Home > Here

PARASITES, VIRUSES and
OTHER SECURITY ISSUES

Confidentiality — Integrity — Accessibility
Updated April 3, 2011
Hold mouse here for list of most recent changes.
Receive notice whenever this page is updated.

PARASITES

ANTI-PARASITE SOFTWARE

OTHER SECURITY PAGES

SECURITY DISCUSSION FORUMS

SANS INTERNET STORM CENTER
Internet Storm CenterSANS Institute’s Internet Storm Center maps changes in Trojan and other virus traffic worldwide. Tracking such changes provides a possible way of anticipating major connectivity disruptions of the Internet infrastructure.

VIRUS INFORMATION TOOLS compliments of
TrendMicro & Symantec
READ THIS FINE PRINT: I am providing these monitors and links as a courtesy and service to site visitors. I have no relationship with TrendMicro or Symantec. Any information that y3ou provide them after clicking one of the links below is subject to that site’s privacy policies, not my own. In other words: This looks good to me, but use your own judgment in accessing or acting on this information, over which I have no control.

Symantec Repair Tools

Kaspersky Virus Removal Tools

Microsoft Windows Malicious Software Removal Tool
Run manually from your computer by launching MRT.EXE in the system32 folder. Use the above link or Windows Update to get the latest version.

McAfee AVERT Stinger
Not as good as it used to be, but still worth having in your toolbox.

SECURITY LINKS

General Information

A sound basis for personal computer security rests on the following five points:
  1. User education. The best security measures begin on the space-bar side of your keyboard. Equip yourself with basic security information. (Start with the links on this present page.)
  2. Security patches & other critical Windows and MS Office updates. Be sure you are up-to-date on security patches. Microsoft rolls out new patches (when warranted) on the second Tuesday of every month. On current versions of Windows, you can set your computer to automatically notify you of any new Windows updates; otherwise, check manually on the second Wednesday of every month. Install all CRITICAL UPDATES immediately — the risk of a rare bad update is much less than the security risk of not installing.
  3. Antivirus protection. A top-grade anti-virus program, with frequently updated virus definition files, running in real time should be basic to every computer in use today.
  4. Firewall protection. Every PC with Internet access should have either a hardware firewall in place or a personal firewall installed and running. It should be bidirectional, tracking both outbound and inbound traffic.
  5. Parasite protection, which is discussed in detail on my page The Parasite Fight!.
Microsoft never distributes software directly through email! If you receive an e-mail that claims to contain software from Microsoft, do not open the attachment. The safest course of action is to delete the mail altogether. If you would like to take additional action, report the e-mail to the sender’s Internet Service Provider. Most ISPs provide an “abuse” userid for this purpose.

Free Online Virus Scanners

Notification Services

Firewalls

Leading Vulnerabilities

RootKits

RootKits, as MS-MVP Harry Waldron puts it, are a type of “Super Spyware”. They affect both Windows and Linux operating systems, hide themselves, impact the OS kernel directly, and usually carry a more serious secondary payload. I will use this section to gather information and industry thoughts about this emerging threat.

Professional Resources

Visit Microsoft.com

  Top of Page   Home   Site Map   Search   Forums   Feedback   Donate