Crustyoldbloke's Stuff

What is malware?

Malware (malicious software) comes in many forms including adware, trackware, scumware, thiefware, snoopware, sneakware, keyloggers, Trojans, system monitors, browser hijackers, and dialers. It ranges from benign - adware tracking cookies, which let online companies track your activities on a Web site and tailor pop-up advertising messages based on your choices - to more nefarious spyware programmes like Trojans, keyloggers and system monitors, which are capable of capturing keystrokes, online screenshots, and personal identity information like your social security number, bank account numbers, logins and passwords, or credit card numbers. Some of the symptoms of malware are: sluggish PC performance, increased pop-up ads, unexplained homepage change and mysterious search results.

Where does this malware come from?

There's no doubt in my mind that most malware that we see here at GeeksToGo comes from downloading via peer to peer (P2P) networks. Whilst it is easy to say that you recommend uninstalling all P2P programmes, actually getting a member to do that is almost impossible. It is only when I see a badly infected PC with P2P programmes that I insist on it. Most members accept that it is P2P activities that cause the infections, but few are prepared to do away with the facility. Instead they ask how they can beef-up their security to prevent Trojan attacks. Well, the easy answer is that you can't.

P2P file-sharing is a very popular and easy way for users to share music, movies, videos, and other files over the Internet. However, using P2P software is very risky, because it makes you very susceptible to infection, attack, exposure of personal or company information, and even copyright infringement issues

If you use P2P applications, it is difficult, if not impossible, to verify that the sources of the shared files are safe. P2P applications are often used by attackers to transmit malware. The files may contain spyware, viruses, Trojan horses, or worms. When you download the files, your computer can become infected. Currently, experts have estimated that over 70% of the programmes shared on P2P networks contain some sort of malware.

When using P2P applications, you may unknowingly give other users access to personal or sensitive information that is stored on your computer. People may be able to access your financial or medical data, personal documents, sensitive corporate information, or other private information. If your computer contains other people's or companies' information, you may even become legally liable if their information gets released in this way.

Many P2P applications require you to open specific ports on your firewall to send and receive the shared files through. However, by opening those ports, you may give attackers access to the information on your computer or enable them to attack your computer by taking advantage of any security vulnerabilities that may exist.

Downloading files with these applications causes a significant amount of traffic over your internet connection; it also relies on certain processes to happen on your computer. This activity may adversely limit or even block your access to the Internet while you are running these types of programmes.

Downloading or sharing copyrighted software, music or videos is illegal. If you download them, even unknowingly, you may be faced with fines or other legal actions.

This article lists only a few of the risks that P2P programmes can open you up to. I urge you to strongly consider not using these types of programmes. There are many people in the music industry that are, quite understandably, not in favour of working for free; would you?

Trojans - what are they?

The word Trojan refers to a person from Troy, where a wooden horse was built, and filled with Greek soldiers, who were then dragged within the city to launch an attack against the unsuspecting Trojans. That has been since named as a "Trojan Horse". I think the name Trojan perfectly describes the malware as it does exactly the same. It pretends to be something desirable to get past the antivirus and antimalware scanners, and then opens its payload and does its damage. The AV and AM scanners can be updated to prevent it happening again once the information is known, but then the malware writers just use different stealth techniques to do it all over again, which means that AV and AM scanners are always playing catch-up.

I always advise members to uninstall Incredimail due to their Privacy Policy, but many female members like the graphics it provides and would rather risk the malware than do without the programme, as it is often the last I see of them; they just disappear rather than uninstall it. Their Privacy Policy gives them the right, to bundle third party software to you without your further permission. My usual warning is along the lines of, "Beware of desirable things for FREE"

What do I look for in choosing a topic?

I like these

These are my preferences: Well written topic and within my capabilities. Here's what I mean; well written in that the writer tells of the problem and what has been tried so far. I am not bothered about spelling or punctuation, and I do make allowances for non English speakers. Within my capabilities literally means that I can look at the case and believe I can fix it. If I cannot, I leave it for someone who can, although invariably these cases end up being shut down after 7 days in the waiting room.

I don't like these

Text language, it just takes me too long to work out what I am reading, example F U N E M N X? which is text for Have you any ham and eggs? the youngsters can take those on if they speak "text." The silly juvenile names are ones like, ihateputers or thisisdrivingmemad, as experience tells me that these are kids, and the problem with fixing kids' computers is that, they continue to download more malware whilst you are fixing and if you tell them to do two things, they do twenty, but not the two you asked them to. I don't like obnoxious names either. If you decide to call yourself "Toadspew", don't be too surprised if you don't get help. This is a family friendly site and if your intention is to shock, you are at the wrong place.

We all like common courtesy

Also very important is to thank the person helping you. Remember, I do this for FREE, I like to feel as though my work is being appreciated. One of the ways I can measure this is by the person I am helping saying Thank You; it is common courtesy and the very least you can do. I find it almost unbelievable that members believe that us helpers are here to be taken for granted and they do not have to thank us. I really should not have to remind people of good manners, my signature makes reference to saying Thank You and that should be more than enough. I am not going to work with ill-mannered members; if by their second response they haven’t said Thank You, then I will not respond.

Unacceptable behaviour for me.

Double Posters

Sadly, we have double posters. These are people who post a topic at GeeksToGo and another antimalware website; What an absolute disgrace. What is happening to people's morals, ethics, and good manners? We give a high quality FREE service to our members, but there are always those who will abuse it and have two skilled people doing exactly the same job to the same computer without saying anything to either of them. That is just pure greed, avarice and totally narcissistic. I can understand anyone getting their PC's hit with malware and not having the money those PC repairers want to reformat, posting and hoping for FREE help. I can, with a push, believe that you might post your plea for help at two malware removal sites, especially as it's FREE, but then to allow two experts to sort out one problem is the lowest you can sink to. Not only do you rob someone else of a chance of a FREE clean up, but you actually go so far as to make the two experts compete.

Abandoned Threads

Now abandoned threads are just the epitome of people who are users. They get what they want and they are gone. Some time ago, I started a "10-days of inactivity" regime. Simply put, I send the member a PM after 10 days of inactivity telling them that I am closing the thread and marking it as inactive due to lack of feedback, and warning them that repeats of this may terminate their membership. More than half don't bother to reply, but the ones that do have some really good excuses.

Please do not just abandon your thread even though you may be clean. Someone came to your aid when you needed help. Just because the help is free, there is no need to abuse it. If you were paying $200, €150 or £100, you would want to hear or read every word about your PC. Please do not abuse a free service, otherwise you might lose it.

Staff Skills

HijackThis logs

Some people think that staff members have a little programme to scan HJT logs to find out what is bad and good. Let me categorically deny this; there are such programmes, but they are wildly inaccurate. They are NOT used by staff members at any of the antimalware sites that I know of; we all use our eyes, memory and Google to find the bad guys and remove them. I would advise anyone thinking of having their HJT log analysed by a machine to expect problems. Staff members go through the Geek University here at GeeksToGo and it is only when they are deemed to be at a competent level are they let loose on members' logs with a tutor checking their work. Only when the tutor believes them to be both competent and safe, are they allowed to fly solo.

Donations

Donations and the lack of them would be a better title. The reason many of us staff members have the link is so that we might be compensated for our time spent in a continual learning environment, and our cost of replacing equipment long before we would if we did not use our computers so much helping others. It also helps us to afford to buy new software when it comes out (Vista for example), so that we can become accustomed to it and give advice. I see a donation as a way that you can say THANKS for the help you receive that probably saved you a small fortune had you gone to a PC repairer. If you can afford a PC and an ISP, surely you can afford a small donation.

Many talented people go through the rigorous training here at Geeks To Go, and in fairness, not that many make it. The ones that do seem to quit quite soon afterwards for whatever reason, but I will wager often it's because they think they will generate some funds and it doesn't materialise. Based on that scenario, people like me will find work for pay and not do any free fixing.

Stop Press

Unfortunately, Meniere's has bitten back and prevented me from being well enough to continue removing malware from members' PC's; I hope to return soon.