Pages

Saturday, April 23, 2011

Using Social Networking Sites to Find Dates

The Advantages and Disadvantages to Using Social Networking Sites to Find Dates

Have you been looking for love, but in all of the wrong places?  Many singles are fed up with the traditional bar scene; therefore, many are looking for alternatives when it comes to meeting and possibly falling in love with someone.  One of those alternatives is online dating. Online dating has skyrocketed in popularity.  Millions of Americans have turned to the internet in hopes of finding love.  If you are thinking about doing the same, you may be wondering if it is really worth it.  To determine whether or not it is, you are advised to examine the advantages and disadvantages of online dating.

Before you can begin to examine the advantages and disadvantages of using your social networking website for dating, it is important to remember one thing.  There are two main types of social networking websites.  The first type is often classified as traditional networking websites.  These websites are websites that tend to have an open membership. An open membership means that anyone can join them. The second type are known as specialty social networking websites. Specialty social networking websites tend to focus on a particular topic or interest, such as online dating.

One thing that you may not know about online dating and social networking is that they are almost always connected. When many individuals go in search for love online, many head to online dating websites. Did you know that online dating websites are actually socially networking websites?  What sets online dating websites apart from traditional social networking sites is that all of the individuals who are a part of the online community are looking to find love. In fact, that is one of the many advantages to using social networking websites, especially those with a focus on relationships.

When you join a traditional social networking site, one that allows all different types of internet users to join, it is often hard to tell what many are looking for. A large number of network users are looking for love, but many more are only looking for friendships.  Online dating websites help to eliminate confusion and awkward moments, especially when approaching someone who is not interested in starting a relationship.

Another one of the many benefits to using online social networking sites to find a date is that you literally have an unlimited number of different choices. Social networking websites have expended overtime.  In fact, many networks have as many as a million members. This means that if you are looking for love online, there is a good chance that you can find a love interest online. In fact, you could probably find more than one!

Although social network dating has its advantages, there are disadvantages as well. One of the main disadvantages is the cost of using the networks service. As previously mentioned, online dating websites are the best type of social network to join, especially if you are looking for a romantic partner.  Unfortunately, unlike most traditional networking sites, most dating sites require a paid membership. To many this membership is worth the cost, but overtime it could get quite expensive and you are not guaranteed any results.

In addition to the cost of dating online, there are a large number of safety concerns that could be considered disadvantages as well.  Unfortunately, the internet has made it easy for individuals to claim to be someone who they are not. Essentially, this means that you could be starting an online relationship with someone who is not as they look in their photos or their personality is not as they described to you.  While this will not only lead to disappointment when you find out, it could also lead to danger.  There have been numerous reports of instances where online dates resulted in abuse or murder; therefore, you are always urged to be careful and meet your dates in a safe, public place.

The above mentioned advantages and disadvantages of social networking dating are just a few of the many.  One you have examined all of these advantages and disadvantages, you can compare the two. If you find that the advantages outweigh the disadvantages then social networking and dating might be right for you.

Ir.Zulkronz

I fell somebody skodeng me or what that?????

Why Do I Feel Like Somebody’s Watching Me?

Spyware is one of the fastest-growing internet threats.  According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today.  These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the user’s knowledge.  Once embedded in a computer, it can wreak havoc on the system’s performance while gathering your personal information.  Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate.  

Where does it come from?
Typically, spyware originates in three ways.  The first and most common way is when the user installs it.  In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user’s knowledge.  The user downloads the program to their computer.  Once downloaded, the spyware program goes to work collecting data for the spyware author’s personal use or to sell to a third-party.  Beware of many P2P file-sharing programs.  They are notorious for downloads that posses spyware programs.

The user of a downloadable program should pay extra attention to the accompanying licensing agreement.  Often the software publisher will warn the user that a spyware program will be installed along with the requested program.  Unfortunately, we do not always take the time to read the fine print.  Some agreements may provide special “opt-out” boxes that the user can click to stop the spyware from being included in the download.  Be sure to review the document before signing off on the download.

Another way that spyware can access your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations.  The Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads.  That is why the user has to initiate a download by clicking on a link.  These links can prove deceptive.  For example, a pop-up modeled after a standard Windows dialog box, may appear on your screen.  The message may ask you if you would like to optimize your internet access.  It provides yes or no answer buttons, but, no matter which button you push, a download containing the spyware program will commence. Newer versions of Internet Explorer are now making this spyware pathway a little more difficult.

Finally, some spyware applications infect a system by attacking security holes in the Web browser or other software.  When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.

What can spyware programs do?

Spyware programs can accomplish a multitude of malicious tasks.  Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.

