World Virus Month or What?

by | Oct 1, 2013 | Email, Phishing, Scams and Spoofs

Last month we talked about the mysterious (to most people anyway) CLOUD. Although we’ve heard tons about it to date, it is worth reminding ourselves of one of the worst problems lurking in every Internet nook and crabby: MALWARE. There are many common internet myths about this topic. I like the word malware more than most words describing Internet nastiness because it is all encompassing of the problem.

Here at CharlesWorks, we think malware is a pretty easily understood term: generally speaking, some kind of software or automated computer commands that causes your computer to be subjected to possible control by some unauthorized person or persons. So, to us, malware can be computer viruses, spyware, adware, and so on. While the computer viruses are usually the worst, the others can be so annoying that you lose productivity as your machine becomes less able to perform what YOU want it to.

People usually ask me How did this happen?

In most instances, you’ll probably never really know. Consider yourself extremely fortunate if you DO know exactly how and when it happened. Many of the more sophisticated malware doesn’t appear to “do” anything immediate to your computer. So you think all is okay. However, if you are “infected” you can now pass that along to others in your emails. Some of the more sophisticated infections can be passed into your website if you manage your website with malware on your computer. Very embarrassing when search engines warn your site visitors that your website is infected!

Then people often ask Why do they do this?

So let’s enter into the equation here economics. In my example above, CharlesWorks, being a company, is driven by economics or it could not stay in business. Malware is driven similarly. There are two pieces generally involved: tricking the end user into loading the malware directly on one’s machine in the case of email attachments, and getting an end user to purchase something via spam emails. Make no mistake about it – if doing this didn’t generate billions of dollars in revenue it would not be done. With the exception of a relatively low number of malcontents looking for a cause – or just plain malicious individuals trying to hurt anyone they could hiding behind an IP address on the Internet – the individuals developing these malware payloads are in this for the money.

Finally they’ll ask Can malware be avoided?

Honestly? No. Probably not the answer you wanted to hear – so I will explain why I say malware can’t be avoided.

The software systems we are using to run our computers have evolved over many, many years of development. Believe me, the software was so much simpler in the late seventies when I first became involved with computers and operating systems. Today’s software – in particular the computer’s operating systems we have come to know (like Windows, CentOS, Fedora, and so forth) are incredibly complex. They consist of anywhere from thousands to millions of individual programs working in concert to allow us to make use of the computer system. The operating systems are interfaces between human beings and the computer hardware.

In large, complex systems such as these are, there are bound to be pieces of code that might be used in ways other than the developer originally intentioned. And that’s exactly what happens. In the world of computer security, the ability to use the existing code in a malicious manner not intended by the developer is what we refer to as an exploit or as software exploits.

We are all familiar, I am sure, with the numerous security updates that happen to our various operating systems. These security updates are to patch the numerous exploits as the exploits are discovered. Again, the operating system softwares are so complex that sometimes even the security fixes might contain yet more exploits.

We can’t avoid this. As a business owner, I can best explain this in terms of relating it to running CharlesWorks in general. I view the various exploits as not much different than our having to deal with blizzards, power failures, quipment malfunctions, human errors, and all the different things that are simply part of our costs of doing business – our business overhead.

Not to paint too dismal a picture here, however, we certainly CAN prepare for many potential problems – especially since we know it is reasonable to expect they might happen. For instance, at CharlesWorks we are ready for snow removal should we have the opportunity to experience a blizzard. Uninterruptible power supplies with power generator backup should the electric grid fail. Spare equipment and technical staff on hand for equipment malfunctions. Continued training, instruction and idea sharing to help reduce human error. None of these are any different really than applying the security updates on our computers (so our operating systems and any anti-malware software is kept as up to date as possible) to reduce the downtime when confronted with an issue!

In closing this, let me reiterate a few of the common sense rules as applies to the Internet:

  • Don’t open it if you aren’t totally sure of who it’s from and were expecting it
  • Don’t respond or even open emails promising sums of money for nothing
  • Don’t respond to emails about accounts with institutions you don’t have an account with

Give CharlesWorks a call today at (603) 924-9867 and let people who care about you help you get onto the web.


About Charles

In November 1977, Charles Oropallo authored and implemented a Bulletin Board System (BBS) called Access-80. Such systems were the forerunners to much of what is in use today. It operated on a Radio Shack TRS-80 Model I, Level II microcomputer. There were only a handful of such systems online for public use on the entire planet at that time. It provided personal messaging for local computer enthusiasts. It went online in East Greenbush, NY with a 300 baud modem and home brewed auto answering device. Relative speed and technological changes have been immense – today’s dialup at its fastest speed is 53,000 bits per second compared to 300 then!

Access-80 was also concurrently placed online in Schenectady, NY. Then, in 1982, Charles moved from the Albany, NY area to Nashua, NH, and so did Access-80. Charles’s original Nashua Access-80 setup is shown at http://Access-80.com. Before long Access-80 was concurrently online in Londonderry NH as well as Nashua. Access-80 remained online until 1987.

Charles founded CharlesWorks in June of 1998 in order to provide reliable and affordable hosting solutions. At that time he was only providing Internet connectivity for several personal and organizational websites at very low speed. Over time, Charles’s desire to provide reliable (as well as still being affordable) Internet solutions moved CharlesWorks into more commercially oriented markets. Charles still helps individuals get personal sites on the web.

CLICK HERE to find your domain name!   CLICK HERE to transfer your domain name!

