McAfee VirusScan

Never go online without the latest anti-virus protection. Fast-spreading mass-mailing viruses, worms and Trojans like Mydoom, Bagle and Sasser can easily infect exposed PCs over dial-up or broadband connections, forward themselves to your email contacts and even help remote hackers hijack personal information.

That’s why award-winning McAfee VirusScan-trusted by millions worldwide-automatically scans your email, attachments, shared disks and downloads, then immediately starts to clean or quarantine infections. Easy to download, install and use, McAfee VirusScan automatically checks for virus updates* whenever you connect to the Internet, so your protection stays up-to-date against the latest threats, including spyware.

Features

  • Prevents viruses when emailing, downloading and surfing
  • Destroys viruses and virus-like threats
  • Identifies spying and pop-up ad programs
  • Updates automatically to protect against new threats

System Requirement

  • Windows 98, ME, 2000, or XP
  • Pentium 133 MHz
  • Minimum 16 MB RAM; 32 MB recommended
  • 8 MB free hard-drive space
  • Microsoft Internet Explorer 5.5 or higher

Purchasing Information

McAfee VirusScan can be purchased as a downloadable package or on CD with documentation.

Visit McAfee for information regarding purchasing.

Norton AntiVirus

Symantec’s Norton AntiVirus™ 2005 is the world’s most trusted antivirus solution. It removes viruses, worms, and Trojan horses automatically without interrupting your work. New Norton™ Internet Worm Protection blocks certain more sophisticated worms (such as Blaster and Sasser) before they enter your computer. Norton AntiVirus can also detect spyware and other non-virus threats.

Features

  • Norton™ Internet Worm Protection stops certain damaging Internet worms at their attempted point of entry.
  • QuickScan tool automatically searches for and removes viruses whenever new virus protection updates are downloaded.
  • PreInstall Scan quickly detects and removes infections that can interfere with installing and launching Norton AntiVirus.
  • Automatically removes viruses, worms, and Trojan horses.
  • Scans and cleans both incoming and outgoing email messages.
  • Blocks viruses in instant message attachments.
  • Detects spyware and certain non-virus threats such as adware and keystroke logging programs.
  • Scans compressed file archives before you open them and risk infecting your computer.
  • Downloads new virus protection updates automatically to protect against new threats.

System Requirement

Windows XP Home Edition/Professional

  • 300MHz processor or higher
  • 128 MB of RAM
  • 125 MB of available hard disk space

Windows 2000 Professional

  • 133MHz or higher processor
  • 64 MB of RAM
  • 125 MB of available hard disk space

Windows Me

  • 150MHz or higher processor
  • 64 MB of RAM
  • 90 MB of available hard disk space

Windows 98

  • 133MHz or higher processor
  • 64 MB of RAM
  • 90 MB of available hard disk space

REQUIRED FOR ALL INSTALLATIONS

  • DVD or CD drive
  • Microsoft® Internet Explorer 5.5 or later

Purchasing Information

Norton AntiVirus can be purchased as a downloadable package or on CD with documentation.

Visit Symantec for information regarding purchasing.

Lavasoft Ad-Aware

What is AdAware?

Most people are familiar with freeware, shareware, cookies, media players, interactive content, and file sharing. What they may not realize is that some of the aforementioned may contain code or components that allow the developers of these applications and tools to actually collect and disseminate information about those using them.
They can track your surfing habits, abuse your Internet connection by sending this data to a third party, profile your shopping preferences, hijack your browser start page or pages, alter important system files, and can do this without your knowledge or permission. The security and privacy implications of these exploits should be quite obvious and undesirable on any system or network!

Lavasoft is the industry leader and most respected provider of anti Trackware solutions. We have developed several applications that will provide you with the means to keep your computer or network free of these compromising and intrusive threats to your privacy.

System Requirements

Operating Systems

  • Windows 98
  • Windows 98SE
  • Windows ME
  • Windows NT 4.0
  • Windows 2000
  • Windows XP (Recommended)

Download Locations

Lavasoft Main Site

Direct Download Link: http://www.lavasoftusa.com/support/download/

Spybot – Search & Destroy

What is Spybot?

Spybot – Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not yet cover. If you see new toolbars in your Internet Explorer that you didn’t intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don’t see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies. Spybot-S&D is free, so there’s no harm in trying to see if something snooped into your computer.

