Sunday, March 1, 2009

War - from the comfort of our computer tables

Taking extra steps for what seems to be simple processes never feels good, no matter how necessary those steps are. (So says the true blue lazy bug.)

Regardless of the reasons for our computer usage, ultimately we want to use it to get somewhere, from Point A to Point B. Point B could be...a website, a successful transaction, a download, etc. It's so simple and fast to go straight from A to B, just like what the purple man did down there. *looks down*

...except he seems to be in a pretty bad shape at the end of it. (My condolences. *observes a minute of silence*)

And then we notice the little blue man, who took a much longer time to get where he is. En route he stopped to equip himself with an armor, sword, shield, bow and arrow, and I presume he utilized them effectively on the way. He also took pains to avoid the waiting monsters and navigate himself slowly but surely to point B, ending up well and alive and all the stronger for his efforts. *applause*

How tiring to do that you say... Well...it's YOUR privacy, money, identity, safety and data you're putting on the line. Your choice. *shrugs*

Let's start with simpler options...simply avoiding some of these dangers especially susceptible to youngsters.

When faced with the alternative of buying really expensive software, many of us might be tempted to simply download it from the Internet for free. But how safe are these illegal software copies (known as warez in Internet subculture)? These warez are offered on numerous warez-focused websites on the Internet. Don't be surprised to discover any amount of spyware on your computer after a visit to or a download from such sites.

After downloading such illegal software, serial numbers or keys are needed to crack the installation files. Some websites provide these keys, or sometimes key generators are used for the purpose. Unknown to most of us, key generators can install keyloggers on your computers, designed to record every keystroke you type, and subsequently send your passwords and personal information to third parties. *gasps*

The Internet is like a huge database where real time need not exist. This is best reflected in the uploading and downloading of videos. There really isn't much need for tv viewers to be glued to their television sets following television programs and dramas and such (and enduring all the advertisements and be confined to say an episode a day) these days. Much video content can be found on the Internet, to be watched on streaming sites, or even be downloaded to your computer for viewing at your own leisurely pace.

If you often download audio or video content from the web, you'll be pretty familiar with the usage of codecs. Codecs are "like a set of instructions your computer can use to allow you to watch and hear content". Video and audio programs usually kindly inform you when you are lacking specific codecs to play certain files, and internet search engines efficiently direct you to codec packs claiming to contain the codec you need. The downside is...you have no idea what else comes in the bundle. Trojans and adware can easily be hiding among the package, ready to be unzipped and unleashed on an unsuspecting you. *ouch*

A note to all the guys out there, websites containing pornographic material may tell you to download a plug-in codec to watch online videos. (Not that I would know...I read about it here!) Anyway, BEWARE! These codecs might be false, they'll simply open your computer's system up to harmful software. Okay let's be fair, these fake video codec sites, although often centered on pornography, could just as easily be found on any other type of website. So girls...beware too... *sounds ominous*

There are so many things to take note of and avoid... Pop-ups, rogue software, drive-by downloads, email attachments containing hidden surprises, etc. We definitely need that armor, sword, shield, and whatever other weapons are out there to protect ourselves from these dangers.

If you haven't already, go load up on those anti-spyware and anti-virus software. Don't just click on any pop-up claiming to have found viruses on your computer and asking if you want a free scan, those are most likely rogue software, waiting to wreck havoc once you click 'ok'. Make the effort, go hunt around a little for trusted providers. For UB students, the ubit website is there for a purpose, utilize it!

So you've already installed the software, you're suited up and brandishing those swords and shields, well, make sure your software is up to date. (i.e. upgrade those swords and shields to guns and rifles if that's what takes down the new forms of viruses)

Don't let this happen to you.


Make sure THIS is what happens.


And lastly, ignorance is NOT always bliss. Keep yourself updated on the viruses and trojans and worms lurking around out there. Prevention is better than cure.

To everyone out there fighting this war with cyber-ill-doers, all the best!

Resources: http://stopbadware.org/home/trends2007

No comments:

Post a Comment