Name:  Don’t use your full name unless needed. Abbreviate your name for example Alex instead of Alexander.

Date of Birth:  Don’t use your exact date of birth. Some websites will ask for this but it’s generally to verify your age so use the same year and change the month and day. It’s worth having a ficticious date of birth that you can remember as sometimes websites will ask for this information to allow you to log in when you have forgotten your password.

Bank Details:  The only two people who you should trust with you bank account number and sort code is you and your bank. I would reccomend that you use Paypal or a credit card  for any online transaction. Both of these will refund any money lost due to fraud (eventually). It’s a good idea to read the small print on the credit card contract to see how they deal with Internet fraud. Remember every time you use a card online you are giving details to a third party, and if they are compromised or unscrupulous you could compromise your credit card details. Don’t use your current account details on unrecognised sites as reclaiming money from any fraud can take some time and if your current account is emptied (as mine was once) it can cause embarresment at the supermarket!

Credit/debit card PIN Number: This is the number you have to type to withdraw money from a cashpoint. There’s only one person who should know it. YOU! If the bank proves you told a third party your PIN you will be liable for any fruadulent transactions on you card.

Any other personal Information: The first tip is not to give any more information than is required. When you submit personal information online some of it will not be mandatory. Typically mandatory information will have a symbol next to it. Only fill these ones in and don’t fill them in if you are not confident about the website. If I am unsure of a website will NEVER give them any information about me.

Passwords: This is an important one. Many people have their online accounts broken into because they use weak passwords. I will give you a few tips to help you make sure you don’t fall foul of this:

Don’t use the same password for all of your online logins. We all have problems remembering passwords but the best trick is to have three you use. One password for secure sites you trust like your bank, your supermarket and your paypal account. Another for you Email, Facebook, and Skype accounts and the last password for untrusted accounts on the Internet such as message forums for your personal hobbies. These 3 catagories of passwords allow you to separate the most critical accounts form the least. If one of your personal hobby accounts (with weaker security) has a security breach and your password is compromised then it will not have devastating consequences for you.

In each of these three passwords use UPPER and lower case, numbers and special characters such as !”£$%^&*(). The reason you should do this is that hackers will often use something called a ‘bot’. This is a program that will try to break into your account by rapidly bombarding your login trying random passwords. If you use characters outside the 27 letters of the alphabet you are decreasing the chance of one of these ‘bots’ from guessing your password on a massive level. I won’t go into the figures but a random selection of upper and lower case characters and special characters makes a password very difficult to discover even with a ‘bot’.

While we are on the subject of the passwords avoid using something that is easy to guess- Your surname, name, or any other word in the dictionary are not a good idea. If you have to use a word in the dictionary the substititue letters with numbers- For example use a zero instead of an ‘o’, a one instead of an ‘i’ or a three instead of an e. The number looks similar to the letter so it’s easy to remember and will work in your favour.

One last note on passwords: It’s worth being organised with them. If you are busy on the Internet you may sign up to a number of sites in the period of a month. Every time you do make a note of your login and password in a notebook . Resist the temptation to save the details on your copmuter unless you know how to encrypt file or you will be up shit creek without a paddle if somebody gets hold of it. You will need to record the website, username and password for each site you set up an account on and for gods sake don’t lose it! The benefit of this that if somebody manages to guess your password on any site (unlikely if you follow my guidelines above)  you will have a list to refer to that confirm all the other sites that use the same password and change them, making it much easier to prevent the damage from spreading. Look after this password book like you would your passport.

Emails:

Sender fraud: The best way for me to start this section is to say it’s shockingly easy to send an email and make it look like its from a freind of yours. Don’t assume an email from somebody you know is actually from them. Based on this be very cautious about opening  any attachment even if it is from a friend. Viruses can be sent in email attachments and this is the most common way of getting one. If your anti-virus software is capable of scanning emails then the chances are it will detect it, but if you are in doubt don’t open the attachment. If you read the email but leave the attachment alone it won’t infect your computer.

Email attachments: I covered this in the last paragraph but it’s worth expanding on the information. A lot of files can carry a ‘Trojan’ virus.  A simple explanation is a file that looks perfectly benign such as a word document, a spreadsheet or even a website link but contains a program that will make you wonder what was wrong with posting letters instead. If you are not expecting an attachment from a friend then don’t trust it. Even if you are expecting something it could still be infected with a virus without your friend being aware. The only way to protect yourself from this is to make sure your Anti-Virus software checks emails as you recieve them.


