Digital Threats Unmasked Gaining a Solid Understanding of Viruses, Spyware and Spam So That YOU Will Not Fall Victim to It!
Total Page:16
File Type:pdf, Size:1020Kb
Digital Threats Unmasked Gaining a solid understanding of viruses, spyware and spam so that YOU will not fall victim to it! By David Risley Founder/Publisher, PC Mechanic, www.pcmech.com With contribution by: Adam Deutschmann Copyright 2007 PC Media, Inc. All Rights Reserved. www.pcmech.com Page 2 Table of Contents Introduction..................................................................................................5 Computer Viruses.........................................................................................7 What is a computer virus?.......................................................................7 Who Programs Computer Viruses? .........................................................9 Types of Viruses ....................................................................................16 Virus Examples .....................................................................................19 How To Tell If You're Infected..............................................................22 Virus Prevention....................................................................................25 Virus Removal.......................................................................................29 A Word on Hoaxes ................................................................................31 Additional Resources ............................................................................32 Spyware......................................................................................................34 Types of Spyware..................................................................................37 Adware .............................................................................................38 Browser Helper Objects ...................................................................38 Browser Hijackers ............................................................................39 Computer Barnacles .........................................................................40 Dialers...............................................................................................41 Keyloggers........................................................................................41 Malware............................................................................................42 Spyware ............................................................................................43 Trojans ..............................................................................................44 Worms...............................................................................................45 Other Terms To Know ......................................................................46 Effects & Telltale Symptoms of Spyware .............................................49 What Kinds of Tactics Are Used? .........................................................51 ActiveX.............................................................................................51 Fake Removal Tools .........................................................................53 Misleading or Enticing Advertisements ...........................................53 Phishing ............................................................................................56 Downloads........................................................................................60 Prevention Techniques ..........................................................................62 Administrator Accounts....................................................................62 ActiveX Security and Safety ............................................................63 www.pcmech.com Block Adservers & Spyware Servers ...............................................64 Browsing & Downloading Habits ....................................................65 Email Safety .....................................................................................65 Hidden File Extensions.....................................................................67 IE AutoComplete Security Risk .......................................................67 IE Search Toolbars............................................................................68 Install a Firewall...............................................................................69 JVM Security....................................................................................71 Software Updates & Patches ............................................................71 Use an Alternative Browser..............................................................72 Windows Processes ..........................................................................73 Scanning Tools ......................................................................................73 Problem Specific Tools .........................................................................76 The Spyware Removal Process.............................................................77 The Last Word.......................................................................................81 Email SPAM ..............................................................................................83 Why SPAM? .........................................................................................85 Understanding SPAM............................................................................92 Identifying SPAM .................................................................................98 Hidden URLs....................................................................................99 Javascript in Message Bodies.........................................................101 Random Characters ........................................................................101 Email Addresses in Links ...............................................................102 Personalization ...............................................................................102 Dirty HTML ...................................................................................102 Use of Affiliate Sites ......................................................................103 How Did You Get Spam In the First Place?........................................103 Spam Damaging Your Computer?.......................................................105 Spam Laws ..........................................................................................108 How To Stop Spam..............................................................................109 Use a Junk Email Account..............................................................110 Spell Out Your Address ..................................................................110 Contact Forms ................................................................................111 Email Images..................................................................................111 Using Javascript to Hide Emails.....................................................111 But, I Already Get Spam!....................................................................111 Don't Buy Anything........................................................................111 www.pcmech.com Page 4 Don't Ever Reply ............................................................................112 Keep Your Cool ..............................................................................113 Don't Open It ..................................................................................113 Report Spam ...................................................................................113 Read Website Privacy Policies .......................................................113 Check the "Do Not Mail" boxes.....................................................113 Secure Your Email Client ...............................................................114 Spam Filters ........................................................................................114 How Filters Work ...........................................................................115 Reporting SPAM .................................................................................119 Detective Work....................................................................................121 And That is Spam................................................................................127 Handing Your PC to Hackers in 9 Steps ..................................................130 Appendix..................................................................................................135 Sample HOSTS File for Blocking Spyware Sources..........................135 www.pcmech.com Introduction The days of a computer being a self-contained little world are over. Today, an internet connection is almost a necessity. More and more of our computer activity is going online. Whether it be surfing the internet, using web-based service, chatting with friends or connecting up in social networks, there is so much going on online today that being forced to use a computer with no internet connection can make you feel like you just ported back to the dark ages. With that pipeline to the internet comes a lot of freedoms. Freedoms to speak to others. Freedoms to share you work. Freedoms to chat, email, watch videos, you name it. But, over that pipeline, other things can travel as well. Things you don't necessarily want on your computer. It is a turf war. You are trying to defend your turf – your computer. Others are trying to stake a claim and take use of your computing