Instead of attaching a guideline on their desktop every time I finish a repair, I decided to create this one - so anyone who needs help with this extremely common problem can use it, anytime.
Understand that even if you follow every single step every single time your system may still get invaded, but it is much less likely to happen if you learn how to research the item, how to install it properly, and how to recognize signs that a program may not be safe before you ever download it.
First step
should always be to search Google (or your search engine of choice) for
reviews, opinions, etc. about the software in question. And take the time
needed to read the description and recommendations at the download site, or at
the program's website. You don't want to install something that won't be
compatible with your needs or your computer.
Seeing where
it's hosted (and if its developer has a site for it) can give you some clues,
too. Try to avoid 3rd-party download sites & go directly to the source -
those 3rd-party folks just love to bundle & most of them could care less if
the extras are safe for you.
If your internet
search primarily links to a multitude of negative comments and reviews bashing
the software as being loaded with malware, spyware, viruses, and so on, you
should think twice - at least twice, before jumping in. If you can find evidence of the software
being hosted by or linked from sites you've come to trust, then the odds are
good that it's probably okay.
Always be wary
of a forced download -- like your browser telling you that you “must” install something in order to
view a Web page. Liars!! Just about the only browser plug-in you need these days
is Adobe Flash, and that should only be downloaded and installed from Adobe's
Web site -- nowhere else. Always attempt to download from the object's site of origin, even if you
have to spend some time searching the 'net to locate them.
When installing
any program, read every single step thoroughly. Whenever given a choice for
"Standard" or "Custom" Installation, you should ALWAYS
choose CUSTOM INSTALL! Read each screen carefully and opt out of installing
anything extra. In this screenshot, you would want to UN-check the boxes under
"Custom":
Sometimes, the
choice is not so straightforward – you may encounter a screen similar to this
one:
If you choose "Decline" - that applies to the
offer on this screen only, and will not prevent your chosen program from
installing. So, DECLINE & proceed!
Some installers will also give you a few browser toolbars or
"bonuses" that serve to do nothing more than clutter up your
computer. Look for boxes to un-check -- reputable software developers will give
you the option to opt out of such offers during an install.
NEVER, NEVER, NEVER
download software that's been pirated or cracked. That's got "bad
news" written all over it. There's no quicker way to compromise your
system than to use code that doesn't come from a trusted source. A LARGE
percentage of spyware, virus, and general malware originate via P2P networks
& illegitimate media.
Don't assume that, just because you're using non-Windows
operating system (like Linux or Apple's OS X) that you're safe from the threat
of a potential security breach. Most malware programmers target Windows because
it's the most used operating system in the world , but have no illusions, these
programmers, evil little leprechauns and trolls that they are, are capable of
infecting any operating system – and believe me, it does happen!
It may seem hard to believe, but many of the systems I have
repaired had NO active security to help protect their systems. Often, a
purchased system will come with some antivirus program installed, those
pre-installed programs are usually under a trial period, and when that period
has ended, it is up to YOU to either renew the subscription, find another
protection program, whatever you choose - when that time comes, PLEASE - CHOOSE
SOMETHING! Allowing your system to cruise the Internet unprotected is a great
way to turn it in to a very expensive door stopper, boat anchor, - you get my
drift right? So make sure you've always got security software running &
that the virus definitions, updates, and so on are kept up-to-date & that
system scans are run on a regular basis.
These malware writers are very experienced in using tricks
to get users to download their malware. Software that comes bundled with
"other software" is often called a Trojan Horse. For example, instant
messenger software bundled with a program such as WildTangent, a known spyware
offender. Peer-to-peer file sharing software, such as Kaaza & LimeWire,
bundle various types of malware that are categorized as spyware or adware.
Software that promises to speed up the Internet connection or assist with
downloads (e.g., My Web Search) will often contain adware.
Another common way to infect a computer can be via email
messages, which contain a seemingly benign link or email attachment; if
something pops up on your screen without you clicking, take your hands away
from the mouse and keyboard. You need to analyze this intruder before
accidentally accepting or downloading some malicious software. The following
link is another useful and well-written information source on this topic.
In summation, malware can exploit security holes in your
browser as a way of invading your machine. Sometimes websites state that
software is needed to view the site, in an attempt to trick users into clicking
"Yes" thus installing software onto their machines. Another trick is
if you click "No," many error windows display. Other sites will tell
you that using a certificate makes their site "safe" which is not the
case. Certificate verification means only that the company that wrote the
software is the same as the company whose name appears on the download prompt.
Some malware provides no uninstall option, and installs code
in unexpected and hidden places (e.g., the Windows registry) or modifies the
operating system, thus making it more difficult to remove – and sometimes even
impossible! Some of these malicious programs have the potential to literally
kill your hard drive – imagine it; every picture, every song, every document
(tax returns, payment receipts, school papers, EVERYTHING wiped out with no
hope of recovery… It is a good investment to follow the steps I have given you,
print this out & sit it right next to your system, whatever it takes to
become an informed & safe downloader.
Thanks for reading, I would love to see suggestions or tips
from others, questions, anything you want to know or want to share!