Introduction to Free Computer Tools



Similar documents
How To Understand What A Virus Is And How To Protect Yourself From A Virus

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Introduction to Computer Security Table of Contents

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

How to easily clean an infected computer (Malware Removal Guide)

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

A Crawler-based Study of Spyware in the Web. Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Basic Virus Removal Steps

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Contents. McAfee Internet Security 3

Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

What's the difference between spyware and a virus? What is Scareware?

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

ViRobot Desktop 5.5. User s Guide

How Spyware and Anti-Spyware Work

Spyware Doctor Enterprise Technical Data Sheet

Symantec Norton AntiVirus for Macintosh Download, Installation, and Basic Use Tutorial

Sophos Endpoint Security and Control Help

Basic Computer Maintenance

Securing small business. Firewalls Anti-virus Anti-spyware

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

Ad-Aware Antivirus Overview

Michelle Vonderhaar June 23, 2010

FOR MAC. Quick Start Guide. Click here to download the most recent version of this document

FortiClient dialup-client configurations

Charter Business Desktop Security Administrator's Guide

Home Use Installation Guide For Symantec Endpoint Protection (SEP) 11 For Mac

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Welcome back everyone from the Monmouth University Student Help Desk!

Additional details >>> HERE <<<

Frequently Asked Questions: Xplornet Internet Security Suite

NewNet 66 Network Security

Avira Secure Backup INSTALLATION GUIDE. HowTo

Sophos Endpoint Security and Control Help. Product version: 11

Beginning Open-Source/Free Solutions for Home and Small Business Owners. Robert Baldi, CISSP- ISSEP Robert Clauff

User Guide for the Identity Shield

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Trend Micro OfficeScan Best Practice Guide for Malware

Security Task Manager User Guide

How to Deal with Spyware A CyberAngels Quick Tutorial

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Spyware and Adware What s in Your Computer?

Avira System Speedup. HowTo

Kaspersky Internet Security 2014: Reviewer s Guide

Web-based Installation of Symantec AntiVirus

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Verizon Anti-Spyware 1 Introduction

Optimal Internet Explorer v6.0 Settings User Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

Simnet Registry Repair User Guide. Edition 1.3

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

Send technical support questions to In the United States, call the technical support team toll-free at TMSS

Pearl Echo Installation Checklist

Basic Administration Guide

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Pro Security

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO Version 8.0.

F-Secure Anti-Virus for Mac 2015

Microsoft Security Essentials Installation and Configuration Guide

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

Additional details >>> HERE <<<

2. Installation and System requirements

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Cox Business Premium Security Service FAQs

Bitdefender Internet Security 2015 User's Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

Printed Documentation

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

FAQ. Safe Anywhere PC. Disclaimer:

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Virus Definition and Adware

C&G FLUX MARKET Internet Safety

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Symantec Protection Suite Small Business Edition

Registry Tuner. Software Manual

Spyware. History and development

The Care and Feeding of Your Computer Troubleshooting and Maintenance

1 Introduction. Agenda Item: Work Item:

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

PC Security and Maintenance

Detecting and Removing Spyware From Your Home Computer

1 Introduction. Agenda Item: Work Item:

Spyware Study. Prof. Robila CMPT 495. Computer and Data Security. Group: Francis Rivera Douglas Schemly Igor Yussim. Due:

This document provides instructions for updating and running the free versions of Ad- Aware, Spybot Search & Destroy, and Spyware Blaster.

Information Technology

Kaseya 2. User Guide. Version 6.5 and 2.3

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

FortKnox Personal Firewall

Best Practice Configurations for OfficeScan (OSCE) 10.6

Auslogics BoostSpeed 5 Manual

Kaspersky Internet Security 2012: Reviewer s Guide

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Countermeasures against Spyware

Installation Instructions

The answers vary widely, but there are five components to every spyware definition:

Transcription:

Introduction to Free Computer Tools

About me Serge Aubin Technology Advisor / OLS-N Programmer / DBA - 9yrs Web design / Web applications Intranet/Extranet

Today s session Terminology Anti-Spyware software Photo Editing software Other free tools

What is Spyware? Spyware is a computer software that is installed surreptitiously on a computer to intercept or take partial control over the user s interaction with the computer, without the user s informed consent.

How is spyware installed Spyware gets on a computer through deception of the user or through exploitation of software vulnerabilities Software such as Kazaa, Bonzi Buddy, shareware Internet pop-up s, dialog boxes JavaScript vulnerabilities Installed via a virus or worm received via email, downloaded music, freeware

Effects and Behaviours Collects personal informatio Create CPU activity, disk usage, network traffic Stability issues, applications freezing, failure to boot, system crash Some display advertisement, pop-up's, banner ads Write cookies for business purpose

Collect personal information Can install other software Redirect browser activity Change computer settings Slow internet connection Loss of internet and other programs

Examples of spyware CoolWebSearch: uses IE vulnerabilities. Directs traffic to advertisement on Web Sites including coolwebsearch.com. Displays pop-up ads, alters searches. Internet optimizer: redirects IE error pages to advertising Zango: transmits detailed information to advertisers about websites which users visit. Redirects users to make profit sites. HuntBar: Installed via Active-X pop-up in IE. Can install other spywares and creates an open door to the internet. Movieland: A download service that opens popups and demands payment of $29.95 claiming you signed up for a 3 day free trial that expired.

SuperAntiSpyware There are other anti-spywares out there. This is an example of one available for free. Quick, Complete and Custom Scanning of Hard Drives, Removable Drives, Memory, Registry, Individual Folders and More! Includes Trusting Items and Excluding Folders for complete customization of scanning! Detect and Remove Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats.

Repair broken Internet Connections, Desktops, Registry Editing, Task Manager and more with our unique Repair System! Spyware application often disable system components to prevent removal - SUPERAntiSpyware resets and restores these items in seconds! Quarantine items detected and removed for complete protection. Items in the quarantine may be restored to your computer if desired. Detailed scan logs with complete information about detected and removed threats and their locations within your computer. Scan logs allow you to review scheduled scan results at anytime.

System Requirements Very little requirements Windows 98, 98SE, ME, 2000, XP, Vista or Windows 2003 400Mhz or Faster Processor with at least 256MB RAM

Where to get it? www.superantispyware.com Download the free version (also a professional version available for $29.95)

Other programs available Spybot Search and Destroy http://www.safer-networking.org/en/index.html Ad-aware http://www.lavasoft.com Avast anti-virus www.avast.com

Scans your computer for spyware Checks and updates your anti-spyware Allows you to manage spyware found. Shows when you last updated your anti-spyware Date you last did a scan

Select the drives to scan You can perform a Quick Scan or a Complete scan. Complete scan is recommended every 30 days.

Scan in Progress Displays any threats found. Number of items scanned and number of threats deleted.

Scan Summary The scan summary will give you the results of the scan.

Results The results window allows you to manage the threats found. Some items such as cookies may not be a threat. You can select those to be allowed and even report them to the Support team as False threats.

Quarantined and Removed Items

Photo Editing Software There are other anti-spywares out there. This is an example of one available for free Picasa v3 Simple and Easy photo editing Add text to your images Quick organization of images Create movies, collages, slideshows Share your images online with Picasa Web Albums

System Requirements Windows XP/Vista or Linux 256MB RAM 100MB available hard disk space Also runs on Mac OS X

Where to get it? http://picasa.google.com Click on Download Picasa 3

Other Photo Editing tools available Paint.Net www.getpaint.net PicKik www.picnik.com Gimp www.gimp.org

Live Demo

Questions?