Pages

Subscribe:

Tuesday, July 17, 2012

Microsoft Revamps Office, Looks to the Cloud

Microsoft Corp unveiled a new version of its Office suite tailored for tablets and other touch screen devices, in the company's largest-ever overhaul of the workplace software it relies on for much of its profit.

The revamped Office, touted by Microsoft Chief Executive Officer Steve Ballmer on Monday as the most ambitious version so far, takes advantage of cloud computing and is designed for use with the upcoming Windows 8 operating system.


It makes use of cloud computing by storing documents and settings on the Internet by default, and is compatible with touch screens widely used in tablets. It also incorporates Skype, the video-calling service Microsoft bought for $8.5 billion in 2011.

The latest version of Office comes as Apple Inc and Google Inc make inroads into the workplace, long Microsoft's stronghold. Office is Microsoft's single-biggest profit driver.

"The Office that we'll talk about and show you today is the first round of Office that's designed from the get-go to be a service," Ballmer said at a news conference. "This is the most ambitious release of Microsoft Office that we've ever done."

Microsoft has a lot riding on the 15th version of Office. Windows is one of the world's biggest computing platforms, and the Office applications -- Word, Excel, PowerPoint, and other tools -- are used by more than 1 billion people around the world.

The world's largest software company has been slow to adapt to a boom in mobile devices and cloud computing.

Microsoft is hoping corporate IT managers will fork over the cash to upgrade internal software just when global tech spending is looking shakier than it has in years. The 2013 picture is uncertain but budgets are expected to tighten, with Europe's economic crisis and a deceleration in the Chinese economy.

CLOUD FIRST

The company last updated Office in 2010, when it incorporated online versions for the first time. The full version of Office 15 is expected to be available in early 2013.

Cloud computing refers to a growing trend toward providing software, storage and other services from remote data centers over the Web instead of relying on software or data installed on individual PCs.

"Your modern Office thinks cloud first. That's what it means to have Office as a service," Ballmer said, adding that a preview version of the software is now available online.

Documents in the sleeker-looking Office can be marked up by writing on a touch screen with a stylus. The suite will be compatible with tablets that use Windows 8 -- due for release in October.

Screens appear less cluttered with icons and menus than in current Office applications.

Microsoft did not say whether it planned to launch versions of Office compatible with Apple's iPad or tablets running Google's Android platform.

The software package is now integrated with Skype, the voice-over-IP service that lets users collaborate on documents through video conferences.

While past versions of Office saved documents on PCs' hard drives, the new Office uses Microsoft's online "Skydrive" service for default storage. Documents can be shared on Facebook or published as blogs.

"The Windows 8 launch is right around the corner, and we have a lot to do ... In a sense, it feels to us a lot like 1995," Ballmer said, referring to Microsoft's Windows 95 operating system which was a significant step forward at the time.

"We have the most exciting, vibrant version of Windows in years," Ballmer said. He did not disclose pricing plans for the new Office.

Google has been pushing hard to persuade Office users to switch to Google Docs, an applications suite running on Google's servers and accessible on the cloud and mobile devices. Apple has also been trumpeting the ability of its iPad -- the dominant tablet in the market today -- to perform clerical duties.

"This puts them (Microsoft) even farther ahead of Apple in terms of product richness. But it still leaves the door open to competition from Google pursuing a strategy that's cross-device, cross-platform - and is free," said Sarah Rotman Epps, an analyst at Forrester.

Wednesday, June 13, 2012

iOS6: Full of New Features; Lacking on Useful Innovation


Apple may have fulfilled consumers' desire for more features in iOS 6, but it's not clear it satisfied their cravings for innovation. "The announcement of iOS 6 felt more like a mashup of what other companies have already done instead of a groundbreaking new user experience," said Joe Burger, cofounder and CTO of Labor Sync.


