How Early Viruses Spread from Computer to Computer

In the mid-to-late 1980s, data was most often transferred from computer to computer by using floppy disks and so-called bulletin board systems (BBSs), managed online locations that were the forerunners of today’s Web sites. Stowing away on floppy disks Even without using the Internet, people in offices where PCs were used traded and circulated programs, … Read more

The Origins of Antivirus Tools

In 1991, Symantec released the first version of Norton AntiVirus. Norton was a popular brand name among computer technophiles from the well-known and successful Norton Utilities program. Programs like Norton AntiVirus are designed to find and eliminate viruses from a computer, usually with three goals in mind: Make the virus stop doing harm to the … Read more

The People Who Write Viruses

Sometimes I think that it helps to understand a little bit more about the people who perpetrate crimes, in order to be able to avoid being a victim of those crimes. Others of you may just have a morbid curiosity about those who like to hurt other people. Either way, you’ll learn a little more … Read more

How Early Viruses Spread from Computer to Computer

In the mid-to-late 1980s, data was most often transferred from computer to computer by using floppy disks and so-called bulletin board systems (BBSs), managed online locations that were the forerunners of today’s Web sites. Stowing away on floppy disks Even without using the Internet, people in offices where PCs were used traded and circulated programs, … Read more

Using Public Computers

Public libraries, Internet cafes, and other customer-serving establishments have their own computers that customers may use to access the Internet. Are these computers safe for you to use? Tales abound of public-access computers infected with viruses, spyware, and even key loggers, many deliberately planted there in order to elicit information from unsuspecting users. I recall … Read more

Blocking Spyware

Spyware is a wide-reaching term that describes software used to monitor your Internet usage patterns, as well as software that can attempt to change your Internet browser configuration, or even record keystrokes (Virginia, the hackers want your bank account and other online passwords). Most spyware is not malicious in the same way that viruses are, … Read more

Avoiding Spam

Spam is the common name used to describe junk e-mail, or unsolicited commercial e-mail (UCE). Spam is, at the same time, big business for those who create and distribute it and a growing nuisance for its recipients. By being careful how and where you share your e-mail address, you can help to keep your e-mail … Read more

Adding Parental Internet Blockers

These blockers prevent persons from visiting (deliberately or otherwise) Web sites containing particular content, such as violence, hatred, casino gaming, and Barry Manilow. (Kidding there. I think.) The main purpose of these products is to protect children from accidentally or deliberately viewing content intended only for adults. They also prevent you from accidentally bumping into … Read more

Keeping Alternate E-Mail Accounts

It’s more or less inevitable: Over a period of time, many organ-izations are going to collect your e-mail address. And, sooner or later, after signing up for something and providing your e-mail address to this Web site or that Web site, your e-mail address is going to leak to or be purchased by a mass … Read more