ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Protect Your Computer From viruses and Online Scams

Updated on January 17, 2014

Evil raises its ugly head!

When this beast shows its self on your computer it will take over everything to the point were the only option is to deal with it though...TIME TRAVEL!
When this beast shows its self on your computer it will take over everything to the point were the only option is to deal with it though...TIME TRAVEL!

Time Traval Saves The Day

When it comes to computers, I have not had a good year, with one problem after another.The latest catastrophe was a very nasty malware that slipped past my security system by camouflaging itself inside of a download. It pretended to be a security program that tries to get its victims to cough up a credit card Number. The “program” takes over the computer to the point that you can not turn off your computer without taking out the battery.

I finally defeated the little demon by rebooting in safe mode and then going back to a time before the problem even happened. This method is a simple way to remove any type of spyware or other annoying program.

This problem all started when I let a friend who is not very computer savvy check his email and next thing I know is, he was going download crazy! I log back on and was greeted by a abomination pretending to be security program! The name of the Beast? Total PC Defender 2010. I knew that it was some kind of scam program so I did not take the bait. However it cost me a lot of downtime. This rogue security application is spread with the help of sneaky Trojans.

When I at long last I was able to regain control of my machine, I went to Google to find out more about this cyber thorn in my side. All together Google found 1,250,000 sites that had information on dealing with this particular scam. I read forms with the laments of many victims, some who succumbed to the scam and submitted their credit card numbers!

In my search, I did find some very useful websites that will take you step by step though the same methods I used. They also offer free software that they say will supply a remedy. I guess I have gotten paranoid from my experience, for I am little hesitant to download anything. Here is the point I want to make about all the ways presented to deal with this is not necessary to buy more software to resolve the situation. One site I found useful is one called Bleeping This site has software called “Spyware Doctor” that they claim will resolve most malware problems.

The word “malware”is actually short for malicious software. Another term for programs like Total PC Defender 2010, is scareware for it is meant to scare the victim in devolving there credit card number. Malware is a catch all term that could include any type of malicious software, including spyware, worms Trojan Horses and any other software created to do harm or control a computer.

This whole computer virus nightmare started somewhat innocently as an experiment and/or computer nerd pranks. Then came the age of broadband Internet and our brave new world became even more sinister! Now a lot of Black market software is being designed to allow profit in one form or another. cyber-crime is bigger than ever.

Tthe reality of our times

Here a Scam there a Scam...Everywere a Scam!

I am now on mission to not only help those who are dealing with this particular menace, but to hunt down what other electronic scams are controlling the masses. I already knew there was a lot of scams out there, for every time I peek inside my spam folder I find that I have won millions of dollars in some far off country! However, what I discovered was somewhat alarming, for the problem is much greater than I even anticipated.

These high-tech criminals have become very sophisticated and ruthless and use any means necessary to either rip off, harm or control as many computers as they can. In fact Social Networking sites like Twitter, MySpace and Facebook are major targets of hackers, phishers and other cyberage outlaws. Here is just one example of a MySpace scam: A phishing scam is targeting the popular social networking site, MySpace. Scam artists are accessing account and posting status updates that invite people to make some cash.

If a person clicks on this status update, then he or she will be asked to re-enter their account information. As a result, the cyber criminal will use this information to log in to another person's account to post the same status update. This is why it is important that when you log-in to a social networking site, make sure to type the site's URL.

Another scam has target Being's search engine and it has been reported that 90% of those pharmacy adds will take the person who clicks on the add to phishing site to obtain credit card numbers.These scams goes on and on and to find out more, you can visit slam the Online They have frequent up dates on the latest online scams.

On to the next scary issue and that is, something know as Click Jacking. The following video will give a demonstration that will explain things clearer. The basics of the scam is gain control or manipulate the users mouse to serve the hacker.

It is now is the age of the "invisible scam!"

"walk this Way"...Be on the lookout for the computer Zombies!

Watch in horror as the users of FaceBook and MySpace blindly go were their computers lead them!
Watch in horror as the users of FaceBook and MySpace blindly go were their computers lead them!

Beware of Computer Zombies!