Among the highlights at Apple's Worldwide Developer's Conference was the presentation on Monday of a laundry list of enhancements to be found in iOS 6. The 200-plus new features and functions include Facebook integration , a Maps app that has turn-by-turn navigation and a new Flyover view. Siri also got an upgrade and can now converse in more languages.

For many users, the top change will be the Facebook integration. Apple rolled out Twitter integration in iOS 5, leaving Facebook fans bereft. iOS 6 offers tools that allow users to write status updates, and share photos and links from iOS applications.

Facebook friends' information is synced across all iOS devices, automatically updating details in Contacts when they change. Users can "Like" content directly from the App  Store and iTunes and see what their friends recommend.

Those recommendations will prove to be very important for developers, Echo Interaction Group CEO Carlos Carbonell told MacNewsWorld.

"Most apps now spread via word of mouth. With this new feature, Facebook will become our new 'word of mouth,'" he said.


Pretty Maps

iOS 6 comes with a new Maps app sporting vector-based map elements. There is also turn-by-turn navigation with spoken directions, and a Flyover feature that has photorealistic interactive 3D views.

This is the most impressive feature to Josh Davis, Apple boutique store manager for Abt Electronics.

"Visually it looks wonderful, and the Flyover feature is something that will wow the users," he said.

"It will definitely give Google (Nasdaq: GOOG) a run for its money, although Google Maps is in the process of changing too to include similar functionality," he told MacNewsWorld.

Maps comes with real-time information on traffic, and it will guide users in finding a new route if the one they are taking suddenly slows down due to traffic conditions.

There is also a local search component that integrates with Yelp.


The Voice of Experience

Enhancements to Siri include language support for Spanish, Italian, Korean, Mandarin and Cantonese. It has been optimized to be used in 15 countries all together. Users can now ask Siri to update their status on Facebook or post to Twitter or launch an app. There is also a new Eyes Free mode, allowing users to interact with the iPhone via voice only.

"Siri now understands a little better what you are asking," said Carbonell. "It is also is more user-friendly with the Eyes Free mode and ability to launch apps."


Other Features

It will take time for users to become acquainted with all 200 new features. Some of the additions fall in the category of "I didn't know I needed that until I saw it" -- such as the Passbook app.

It organizes a user's passes -- from boarding passes to movie tickets -- in one place. It also lets the user scan via the iPhone or iPod touch to use a coupon or check into a hotel.

Also new is Guided Access, which allows someone to disable hardware buttons to lock an iOS device into a single app. Apple positions this feature as useful for parents or teachers of disabled students during test taking or merely just to keep students' focus on learning and off everything else that can be found online.

iOS 6 also supports FaceTime calls over cellular networks, lets users set up a VIP Mailbox, and gives them the option to decline incoming calls with a quick message.


Nothing New to See Here

Critics point to the obvious fact that much -- although not all -- of this functionality has been available on other platforms.

"The announcement of iOS 6 felt more like a mashup of what other companies have already done instead of a groundbreaking new user experience," said Joe Burger, cofounder and CTO of Labor Sync.

"Features such as "Can't talk now," which allows a user to respond to a caller with a canned text message when unable to answer the phone, has been available on other platforms for quite a while now," he told MacNewsWorld.

"Enabling FaceTime over 3G and enabling Siri on the new iPad were not new features at all -- just a removal of artificial restrictions. Features such as "turn-by-turn" navigation and "VIP Mail" have also been around for years, and come out of the box on other platforms."

In short, Burger concluded, Apple's iOS 6 announcement left a lot to be desired from a company known for innovation.

Tuesday, June 12, 2012

Flame Malware Can Now Self Destruct


The command-and-control servers directing Flame have apparently ordered the malware to delete itself. Flame was designed to steal information, and "when you run covert operations, you get operatives out of the target area when their job is done or their presence is a risk to the operation," said security expert Randy Abrams.

The Flame malware has reportedly begun to self-destruct.


Some command-and-control (C&C) servers for the malware sent an order recently that completely removes it from infected systems, according to Symantec (Nasdaq: SYMC).

