Virus Removal and Prevention (March 2010)
What is a virus? According to Wikipedia:
"A computer virus is a computer program that can copy itself and infect a computer.
The term "virus" is also commonly but erroneously used to refer to other types
of malware, adware, and spyware programs that do not have the reproductive
ability. A true virus can only spread from one computer to another (in some form
of executable code) when its host is taken to the target computer; for instance
because a user sent it over a network or the Internet, or carried it on a
removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can
increase their chances of spreading to other computers by infecting files on a
network file system or a file system that is accessed by another computer.
As stated above, the term "computer virus" is sometimes used as a catch-all
phrase to include all types of malware, adware, and spyware programs that do not
have the reproductive ability. Malware includes computer viruses, worms, trojans,
most rootkits, spyware, dishonest adware, crimeware, and other malicious and
unwanted software, including true viruses. Viruses are sometimes confused with
computer worms and Trojan horses, which are technically different. A worm can
exploit security vulnerabilities to spread itself automatically to other
computers through networks, while a Trojan is a program that appears harmless
but hides malicious functions. Worms and Trojans, like viruses, may harm a
computer system's data or performance. Some viruses and other malware have
symptoms noticeable to the computer user, but many are surreptitious and go
||A computer worm is a self-replicating Malware computer program. It
uses a computer network to send copies of itself to other nodes
(computers on the network) and it may do so without any user
intervention. This is due to security shortcomings on the target
computer. Unlike a virus, it does not need to attach itself to an
existing program. Worms almost always cause at least some harm to the
network, if only by consuming bandwidth, whereas viruses almost always
corrupt or modify files on a targeted computer.
||A Trojan, sometimes referred to as a Trojan horse, is
non-self-replicating malware that appears to perform a desirable
function for the user but instead facilitates unauthorized access to the
user's computer system. The term is derived from the Trojan Horse story
in Greek mythology.
||A rootkit is a software system that consists of one or more programs
designed to obscure the fact that the system has been compromised.
Contrary to what its name may imply, a rootkit does not grant a user
administrator privileges as it requires prior access to execute and
modify system files and processes. An attacker may use a rootkit to
replace vital system executables, which may then be used to hide
processes and files that the attacker has installed, along with the
presence of the rootkit. Access to the hardware, e.g., the reset switch,
is rarely required, as a rootkit is intended to seize control of the
operating system. Typically, rootkits act to obscure their presence on
the system through subversion or evasion of standard operating system
security scan and surveillance mechanisms such as anti-virus or
anti-spyware scan. Often, they are Trojans as well, thus fooling users
into believing they are safe to run on their systems. Techniques used to
accomplish this can include concealing running processes from monitoring
programs or hiding files or system data from the operating system.
Rootkits may also install a "back door" in a system by replacing the
login mechanism (such as /bin/login) with an executable that accepts a
secret login combination, which, in turn, allows an attacker to access
the system, regardless of the changes to the actual accounts on the
Rootkits may have originated as regular applications, intended to take
control of a failing or unresponsive system, but in recent years have
been largely malware to help intruders gain access to systems while
avoiding detection. Rootkits exist for a variety of operating systems,
such as Microsoft Windows, Linux, Mac OS, and Solaris. Rootkits often
modify parts of the operating system or install themselves as drivers or
kernel modules, depending on the internal details of an operating
||Spyware is a type of malware that is installed on computers and
collects little bits of information at a time about users without their
knowledge. The presence of spyware is typically hidden from the user,
and can be difficult to detect. Typically, spyware is secretly installed
on the user's personal computer. Sometimes, however, spywares such as
key loggers are installed by the owner of a shared, corporate, or public
computer on purpose in order to secretly monitor other users.
While the term spyware suggests that software that secretly monitors the
user's computing, the functions of spyware extend well beyond simple
monitoring. Spyware programs can collect various types of personal
information, such as Internet surfing habits and sites that have been
visited, but can also interfere with user control of the computer in
other ways, such as installing additional software and redirecting Web
browser activity. Spyware is known to change computer settings,
resulting in slow connection speeds, different home pages, and/or loss
of Internet or functionality of other programs. In an attempt to
increase the understanding of spyware, a more formal classification of
its included software types is captured under the term privacy-invasive
In response to the emergence of spyware, a small industry has sprung up
dealing in anti-spyware software. Running anti-spyware software has
become a widely recognized element of computer security practices for
computers, especially those running Microsoft Windows. A number of
jurisdictions have passed anti-spyware laws, which usually target any
software that is surreptitiously installed to control a user's computer.
