Send via SMS

Wednesday, March 29, 2006

coming soon

So after 2 months of work we are about to open the new site ... and it is about time.

Let me back up a little bit, my main website PCSecurityShield sells computer security software (we own all the software) and we have an enormous amount of customers and "marketing reach". So I decided we needed more "products to sell".

So I browsed and browsed the internet ... looked at sites I have looked at in the past and decided that we are going to go with the deal of the day products. So here is comes ... Yugster.com.

We have been bringing in products on a daily basis and getting ready to launch on April 17th (yes I know it says the 15th but I didn't realize that was a Sat).

Why am I telling you ... the site is going to be the biggest thing I have done so far ... I promise that.

Blog on ... Yug This.

Chief Yugster? .... nah ... Big Yug? nah .... Head Yugger?

F--k it ... call me Yug.

Tuesday, March 28, 2006

All about viruses and antivirus software

WHAT IS A VIRUS?

  • Viruses- A virus is a software program that is capable of replicating with little or no user intervention, and the replicated programs also replicate further. Viruses piggyback on real programs. For example, a virus may attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs as well, and it has the opportunity to reproduce by attaching to other programs. The purpose of a virus can be anything from erasing files, formatting your hard drive, to replacing text in your document. Viruses are often disguised as games or images with clever titles such as “Pictures of ME”.
  • E-mail Viruses- An email virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to the people in the victim’s e-mail address book.
  • Worms- A worm is a virus that spreads by creating duplicates of itself on other drives, systems, or networks. Worms may send copies of themselves to other computers across network connections, through e-mails, through infected web pages, or through instant messages.
  • Trojan Horses- This program may claim to do one thing (such as claiming to be a game) but instead does damage when you run it. Trojan horses are not technically viruses, since they do not replicate.

HOW DO VIRUSES SPREAD?

When you execute program code that is infected by a virus, the virus code will also run and try to infect other programs, either on the same computer or on other computers connected to it over a network. And the newly infected programs will try to infect yet more programs. When you share a copy of an infected file with other computer users, running the file may also infect their computers; and files from those computers may spread the infection to yet more computers.

For example, if your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and the virus copy on the hard disk and will try to infect still more floppies.

WHAT DO VIRUSES DO TO COMPUTERS?

The actual effect of any particular virus depends on how it was programmed by the person who wrote the virus. Some viruses are deliberately designed to damage files or interfere with your computer’s operation, while others only spread themselves around and may cause damage to your computer in the process of spreading.

TIPS ON AVOIDING VIRUSES AND WORMS:

  1. Install antivirus software, update regularly, and use it regularly.
  2. Do regular backups. If you contract a virus it may be the only way to recover your data. Ideally, you should backup your entire system on a regular basis, however if this is not practical, at least backup files that you can’t afford to lose or that would be difficult to replace: documents, bookmark files, address books, important emails, etc.
  3. When possible, avoid e-mail attachments both when sending and receiving e-mail.
  4. Never open email attachments with the file extensions VBS, SHS, or PIF. These extensions are almost never used in normal attachments but they are frequently used by viruses and worms.
  5. Never open attachments with double file extensions such as NAME.BMP.EXE or NAME.TXT.VBS.
  6. Disconnect your network or modem cable when you’re not using your computer-or just power it down.
  7. If you feel that an e-mail you get from a friend is strange (if it is a foreign language or it just says odd things) double check with the friend before opening any attachments.
  8. When you receive e-mail advertisements or unsolicited e-mail, do not open attachments.
  9. Avoid attachments with sexual file names.
  10. Do not trust the icons of attachment file. Worms often use executable files which have an icon resembling icons of picture, text, or archive files to fool the user.
  11. Never accept attachments from strangers in online chat systems such as IRC, ICQ, or AOL Instant Messenger.
  12. Avoid using floppies to exchange information between computers.

Best Antivirus Program

We consider The Shield Pro the best antivirus program available. This is mostly because it contains multiple virus engines, excellent customer service and The Shield Pro is simple, affordable virus protection which makes it the best antivirus available today.

Try The Shield Pro from PCSecurityShield today or try a 30 day trial of The Shield Antivirus.

Tuesday, March 21, 2006

virus protection