Archives

Tags

24 hour (1) Accessibility (2) Accounting (1) Advertising (15) AdWare (1) Alex Johnson (2) Alignment (1) Android (2) Anti-Virus (1) Antivirus (1) Antrim Computer Repair and Service (3) APC Back-UPS (1) Appearance (2) Apple Mail (4) Apple Mobile Mail (2) Attachments (1) Audit (1) Authorized (1) Autoresponder (5) Availability (1) Backups (1) Badges (3) Bank Account (1) Bank Statement (1) Battery Backup (2) Better Business Bureau (3) Bob Hill (1) Bookkeeper (1) Branding (8) Budget (2) Business (26) Business Management (1) Catalog (1) Categories (1) Charles Oropallo (1) CharlesWorks (42) Cherryl Jensen (1) Chrome (1) Cloud (1) Code (2) Communicating (1) Competition (1) Computer (2) Computer Cache (1) Computer Hardware (1) Computer Security (2) Constant Contact (1) Consultation (1) Contact Information (2) Content (1) Content Management (31) Content Management System (1) Copiers (1) Copy Machine (1) Coronavirus (2) Courteous (1) COVID-19 (3) Credibility (9) Credit Card (1) Credit Card Processing (1) CSS (9) Customer Service (2) Database (1) Debian (1) Design (45) Design Expertise (1) Desktop (1) Dialup (1) DirectAdmin (3) Directions (1) DIVI (7) DNS (2) Do-it-Yourself (1) Documentation (1) Domains (18) Domain Transfers (5) E-Commerce (1) ecommerce (1) Elementor (1) Email (63) Email Lists (4) Email Management (2) Email marketing (3) Etiquette (3) Eudora 6 (1) Exchange (1) Expanding (1) Facebook (1) Financial (1) Finish (1) Firefox (1) Fonts (1) Forms (2) Forms Protection (1) Fraud (2) Galaxy S4 (1) General Info (1) Gmail (1) GoDaddy (1) Google (1) Google Adwords Certified Partner (1) Google Chrome (2) Groups (1) Happy Holidays (1) Hardware Help (1) Hill Specialty Networks (1) Hosting (1) Images (1) IMAP (1) include (1) Infected (1) Information (32) insert pages (1) install (1) Internet Browsing Errors (1) Internet Consultant (1) Internet Explorer (1) Joomla! (1) Keywords (2) Laptop (1) Legibility (1) Linux (8) Logging on (1) Macintosh (1) Mail 6.0 (1) Mail 2011 (2) Make-Over (1) Malicious (1) Malware (1) Marketing (8) Matt Burke (3) MDaemon (3) MelbourneIT (2) menu (1) Merchant (1) meta (1) Microsoft (1) Microsoft Edge (1) Microsoft Hosted Exchange (5) Microsoft Live (2) Mobile Email Setup (1) Monadnock Region (1) Mozilla Firefox (2) MySQL (1) Nathan Wesley (1) Netscape (1) Netscape Messenger (1) Office Copiers (1) OfficeLive (1) Online (1) Outlook (9) Outlook 2010 (2) Outlook Express (1) PayPal (1) Pay Per Click (2) PC (1) Personal (1) Peter Harris (1) Peter Harris Creative (1) Phishing (2) PHP (3) pixel (1) plugins (1) Pop Email (1) Popularity (1) Portfolio (1) Power Grid Failure (1) PPC (1) Prevent Fraud (1) Privacy (1) Private (1) Product (6) products (1) Professional (5) Projects (2) Protect (1) Protection (1) QR codes (1) Quality (2) QuickBooks (1) Reconciliation (1) Reduce Risk (1) Register (1) Reliability (2) Renew (1) Reseller (2) Resolution (1) Restrict User Access (1) Results (1) Review (2) Risk (1) Robin Snow (1) Roundcube (1) Safe (1) Samsung (2) Scam (16) Scammer (16) Search (1) Search and Replace (1) Search Engine Optimization (SEO) (19) Security (23) Security Risk (1) Selling (1) Servers (2) Service (11) Shopping Cart (1) Site (1) SmarterMail (9) Social Engineering (1) Social Networking (1) Software (1) Solutions for Today (1) Spam (1) Spam Filtering (15) Spammer (1) Spyware (2) SquirrelMail (1) SSL (8) Statistics (2) Stats (2) Stone Pond Technology (1) Storage (1) Support (1) Tablet (1) Target Market (1) Technical Help (1) Testimonials (9) The CW Corner (1) Thom Little (1) Thom Little Associates (1) Thunderbird (3) Thunderbird 10 (2) TLD (1) Topic (1) Top Level Domains (3) Transaction (2) Transfer Data (1) Transfer Funds (1) Typography (1) Update (2) Uploading (1) UPS System (2) Up to Date (1) Virus (2) Viruses (1) Vista (1) Web (1) Web-Over (1) Web Development (98) Web Hoster (1) Web Hosting (2) Web Hosting Company (1) Webmail (8) Web Mail (1) Webmaster (10) Web Presence (26) Website (110) Website Development (1) websites (2) Web Stats (1) Web terms (1) Web Writing (1) Windows 7 (2) Windows Mail (6) Windows XP (1) WooCommerce (5) WordPress (87) WordPress Updates (1) Working Remote (2) Writing (1) YouTube (1)

Protected by Security by CleanTalk and CleanTalk Anti-Spam