Flash Intro
Introduction to Cajun Computer Upgrades
Build a Custom Computer
Common Problems
Current Price List
NEWS
Did you know!
Contact Us
Policy
Please Visit One of Our Online Affiliate Stores
Cajun Computer Upgrades
You've Come To The Right Place
Did you know!

 

The things that are infecting
           your computer


A key-logger is just what it sounds like. It is a program that logs every keystroke you make and then sends that information, including things like passwords, bank account numbers, and credit card numbers, to whomever is spying on you. A Torgan horse may damage your system, and it may also install a "back-door" through which to send your personal information to another computer

How did I get this Malware?


Malware is an abbreviated term used to describe a "malicious software" program. Malware includes things like spyware or adware programs, such as tracking cookies, which are used to monitor your surfing habits. It also includes more sinister items, such as keyloggers, Trojan horses, worms, and viruses.

 
With the increasing number of websites coming online and the establishment of well known websites, it is becoming more difficult for Internet surfers to avoid malware. Although the best way to avoid getting malware in your PC is to curb your clicking habits, even the most security-minded surfers can still be fooled by some of the tactics that cybercriminals use to install malware in your PC.
 
The explosion of online commerce has opened up a whole new venue for cybercriminals. While it is utterly impossible to dodge all of the cybercriminal activity going on altogether, if you have some knowledge of what they do and how they do it, you stand a better chance of protecting your PC against malware infection.

                          
                               
Websites with Malware


 

A high percentage of malware comes from websites and pop-up advertisements and sometimes it is nearly impossible for an Internet surfer to tell whether or not they have arrived on a website that is hosting malware. The following information will give you some insight as to how malware criminals work.

                                                     Redirections


When a cybercriminal creates malware they design it and host it on a small group of websites or specified number of emails. They gradually add more websites so one redirect can transport the visitor to another website, and then another, where they finally meet up with the malware infected site.
Most of the time this is done in a seamless fashion and the only way to tell you are being redirected is that the page may download slowly or the URL in the browser window changes during transmission.

                                     Proxy Websites 


Malware criminals create what is called "proxy websites." These websites are used to hide the malware for a longer period of time before it is discovered by the website owner. The problem with proxy websites is they can be dressed up to look like anything from a lesser known site to a well known site such as MySpace.
Cybercriminals often create fictitious accounts on well known websites and then install links that direct the visitor to the malware
which is a site that is designed to look like the real thing.

                              Antivirus Software


Malware criminals who host malware on websites have also figured out a way to confuse antivirus software programs. They have packaged website malware differently so it can sneak by the antivirus program you have installed on your PC. Antivirus programs produce signatures that allow the program to recognize and block malware. If the malware is packaged differently by the cybercriminal it can easily slip by the antivirus program and into your PC.

If you think that your computer is infected and for some reason nothing is working properly, call Cajun Computer Upgrades, we can fix it.  But don't wait too long, some types of Malware can spread throught your computer, then the only way to fix it properly is to erase your hard drive and start over.  (that would be the worse case

                                  
   Common Virus


 
A virus or a worm replicates itself and may hijack your system. These types of malware may then be used to send out spam or to accomplish a variety of other unsavory activities, and you may not even know it. Viruses usually attach to other programs, while worms are self-contained. Both can cause severe damage by eating up essential system resources, which may lead to your computer freezing or crashing. Viruses and worms commonly use shared files and items like email address books to spread to other computers.
 
Any type of code or program that is used for monitoring and collecting your personal information or disrupting or damaging your computer, may be referred to as malware. In fact, malware can be any type of malicious code, even if it has not yet been identified as a worm, Trojan, etc. Good anti-virus programs can be configured to scan email for any type of malicious or suspicious code, and alert you to its presence, even if it is not currently recognized malware.
Anti-virus programs are good protection when kept up to date. However, they frequently miss certain types of malware, such as Trojans and spyware, so it is a good idea to run at least one anti-adware program in conjunction with anti-virus. Running two is even better. Utilizing a firewall is also helpful. While it won't keep malware out, it can keep such programs from accessing the internet and delivering your personal information to the intended target

One last thing, IF your computer starts acting wierd or slows down and your not sure if you have a virus or malware 

                                           Just ASK

                           504-289-1963