PC's and Servers
Business Network Solutions technicians
are recognized experts in the field of viruses and spyware removal.
While many companies will advocate wiping out your computer and saving
your data, this can cause more problems than you originally had. Many
times, the infections are actually located in your user data, and to
save time techs will just copy off your data (usually by burning a CD),
format your machine and copy the INFECTED data back to the drive.
So rather than being the 'cheaper' solution as many will suggest, it
actually turns out to be more expensive. You'll end up paying the
expense of having your PC wiped out - but in a few weeks you will pay to
get it cleaned again!
At BNS, we always clean the machine and repair the operating
system if needed. If the software is too badly damaged, or if the drive
is failing - we clean the data of all infections prior to reinstallation
on your drive.
Your data will be copied to our Data Recovery machine,
where all files will be scanned and cleaned by our proprietory methods
before being copied back to your computer.
Identity Theft and Spyware
Obviously one of the latest and most dangerous threats to privacy in the digital age lies at the doorstep of
spyware. Spyware can be used to surreptitiously gather all types of confidential information and in most cases the user has no idea the information is being taken. This form of “snoopware” lets the spy access everything you do online including usernames, passwords, online shopping purchases and e-mail or chat correspondence. In the hands of an identity thief this type of information is a deadly treasure trove.
This is especially dangerous if you do online banking, or file taxes
online. You could be providing criminals with you name, age, Social
Security Number, address, phone number and other tools used for identity
Intro to Spyware
There are a lot of differing opinions on what the definitions of Parasiteware Spyware, Adware and Malware should be.
In order to help you we have provided brief definitions in this miniature spy primer.
ParasiteWare is the term for any Adware that by default overwrites certain affiliate tracking links. These tracking links are used by webmasters to sell products and to help fund websites. The controversy is centered on companies like WhenU, eBates, and Top Moxie, a popular maker of Adware applications. These companies have release their software to assist users in getting credit for rebates, cash back shopping, or contributions to funds. To the end user ParasiteWare represents little in the way of a security threat.
Adware, also known as an Adbot, can do a number of things from profile your online surfing and spending habits to popping up annoying ad windows as you surf. In some cases Adware has been bundled (i.e. peer-to-peer file swapping products) with other software without the user's knowledge or slipped in the fine print of a EULA (End User License Agreement). Not all Adware is bad, but often users are annoyed by adware's intrusive behavior. Keep in mind that by removing Adware sometimes the program it came bundled with for free may stop functioning. Some Adware, dubbed a "BackDoor Santa" may not perform any activity other then profile a user's surfing activity for study.
AdWare can be obnoxious in that it performs "drive-by downloads". Drive-by downloads are accomplished by providing a misleading dialogue box or other methods of stealth installation. Many times users have no idea they have installed the application. Often Adware makers make their application difficult to uninstall.
A "EULA" or End User License Agreement is the agreement you accept when you click "OK" or "Continue" when you are installing software. Many users never bother to read the EULA.
It is imperative to actually read this agreement before you install any software. No matter how tedious the EULA, you should be able to find out the intent BEFORE you install the software. If you have questions about the EULA- e-mail the company and ask them for clarification.
Spyware is potentially more dangerous beast than Adware because it can record your keystrokes, history, passwords, and other
confidential and private information. Spyware is often sold as a spouse monitor, child monitor, a surveillance tool or simply as a tool to spy on users to gain unauthorized access. Spyware is also known as: snoopware, PC surveillance, key logger, system recorders, Parental control software, PC recorder, Detective software and Internet monitoring software.
Spyware covertly gathers user information and activity without the user's knowledge. Spy software can record your keystrokes as you type them, passwords, credit card numbers, sensitive information, where you surf, chat logs, and can even take random screenshots of your activity. Basically whatever you do on the computer is completely viewable by the spy. You do not have to be connected to the Internet to be spied upon.
The latest permutations of Spyware include the use of routines to mail out user activity via e-mail or posting information to the web where the spy can view it at their leisure. Also many spyware vendors use "stealth routines" and "polymorphic" (meaning to change" techniques to avoid detection and removal by popular anti-spy software. In some cases Spyware vendors have went as far as to counter-attack anti-spy packages by attempting to break their use. In addition they may use routines to re-install the spyware application after it has been detected.
Malware is slang for malicious software. Malware is software designed specifically to disrupt a computer system. A trojan horse , worm or a virus could be classified as Malware. Some advertising software can be malicious in that it can try to re-install itself after you remove it.
For the purpose of simplicity Malware is software specifically engineered to damage your machine or interrupt the normal computing environment.
Hijackers are applications that attempt to usurp control of the user's home page and reset it with one of the hijackers choosing. They are a low security threat, but obnoxious. Most Hijackers use stealth techniques or trick dialogue boxes to perform installation.
A dialer is a type of software used by pornographic vendors. Once dialer software is downloaded the user is disconnected from their modem's usual Internet service provider and another phone number and the user is billed. While dialers do not spy on users they are malevolent in nature because they can cause huge financial harm to the victim.
Many of today’s most popular spyware applications promise the ability to execute via “remote installation”. Remote installation is the ability to put a spyware program on a computer without having physical access to the machine. Obviously this is crossing a thin line into illegal behavior and this type of software should be classified as a Trojan horse. Nevertheless, these programs are sold every day to consumers who want to monitor their kids, employees, or spouse and perhaps to people that have more nefarious purposes in mind. While there are certainly legitimate uses for monitoring software we find it hard to believe there is any legitimate scenario where a parent or employer would need to use remote installation to install a monitoring program. Make no mistake that spyware can certainly be used to illegally obtain your personal information
Many corporations run Anti-Virus software, but still got hit
with virii such as Slammer. BNS is a security-minded company that focuses
on zero day exploits, vulnerabilities and patches. Our clients get
warned about potential problems before they become general knowledge.
Our staff monitors news servers, hacker forums and major security firms
for any information on vulnerabilities. This gives us a 'heads-up'
on many potential problems we can effectively block until a patch
As an Authorized Partner with Grisoft and
Computer Associates - makers of award winning antivirus software, BNS can
offer you the highest quality software at discount rates.
CONTACT US for
Copyright © 2001-04 Business
Network Solutions. All rights reserved