Why the self-destruct command was sent is not clear, although it could be that the malware's creators were afraid of detection, as cybersecurity experts had shut down most of their C&C servers.

Flame was designed to steal information, and "when you run covert operations, you get operatives out of the target area when their job is done or their presence is a risk to the operation," Randy Abrams, an independent security  consultant, told TechNewsWorld. "This isn't a self-destruct command; it's more analogous to wiping out the trail."

Flame "is a very advanced, very targeted weapon," Tony Zirnoon, senior director of security strategy  and marketing at VSS Monitoring. "It's changed the game from cybercrime to cyberwar."


Flame Off!

Most of Flame's C&C servers had been shut down by last week, but its creators still controlled a few because they had retained control of their domain registration accounts, so they could host these domains with a new ISP, Symantec said.

These servers let the malware's creators communicate with a specific set of compromised systems.

Compromised computers regularly contact their C&C servers to ask for additional commands, and the servers that were still working shipped a file Symantec named "Browse32.ocx." This was, in essence, an uninstaller, Symantec said.


Without a Trace

The Browse32.ocx module has two parts. One, which Symantec named "EnableBrowser," was the initializer. It set up the environment prior to action. The other, "StartBrowse," actually wipes the files.

Browse32.ocx has a list of files and folders that are used by Flame, Symantec said. It locates every file on disk, removes it and overwrites the disk with random characters to prevent anyone from obtaining information about the files. This is recommended procedure for wiping a hard drive.

Symantec captured a version of the Browse32.0cs module created on May 9, shortly before Flame made the headlines. It's likely that previous versions of this module have been used in the past, Symantec said.


Goodbye Is Not Forever

It's possible that traces of Flame still reside on systems that the Browse32.ocx module apparently wiped. "If I was running a cyberespionage operation, I would certainly consider leaving modules on non-mission oriented computers for misinformation tactics," Abrams said.

Or, if infected computers were offline when the uninstaller module was sent out, they would not be affected, Abrams pointed out. An adverse interaction with other software could have prevented the removal command from working. Different versions of the malware might respond to different versions of the uninstaller, and so some might remain infected.

Further, "the removal of malware that arrives on a system using exploits will never assure the system hasn't been infected with something else," Abrams said. "This is true of all malware infections."

Microsoft (Nasdaq: MSFT) has overhauled its Update feature, which Flame leveraged, to prevent further similar attacks.

However, operating systems are "so complex that it's difficult to know if all attack vectors have been found," Abrams warned. "Just like Apple (Nasdaq: AAPL) Update or any other automated updating mechanism, there is always the potential for exploitation of unknown vulnerabilities."
The Evil That Men Do

Flame "is very advanced getting in, advanced getting out, and advanced in not leaving traces," VSS Monitoring's Zirnoon said. That could end up causing trouble for the United States and its allies.

"We won't go into who might have been responsible for creating it, but it's been targeting countries in the Middle East, and I wouldn't be surprised if somebody somewhere leverages [Flame's advanced capabilities] and targets European and Western financial institutions like what was done with Duqu," Zirnoon speculated.

Duqu is a worm discovered in September that's believed to be related to Stuxnet, a piece of malware that targeted Iran's nuclear infrastructure.

Symantec did not respond to our request for more details.

Thursday, June 7, 2012

Microsoft Windows 8 VS Apple OS X Comparison


Even at this stage in its development, Windows 8 is reminiscent of Apple OS X 10.7 Lion. It's too early to properly compare the OSes, but there is value in examining their underlying assumptions about what an OS should look like in the age of smartphones and tablets.

If the iPhone's success has taught us anything, it's that consumers want their software to be hassle-free. That means ditching retail boxes in favour of downloads, automatic software updates and elegant interfaces that keep them informed. The Metro app ecosystem hits all three points with panache. But whereas Lion offers apps in the form of compact icons suggestive of the iOS approach, Windows 8 serves up gorgeous, customisable tiles that relay useful information in a compact space.