The US Federal Trade Commission has placed on the Internet a page of
advice to consumers about how to lower the risk of spyware infection,
including a list of "do's" and "don'ts.
||Crimeware is a class of malware designed specifically to automate
cybercrime.The term was coined by Peter Cassidy, Secretary General of
the Anti-Phishing Working Group to distinguish it from other kinds of
Crimeware (as distinct from spyware, adware, and malware) is designed
(through social engineering or technical stealth) to perpetrate identity
theft in order to access a computer user's online accounts at financial
services companies and online retailers for the purpose of taking funds
from those accounts or completing unauthorized transactions that enrich
the thief controlling the crimeware. Crimeware also often has the intent
to export confidential or sensitive information from a network for
financial exploitation. Crimeware represents a growing problem in
network security as many malicious code threats seek to pilfer
||Adware, or advertising-supported software, is any software package
which automatically plays, displays, or downloads advertisements to a
computer after the software is installed on it or while the application
is being used. Some types of adware are also spyware and can be
classified as privacy-invasive software.
Quadaces can help you protect your computer and give you hints and tips for the future.
If you already have encountered one of these nasty buggers, give us a call today and we
will take care of you Malware problem within 48 hours, guaranteed. Go to:
Content Management Platforms puts you in control of almost anything. A self
producing website! It's all about what you want on your website.
From the Joomla Website-
What is Joomla?
Joomla is an award-winning content management system (CMS), which enables you to
build Web sites and powerful online applications. Many aspects, including its
ease-of-use and extensibility, have made Joomla the most popular Web site
software available. Best of all, Joomla is an open source solution that is
freely available to everyone.
What's a content management system (CMS)?
A content management system is software that keeps track of every piece of
content on your Web site, much like your local public library keeps track of
books and stores them. Content can be simple text, photos, music, video,
documents, or just about anything you can think of. A major advantage of using a
CMS is that it requires almost no technical skill or knowledge to manage. Since
the CMS manages all your content, you don't have to.
What are some real world examples of what Joomla! can do?
Joomla is used all over the world to power Web sites of all shapes and sizes.
* Corporate Web sites or portals
* Corporate intranets and extranets
* Online magazines, newspapers, and publications
* E-commerce and online reservations
* Government applications
* Small business Web sites
* Non-profit and organizational Web sites
* Community-based portals
* School and church Web sites
* Personal or family homepages
From the Drupal Website - www.drupal.org
Drupal is a free software package that allows an individual or a community of users to easily publish,
manage and organize a wide variety of content on a website. Tens of thousands of people and organizations
are using Drupal to power scores of different web sites, including
* Community web portals
* Discussion sites
* Corporate web sites
* Intranet applications
* Personal web sites or blogs
* Aficionado sites
* E-commerce applications
* Resource directories
* Social Networking sites
The built-in functionality, combined with dozens of freely available add-on modules, will enable features such as:
* Electronic commerce
* Collaborative authoring environments
* Peer-to-peer networking
* Picture galleries
* File uploads and downloads
and much more.
DotNetNuke Website- www.dotnetnuke.com
Who is DotNetNuke Corp?
DotNetNuke Corp. (or DNN Corp.) is the creator of DotNetNuke, the most widely
adopted web content management system (CMS) and application development
framework for building web sites and web applications on Microsoft .NET. Using
DotNetNuke, businesses can quickly develop and deploy interactive, dynamic
public web sites, intranets, extranets, and web applications. DotNetNuke Corp.
provides this framework in both "Community" and "Professional" Editions.
Founded in 2006, DotNetNuke Corp. is privately held. Our investors include
August Capital and Sierra Ventures. We're headquartered in San Mateo, Calif.
Our mission is to create entrepreneurial opportunities around the world by
providing a superior open source web application framework that cultivates a
passionate developer community as well as a prosperous commercial ecosystem.
The Stewards of the DotNetNuke Ecosystem
The DotNetNuke web content management system (CMS) and application development
framework was developed as an open source, community-driven project. It
continues to thrive and benefit from an established and active group of users,
developers, system integrators, module vendors, skin vendors, and hosting
In addition to creating and maintaining the DotNetNuke framework, DotNetNuke
Corp. also leads the DotNetNuke ecosystem through which DotNetNuke users and
customers gain access to a wide variety of complementary technologies, services,
and hosting alternatives.
Quadaces Website Design and Hosting now has offers to make your content
Want to know more? Call (386) 492-1880 or e-mail us at:
Website Hosting - Hosting Design - What's New!
Social Networking for Advertising (January 2010)
There are many social networking sites out in the World Wide Web, so why not take advantage
of all those people who connected to spread the word about your business?
The top two social networking sites today are Facebook
321.1 million people in 2009 and is still growing!
has over 117.9 people on their
site! That is a lot of potential customers.
Let's do the math:
6,798,717,439 is the world's population
308,555,722 is the United States population
321,100,000 is Facebook's
117,900,000 is MySpace's
So according to this there are more people on
then there are in the whole USA and
has more then half the USA population.
equal 439,000,000 people. All of those people could be your potential customer.
But what's new?
Well Quadaces Website Design and Hosting now has offers to make your business profiles
and ads on these social networking sites for a low rate.
Want to know more? Call (386) 492-1880or e-mail us at: