{"id":5,"date":"2009-11-20T14:31:38","date_gmt":"2009-11-20T20:31:38","guid":{"rendered":"http:\/\/www.tallhorse.com\/blog\/?p=5"},"modified":"2010-09-22T13:40:57","modified_gmt":"2010-09-22T19:40:57","slug":"malware-information","status":"publish","type":"post","link":"https:\/\/www.tallhorse.com\/blog\/2009\/11\/malware-information\/","title":{"rendered":"Malware Information"},"content":{"rendered":"<p>Recently, we have been seeing a rash of computers that have had <strong>malware<\/strong> (software designed to infiltrate or damage a computer system without the owner&#8217;s <a title=\"Informed consent\" href=\"http:\/\/en.wikipedia.org\/wiki\/Informed_consent\">informed consent<\/a>) installed.\u00a0 The information below should help you avoid this problem.<\/p>\n<p>The main programs we have been seeing are AV360, Antivirus 2008, Antivirus 2009 and XP Police Antivirus.\u00a0 These applications launch a program on your computer telling you they have found viruses on your system, and for a fee, this program will remove them.\u00a0 Unfortunately, even if you were to \u201cpurchase\u201d the program, the files would not be removed.\u00a0 Neptune currently uses McAfee Anti-virus software to protect our systems.\u00a0 However, any anti-virus program can miss new computer parasites.<\/p>\n<p>Malware is a term that is used to describe all malicious code, including spyware, adware, and browser hijackers.\u00a0 Malware is normally installed on one system and does not propagate as an e-mail virus does.<\/p>\n<p>The following are symptoms of possible malware:<\/p>\n<ul>\n<li>Sluggish computer performance<\/li>\n<li>Annoying pop-ups that don&#8217;t seem to be connected to      Internet activity<\/li>\n<li>Internet Bookmarks you didn&#8217;t add<\/li>\n<li>A change in your designated Home Page<\/li>\n<li>A web search tool bar that you don\u2019t recall installing<\/li>\n<li>Anti-virus      program picks up a Trojan, Trojan Horse or Worm<\/li>\n<\/ul>\n<p>If you download &#8220;free&#8221; software it may come bundled with tracking software (spyware) that keeps track of your keystrokes and reports the data back to advertisers. These free programs include, but are not limited to \u201cfree\u201d screen savers, \u201cfree\u201d web search engines and \u201cfree\u201d music sharing.\u00a0 Malware can be bundled with the software you are installing, but you might not be aware of it.<\/p>\n<p>There are also products that display advertising pop-ups (adware) based on data collected. Adware is a marketing tool used to find out which web sites you are visiting, so the pop-ups can be tailored to you.\u00a0 Since this software is continuously &#8220;calling home&#8221; using your internet connection, it can significantly slow down the performance of your computer.<\/p>\n<p>Browser hijackers can redirect your internet start page or change the default search service you have set. These files can automatically install when you visit a web site or may ask for permission in a confusing way that can trick you into consenting.\u00a0 Often the pop-ups are written in such a way that clicking &#8220;no&#8221; will actually allow the software to be loaded on your machine.\u00a0 They may present a dire warning, such as the anti-virus \u201cproducts\u201d listed above, that will tell you your computer is infected and you need to clean it with the suggested application immediately.<\/p>\n<p>Not all computer slow-downs are due to malware.\u00a0 Some may be software or hardware related.<\/p>\n<p>The best ways to avoid these problems are to know the web sites you are visiting.\u00a0 We all try to conduct research on the Internet, to find the best product we can. As more malware and spyware is created, the more careful we need to be.\u00a0 This issue can not only affect your work computer, but also your home computer.\u00a0 Additionally, if you suddenly start receiving pop-ups on your work system, especially having to do with viruses found on your system, contact your IT help desk.\u00a0 If you receive these pop-ups on your system, do <strong>NOT<\/strong> click or attempt to purchase these items.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, we have been seeing a rash of computers that have had malware (software designed to infiltrate or damage a computer system without the owner\u2019s informed consent) installed.  The information below should help you avoid this problem.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-5","post","type-post","status-publish","format-standard","hentry","category-computer-help"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/posts\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":6,"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/posts\/5\/revisions"}],"predecessor-version":[{"id":7,"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/posts\/5\/revisions\/7"}],"wp:attachment":[{"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/media?parent=5"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/categories?post=5"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tallhorse.com\/blog\/wp-json\/wp\/v2\/tags?post=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}