An interface must do more than simply keep you informed. Lion applies lessons that Apple has learned from its multitouch devices, implementing trackpad gestures to make interacting with your Mac more efficient and immersive. But it still delivers the look and feel of a traditional operating system, replete with folder hierarchies and windows to wrangle. Microsoft has shoved the old design ethos aside with Windows 8, developing a unified interface that flows readily from 7in ARM tablets to multi­monitor desktops.





The cloud takes things one step further. Both Lion and Windows 8 have tendrils that snake into your assorted devices. But while Apple's iCloud ensures that your media and photos populate across all your gadgets, Windows 8 makes your personalised interface available everywhere – from apps down to the particulars of your tile layout. Perpetually connected devices make it all possible. Windows 8 will shake up how you interact with tech.

Windows 8: Eight things we still don't know

  • How many versions will be available. Windows 7 had six, but most users saw three. Expect a similar number.
  • What it will be called. Windows 8 is just a code name, but Windows 7 has worked well. Why change?
  • How much it will cost. Windows 7 costs from £99 to over £200, with volume discounts for manufacturers. Microsoft is unlikely to stray far from those prices, but tablets versions may cost less. 
  • How Xbox Live will work on Windows 8. We know you'll get your avatars, achievements and messages, but not how it will work. Don't expect to pop an Xbox 360 disc into your PC's drive and play it.
  • Whether the next version of Office will feature Metro apps. A new desktop version will surely surface, but tablet users will want Office, too.
  • What new tools and utilities Windows 8 will include. Calculator, Paint and other accessory apps are sure to be updated for Metro, although we haven't seen them yet.
  • Whether Microsoft will take a cut from the Windows Store. Developers give Microsoft 30 percent of revenue on sales through Windows Phone 7's store, but it might adopt a different model here.
  • What apps will run on ARM-based tablets. Desktop Windows programs won't work on ARM, but can developers make traditional desktop applications for ARM?

Thursday, May 31, 2012

Flame Malware Ripped Off Middle East Computer Systems


A strain of malware dubbed "Flame" has been spotted on computer systems in the Middle East, and threat researcher Kaspersky says it's one of the most sophisticated threats it's ever seen. Flame is designed to slurp up data and send it to command and control centers. However, it's unclear who made it, how far it's spread, and even just how sophisticated a threat it really is.

A cyberweapon of unprecedented sophistication is ripping through computer systems in the Middle East, security vendor Kaspersky Lab claims. It has dubbed the malware "Worm.Win32.Flame" -- or "Flame," for short.



Other security vendors, including McAfee and Symantec (Nasdaq: SYMC), have issued similar warnings, and there are claims that it was created, or at least backed, by a nation-state.

Flame is one of the most complex threats ever discovered, Kasperksy contends. However, the picture on Flame is far from clear. Various names have been given to various pieces of malware floating about, and it's uncertain whether or not they all refer to the same code.

"It's in the early stages of research at the moment," Dave Marcus, director, advanced research and threat intelligence at McAfee, told TechNewsWorld.

Kaspersky Labs spokesperson Greg Sabey declined to provide further comment.

However, Webroot contends the threat from this malware is overblown.

"Flame would be easy to discover for multiple elements of an intrusion defense system, so if a nation-state was behind it, they clearly didn't plan it well or want it to actually work," Joe Jaroch, vice president of endpoint solutions engineering at Webroot.


Something Wicked This Way Comes, We Think

Over the weekend, Iran's emergency response team published news of an attack it called "Flame" or "Flamer," McAfee said.

Meanwhile, Hungarian research team CrySys published information about a new piece of malware it called "sKyWIper," parts of which had been uploaded from Europe. CrySys later said sKyWIper is what Kaspersky called "Flame" and the Iranians call "Flamer."

Then there are news reports out of Iran that claim a piece of malware called either "Viper" or "Wiper" had infected computers at the country's oil ministry.

