Home Services About Us Contact Us Links Disclaimer



We offer pick up and delivery or onsite repairs! (within 30 miles)

Call us for pricing at 775-720-9287 or Email us


Home of the $80.00 Malware removal!


Difference between Virus, Worms, Trojan and Spyware

Virus: A virus is a self replicating program that attaches itself to an executable file. When the file is executed the virus automatically gets executed and enters into system memory. Once it enters into system memory it either searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.

Worms: Worms are very similar to viruses but differ in way that they don’t bind themselves to executable files instead to replicate themselves they use the network. If you find excessive use of your network bandwidth then you may be infected by a worm. So a worm doesn’t require a user to execute any file for its execution it can work without user intervention.

Trojan horse: A Trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to facilitate unauthorized remote access to the computer. Trojans do not replicate themselves.

Spyware: A spyware is a program that secretly monitors and collects pieces of information. They usually run in stealth mode and cannot be detected easily. Key logger is a great example of spyware software. There are not limited to just spying but can also send data to remote computers

Key loggers

Key loggers also known as key Stroke recorders are the software that can record the key strokes. These are used in phishing websites to steal your username and password. These key loggers can also be installed on a computer and they can send usernames and passwords using your Internet connection. You can protect yourself using special tips and tricks. And if you follow the guidelines we are providing your username and password will be safe even if a key logger has been already installed on your system. Here are the tips and tricks to protect yourself from the key loggers

1. Enable Your Firewall:

Firewalls don’t stop the key loggers from entering into your PC But they can help in stopping the key loggers from sending your information. It is always recommended that you install a good firewall software to protect your computer from unauthorized access. By default Microsoft windows firewall is enabled.

2. Use Good Antivirus Software and Avoid Downloading cracked Software.

Use good antivirus software like Avg. They certainly provide a lot of protection against key logger. Using a special Antispyware program also helps. And avoid downloading software which has been cracked. Also avoid using torrents as much as you can because torrents is the hub of viruses and home of hackers.

Now we will discuss how to fool key loggers

If you believe that there is a key logger in your system then you can do the following things to protect yourself

1. Instead of typing your username and password using your keyboard type it using On Screen Keyboard. On Windows platform it can be opened By typing "osr" in run. Or in Widows Vista start, accessories, ease of access, on screen keyboard. In Windows XP it is start, accessories, accessibilities, on screen keyboard.

2. Type 2-3 random characters in your password field and then select it using your mouse, now type your real password. This will add the random characters in front of the password recorded by key logger and the key logger is fooled by you for sending wrong password.

3. Key logger runs in the background. Always check out for suspicious processes using task manger and end them.

This “tips and tricks” will help you out in protecting yourself from these harmful spyware







Home | Services | About Us | Contact Us | Links | Disclaimer

All Rights Reserved NyeCo Computers 2002-2014