Check out the Spybot website for threat removal, tutorials and compatibility issues.

System Requirements

Operating Systems

  • Windows 98
  • Windows 98SE
  • Windows ME
  • Windows NT 4.0
  • Windows 2000
  • Windows XP (Recommended)

Download Locations

Spybot Main Site

Direct Download Link: http://www.safer-networking.org/en/mirrors/index.html

Opera

Opera Features 

Search directly in address field
By prefixing search terms by the search engine’s shortcut keyword, for example “g” for Google, as in “g Medium-Screen Rendering”, you can perform searches directly from the address field.

Pop-up blocking
Opera lets the user control whether Web sites can use pop-ups. Select to block them all, or let the browser open only pop-ups that you have requested.

Opera Mail
In Opera’s e-mail client, the full text of messages are indexed to allow for speedy searches. There is a built-in spam filter that learns as you add and remove messages. Starting with Opera 7.50, you can use Opera Mail to read RSS newsfeeds. Opera Mail also handles Usenet newsgroups.

Sessions
Opera lets you save a collection of open pages as a session, allowing for retrieval on later start-ups, or in the middle of another session. Opera can also be set up to start with the pages you had open when the browser was last closed.

Multiple Document Interface
Opera is by default a Multiple Document Interface application, displaying multiple pages in the same application window, allowing you to resize and pose pages next to each other. However, Opera can also be made to work as a Single Document Interface application, a tabbed application, or with a combination of the Multiple and Single Document Interface, running multiple instances and windows at the same time.

The Wand password manager
Opera’s password manager, the Wand, remembers your usernames and passwords so you will not have to. Log in manually once and use the Wand for later visits to a password-protected Web site.

System Requirement

Operating Systems

  • Windows 98
  • Windows 98SE
  • Windows ME
  • Windows NT 4.0
  • Windows 2000
  • Windows XP (Recommended)

Opera also supports Mac, Linux, and other platforms. Please view go to www.opera.com for more information.

Download Locations

Opera Main Site

Direct Download Link: http://www.opera.com/download

Netscape

Why Netscape?

More and more people are interested in choosing their software rather than just using what comes loaded on their machines. Netscape 7.2 offers you a real choice.
You get more done with Netscape 7.2 because it fits the way you use the Web.
  • Improved pop-up window blocking control
  • New Macromedia ® Flash 7 plugin
  • Password Manager
  • Palm Sync Improvements
  • Improved browser rendering speed and application start-up

It’s never been a better time to switch to Netscape 7.2
Download this next generation browser from Netscape and see for yourself why the experts are praising the quality and performance of Netscape 7.2.

Questions about switching?
We have made it easy for you to switch. We’ll even automatically bring over your browser preferences and favorites. Consult Netscape’s Website for specific answers to questions you might have. Since Netscape 7.2 runs out of its own directory, installing it doesn’t overwrite any of your existing software.

System Requirements

Operating Systems

  • Windows 98
  • Windows 98SE
  • Windows ME
  • Windows NT 4.0
  • Windows 2000
  • Windows XP

Minimum Hardware

  • Pentium 233 MHz (Recommended: Pentium 500MHz or greater)
  • 64 MB RAM (Recommended: 128 MB RAM or greater)
  • 26 MB hard drive space 

Netscape also supports Mac, Linux, and other platforms. Please view go to www.netscape.com for more information.

Download Locations 

Netscape Main Site

Direct Download Link: http://channels.netscape.com/ns/browsers/download.jsp

Mozilla Firefox

Firefox Features

Popup Blocking 
Stop annoying popup ads in their tracks with Firefox’s built in popup blocker.

Tabbed Browsing 
View more than one web page in a single window with this time saving feature. Open links in the background so that they’re ready for viewing when you’re ready to read them. Find out more…

Privacy and Security 
Built with your security in mind, Firefox keeps your computer safe from malicious spyware by not loading harmful ActiveX controls. A comprehensive set of privacy tools keep your online activity your business.

Smarter Search 
Google Search is built right into the toolbar, and there are a plethora of other search tools including Keywords (type “dict <word>” in the Location Bar), and the new find toolbar (which finds as you type and eliminates the annoying window that always seems to be in your way).

