The last article, Hardware Guide written by me covered the general needs for a reliable, hardware, capable set up for trading the Forex market in an effective manner. Some of you might be aware of the Techies Corner guide that certain general information regarding the PC security and utilizes it to varieties of downloadable tests and programs to utilize the security consciousness among us. Some information in both might be duplicated, but the article offers all the things together in the form of one stop store and offers a valued point of reference for using in the future.
There are several issues that all of us playing the role of internet users can come during the regular work. Most of the people utilize ADSL connections and even as this kind of connection is over often than not important for our trade, it exposes to unfriendly part of online.
Some of the general issues you will without any doubt encounter include:
• Firewall attacks
• Trojan horses
• Spoof sites
If one is not familiar with all the above mentioned items, keep in mind that they should be. As dealers, we do not have enough money to show complacency while dealing with the malicious people who write and create such type of programs-cut them at knees or do not offer them an option in the initial place.
Most of the people should be acquainted with the viruses. A virus is defined as a program that self-replicates and also spreads by keeping their copies into another code of computer and program. Some of the viruses are said to be harmless which can even destroy one’s system, delete the files and can also disable the hardware. In a short manner, if one detects them in the system, it is better to remove them.
There are large numbers of anti-virus programs available. Many are available at free of cost whereas others include an annual charge. Some of the popular anti-virus programs found for downloading purpose are mentioned below. Some of the products are regarded to be standalone and need downloading whereas others are available through the web interface. If you use Windows XP, the XP displays the AV product through default and will repeatedly remind you the fact that either one does not have it installed or virus definitions are outdated. One can turn off this function if needed by accessing the start control panel.
It is worth searching how effective the current or proposed AV solution should be. There are large number of reports that are published in a frequent manner on web which examines famous solutions on varieties of platforms and results of shows. Two proper examples are About and Virus Bulletin.
AV Programs at free of cost (standalone)
• Anti -virus
• Anti Vir
• AVG anti-virus
AV Scanners at free of cost (web based)
• RAV anti -virus
• Macfee Free scan
If you choose a standalone version, ensure that either you update it daily or configure the trading program or checking the date once every day. According to me, standalone is regarded the best as certain SV programs will scan PC every time even when one does not ask it to scan the viruses manually. Avast is such a program which during the past has alerted me to an issue before I had to start a manual scan.
One should run a single AV product on the PC. Most of the time, the AV products will utilize the similar files and also resources as each other and try to attain two for working in a concurrent manner can cause severe issues, so you should keep the things simple.
There are times when this is also known as Adware. It is the generic name for any type of program that handles the activity of a user. Again, like the viruses, it can be harmless or can cause several issues. Sometimes, the similar form of the spyware will be having a single effect on a single machine and other effects. You will not find any specific rules, except for one regarding avoiding them from the system.
A harm free type of spyware is possibly tracking a cookie. It is a code piece kept on the computer by the web browser and utilized by the website for recording information regarding you. Some of the cookies like ones used by the site can at per the request remember these details as password and username, logging in an automatic manner at the time when you return. Others can easily record the type of websites that one visits for the demographic purposes.
Other kind of spyware could be malicious, specifically those which incorporates the script of Active X. It is the technology created by the Microsoft for enabling the web pages for behaving like the programs- an exploitable element of being they can easily install the programs on to the PC without any knowledge. Microsoft has moved certain way to fix it with the releasing of service of Windows XP.
Some of the browsers are susceptible to the Spyware than others. Popular browser, named as Internet Explorer ships as the default on the machines that are equipped with Windows and the browser daily targeted by the developers of Spyware. Other types of browsers like Mozilla Firefox which is considered as an open browser, provided improved security over Internet Explorer but at small expenses.
The following version of the Internet Explorer, rumored to be with them in the beta format in the year 2005. It is going to focus on the security, suggesting that the Microsoft is properly aware of Internet Explorer 6. Some of the popular at free of cost and pay for the solutions are mentioned below. It is not planned in the form of exhaustive list and is worth going through the different reviews found online and in the PC magazines. Some of the anti-spyware databases perform in a poor manner and others will also install the spyware on the machine.
Free Programs of anti-spyware
1. Microsoft anti spyware
2. Spy bot destroy and search
4. Spyware blaster
Pay for the Programs of Spyware
• Pest petrol
Like the viruses, ensure that whichever the spyware solution you select is update on a daily basis. Most of them will prompt one for the updates when one runs them. However, unlike the AV products, one can run more instances of the anti-spyware items on the machine as no solution has been found which a catch all is.
As wooden horses of Troy, Trojan is defined as the program that arrives on the PC and should also stumble over it, generally looks a bit innocent. They might sit there and do nothing, whilst monitoring things like the Spyware or on the pre-defined time and date, will easily perform certain action like erasing files, sending the keystrokes for the purpose of password retrieval and logging and other similar things. These are not classified in the form of viruses as it does not repeat them, although certain actions are like the virus.