It's unclear whether all these names refer to the same piece of malware.

Meanwhile, there's speculation that Flame may be connected to the Stuxnet worm, but again the picture's murky. Kaspersky claimed at one point that Flame shares many characteristics with Stuxnet and its relative, the Duqu worm, then later said Flame has no major similarities with the other two.

"We don't see them being related," Webroot's Jaroch said. McAfee's Marcus is not sure yet.


What Does Flame Do?

The worm was launched to systematically collect information on the operations of states in the Middle East, Kaspersky said. However, there doesn't seem to be any kind of pattern as to who's being attacked. Victims include individuals, state-related organizations and educational institutions across several countries.

Once a system's infected, Flame begins sniffing network traffic, taking screenshots, recording audio conversations and intercepting keyboard commands. It then sends all this back to several command and control servers scattered around the world, Kaspersky said. Flame can also collect information about discoverable devices near an infected machine.


The Threat From Flame

Flame has many different libraries for compression and data manipulation, and it implements security algorithms as well as a Lua virtual machine, Kaspersky said. At about 20 MB in size, it is exceptionally large, and it is very sophisticated.

"Yes, it is a highly modular piece of code with many components, but that doesn't equate to the conventional term of complexity with regard to threats," Webroot's Jaroch remarked. Server-side polymorphic malware, which has been around for several years, is "orders of magnitude more complicated."

Further, while Flame does use differing algorithms, "none of them are challenging," Jaroch said. They're "significantly outdated and easily broken automatically by current security technology."

Although Flame covers several areas that some threats don't, none of them are unique, Jaroch pointed out. "One of the frequently commented-on aspects of Flame is that it collects the name of every file on the system but even this is far from revolutionary. Most backdoor Trojans have significantly more functionality than this -- Rbot, SubSeven and Bifrost, to name a few."

"Whether sKyWIper is the most complex [malware] ever or not has no bearing on whether or not Iran's CERT can come up with a remediation tool to remove the infection," McAfee's Marcus pointed out. "A full detailed analysis of sKyWIper is of a level of analysis way deeper than is required to come up with remediation tools."

As for Flame's complexity, Webroot "automatically developed a solution in 2007 ... and it would not be difficult for Iran to develop a solution either in our opinion."

Tuesday, May 29, 2012

Samsung Chromebox Review


Some may have suggested that the desktop is a dying breed – a relic of a bygone computing era – but Google is looking to buck that trend by putting its Chrome OS on a tiny computer called the Samsung Chromebox. 

The small form-factor PC sports the latest version of Chrome OS and arrives alongside the new Samsung Series 5 Chromebook, to offer up a meaningful competitor to Apple's Mac OS and Windows PCs.

Priced at $329 (£279), the Samsung Chromebox is designed for the lower end of the market – think net-top – and its tiny size and simple interface could just make it a viable computer for people who value simplicity and surfing over file management and power.

The Chromebox ships without a monitor, keyboard and mouse but obviously needs all three – something worth considering if you do not already have the necessary accessories.


Ports and Specs


Port wise the box sports six USB, a single Ethernet, two display port outputs and a DVI single link output.

The first thing you may notice is that there is no HDMI port, something of a surprise considering the growing market for media PCs that plug easily into the television and, perhaps more critically, there is no VGA port – which may mean many of its target audience will need to shell out for adapters to get it to work. 

Innards wise, the Chromebox sports an Intel Celeron B840, a cheaper 1900Mhz dual-core processor with integrated graphics.

This is at the lower end of the power spectrum, but probably what you would expect at this price-point. Given that the Chromebox really isn't built with any manner of core gaming in mind, it's probably fit for purpose.


Bootup and Chrome OS introduction


Perhaps the most significant thing about the Chromebox is the Chrome OS within – an operating system that is built for being online and might well be more suitable to a home environment (where a connection is usually present) than in the Chromebook ranges.