Fits Like a Glove 
Simple and intuitive, yet fully featured, Firefox has all the functions you’re used to – Bookmarks, History, Full Screen, Text Zooming to make pages with small text easier to read, etc.

System Requirements

Operating Systems

  • Windows 98
  • Windows 98SE
  • Windows ME
  • Windows NT 4.0
  • Windows 2000
  • Windows XP (Recommended)

Minimum Hardware

  • Pentium 233 MHz (Recommended: Pentium 500MHz or greater)
  • 64 MB RAM (Recommended: 128 MB RAM or greater)
  • 52 MB hard drive space

Mozilla Firefox also supports Mac, Linux, and other platforms. Please view go to www.mozilla.org for more information.

Download Locations

Mozilla Main Site

Direct Download Link: http://www.mozilla.org/products/firefox/download.html

What is Spyware?

Spyware is Internet jargon for Advertising Supported software (Adware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don’t have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Why is it called “Spyware”?

While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously “calling home”, using your Internet connection and reports statistical data to the “mothership”. While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a “live” server sitting on your PC that is sending information about you and your surfing habits to a remote location.

Are all Adware products “Spyware”? 

No, but the majority are. There are also products that do display advertising but do not install any tracking mechanism on your system. These products are not indexed in our database.

Is Spyware illegal? 

Even though the name may indicate so, Spyware is not an illegal type of software in any way. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product. This usually involves the tracking and sending of data and statistics via a server installed on the user’s PC and the use of your Internet connection in the background.

What is Spam?

A “spam” e-mail is generally defined as an unsolicited mailing, usually to many people. A message written for, and mailed to, one individual that is known to the sender is not spam, and a reply to an e-mail is not spam, unless the “reply” repeats endlessly.

Spam e-mailers have become a separate part of the Internet, with their own host computers, methods, and politics. Many Internet sites have begun to forbid spamming, for several reasons – one is a sense that it is unethical, another is that, over time, other Internet sites will stop all e-mail from that site and thus prevent legitimate e-mail from getting through. As a result, spammers have begun to set up their own Internet sites — sites that cater to, or encourage, spamming.

Spam Do’s and Dont’s


Never respond to a spam e-mail.

For a spammer, one “hit” among thousands of mailings is enough to justify the practice. Instead, if you want a product that is advertised in a spam e-mail, go to a Web site that also carries the product, inquire there, and tell them you do not approve of spam methods and will not patronize a company that uses spammers.

Never respond to the spam e-mail’s instructions to reply with the word “remove.”

This is just a trick to get you to react to the e-mail — it alerts the sender that a human is at your address, which greatly increases its value. If you reply, your address is placed on more lists and you receive more spam.

Never sign up with sites that promise to remove your name from spam lists.

These sites are of two kinds: (1) sincere, and (2) spam address collectors. The first kind of site is ignored (or exploited) by the spammers, the second is owned by them — in both cases your address is recorded and valued more highly because you have just identified it as read by a human.

Tips for Avoiding Spam


Read carefully when filling out online forms requesting your e-mail address, and exercise your choice.

If you don’t want to receive e-mail from a Web site operator, don’t give them your e-mail address unless they offer the option of declining to receive e-mail and you exercise that option. If you are asked for your e-mail address in an online setting such as a form,make sure you pay attention to any options discussing how the address will be used. Pay attention to check boxes that request the right to send you e-mails or share your e-mail address with partners. Read the privacy policies of Web sites.

Use a filter.

Many ISPs and free e-mail services now provide spam filtering. While filters are not perfect, they can cut down tremendously the amount of spam a user receives.

Short e-mail addresses are easy to guess, and may receive more spam.

E-mail addresses composed of short names and initials like bob@ or tse@, or basic combinations like smithj@ or toms@ will probably receive more spam. E-mail addresses need not be incomprehensible, but a user with a common or short name may want to modify or add to it in some way in his or her e-mail address.

Disguise e-mail addresses posted in a public electronic place.