Phishing
: I will go into more details of this in another article, but this is the term given to any email ‘fishing’ for an inexperienced or trusting indvidual with the motive of getting them to part with their hard earned money. The simple rule on the Internet is not to trust anything that sounds too good to be true. If it’s a Nigerian company owner who wants to pay you for receiving millions of pounds in your bank account the only thing they are after is your bank details and if you trust them enough some money to initiate the transaction. Needless to say you will fill foul of this. It’s worth realising what Phishers are looking for. These days it’s personal information. Don’t break the personal information rules I explained earlier. There is only one person that needs to know your bank account, sort code and pin number: YOU!

Websites

This subject is a bit tricky. There are good websites and there are bad ones. If you trust none of them then you may as well give up with the Internet. You should be pretty confident that a recognised company has a safe website such as Sainsburys, Tescos, Waitrose, Paypal, Barclays etc, etc, but when you are on a site that does not have a high street presence then you need to be aware of the dangers. The main dangers are phishing and viruses. As discussed in the previous section phishing is an attempt to steal enough of your personal information to use your identity to make a purchase or transaction in your name. Some websites set themselves up to look like a legitimate one, for example to look like your bank. In this case when you enter your online banking details on the fake website it will record them allowing somebody to use them to log into your bank account and empty it. Other websites will ask you to install a program to allow you to access part of the site or play a movie. Some of these programs will be viruses so if you are in any doubt then close the window asking you to install this program and close your Internet window.

Purchasing online

There are dishonest traders on the Internet. If you make purchases on the Internet then you may fall foul of this. First you need to understand what the cons are. The dishonest website will have one or more of these objectives:

Steal your credit/debit card details- Instead of supplying goods they use the credit card information you typed in to make fraudulent purchases. The best way you can protect yourself is to make sure the credit card you use is protected against Internet Fraud. I’d even suggest having a credit card you use for Internet transactions and nothing else. Print all your Internet transactions and keep them in a file. If you start getting fraudulent transactions on your credit card and you’ve followed my advice you can provide the credit card company printed documentation of all transactions and more importantly if that credit card has only been used on the Internet then one of those transactions is very likely to be responsible for stealing your card details. I would advise you never use your current account debit card on the Internet. The chaos caused by a fraudster emptying you current account is just not worth the risk. Best of all set up a paypal account. PayPal is a global e-commerce business allowing payments and money transfers to be made through the Internet. Using Paypal prevents you having to give your credit card details to somebody you don’t trust and they will act as a middle-man in any transaction. If you don’t get the goods you purchased then Paypal will own the debt and repay your money.

Gather other personal information/Identity theft- When you make the purchase they will ask for a uneccesary personal information such as your date of birth. If they are asking for uneccesary information to make the purchase you should’nt trust them. Refer to the section about personal security above.

Have no intention of supplying the goods- You buy the goods, they take the money and run. Some Credit cards will cover you for this and so will Paypal. If they do this they will probably try to use your card details fraudulently. Inform your credit card immediately if this happens, and avoid purchasing anything from an untrusted seller that are suggesting delivery times of over two weeks. The longer you have to wait before reporting the fraud the more explaining you will have to do. Another point to consider is that it is common trick for frausters is give a long delivery time allowing them to remain in operation for longer before they are discovered and shut down.

Nickris Ltd. can help you by providing one to one coaching sessions in the comfort of your own home. We can help you feel more confident on the Internet and help identify potential risks. We will tailor coaching to your requirements in easy to understand language. You can find our contact detailshere.

Malware? Spyware? Rootkits? What does this all mean?

Malware? Spyware? Rootkits? What does this all mean?

For those of you who use your PC as a tool to read email, look at the Internet and write a few letters all the terminology that comes out of the computer industry can be confusing. I’ll try to explain what each of the common terms mean in understandable language.


Malware

A generic term given to any computer program with undesirable consequences. Viruses, Spyware and Rootkits are all Malware.


Virus

Most people know what these are. This term is given to a malicous program that infects a machine without the user being aware of it. It is capable of reproducing itself and infecting other computers. Viruses typically have a number of purposes:

Hijack

They may allow somebody to use your PC from another location for illegal activites by hijacking it. You will not realise they are doing it but may notice the Internet and PC are running slowly.