Has your computer been running slower than normal? It may be that it is in the clutches of hacker performing digital Voodoo on your beloved PC! They can use it for what ever they desire, be it spreading spam...attacking government agencies or overrunning sites like FaceBook! Far fetched you say? Not according to the New York Times article written as far back as June 23, 2005. I quote from that article:

“Experts say hundreds of thousands of computers each week are being added to the ranks of zombies, infected with software that makes them susceptible to remote deployment for a variety of illicit purposes, from overwhelming a Web site with traffic - a so-called denial-of-service attack - to cracking complicated security codes. In most instances, the user of a zombie computer is never aware that it has been commandeered.”

The BBC News reports as recently as May 6th 2009 that this problem as increased 50% since 2008. The article also states that the U.SA leads the way with as much as18% percent of the effected computers.

So what can be done to combat these technical nightmares? A lot of simple practical things like..

  • Scan your computer often: Be diligent and do what you can to detect anything that may become a problem. Make sure your computer is fully protected by updated security programs.

  • Do not leave your computer on all the time: This is just what the “bad guys” want, a machine left on and unattended to do their bidding!

  • Be careful of were you click: If you run across adds that promise outrageous giveaways or whatever, avoid them like the plague! The old rule is so true...if it sounds to good to be true it probably is!

  • Be careful of what you down load: Scan when every you can!

  • Never give out credit card numbers to sites you are not certain about: For my self, I never use a credit card on the Internet. If I need to have a credit card to buy something on the Internet-I look for another way to obtain it. I refuse to use credit cards on line.

This is just a few examples of what scams are out there and what can be done about them. This is, as they say, is just the tip of iceberg...


    0 of 8192 characters used
    Post Comment
    • urmilashukla23 profile image


      6 years ago from Rancho Cucamonga,CA, USA

      Super great advise. Thanks for sharing it. Voted up!

    • Highvoltagewriter profile imageAUTHOR

      William Benner 

      7 years ago from Savannah GA.

      Thank you hotletravel for taking the time to stop in I am happy that I could help!

    • hoteltravel profile image


      7 years ago from Thailand

      I find technological advances too much to comprehend, though I try my best to keep up with the latest. I have the best anti-virus installed in my system, still face problems periodically. Thanks for the tips and link.

    • Highvoltagewriter profile imageAUTHOR

      William Benner 

      7 years ago from Savannah GA.

      You are welcome rahman, and I thank you for stopping by!

    • rahman1912 profile image


      7 years ago from Bangladesh


    • MMMoney profile image


      8 years ago from Where U Can Make More Money

      thnaks for nice advice good hub

    • Lita C. Malicdem profile image

      Lita C. Malicdem 

      8 years ago from Philippines

      This is great information! I'll bookmark this for reference because of its good intention to help. I'm relying on my scan when it pops out to test security and I haven't encountered harm yet to my knowledge. Thank you for this warning tips!

    • profile image


      8 years ago

      The magnitude of the harm is greater for computer novice like me!! Great info and thanks for sharing so much!!

    • Highvoltagewriter profile imageAUTHOR

      William Benner 

      8 years ago from Savannah GA.

      So good of you to drop by, I always enjoy your insites...

    • magnoliazz profile image


      8 years ago from Wisconsin

      Great advice!

      Its a shame...the world we live in is full of rather nasty people.

    • Highvoltagewriter profile imageAUTHOR

      William Benner 

      8 years ago from Savannah GA.

      Hay Lynda, thanks for stopping by! Yea run that Norton every day, besides there typical scans they do. It is good to do a deep scan every couple of weeks. Take care of those great Tomato plants for me!

    • lmmartin profile image


      8 years ago from Alberta and Florida

      Excellent advice and I will take all this into consideration. I feel a sudden urge to run a Norton scan and make sure all is fine. What a scary thought! Thanks for this info. Lynda

    • Highvoltagewriter profile imageAUTHOR

      William Benner 

      8 years ago from Savannah GA.

      Hay kariem2, so nice for you to drop by! I am glad I could help!

    • katiem2 profile image


      8 years ago from I'm outta here

      Great advice thanks for the heads up with avoiding maleware and other viruses on my computer. Thanks and Peace :)

    • Highvoltagewriter profile imageAUTHOR

      William Benner 

      8 years ago from Savannah GA.

      Thank you so much "Quill" for commits and thanks for stopping by! It is always good to hear from you my brother! This reminds me that I need to catch up on some of my reading and drop by your hubs!

    • profile image


      8 years ago

      Great advice as they are oit there and pose as anything and speak all the right language to attract the unsuspecting...stay alert...great hub



    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)