Monthly Archives: September 2012

Kaspersky Antivirus 2012

When it comes to malware removal, Kaspersky is the best. The company earned an elusive six of six in the last two AV-Tests for malware removal and product of the year 2011 from AV-Comparatives.

This particular version of Kaspersky software does not include a safe browser, which is an isolated browser that can open websites in a virtual environment separate from your PC.

The Verdict
: 9.5/10

Kaspersky continues to outperform its competitors. It can deliver nearly 100-percent protection from malware and can completely remove most malware from your PC.

The Many Faces of Malware

The Many Faces of Malware

According to Wikipedia, there are in fact eleven distinct types of malware, and even more sub-types of each.

1. Viruses. The malware that’s on the news so much, even your grandmother knows what it is. You probably already have heard plenty about why this kind of software is bad for you, so there’s no need to belabor the point.

2. Worms. Slight variation on viruses. The difference between viruses and worms is that viruses hide inside the files of real computer programs (for instance, the macros in Word or the VBScript in many other Microsoft applications), while worms do not infect a file or program, but rather stand on their own.

3. Wabbits. Be honest: had you ever even heard of wabbits before (outside of Warner Bros. cartoons)? According to Wikipedia, wabbits are in fact rare, and it’s not hard to see why: they don’t do anything to spread to other machines. A wabbit, like a virus, replicates itself, but it does not have any instructions to email itself or pass itself through a computer network in order to infect other machines. The least ambitious of all malware, it is content simply to focus on utterly devastating a single machine.

4. Trojans. Arguably the most dangerous kind of malware, at least from a social standpoint. While Trojans rarely destroy computers or even files, that’s only because they have bigger targets: your financial information, your computer’s system resources, and sometimes even massive denial-of-service attack launched by having thousands of computers all try to connect to a web server at the same time.

5. Spyware. In another instance of creative software naming, spyware is software that spies on you, often tracking your internet activities in order to serve you advertising. (Yes, it’s possible to be both adware and spyware at the same time.)
6. Backdoors. Backdoors are much the same as Trojans or worms, except that they do something different: they open a “backdoor” onto a computer, providing a network connection for hackers or other malware to enter or for viruses or sp@m to be sent out through.

7. Exploits. Exploits attack specific security vulnerabilities. You know how Microsoft is always announcing new updates for its operating system? Often enough the updates are really trying to close the security hole targeted in a newly discovered exploit.

8. Rootkit. The malware most likely to have a human touch, rootkits are installed by crackers (bad hackers) on other people’s computers. The rootkit is designed to camouflage itself in a system’s core processes so as to go undetected. It is the hardest of all malware to detect and therefore to remöve; many experts recommend completely wiping your hard drive and reinstalling everything fresh.

9. Keyloggers. No prïze for guessing what this software does: yes, it logs your keystrokes, i.e., what you type. Typically, the malware kind of keyloggers (as opposed to keyloggers deliberately installed by their owners to use in diagnosing computer problems) are out to log sensitive information such as passwords and financial details.

10. Dialers. Dialers dial telephone numbers via your computer’s modem. Like keyloggers, they’re only malware if you don’t want them. Dialers either dial expensive premium-rate telephone numbers, often located in small countries far from the host computer; or, they dial a hacker’s machine to transmit stolen data.

11. URL injectors. This software “injects” a given URL in place of certain URLs when you try to visit them in your browser. Usually, the injected URL is an affïliate link to the target URL. An affïliate link is a special link used to track the traffïc an affïliate (advertiser) has sent to the original website, so that the original website can pay commissions on any salës from that traffïc.

12. Adware. The least dangerous and most lucrative malware (lucrative for its distributors, that is). Adware displays ads on your computer. The Wikipedia entry on malware does not give adware its own category even though adware is commonly called malware. As Wikipedia notes, adware is often a subset of spyware. The implication is that if the user chooses to allow adware on his or her machine, it’s not really malware, which is the defense that most adware companies take. In reality, however, the choice to install adware is usually a lëgal farce involving placing a mention of the adware somewhere in the installation materials, and often only in the licensing agreement, which hardly anyone reads.

Are you ready to take on this dirty dozen? Don’t go it alone. Make sure you have at least one each of antivirus and antispyware.

Would you like to earn some extra money?

PCRS Computers is in need of a sales person. If you like to work alone, and have great people skills them call 260-220-9527 to find out how to get started today. PCRS Computers needs you today.

What is a Computer virus?

A computer virus is a computer program that can replicate itself[1] and spread from one computer to another. The term “virus” is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen’s theoretical compression virus. However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorised changes to a computer, which is undesirable even if no damage is done or intended. On page one of Dr Solomon’s Virus Encyclopaedia, the undesirability of viruses, even those that do nothing but reproduce, is thoroughly explained.

What is Spyware?

Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.

While the term spyware suggests software that monitors a user’s computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.

Sometimes, spyware is included along with genuine software, and may come from an official software vendor. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user’s computer.

Routes of infection

Malicious websites attempt to install spyware on readers’ computers.

Spyware does not directly spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system through deception of the user, or through exploitation of software vulnerabilities.

Most spyware is installed without users’ knowledge, or by using deceptive tactics. Spyware may try deceive users by bundling itself with desirable software. Other common tactics are using a Trojan horse. Some spyware authors infect a system through security holes in the Web browser or in other software. When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware.

