Saturday, February 7, 2015

Download Safety - A Crash Course for Some Local Friends (And Whoever Else Needs It)

The majority of systems that I am asked to repair are bogged down with virus, malware, adware, & spyware that were boot-strapped into various files and programs the user downloaded from the Internet.

Instead of attaching a guideline on their desktop every time I finish a repair, I decided to create this one - so anyone who needs help with this extremely common problem can use it, anytime.

Understand that even if you follow every single step every single time your system may still get invaded, but it is much less likely to happen if you learn how to research the item, how to install it properly, and how to recognize signs that a program may not be safe before you ever download it.



First step should always be to search Google (or your search engine of choice) for reviews, opinions, etc. about the software in question. And take the time needed to read the description and recommendations at the download site, or at the program's website. You don't want to install something that won't be compatible with your needs or your computer.

Seeing where it's hosted (and if its developer has a site for it) can give you some clues, too. Try to avoid 3rd-party download sites & go directly to the source - those 3rd-party folks just love to bundle & most of them could care less if the extras are safe for you.

If your internet search primarily links to a multitude of negative comments and reviews bashing the software as being loaded with malware, spyware, viruses, and so on, you should think twice - at least twice, before jumping in.  If you can find evidence of the software being hosted by or linked from sites you've come to trust, then the odds are good that it's probably okay.

Always be wary of a forced download -- like your browser telling you that you “must” install something in order to view a Web page. Liars!! Just about the only browser plug-in you need these days is Adobe Flash, and that should only be downloaded and installed from Adobe's Web site -- nowhere else. Always attempt to download from the object's site of origin, even if you have to spend some time searching the 'net to locate them.


When installing any program, read every single step thoroughly. Whenever given a choice for "Standard" or "Custom" Installation, you should ALWAYS choose CUSTOM INSTALL! Read each screen carefully and opt out of installing anything extra. In this screenshot, you would want to UN-check the boxes under "Custom":

Sometimes, the choice is not so straightforward – you may encounter a screen similar to this one:
If you choose "Decline" - that applies to the offer on this screen only, and will not prevent your chosen program from installing. So, DECLINE & proceed!

Some installers will also give you a few browser toolbars or "bonuses" that serve to do nothing more than clutter up your computer. Look for boxes to un-check -- reputable software developers will give you the option to opt out of such offers during an install.

NEVER, NEVER, NEVER  download software that's been pirated or cracked. That's got "bad news" written all over it. There's no quicker way to compromise your system than to use code that doesn't come from a trusted source. A LARGE percentage of spyware, virus, and general malware originate via P2P networks & illegitimate media.

Don't assume that, just because you're using non-Windows operating system (like Linux or Apple's OS X) that you're safe from the threat of a potential security breach. Most malware programmers target Windows because it's the most used operating system in the world , but have no illusions, these programmers, evil little leprechauns and trolls that they are, are capable of infecting any operating system – and believe me, it does happen!

It may seem hard to believe, but many of the systems I have repaired had NO active security to help protect their systems. Often, a purchased system will come with some antivirus program installed, those pre-installed programs are usually under a trial period, and when that period has ended, it is up to YOU to either renew the subscription, find another protection program, whatever you choose - when that time comes, PLEASE - CHOOSE SOMETHING! Allowing your system to cruise the Internet unprotected is a great way to turn it in to a very expensive door stopper, boat anchor, - you get my drift right? So make sure you've always got security software running & that the virus definitions, updates, and so on are kept up-to-date & that system scans are run on a regular basis.

These malware writers are very experienced in using tricks to get users to download their malware. Software that comes bundled with "other software" is often called a Trojan Horse. For example, instant messenger software bundled with a program such as WildTangent, a known spyware offender. Peer-to-peer file sharing software, such as Kaaza & LimeWire, bundle various types of malware that are categorized as spyware or adware. Software that promises to speed up the Internet connection or assist with downloads (e.g., My Web Search) will often contain adware.
Another common way to infect a computer can be via email messages, which contain a seemingly benign link or email attachment; if something pops up on your screen without you clicking, take your hands away from the mouse and keyboard. You need to analyze this intruder before accidentally accepting or downloading some malicious software. The following link is another useful and well-written information source on this topic.
In summation, malware can exploit security holes in your browser as a way of invading your machine. Sometimes websites state that software is needed to view the site, in an attempt to trick users into clicking "Yes" thus installing software onto their machines. Another trick is if you click "No," many error windows display. Other sites will tell you that using a certificate makes their site "safe" which is not the case. Certificate verification means only that the company that wrote the software is the same as the company whose name appears on the download prompt.

Some malware provides no uninstall option, and installs code in unexpected and hidden places (e.g., the Windows registry) or modifies the operating system, thus making it more difficult to remove – and sometimes even impossible! Some of these malicious programs have the potential to literally kill your hard drive – imagine it; every picture, every song, every document (tax returns, payment receipts, school papers, EVERYTHING wiped out with no hope of recovery… It is a good investment to follow the steps I have given you, print this out & sit it right next to your system, whatever it takes to become an informed & safe downloader.

Thanks for reading, I would love to see suggestions or tips from others, questions, anything you want to know or want to share!