Logic Bomb
What are Trolls?
Hackers
Cookies
Phishing
Spyware
Zombie Computers
Problem with MS-Word
Trojan Horse
EFencing
Cyberbullying
What's a Firewall?
Otherware?



Anti-Virus & Security

 

Underestimate at your peril!

For example, experts estimate that the Mydoom worm infected approximately a quarter of a million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected. That's pretty impressive when you consider that many viruses are incredibly simple.

Information extracted from howstuffworks


How Computer Viruses Work


more info 
Computer viruses tend to grab our attention because they remind us how vulnerable our information and technology can be -- a properly-engineered virus can wreak havoc on a global scale.


How do viruses and worms spread in e-mail?

How do viruses and worms spread in e-mail?
more info 
From Trojan horses, to worms and viruses, we give you the skinny on how viruses can infect your system through email.


How does a logic bomb work?

How does a logic bomb work?
more info 
Logic bombs can cripple a company's computer system and either reveal or destroy sensitive information. It's often a tool used by angry employees


How Trolls Work

How Trolls Work
more info 
Sometimes it seems like no matter what Internet community you join, someone's trying to drive you crazy. Are they just annoying, or are they doing it on purpose?


Someone started controlling my computer over the Internet -- what happened?

Someone started controlling my computer over the Internet -- what happened?
more info 
Both BO and Netbus are Windows 95/98 applications designed to allow other people to access your machine over the Internet. But here's the kicker - you're the one installing it!


How Hackers Work

How Hackers Work
more info 
Without hackers, we'd have no PCs or iPods. Yet, hackers have gotten a bad reputation as criminals of the computer age. What exactly are hackers, and are they friends or foes?


How Internet Cookies Work

How Internet Cookies Work
 more info 
Cookies are widely used by Web sites to keep track of their visitors, but they can also provide a better user experience. Are cookies letting Big Brother into your PC?


How Phishing Works

How Phishing Works
more info 
Most people associate phishing with e-mail messages imitating banks or other businesses in an attempt to scam victims into revealing personal information. But e-mail messages are only one small piece of a phishing scam.


How Spyware Works

more info    According to recent estimates, more than two-thirds of all PCs are infected with some kind of spyware. These programs track your Web habits and more. Is your computer doomed, or can you get rid of spyware?


How Zombie Computers Work

How Zombie Computers Work
more info 
According to recent estimates, more than two-thirds of all PCs are infected with some kind of spyware. These programs track your Web habits and more. Is your computer doomed, or can you get rid of spyware?


What's the problem with Microsoft Word?

What's the problem with Microsoft Word?
more info 
How did hackers exploit four different "zero day" flaws in Microsoft Word? Find out what went wrong with Microsoft Word.


How Trojan Horses Work

How Trojan Horses Work
more info 
We all get spam e-mail messages that tell us to follow a link. But that link could download a Trojan horse. What are they and how are they different from viruses?


How eFencing Works

How eFencing Works
more info 
You can get some great deals on online auction sites. But do you know where the items originally came from? You might be buying from an eFence.


How Firewalls Work

How Firewalls Work
more info 
Firewalls have helped protect computers in large companies for years. Now they're a critical component of home networks as well. What are they protecting you from?


Is cyberbullying getting out of control?

Is cyberbullying getting out of control?
more info 
With the evolution of the Internet, the big kid in class who used to steal your lunch money has evolved into a new kind of bully -- one who hacks your e-mail, sends you threatening messages and sabotages your computer.
Other "Ware"
 
  • Malware - a general term for any program that makes changes (does malicious or "bad" things) without your express permission
  • Adware - programs designed specifically to deliver unrequested advertising
  • Stealware - specific spyware designed to capture clicks or Web-site referral credits
  • Browser hijacker - a malicious program that becomes deeply embedded in your browser's code and core functionality
     
  •  
    Removal - We can do that!