We'll dip into Chrome OS a little later, but it's worth pointing out just how ridiculously easy it is to get the Chromebox up and running – something that could well be a critical point to its audience.

Using the office Wi-Fi, after plugging our Chromebox in to a keyboard, mouse and monitor (after finding an adaptor for the latter) we were up and surfing with all our Google apps, docs and Chrome bookmarks inside two minutes.

For many that have battled to get up and running on various PCs over the years it's genuinely a breath of fresh air to be online and set up within minutes.


Chrome OS explored


Chrome OS itself has gone through a huge overhaul – bringing in a desktop and a windows set-up that will feel far more familiar to anyone who has used Macs or Windows PCs.

That means that multitasking is significantly improved in this version, something that you would expect from a desktop computer, and allows for you to have windows side by side on your monitor.

Another huge advantage of the Chrome OS in the Chromebox is that it boots in seconds, meaning that it is an ideal extra computer used for when you simply need to surf rather than to get to grips with more memory intensive programs.

This latter point is perhaps the crux – if you want to spend hours on productivity programs, video or picture editing for instance or constructing complicated office documents, then the Chromebox is probably not for you.

Programs cannot be simply installed as you would on a Windows PC or Mac but must be purchased or downloaded from the Chrome App Store.


This has certain advantages in terms of keeping the system speedy. All of the apps run online which means you never need to download updates and because most of the files are stored remotely rather than locally the in-built virus protection is not something you really need to worry about.


However, it does mean you are limited to what has made it to the App Store and been vetted by Google; so no "full-fat" Photoshop and no Microsoft Office (although the online Google Docs may well be powerful enough for many).


The super-speedy 16GB SSD is there to provide a little local storage, but, especially with a desktop PC designed to always be online, it is really just for the operating system files, cache and the odd bit of music.



Early Verdict


In a lot of ways the Chromebox makes more sense for Google than the Chromebook; it provides a speedy, well-designed and novel way of getting online quickly with enough additional functionality to make it a fine second computer.

Because, by its nature, a desktop PC is normally always in range of a network (be it LAN or Wi-Fi) the offline functionality issues that have blighted the rise of the Chromebook are irrelevant to the Chromebox.

Although the issues around programs are still there, as a secondary PC the remote access features mean that this provides a neat addition for heavy users who need the additional power but want a "surfing" computer.

And for those who don't need to do much more than consume media, files and browse the internet, this is a very cheap, very efficient and neatly designed offering from Samsung.

But, the omission of both HDMI and a VGA monitor cable in favour of the more-modern DVI is a massive oversight given the target audiences.

For many, having a second PC that they can plug into their TV (and many TVs have either of the two options) would be a tempting proposition, but making them go out to buy a cable is not ideal. Especially when they could feasibly go out and buy a tablet as a (pricier) alternative.

And for those with an old monitor (i.e. probably sporting an older cable and not DVI or DisplayPort) there would also be the need of a cable. It's a silly oversight – and one that you would hope is rectified at point of sale.

Because beyond that, the Chromebox could well carve itself a nice little niche in the desktop market.

Browser War: Google Chrome VS Mozilla Firefox


As of February 2012, Firefox and Chrome are neck-and-neck in the race for being the most used Web browser in the world, both with about 36 percent market share, according to statistics from W3Schools. While Firefox claims a slight lead over Chrome in terms of popularity, both browsers offer features that make them worth taking for a test drive. Important factors such as speed and security are more ore less comparable for the two browsers, so your ultimate decision may come down to which one offers the customizations or features that you need to perform your desired tasks


Structure
When it comes to structure, Chrome and Firefox subscribe to two different schools of thought. Firefox, owned by Mozilla, is an open-source project with many contributors, whereas Google's Chrome is closed-source and documentation is kept private. That's not to say that Google doesn't invite open-source projects, but its open-source browser is Chromium, not Chrome. What this means for the browser experience is that Firefox has potentially had "more cooks in the kitchen" working out potential bugs. Behind the scenes of the two browsers are two different browser engines -- they handle how the browser manages your requests; Firefox relies on the Gecko browser engine, while Chrome is based on Webkit. While both are equally viable, Webkit -- also used in Apple's Safari browser -- is more often used in mobile devices. For the future of browsing, this may be a big factor in overall viability. Firefox is also available on more operating systems, including Mac OS X, Linux, Windows, Sun Solaris, Open BSD and Free BSD. Chrome, meanwhile is available only for Linux, Windows and Mac; other operating systems must use Chromium.


