COMPUTER BACKUPS

by: Jack Back

COMPUTERS AND HALLOWEEN, DO THEY MIX?

Computer backup is so important to your computer that to ignore it is to risk its damnation.

Computers require care and feeding. They require that you attend to their needs. If you don’t, then they will most surely be sent to Hell.

Halloween means Hell. What! What do you mean that Halloween means Hell?

Well, if your computer is given the option of trick or treat, which will it accept? Will it accept the trick or the treat? What do you think?

Halloween is the time that computers are subject to tricks or treats. Did you know that more computers fail on Halloween than any other day of the year? That’s right. It’s true (smile). Your computer is in danger! Protect it. Do your computer backups.

Back to the Hell thing. Hell you say? Yep. Well, what do you mean by Hell?

Computer hell is the place for computers without computer backup. The failure to perform hard drive backup means that you are playing Russian Roulette with your data. Data needs your protection. Failure to protect your data may cause your home or business records to be sent to Hell.

Hell in this instance is for the records and files that cannot be resurrected. Resurrected you say, what does that mean?

It means that without computer backup as a source of salvation then the files can safely enjoy eternal oblivion. Oblivion you say, what does that mean? That means they are eternally lost from computer resurrection.

Is there any mercy for my precious files, you ask?

Why yes there is. Would like to know what the mercy for your files is? Yes! Yes! You say.

OK boys and girls listen carefully. The salvation, mercy, resurrection and redemption of your files lies in regular and consistent and persistent computer backup.

If you backup your computer consistently and persistently your files will be resurrected and saved from accidental deletion, hard drive failure and those nasty things like fire, flood, theft, earthquake, hurricanes, tornados and the like!

Computer backup is the key to your data’s salvation!

Do your computer backups boys and girls.

Milk and cookies will be served in the pantry.

Trick or treat for your computer backup?

About the author:
Jack Back has been a working computer consultant company owner since 1991. He started in IT in 1983. Now get your FREE 2 part guide on how to save your precious computer data from loss at the http://www.tweakspeed.com/Computer-Backup-1.htm website.

Circulated by Article Emporium

Adware: How to Beat the Sneakiest Software

by: Joel Walsh

Promoters of adware, software that shows advertising on a user’s computer, use some cunning tricks to get you to install their software on your machine.

Here’s what to look out for.

Adware is, by definition, something reasonable people don’t want on their computers. That’s why malware can’t just come out and ask people to install it.

Often, the computer owner is completely unaware of it being installed. But not always.

When adware doesn’t want to sneak in through an open window, it will try to trick you into letting it in through the front door. Don’t think you could be

tricked? Don’t be so sure until you’ve checked out these most common ways people have been tricked into allowing malware to be installed on their machines.

Adware Installation Trick 1: Piggybacking

• How it works: malware may come bundled with a legitimate piece of software the user actually wants, such as a game or emoticon. The malware is

merely labeled “companion software,” without any indication of what it will do.
• How to fight it: be very suspicious of any software that comes bundled with other software. Don’t installed software that comes bundled with other

software unless you know everything that the bundled software does. After all, if the bundled program has anything to do with the program you actually want,

why couldn’t the software developer just get both programs’ functionalities into a single piece of software? Software developers are now very sensitive to

malware concerns and will provide a lengthy explanation of just why the bundled software is necessary, in the cases when they actually do need to use bundled

software.

Adware Installation Trick 2: Bait and Switch

• How it works: since people are getting more and more suspicious of bundled software, the malware’s developers may simply label it as valuable

software, for instance, a browser plugin that supposedly accelerates web browsing (but in reality only shows ads).
• How to fight it: again, a suspicious mind is useful in avoiding malware. Ask yourself some questions:
o What will this software actually do? Malware often comes with very fuzzy claims attached. Sure, it says it will improve your browsing experience,

but how? Often, this improved browsing experience just means a browsing experience with more advertising.
o If the software is so great, why is it being given away free? Most commonly, software is only given out free in two cases: if it’s OpenSource

(designed by a community of developers and not proprietary–OpenSource software is always clearly labeled as such); or simply a come-on for a fuller-featured

version of the software. If neither case is true, there’s a real chance the software is financed by adware.

Adware Installation Trick 3: Outright Lying

• How it works: malware may even be labeled as something else entirely, such as a well-known piece of software or a crucial component of the computer

operating system.
• How to fight it: this is the trickiest malware of all, and requires extreme caution. You don’t want to start deleting any of your program files,

much less your system registry entries, unless you’re absolutely sure it’s malware. Plenty of overzealous parasite hunters have shot their own machines to

bits this way. This is one case where you want to be using an anti-spyware program, and preferably a second anti-spyware program to provide a second

opinion.

Getting Rid of Adware

Adware is so tricky that trying to uninstall it by yourself could be like a trip into the Matrix. Luckily, there are good anti-spyware programs that tackle

adware as well–after all many adware programs are also spyware since they monitor your internet usage.
True, it may feel like adding insult to injury to have to install more software to get rid of software you never meant to install in the first place. But

sometimes you just have to fight fire with fire.

About the author:
About the author: Joel Walsh has written a companion article on stealth tactics used by adware: http://www.spyware-refuge.com?%20virus%20protection

[Publishthis article on your website! Requirement: live link for above URL/web address w/ link text/anchor text: “virus protection” OR leave this bracketed message

intact.]

Circulated by Article Emporium