Spyware can:
1.            Monitor your keystrokes for reporting purposes.
2.            Scan files located on your hard drive.
3.            Snoop through applications on our desktop.
4.            Install other spyware programs into your computer.
5.            Read your cookies.
6.            Steal credit card numbers, passwords, and other personal information.
7.            Change the default settings on your home page web browser.
8.            Mutate into a second generation of spyware thus making it more difficult to        eradicate.
9.            Cause your computer to run slower.
10.        Deliver annoying pop up advertisements.
11.        Add advertising links to web pages for which the author does not get paid.  Instead, payment is directed to the spyware programmer that changed the original affiliate’s settings.
12.        Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove.

Spyware Examples
Here are a few examples of commonly seen spyware programs.  Please note that while researchers will often give names to spyware programs, they may not match the names the spyware-writers use. 

CoolWebSearch, a group of programs, that install through “holes” found in Internet Explorer. These programs direct traffic to advertisements on Web sites including coolwebsearch.com. This spyware nuisance displays pop-up ads, rewrites search engine results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites. 
Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.
180 Solutions reports extensive information to advertisers about the Web sites which you visit.  It also alters HTTP requests for affiliate advertisements linked from a Web site.  Therefore the 180 Solutions Company makes an unearned profit off of the click through advertisements they’ve altered.
HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs.  It’s a prime example of how spyware can install more spyware.   These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.

How can I prevent spyware?
There are a couple things you can do to prevent spyware from infecting your computer system.  First, invest in a reliable commercial anti-spyware program.  There are several currently on the market including stand alone software packages such as Lavasoft’s Ad-Aware or Windows Antispyware.  Other options provide the anti-spyware software as part of an anti-virus package.  This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any found spyware software.   As with most programs, update your anti virus software frequently. 

As discussed, the Internet Explorer (IE) is often a contributor to the spyware problem because spyware programs like to attach themselves to its functionality.  Spyware enjoys penetrating the IE’s weaknesses.  Because of this, many users have switched to non-IE browsers.  However, if you prefer to stick with Internet Explorer, be sure to update the security patches regularly, and only download programs from reputable sources.  This will help reduce your chances of a spyware infiltration.
. 
And, when all else fails?
Finally, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.

45000 Type Of Virus attack Computer

Computer Viruses that Come a Carlin

Every day new computer viruses are created to annoy us and to wreck havoc on our computer systems. Below are ten viruses currently cited as being the most prevalent in terms of being seen the most or in their ability to potentially cause damage.   New viruses are created daily.  This is by no means an all inclusive list. The best thing you can do is to remain vigilant, keep your anti-virus software updated, and stay aware of the current computer virus threats.

Virus:  Trojan.Lodear
A Trojan horse that attempts to download remote files. It will inject a .dll file into the EXPLORER.EXE process causing system instability.

Virus:  W32.Beagle.CO@mm
A mass-mailing worm that lowers security settings.  It can delete security-related registry sub keys and may block access to security-related websites.

Virus:  Backdoor.Zagaban
A Trojan horse that allows the compromised computer to be used as a covert proxy and which may degrade network performance.

Virus: W32/Netsky-P
A mass-mailing worm which spreads by emailing itself to addresses produced from files on the local drives.

Virus:  W32/Mytob-GH
A mass-mailing worm and IRC backdoor Trojan for the Windows platform.  Messages sent by this worm will have the subject chosen randomly from a list including titles such as:  Notice of account limitation, Email Account Suspension, Security measures, Members Support, Important Notification.

Virus:  W32/Mytob-EX
A mass-mailing worm and IRC backdoor Trojan similar in nature to W32-Mytob-GH.  W32/Mytob-EX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.  This virus spreads by sending itself to email attachments harvested from your email addresses.

Virus:  W32/Mytob-AS, Mytob-BE, Mytob-C, and Mytob-ER
This family of worm variations possesses similar characteristics in terms of what they can do.   They are mass-mailing worms with backdoor functionality that can be controlled through the Internet Relay Chat (IRC) network.   Additionally, they can spread through email and through various operating system vulnerabilities such as the LSASS (MS04-011).

Virus:  Zafi-D
A mass mailing worm and a peer-to-peer worm which copies itself to the Windows system folder with the filename Norton Update.exe.  It can then create a number of files in the Windows system folder with filenames consisting of 8 random characters and a DLL extension.  W32/Zafi-D copies itself to folders with names containing share, upload, or music as ICQ 2005a new!.exe or winamp 5.7 new!.exe. W32/Zafi-D will also display a fake error message box with the caption "CRC: 04F6Bh" and the text "Error in packed file!".

Virus:  W32/Netsky-D
A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the LSASS (MS04-011) exploit.


Virus: W32/Zafi-B
A peer-to-peer (P2P) and email worm that will copy itself to the Windows system folder as a randomly named EXE file. This worm will test for the presence of an internet connection by attempting to connect to www.google.com or www.microsoft.com.  A bilingual, worm with an attached Hungarian political text message box which translates to “We demand that the government accommodates the homeless, tightens up the penal code and VOTES FOR THE DEATH PENALTY to cut down the increasing crime. Jun. 2004, Pécs (SNAF Team)”