The installation of spyware frequently involves Internet Explorer. Its popularity and history of security issues have made it a frequent target. Its deep integration with the Windows environment make it susceptible to attack into the Windows operating system. Internet Explorer also serves as a point of attachment for spyware in the form of Browser Helper Objects, which modify the browser’s behavior to add toolbars or to redirect traffic.

Effects and behaviors

A spyware program is rarely alone on a computer: an affected machine usually has multiple infections. Users frequently notice unwanted behavior and degradation of system performance. A spyware infestation can create significant unwanted CPU activity, disk usage, and network traffic. Stability issues, such as applications freezing, failure to boot, and system-wide crashes, are also common. Spyware, which interferes with networking software, commonly causes difficulty connecting to the Internet.

In some infections, the spyware is not even evident. Users assume in those situations that the performance issues relate to faulty hardware, Windows installation problems, or another infection. Some owners of badly infected systems resort to contacting technical support experts, or even buying a new computer because the existing system “has become too slow”. Badly infected systems may require a clean re-installation of all their software in order to return to full functionality.

Moreover, some types of spyware disable software firewalls and anti-virus software, and/or reduce browser security settings, which further open the system to further opportunistic infections. Some spyware disables or even removes competing spyware programs, on the grounds that more spyware-related annoyances make it even more likely that users will take action to remove the programs.

A typical Windows user has administrative privileges, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts. Alternatively, they can also reduce the privileges of specific vulnerable Internet-facing processes such as Internet Explorer.

In Windows Vista, by default, a computer administrator runs everything under limited user privileges. When a program requires administrative privileges, Vista will prompt the user with an allow/deny pop-up (see User Account Control). This improves on the design used by previous versions of Windows.

Remedies and prevention

As the spyware threat has worsened, a number of techniques have emerged to counteract it. These include programs designed to remove or block spyware, as well as various user practices which reduce the chance of getting spyware on a system.

Nonetheless, spyware remains a costly problem. When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the operating system. For instance, some spyware cannot be completely removed by Symantec, Microsoft, PC Tools.

What is malware?

Malware, short for malicious software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. ‘Malware’ is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.

Malware includes computer viruses, worms, Trojan horses, spyware, adware, and other malicious programs. In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states. Malware is not the same as defective software, which is software that has a legitimate purpose but contains harmful bugs that were not noticed before release. However, some malware is disguised as genuine software, and may come from an official company website. An example of this is software used for harmless purposes that is packed with additional tracking software that gathers marketing statistics.

Malware has caused the rise in use of protective software types such as anti virus, anti-malware, and firewalls. Each of these are commonly used by personal users and corporate networks in order to stop the unauthorized access by other computer users, as well as the automated spread of malicious scripts and software.


Malware by categories on March 16, 2011.

Many early infectious programs, including the first Internet Worm, were written as experiments or pranks. Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others.

Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on. Left un-guarded, personal and networked computers can be at considerable risk against these threats. (These are most frequently counter-acted by various types of firewalls, anti virus software, and network hardware).

Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users’ computers for black-market exploitation. Infected “zombie computers” are used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.  Other strictly for-profit category of malware has emerged, called spyware. These programs are designed to monitor users’ web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues to the spyware creator. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be packaged together with user-installed software, such as peer-to-peer application.

ask andrew 9/24/2012

How often should i change my password?

No matter how secure your password is, it is a good idea to make a regular change. PCRS Computers would suggest changing each of you passwords every six months at the most to maintain the highest level of security possible.

Thank you for the question. Please comment and email me at any questions you would like ask Andrew to answer. please share this blog with everyone you know i want to hit 1000 views by the end of OCT. and we have only 201 views so far.

Get your computer fix remotely now!!!

Is your computer always slow? Does it freeze and quit working? Can you connect to the internet? If you answered yes to these question then for around $50 PCRS Computers can fix your computer remotely in little as a couple of hours. So pleas
e call today rates are low but they will need to be raised soon so if you want to save money do not wait call 260-220-9527 and get help today no matter where you are at we can help. Checkout our website for me info

PCRS Computers needs your help.

Hello everybody today is a special blog post for you people out there that can write. PCRS Computers needs your help writing articles that people want to read and comment and share. I know only what i want but what i want might not be what you need so please comment on this post and let me know what you would like to read from this blog and if you can write and would like to write a post for PCRS Computers please let me know by email or phone. My email is and my phone number is 260-220-9527 please help us out.

Why pay PCRS Computers to maintain your computer?

There are three reasons why people pay PCRS Computers to maintain their computer. Reason one is lack of computer repair knowledge. That is the most common reason why a computer is not maintained, and annoying problems begin to cause you stress every time you use your computer.

If you do not maintain your computer, your computer gets corrupted and slows down becoming a headache instead of an enjoyment.  Our remote service gives you stress-free maintenance.

Reason two for paying  PCRS Computer to maintain your computer is lack of  time .  Most people work a lot just to make ends meet, so they don’t have time to work on their computer.  They just need it to run properly when they use it.  Our remote service gives you time-saving convenience.

Reason three for paying  PCRS Computers to maintain your computer is we do a great job for a reasonable price.  Most companies charge $300 to $500 dollars a year for the same maintenance service we provide for only $170 a year or $15 a month whichever option works best for you.

Our remote service is available anywhere you can connect to a high speed internet provider.  So call us today at 260-220-9527 to get started.  Do not wait.  You can also email us at with any question about this stress-free, convenient and affordable computer repair service.

As always please comment and tell us what you think about this blog post. Have a great day!!!

%d bloggers like this: