Search
Recommended Sites
Related Links






Valid XHTML 1.0 Transitional

Valid CSS!
   

Informative Articles

Why More Women Should Consider a Career in Computer Programming
Everyone knows that computer programming is a heavily male-dominated field. I think this is unfortunate. Over the years, I've come to conclude that there is a great deal that women can contribute to this field. Why is computer programming...

More Computer Consulting 101 Hiring Tips (Part 2 of 2)
Does your company need to retain the services of a competent computer consulting firm, but you have no idea how to really evaluate "competence"? In the first part of this two-part series on Computer Consulting 101 hiring tips, we looked at why...

5 Ways To Make Night-And-Weekend-Computer-Life Rich
Are you a computer-worm? Do you thrive on a computer 24/7? A "computer-worm" is analogous to "book-worm" – a person who spends most of the time working on a computer. Do you expend most of your time reading or writing emails, chatting with...

10 CD Burning Tips For the Computer-Savvy
There is more to burning CDs than just burning them. The following article shows you how to ensure your CD burning success. 1) The #1 thing you never want to do is put a CD-R or CD-RW in direct sunlight. Unlike CD-ROMs, CD-Rs and CD-RWs are...

6 Tips That Could Save You a Bundle on Computer Support
Business owners learn how to save on computer support With computer users totalling in the millions worldwide, the computer support industry has clearly become a cash cow for many support companies. Yet, were it not for the unreliability of...

 
Free Computer Security Software - A Leaking Seal!

There is nothing wrong with taking less than adequate measures to prevent a bigger damage to anything you treasure if you have financial or other constraints, as long as this is done temporarily over a short time. Similar reasoning applies when it comes to computer security threats.

Unfortunately some (if not most) computer users tend to forget this. They search on the internet for free computer security software which they dump into their computers and hope for the best. Most of the free software developers consistently forget to inform the downloaders of the inadequacies of their software - and they are many and significant!

A simple search for free anti-spyware programs on any search engine yields significant results. If we exclude genuine beta-software from these results, almost all of these anti-spyware programs operate on the principle - "Get infected first, then call us". In other words these programs are reactive. They scan and destroy spyware as it's found in the user's computer. The real downside of these programs is that they offer no real-time protection. Are you surprised? Maybe you've forgotten that "there's no such thing a free lunch"!

The big computer security software developers spend millions of dollars every year developing products that can quickly detect and destroy new computer security threats like spyware, adware, viruses, hacking techniques, Trojans, worms keyloggers etc

Do you think the developers of free computer security software inject millions of dollars in order to bring users of their software regular software updates? I think not!

Computer security software is such a critical purchase that I think one should actually buy the software before bringing home a new PC!

The most critical software that you should have in you PC is:

1. Firewall - To protect your PC from hackers and internal malware that maybe trying to "phone home".

2. Spyware/Adware - To detect the "ETs" that are "phoning home" from your PC, endangering your sensitive information such as passwords, credit card numbers and other sensitive information. These programs also use lots of your critical computer resources. That's why your computer is slow and crashing lately!

3. Anti-virus Software - These can either completely wipe out your critical data or render it or your computer useless. The most dangerous thing is that you may end up (unaware!) being a source of the virus (e.g. through email or infected website pages).

Here are common-sense measures you can take to protect your PC:

1. E-mail - Avoid replying to chain letters. Also be very careful of image attachment. Hackers attach malicious JavaScript program on these.

2. Regularly update your anti-virus definitions by running the update function of your security software.

3. Before buying a computer security software or package make sure that it offers regular updates to keep up with new viruses, adware, spyware and other computer security threats.

I want to repeat what I said at the beginning of this article: There is nothing wrong in taking temporary security measures as far as your computer security is concerned (i.e. using free software/downloads). What is wrong is forgetting that the measure was supposed to be over a temporary period in the first place.

Copyright: 1st Analyst Information Services 2006, All rights reserved.

Website owners can use this article on their websites and ezines, as long as no part of this article is changed/amended.



About the author:

Msingathi ("Msi") Mnyengeza

Msingathi is the owner of the Computer Security Resources Website. The website is targeted at the computer user who wants the best computer security software to protect against spyware, adware, viruses and to improve computer performance using registry cleaners. Visit Msi's websites at http://www.computer-security-resources.com and at http://www.computer-security-resources.biz


Sign up for PayPal and start accepting credit card payments instantly.