PC's and Servers
   Data Recovery
   Security Testing

   sb 1386











Business Network Solutions technicians are recognized experts in the field of viruses and spyware removal. While many companies will advocate wiping out your computer and saving your data, this can cause more problems than you originally had. Many times, the infections are actually located in your user data, and to save time techs will just copy off your data (usually by burning a CD), format your machine and copy the INFECTED data back to the drive. So rather than being the 'cheaper' solution as many will suggest, it actually turns out to be more expensive. You'll end up paying the expense of having your PC wiped out - but in a few weeks you will pay to get it cleaned again!

At BNS, we always clean the machine and repair the operating system if needed. If the software is too badly damaged, or if the drive is failing - we clean the data of all infections prior to reinstallation on your drive.
Your data will be copied to our Data Recovery machine, where all files will be scanned and cleaned by our proprietory methods before being copied back to your computer.

Advertising spyware will monitor the surfing and/or searching activity of any person using the machine on which it is installed. That information is transmitted over the internet, usually to the company responsible for creating the software. The information is stored in a database, usually for marketing purposes. Information from this database might be sold to third parties. The software usually will display advertisements thought to be relevant to the interests of the person(s) using the infected computer. Spyware can be installed in numerous ways. The most common method is bundling. That is when the spyware company pays a software publisher to include the spyware in their products. Another common method is to exploit security flaws in popular web browsers to install the software. Typically, a unique tracking number is assigned to each installation of the spyware. This tracking number, as well as information about how the infected computer is being used, is transmitted to the company responsible for creating the spyware. This allows that company to maintain a database on the activities of the users whose computers are infected by their spyware. Advertisements may be displayed which are related closely to the topics about which the users are reading or for which they are searching. These advertisements most commonly appear as pop-up windows or banner ads that are embedded into an unrelated program. For the term "advertising spyware" to apply properly, a piece of software must transmit information about the activities of the users of the infected computer without their knowledge. It is not necessary for the software to display advertisements in order to be labeled as "spyware" or "advertising spyware". The fact that the information is collected for marketing purposes distinguishes it from "surveillance spyware". Business Network Solutions can clean your pc. Located in Bloomingtonillinois, LeRoy il, central illinois computer repair spyware removal virus cleaning computer wont boot because of spywareand malware virus infections.  

Identity Theft and Spyware

Obviously one of the latest and most dangerous threats to privacy in the digital age lies at the doorstep of spyware. Spyware can be used to surreptitiously gather all types of confidential information and in most cases the user has no idea the information is being taken. This form of “snoopware” lets the spy access everything you do online including usernames, passwords, online shopping purchases and e-mail or chat correspondence. In the hands of an identity thief this type of information is a deadly treasure trove. This is especially dangerous if you do online banking, or file taxes online. You could be providing criminals with you name, age, Social Security Number, address, phone number and other tools used for identity theft

Intro to Spyware

There are a lot of differing opinions on what the definitions of Parasiteware Spyware, Adware and Malware should be.

In order to help you we have provided brief definitions in this miniature spy primer.

ParasiteWare is the term for any Adware that by default overwrites certain affiliate tracking links. These tracking links are used by webmasters to sell products and to help fund websites. The controversy is centered on companies like WhenU, eBates, and Top Moxie, a popular maker of Adware applications. These companies have release their software to assist users in getting credit for rebates, cash back shopping, or contributions to funds. To the end user ParasiteWare represents little in the way of a security threat.

Adware, also known as an Adbot, can do a number of things from profile your online surfing and spending habits to popping up annoying ad windows as you surf. In some cases Adware has been bundled (i.e. peer-to-peer file swapping products) with other software without the user's knowledge or slipped in the fine print of a EULA (End User License Agreement). Not all Adware is bad, but often users are annoyed by adware's intrusive behavior. Keep in mind that by removing Adware sometimes the program it came bundled with for free may stop functioning. Some Adware, dubbed a "BackDoor Santa" may not perform any activity other then profile a user's surfing activity for study.

AdWare can be obnoxious in that it performs "drive-by downloads". Drive-by downloads are accomplished by providing a misleading dialogue box or other methods of stealth installation. Many times users have no idea they have installed the application. Often Adware makers make their application difficult to uninstall.

A "EULA" or End User License Agreement is the agreement you accept when you click "OK" or "Continue" when you are installing software. Many users never bother to read the EULA.

It is imperative to actually read this agreement before you install any software. No matter how tedious the EULA, you should be able to find out the intent BEFORE you install the software. If you have questions about the EULA- e-mail the company and ask them for clarification.

Spyware is potentially more dangerous beast than Adware because it can record your keystrokes, history, passwords, and other
confidential and private information. Spyware is often sold as a spouse monitor, child monitor, a surveillance tool or simply as a tool to spy on users to gain unauthorized access. Spyware is also known as: snoopware, PC surveillance, key logger, system recorders, Parental control software, PC recorder, Detective software and Internet monitoring software.

Spyware covertly gathers user information and activity without the user's knowledge. Spy software can record your keystrokes as you type them, passwords, credit card numbers, sensitive information, where you surf, chat logs, and can even take random screenshots of your activity. Basically whatever you do on the computer is completely viewable by the spy. You do not have to be connected to the Internet to be spied upon.

The latest permutations of Spyware include the use of routines to mail out user activity via e-mail or posting information to the web where the spy can view it at their leisure. Also many spyware vendors use "stealth routines" and "polymorphic" (meaning to change" techniques to avoid detection and removal by popular anti-spy software. In some cases Spyware vendors have went as far as to counter-attack anti-spy packages by attempting to break their use. In addition they may use routines to re-install the spyware application after it has been detected.

Malware is slang for malicious software. Malware is software designed specifically to disrupt a computer system. A trojan horse , worm or a virus could be classified as Malware. Some advertising software can be malicious in that it can try to re-install itself after you remove it.

For the purpose of simplicity Malware is software specifically engineered to damage your machine or interrupt the normal computing environment.

Hijackers are applications that attempt to usurp control of the user's home page and reset it with one of the hijackers choosing. They are a low security threat, but obnoxious. Most Hijackers use stealth techniques or trick dialogue boxes to perform installation.

A dialer is a type of software used by pornographic vendors. Once dialer software is downloaded the user is disconnected from their modem's usual Internet service provider and another phone number and the user is billed. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to the victim.

Many of today’s most popular spyware applications promise the ability to execute via “remote installation”. Remote installation is the ability to put a spyware program on a computer without having physical access to the machine. Obviously this is crossing a thin line into illegal behavior and this type of software should be classified as a Trojan horse. Nevertheless, these programs are sold every day to consumers who want to monitor their kids, employees, or spouse and perhaps to people that have more nefarious purposes in mind. While there are certainly legitimate uses for monitoring software we find it hard to believe there is any legitimate scenario where a parent or employer would need to use remote installation to install a monitoring program. Make no mistake that spyware can certainly be used to illegally obtain your personal information

Many corporations run  Anti-Virus software, but still got hit with virii such as Slammer. BNS is a security-minded company that focuses on zero day exploits, vulnerabilities and patches. Our clients get warned about potential problems before they become general knowledge. Our staff monitors news servers, hacker forums and major security firms for any information on vulnerabilities. This gives us a 'heads-up' on many potential problems we can effectively block until a patch is released.

As an Authorized Partner with Grisoft and Computer Associates - makers of award winning antivirus software, BNS can offer you the highest quality software at discount rates.

 CONTACT US for pricing info.


Copyright © 2001-04 Business Network Solutions. All rights reserved