You will received the most spam just by placing an e-mail address at the bottom of a webpage. Spammers “harvest” these addresses with computer programs that collect and process addresses and add them to spam mailing lists. If a user must post his/her e-mail address in a public place, it is useful to disguise the address through simple means such as replacing “example@domain.com” with “example at domain dot com” or other variations such as the HTML numeric equivalent, in which “example@domain.com” could be written:

&#101;&#120;&#097;&#109;&#112;&#108;&#101;&#064;&#100;
&#111;&#109;&#097;&#105;&#110;&#046;&#099;&#111;&#109;

If your employer places your e-mail address online, ask the Webmaster to make sure it is disguised in some way.

What is a Trojan?

A trojan virus is a small program that runs hidden on an infected computer. The trojan gives hackers access to get stored passwords from your computer, read your personal documents, delete files and break your computer, display pictures, and/or show messages on your screen.

How did I get infected?

Trojans are executable programs, which means that when you open the file, it will perform some action(s). In Windows, executable programs have file extensions like “exe”, “vbs”, “com”, “bat”, etc. Some actual trojan filenames include: “dmsetup.exe” and “LOVE-LETTER-FOR-YOU.TXT.vbs” (when there are multiple extensions, only the last one counts, be sure to unhide your extension so that you see it).

Trojans can be spread in the guise of literally ANYTHING people find desirable, such as a free game, movie, song, etc. Victims typically downloaded the trojan from a WWW or FTP archive, got it via peer to peer file exchange using IRC/instant messaging/Kazaa etc., or just carelessly opened some email attachment. Trojans usually do their damage silently. The first sign of trouble is often when others tell you that you are attacking them or trying to infect them!

How do I avoid getting infected in the future?

You must be certain of BOTH the source AND content of each file you download! In other words, you need to be sure that you trust not only the person or file server that gave you the file, but also the contents of the file itself.

Here are some practical tips to avoid getting infected:

• NEVER download blindly from people or sites which you aren’t 100% sure about. In other words, as the old saying goes, don’t accept candy from strangers. If you do a lot of file downloading, it’s often just a matter of time before you fall victim to a trojan.

• Even if the file comes from a friend, you still must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel. There is seldom reason for a friend to send you a file that you didn’t ask for. When in doubt, ask them first, and scan the attachment with a fully updated anti-virus program.

• Beware of hidden file extensions! Windows by default hides the last extension of a file, so that innocuous-looking “susie.jpg” might really be “susie.jpg.exe” – an executable trojan! To reduce the chances of being tricked, unhide those pesky extensions.

• NEVER use features in your programs that automatically get or preview files. Those features may seem convenient, but they let anybody send you anything which is extremely reckless. For example, never turn on “auto DCC get” in mIRC, instead ALWAYS screen every single file you get manually. Likewise, disable the preview mode in Outlook and other email programs.

• Never blindly type commands that others tell you to type, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts (not even popular ones). If you do so, you are potentially trusting a stranger with control over your computer, which can lead to trojan infection or other serious harm.

• Don’t be lured into a false sense of security just because you run anti-virus programs. Those do not protect perfectly against many viruses and trojans, even when fully up to date. Anti-virus programs should not be your front line of security, but instead they serve as a backup in case something sneaks onto your computer.

How do I get rid of trojans?

Here are your many options, none of them are perfect. I strongly suggest you read through all of them before rushing out and trying to run some program blindly. Remember – that’s how you got in this trouble in the first place. Good luck!

Clean Re-installation: Although arduous, this will always be the only sure way to eradicate a trojan or virus. Back up your entire hard disk, reformat the disk, re-install the operating system and all your applications from original CDs, and finally, if you’re certain they are not infected, restore your user files from the backup. If you are not up to the task, you can pay for a professional repair service to do it.

Anti-Virus Software: Some of these can handle most of the well known trojans, but none are perfect, no matter what their advertising claims. You absolutely MUST make sure you have the very latest update files for your programs, or else they will miss the latest trojans. Compared to traditional viruses, today’s trojans evolve much quicker and come in many seemingly innocuous forms, so anti-virus software is always going to be playing catch up. Also, if they fail to find every trojan, anti-virus software can give you a false sense of security, such that you go about your business not realizing that you are still dangerously compromised. There are many products to choose from, but the following are generally effective: AVP,PC-cillin, and McAfee VirusScan. All are available for immediate downloading typically with a 30 day free trial. Anti-Trojan Programs: These programs specialize in trojans instead of general viruses. For the same reasons, some of these programs are effective against most trojans, but none of them will ever be effective against all trojans.