Malicous attack

These type of viruses are designed to make your PC unusable. They will do this by damaging important files needed for your computer to start up and operate. This type of virus is not so common as most are designed to give the virus author some financial benefit.

Malware can infect your PC in a number of ways. Some of the most common are:

Email attachments

The virus can be hidden in an email attachment. It could be a Word document, a spreadsheet a link to a website or a program. It’s worth considering that
some viruses use emails to infect other computers and can do this without the knowledge of the person who has the virus. Therefore you should treat all email attachments of these types with caution, even it is from a friend. Most anti-virus software has the capability of scanning emails when you use some of the common email programs such as Microsoft Outlook and Windows Mail.

Websites

Some websites can infect your PC with a virus. If a website asks you to install something on your PC be suspicious. Be careful what buttons you click on when you are on an unfamiliar website. Some anti-virus software and internet browsers will warn you if the site you attempting to go to is known to pass on viruses. Ignore any warnings your internet browser give you at your peril.

Worms

Viruses can infect your machine via your internet connection without you doing anything at all. They find your machine on the internet by scanning for machines
then launching an attack. If your PC gets hijacked (explained above) it may be used to infect other unsuspecting Internet users using a worm program. A good firewall will prevent most worms from getting on to your PC. If you have a broadband router (the box of tricks that connects you to the Internet) it will have a built in firewall that will also help. It’s also worth making sure your are up to date with your Windows updates. These are usually downloaded automatically and you will know when you have outstanding ones as it will ask you to install them when you shut down your PC. These updates can be correct problems with Windows that worms can take advantage of to get onto your PC.

Rootkits

A Rootkit is probably the worst type of Malware you can have infect your PC. It uses your computers admistrator access to dig itself deep into your computers software and hides iteslf. It will work in such a way that makes it very difficult for a conventional anti-virus program to detect it and even more difficult to remove. In a lot of cases the easiest way to remove a rootkit from your PC is to take your hard disk out and attach it to another PC. The other PC will not be infected with the rootkit and as none of the rootkits trickery is running so it can be identified and removed. In some cases removing the Rootkit using this method can damage Windows on the disk it was infecting, which will need to be re-installed or repaired. For the average user a Rootkit is something that needs to be looked at by a professional, or you could of course back up your emails, photos, documents etc and re-install Windows with the discs you got with your PC when you purchased it. Rootkits can infect your PCs in the same way viruses do. Many of them open a ‘backdoor’ to your computer. A backdoor on your PC allows somebody
with knowledge to gain access to your PC bypassing any security measures you have on your PC. This backdoor will be used to install more and more Malware onto your PC until it eventually becomes unuasable. Look at the next article Some simple advice to help you protect yourself on your PC and if you follow thes guidelines you will reduce the chances of getting one of these dramatically.

Spyware

Spyware is a type of malware installed on computers that collects information about users without their knowledge. Spyware is a type of malware  installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. While the term spyware suggests software that monitors a user’s computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in Internet browser settings, or changes to software settings.

Ransomware

Ransomware is a type of Malware that infects your PC and prevents you from using it. Often they will inform you that more hard disk is failing, you have viruses or there’s even one that tells you the police are on to you beacuse of pirated software or child pornography. In all of these cases they will prevent you from using your PC and ask you for money to remove allow you to continue. Needless to say you should not pay them. You will probably need to seek help to remove them as they use some of the same clever tricks that are used by Rootkits that make them difficult for Anti-virus software to remove them.

Adware

Adware is more of an annoyance than a problem. Adware is the term given to programs designed to advertise products and services to you on your PC using pop-up windows. Typically you’ll get Adware on your PC when you install free games or other software. The author of the software is getting their income from the Adware as each time somebody buys from one of these advertisments they will get commission. Many of these programs will tell you that they will include Adware
when you install them. Some even give you the opportunity install without the Adware. If Adware is unacceptable to you then be careful where you download free
software from. There are two software sharing websites I use that check all the products they offer are free of Adware and Viruses.www.download.com and www.tucows.com  .

If you are having any Malware problems Nickris Ltd. can visit you in your own home and help you clean up your PC. In some cases it may require the computer to be taken back to our workshop as the scanning processes needed to remove infections can take a long time to run. You can find our contact details here.