My * messed up my computer



Since the massive id theft ring was uncovered, I’ve been reading the Sunbeltblog frequently. Today, they have an interesting post about the various explanations for spyware on peoples computers. They tag it the “other person syndrome”. I’ve heard this before too. “Well, the neighbors kids were over and ever since then we’ve had all sorts of problems.”, “My son was up from college and since then I just haven’t been able to…”, etc. etc. etc.



They emphasize that this is all anecdotal evidence (experiential, not a broad sampling to determine the real state of things.) I have often wondered if it’s a convenient cover in some cases. But, they do mention a good point. If you have someone visiting and using your computer setup a restricted account to allow them access. That way the worst you’ll have to do (in theory) is to wipe out the restricted user account and create another one next time.

I do wonder though how their computers are?

Related Posts

Blog Traffic Exchange Related Posts
  • FBI nabs Zotob and Mytob authors I'm impressed, it looks as though the FBI has announced the arrest of the authors of both the Zotob and Mytob viruses. Of course Zotob was in the wild in the last 2 weeks. This is really very good news as it is rare for virus writers to be identified......
  • How to Remove APCSecure | APCSecure Removal Guide APCSecure is yet another rogue antivirus application from the prolific and annoying wini family of rogues. This particular variant also comes with a rootkit called TDL3. Trojans are used to promote this rogue antivirus and you will likely find that it will create multiple empty files on your computer that......
  • Clonezilla For quite a while I've used ghost4linux (g4l) for my disc cloning needs. What I REALLY like are the ability to do a network copy of the image to an ftp server and the built in dd_rescue to rescue data from a failing hard drive. Unfrotunately g4l does a bit......
Blog Traffic Exchange Related Websites
  • Combating Computer Espionage Combating Computer EspionageCombating Computer Espionage In some cases, spies as well as covert operations are found in war grounds or politically tense regions. Now in spite of everything, you can find spies in addition to covert operations running undetected within your personal computer system as you use your computer along......
  • Microsoft's New Surface Computer If you thought the technology in "Minority Report" was far-fetched, you were mistaken. Its actually a lot closer than you think.Check out this Popular Mechanics video of Microsoft's new multi-touch point, multi-user computing surface computer. If Microsoft has its way, 'ubiquitous computing surfaces' will become pretty common in a few......
  • My Financial Week in Review #2 I had almost forgotten about this series. Let's jump straight to the bullet points. I continue to not fill up full gas tanks as energy prices drop. I'm expecting that the next time I go to the gas station gas will be a few cents cheaper. This is a very......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site