    Even for an expert, removing a virus from a computer can be a daunting task and some viruses and other unwanted software (including spyware) are even designed to reinstall themselves after they have been detected and removed. Fortunately, by updating your computer and using free, trial-period, or low-cost antivirus tools, you can help permanently remove (and prevent) unwanted software. Contact us for support with this

    Having said that, sometimes it can take many hours to remove a virus and repair the damage caused which can be very costly - at tazam.net, we have a simple rule which is: if you can't cure it within an hour then re-install. This may sound harsh but it's very frustrating to reach this decision after wasting a lot of valuable time trying to cure a problem on a pc particularly when it's running slow as a result of the virus. Contact us for support with this
     

    Prevention - better than cure!

    Anti-virus software is essential now days and at tazam.net we firmly believe that it shouldn't be compromised by using 2nd grade solutions. (saving 30 could cost you hundreds! - it's a no-brainer). For data security, we only recommend market leading products and during the last 10 years we've formed our opinions by using all of the top products. At tazam.net we only charge for support and don't profit from the sale of anti-virus software BUT we do recommend the PANDA range. If you click on Buy it now, you will be re-directed to the Panda site but if you experience any problems then please contact us. 

    Panda Global Protection 2009

    Enjoy total security and ensure information integrity.
    Collective Intelligence for Maximum Protection - Minimum Impact
    Benefits:
    • Panda Antimalware - stops viruses, Trojans, spyware etc.
    • Panda Firewall
    • Panda Identity Protect
    • Panda Personal Information Filter
    • Panda Internet Control
    • Premium Backup - secure your important files and access them from anywhere
    • Panda PC Optimization
    • Instant Download
    • Protects up to 3 PC's!


    Panda Internet Security 2009

    Maximum protection against all kinds of Internet threats.
    Collective Intelligence for Maximum Protection - Minimum Impact
    Panda Internet Security 2009 Benefits:
    • Panda Antimalware - stops viruses, Trojans, spyware etc.
    • Panda Firewall
    • Panda Identity Protect
    • Panda Personal Information Filter
    • Panda Internet Control
    • Panda Backup and restore
    • Instant Download
    • Protects up to 3 PC's!

     

    Panda Antivirus Pro 2009

    Install it and forget about viruses, spyware and hackers
    Collective Intelligence for Maximum Protection - Minimum Impact
    Panda Antivirus Pro 2009 Benefits:
    • Panda Antimalware - stops viruses, Trojans, spyware etc.
    • Panda Firewall
    • Panda Identity Protect
    • Instant Download
    • Protects up to 3 PC's!

     

    Keep Virus Protection Software Up-to-date

    New viruses are written everyday. It seems that there are many people in the world who have a lot of time on their hands and a slightly warped idea of how to use their intelligence. Luckily, companies like McAfee, Symantec, and Panda Software are constantly scouting for new viruses and updating their antivirus software tools. They use any of a growing arsenal of weapons to detect and fight viruses.

    In order to take advantage of these new antivirus shields, you must update your antivirus program on a regular basis. The company that manufactured your antivirus software will provide constant updates as they find new viruses. You should make arrangements to get these updates regularly to be sure that your computer is completely protected. Go to the Web site of your antivirus manufacturer to download new virus updates, or definitions as they are often called. Some newer antivirus programs automatically update your antivirus protection as well as the antivirus definitions when you log onto the Internet through a process called live update or online virus scan.

    When you purchase a virus protection program, be sure to check out the company's update program. Some manufacturers give you free updates; others do not. If you already own a virus protection program but have never updated it, see the documentation that came with your program or contact the company that created your program to check on their update policy. If your program did not come with free updates or if you have already used up your free updates, you can purchase additional updates, usually for a nominal fee.

    To keep you protected as much as possible, we recommend purchasing antivirus software that updates automatically. If you update your virus protection manually, a weekly update is mandatory; a daily update may be a good idea in today's virus-infested atmosphere.
     

    Firewalls

    If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall used.

    If you have a fast Internet connection into your home, you may have found yourself hearing about firewalls for your home network as well. It turns out that a small home network has many of the same security issues that a large corporate network does. You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.

    Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.

    If you take our advice and use any of the Panda anti-virus products then you will benefit from the 'software' firewall BUT for the ultimate firewall, we recommend a good hardware firewall such as the Netgear Prosafe range.

        info@tazam.net home    web design    domains, hosting & email    service, support & maintenance   about    contact