Security
An important aspect for any browser is its level of security. According to a study conducted by Accuvant, Chrome emerged as the most secure browser, over both Firefox and Internet Explorer -- with Internet Explorer coming in over Firefox. Chrome scored the highest marks for having the highest number of anti-security measures. While both Firefox and Chrome employ "sandboxing" to isolate potentially harmful attacks on your computer, Chrome employs it more often, for more processes. Likewise, Chrome offers more security features for plug-ins, and automatically disables them when they become out-of-date.


Tabs
Another distinguishing feature of Chrome is its separate processes for each window and tab. When you open a new tab or window, Chrome separates that tab or window in to its own process. What this means for you is that if you're experiencing a slow load time on one site, it's not going to slow down your experience in other windows and tabs. Likewise, if one tab crashes, it won't crash the entire browser. Firefox, meanwhile, continues to employ the more traditional method of processing tabs, in which are all are tied together. In terms of security, this process separation employed by Chrome may make it more secure overall.



Extensions
When it comes to extensions to the browser, Firefox is the clear leader in the number of options. Likewise, Firefox comes with a number of extensions already built in, which could lead to a slower initial load time for the browser. If you're looking for the fastest load time, Chrome may be your choice. If you want a wider array of features to add in to your browsing experience, Firefox may be the answer. At present, Firefox's extension options include more security add-ons than Chrome. And since Firefox has been around longer, there's also been more time for finding and solving security issues.

Monday, May 28, 2012

How To Keep Your PC Malware-Free


Despite the best efforts of computer scientists around the world, malware remains a problem for all PC users, rank novices and seasoned professionals alike. Malware spies on your computer activities, hijacks your browser and contaminates your files. The Internet has become a prime conduit for malware infections, as malicious programs piggyback themselves on enticing, funny or apparently important messages. If you believe your computer has a malware infection, don’t despair; good solutions are available at little or no cost. 


Definition
Malware takes several forms, including viruses, Trojans, spyware and rootkits. A computer virus passes into your computer as part of a downloaded file or on portable media such as a USB drive. The virus runs as a low-profile program on your computer, creating and sending out copies of itself. A Trojan is a virus that typically spreads itself through email attachments and other files disguised as funny videos or important documents. When you click on the attachment, the virus installs itself. Spyware surreptitiously records your Web searches, keystrokes and other activity, looking for passwords, bank account numbers and other vital information. The spyware program sends your data through the Internet to another computer, where identity thieves and unscrupulous businesses collect it. A rootkit installs itself deeply in the computer’s operating system; when you remove the visible malware process and subsequently restart your machine, the act of restarting reinstalls the malware. Rootkits are difficult to detect and remove.


Symptoms
Computers infected with malware display a range of symptoms, some obvious, others barely noticeable. Obvious signs include annoying, persistent pop-up windows in Web pages and a reduction in your computer’s speed. A virus may hijack your system to send out enormous amounts of spam email, which slows other programs and brings Internet activities to a crawl. Some malware programs prevent you from running Microsoft Window’s Help system or your Web browsers. Clever malware programs mimic anti-virus software; these suddenly appear on your computer, flashing warning messages and offering to fix the “problem” for a price. If you see this message, do not accept the offer.

