ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Protect Your Computer From viruses and Online Scams

Updated on January 17, 2014

Evil raises its ugly head!

When this beast shows its self on your computer it will take over everything to the point were the only option is to deal with it though...TIME TRAVEL!
When this beast shows its self on your computer it will take over everything to the point were the only option is to deal with it though...TIME TRAVEL!

Time Traval Saves The Day

When it comes to computers, I have not had a good year, with one problem after another.The latest catastrophe was a very nasty malware that slipped past my security system by camouflaging itself inside of a download. It pretended to be a security program that tries to get its victims to cough up a credit card Number. The “program” takes over the computer to the point that you can not turn off your computer without taking out the battery.

I finally defeated the little demon by rebooting in safe mode and then going back to a time before the problem even happened. This method is a simple way to remove any type of spyware or other annoying program.

This problem all started when I let a friend who is not very computer savvy check his email and next thing I know is, he was going download crazy! I log back on and was greeted by a abomination pretending to be security program! The name of the Beast? Total PC Defender 2010. I knew that it was some kind of scam program so I did not take the bait. However it cost me a lot of downtime. This rogue security application is spread with the help of sneaky Trojans.

When I at long last I was able to regain control of my machine, I went to Google to find out more about this cyber thorn in my side. All together Google found 1,250,000 sites that had information on dealing with this particular scam. I read forms with the laments of many victims, some who succumbed to the scam and submitted their credit card numbers!

In my search, I did find some very useful websites that will take you step by step though the same methods I used. They also offer free software that they say will supply a remedy. I guess I have gotten paranoid from my experience, for I am little hesitant to download anything. Here is the point I want to make about all the ways presented to deal with this problem...it is not necessary to buy more software to resolve the situation. One site I found useful is one called Bleeping Computer.com This site has software called “Spyware Doctor” that they claim will resolve most malware problems.

The word “malware”is actually short for malicious software. Another term for programs like Total PC Defender 2010, is scareware for it is meant to scare the victim in devolving there credit card number. Malware is a catch all term that could include any type of malicious software, including spyware, worms Trojan Horses and any other software created to do harm or control a computer.

This whole computer virus nightmare started somewhat innocently as an experiment and/or computer nerd pranks. Then came the age of broadband Internet and our brave new world became even more sinister! Now a lot of Black market software is being designed to allow profit in one form or another. cyber-crime is bigger than ever.


Tthe reality of our times

Here a Scam there a Scam...Everywere a Scam!

I am now on mission to not only help those who are dealing with this particular menace, but to hunt down what other electronic scams are controlling the masses. I already knew there was a lot of scams out there, for every time I peek inside my spam folder I find that I have won millions of dollars in some far off country! However, what I discovered was somewhat alarming, for the problem is much greater than I even anticipated.

These high-tech criminals have become very sophisticated and ruthless and use any means necessary to either rip off, harm or control as many computers as they can. In fact Social Networking sites like Twitter, MySpace and Facebook are major targets of hackers, phishers and other cyberage outlaws. Here is just one example of a MySpace scam: A phishing scam is targeting the popular social networking site, MySpace. Scam artists are accessing account and posting status updates that invite people to make some cash.

If a person clicks on this status update, then he or she will be asked to re-enter their account information. As a result, the cyber criminal will use this information to log in to another person's account to post the same status update. This is why it is important that when you log-in to a social networking site, make sure to type the site's URL.

Another scam has target Being's search engine and it has been reported that 90% of those pharmacy adds will take the person who clicks on the add to phishing site to obtain credit card numbers.These scams goes on and on and to find out more, you can visit slam the Online Scam.com. They have frequent up dates on the latest online scams.

On to the next scary issue and that is, something know as Click Jacking. The following video will give a demonstration that will explain things clearer. The basics of the scam is gain control or manipulate the users mouse to serve the hacker.


It is now is the age of the "invisible scam!"

"walk this Way"...Be on the lookout for the computer Zombies!

Watch in horror as the users of FaceBook and MySpace blindly go were their computers lead them!
Watch in horror as the users of FaceBook and MySpace blindly go were their computers lead them!

Beware of Computer Zombies!

Has your computer been running slower than normal? It may be that it is in the clutches of hacker performing digital Voodoo on your beloved PC! They can use it for what ever they desire, be it spreading spam...attacking government agencies or overrunning sites like FaceBook! Far fetched you say? Not according to the New York Times article written as far back as June 23, 2005. I quote from that article:

“Experts say hundreds of thousands of computers each week are being added to the ranks of zombies, infected with software that makes them susceptible to remote deployment for a variety of illicit purposes, from overwhelming a Web site with traffic - a so-called denial-of-service attack - to cracking complicated security codes. In most instances, the user of a zombie computer is never aware that it has been commandeered.”

The BBC News reports as recently as May 6th 2009 that this problem as increased 50% since 2008. The article also states that the U.SA leads the way with as much as18% percent of the effected computers.

So what can be done to combat these technical nightmares? A lot of simple practical things like..

  • Scan your computer often: Be diligent and do what you can to detect anything that may become a problem. Make sure your computer is fully protected by updated security programs.

  • Do not leave your computer on all the time: This is just what the “bad guys” want, a machine left on and unattended to do their bidding!

  • Be careful of were you click: If you run across adds that promise outrageous giveaways or whatever, avoid them like the plague! The old rule is so true...if it sounds to good to be true it probably is!

  • Be careful of what you down load: Scan when every you can!

  • Never give out credit card numbers to sites you are not certain about: For my self, I never use a credit card on the Internet. If I need to have a credit card to buy something on the Internet-I look for another way to obtain it. I refuse to use credit cards on line.

This is just a few examples of what scams are out there and what can be done about them. This is, as they say, is just the tip of iceberg...

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)