Trojans are perceived by most of the Spyware and AV items and should be handled with the similar programs as discussed above. Like the viruses and spyware, a proper solution is daily scanning the PC and handle with any type of threats instantly.
I hope that nobody has gone through this is wondering what the firewall is. If you are going through this, it signifies you are online and this in turn also signifies that you need the firewall. The firewall can either be a software piece installed on the PC or as a part of the hardware element that safeguards the network traffic. They consists of set of different programs following the user-defined instructions as what it is and what are the things that are not allowed to access from and to the PC.
Most of the people, who utilize Windows XP as an effective system will have the software firewall install in the form of standard. Though, it is known that default firewall Windows XP, whilst operative at the blocking the inbound traffic, is unusable in delaying the outbound traffic and certain programs can really turn off. This obviously can prove to be problematic. You should inadvertently download or else receive the malicious file.
It is worth attaining a third party like Zone Alarm and Sygate to make sure that security of the system is never compromised. If you have the router, either wireless or wired, this will be having the firewall manufactured in which one should avoid most of the issues.
Firewalls Available at free of Cost
• Zone Alarm
One can examine the efficiency of the firewall at few properly established places on web. You need to only this link, follow an on-screen instruction and within a single minute or two one should have certain idea as how to secure one online.
• Audit My PC
• Gibson Research
• Security checked
It is worth going through the websites like PCP, its stop on the daily basis. Here, one can register at free of cost and have the site perform free scan and provide potential tuning tips for machine generally and suggest you regarding the settings of the security.
Also called as phishing, it will generally appear in the inbox that prompts one to visit a single site claiming to be maintained by the bank, PayPal or Ebay to inform one that they update the records and can log in for verifying them or such. Obviously, one can also click the link mentioned in email, which will take you to a site alleged to appear. You need to log in the details and does not have to think anything else.
Let us say that a website through which you get an email is PayPal, the payment method of Ebay or just think it is PayPal but this is not in reality.
What is it, in fact is the copy of PayPal website. This is simple to do. One can copy the whole page of the website, for instance, by noticing a code and place it in another website. It looks similar buy it does not function in the same manner as the content that develops this particular page and large numbers of web pages are dynamic that are pulled from the remote databases and will not be there. So, move along. Just imagine you have logged in but the thing that you have done actually is send the username and who distinguishes what else to the database.
There are certain things that we can follow to do this:
At first, when one visits a website like Ebay, payPal or online bank or check the real HTTP header in a browser. Ensure that the website address is precise. This says anything dissimilar; type the website address manually into a browser or you can also take this from the “favorite” list and utilize that. Do not click on a link which they have send and imagine that this is fine because it looks perfect. It says one thing which signifies anything else.
Another important thing to consider is encryption. All the sites as discussed above utilize technology known as SSL and an encryption of 128 bit for protecting the identity. Therefore, when one logs in for example, in Ebay, they will find things like the name of the website. As a small symbol of padlock that all the browsers should show in bottom right hand side.
Some of the browsers like Mozilla Firefox provide an add-on the extensions which will inform you about the right address of a specific website in an automatic manner, despite of the things it displayed in a real address bar.
Lot of websites that have been phished or might be a subject to the phishing will generally send open emails to the consumers who say that they would never ask people to log in or check the details. Believe them. If one follows simple points mentioned above, one can easily establish whether one is an open product or a proper copy.
For summarizing the above mentioned things, in the role of an active dealer there are certain things that are “must-haves.”
• Decent, updated anti -virus package
• Anti-spyware items
• A proper hardware of software firewall, configured and tested in a proper manner
Ultimately, you should have all the details about your PC. Collect the information like how will it perform, know the type of things it needs to do. If the software firewall stimulates one to permit a program an access that one has earlier allowed access, it is due to the fact that the specific program is infected with Trojan and therefore changed. Or did one reconfigure it? If the PC performs in a poor manner or you lose functionality, the first and the most important thing is to examine it till death and preserve the total number of PC issues which are simply solved.
For full scanning of both viruses and spyware, try to run PC in a safe mode. For doing this, you have to just hit the F8 when the logo of the manufacturer appears on the screen and then select “safe mode” from on-screen prompts. It will begin the Windows with few drivers needed, so one would not have an internet access, but will perform the scanning at a fast rate as there are few running resources. This can be simpler for deleting the infected files as they might not be loaded in the memory and therefore becomes inaccessible.
By following these suggestions mentioned above, one should keep their PC in a proper shape and assists avoid spreading the malicious files to the friends and colleagues. Most of this is good sense and if one follows guidelines that different software packages offer you, there is nothing awful you can do actually. Keep in mind that if one is utilizing Windows ME, XP or 2000, one has a system restoring function found at the Start menu which can most often undo certain issues, even if one has caused these themselves.