If you suspect an infection, close all open programs on the PC but do not restart it. If you have more than one PC in your home network, disconnect the infected one if possible. Make a backup copy of important documents you recently created or changed. Note any software programs you installed in the past few days; unless they were from trustworthy sources, these programs may have led to the infection. If the programs came from dubious sources, do not reinstall them. Refrain from sending email from the infected PC until you fix the problem.


Detection and Identification
A malware detection program scans your computer’s hard drive, detecting and identifying problems. Typically called anti-malware or anti-virus, the program has a built-in library of malware types and periodically downloads new malware information from its developer. This is necessary, as malware authors create new variations almost daily. When you perform a scan, include your computer’s internal hard drive and any external USB hard drives or memory sticks, as these may also contain malware.

Many new PCs include a preinstalled anti-malware program or suite of programs along with a subscription to malware library updates. Some common choices include McAfee Total Protection, Symantec's Norton 360 and Trend Micro's Titanium line. There are many others, including Malwarebytes, Microsoft Security Essentials and Kaspersky Lab's home security line. Independent reviews based on malware testing are your best bet for finding an effective solution.

The Malwarebytes Corporation distributes a free version of its Malwarebytes scanning software that does a competent job of detecting, identifying and removing infections. For $25, you can upgrade to the Pro version, which prevents infections and has other advanced features. CNET editors rate Malwarebytes 4 1/2 stars out of 5.

Microsoft offers a virus scanner called Microsoft Security Essentials free for home users and small businesses with 10 or fewer PCs. According to the experts at TechRadar, installing the software replaces the default program known as Windows Defender in Windows Vista and 7. Microsoft Security Essentials supports Windows XP, Vista and 7. If you have XP, you do not have Windows Defender, so Microsoft Security Essentials is especially worthy of your consideration.

Kaspersky Lab sells a variety of anti-malware packages including home and business editions. The personal and home office anti-virus software costs between $40 and $180, depending on the computer and your specific needs. The software license is an annual subscription to Kaspersky's malware database. Subscription renewals are slightly less expensive than the initial purchase price. On a case-by-case basis, Kaspersky Lab also offers single-purpose programs for removing malware at no charge; each program detects and removes a specific malware program.

If you have time and patience, visit websites such as “Bleeping Computer.” Computer professionals at these sites volunteer to help you identify and fix malware-related problems. On the site, you post a message giving details of the problem. The experts there give you step-by-step instructions to remove the malware. Typically, they provide links to download single-use software that addresses a particular virus. They provide these services at no cost to you. If your PC has a severe infection, use a second computer to do the research and download the necessary fixes.


Removal
The same anti-virus program that detects malware also removes it. Typically, after scanning your hard drive, the program displays a list of malware files. You select them and click a “Delete” button to remove the malware. Rarely, the software may have a false positive or flag a program that is not malware. Skip those files you trust and delete the rest. After deleting the malware files, the scanner may ask you to restart your computer. When the computer returns to its normal working state, rerun the virus scanner. It doesn’t happen often, but your anti-virus program may detect the same malware. In this case, your computer has a rootkit, which the virus scan did not remove. Do an Internet search on the malware’s file name to find a free, single-purpose program designed to remove it. Download and run the program and scan again. The program may remove the underlying rootkit but leave some malware files. The virus scan removes these.


Prevention
Because malware threatens your privacy, reduces your productivity and poses difficulties in removal, take steps to prevent infections. Windows software, beginning with XP, includes a firewall program that prevents outside intruders from compromising your computer; keep this program enabled. Exercise healthy skepticism when reading your emails; do not open attachments unless you know both the sender and the contents -- and unless you trust the sender to exercise a high degree of caution as well. For the same reason, do not click on Web links embedded in emails. Avoid unsavory websites or those flagged as infected by search engines, as simply loading a Web page can install an infection. Encourage all users of the PC to do the same. Regularly back up essential files and documents onto removable media, such as a USB drive or writable DVD and keep the media in a safe place. Install a good anti-malware program, keep it up to date with periodic updates and scan your hard drive regularly.