Spyware can investigate computer users virtually complete. This not only civil rights challenges. Now, a coalition of Internet activists want to help with diagnostic software.
Internet activists against cyber espionage
Internet activists have released a software to detect spyware on the computers of journalists and human rights activists. Such programs are to have partly on the Internet or are sold by specialized companies to governments, the group, which is supported by renowned human rights organizations such as Amnesty International said. Some of spying programs are characterized virtually all actions of computer users: you can log keystrokes, turn on cameras and microphones and monitor online activities. It is very difficult for victims to see if your computer is infected with such a program.
The software called “Detect to detect the spying programs. So far, they are available in a version for Windows computers and is available for download at. Has developed Detect the IT security specialist Claudio Guarnieri, who explored the aggressive spying programs for years. This land is usually prepared via websites or e-mail attachments on the computers of espionage victims. Such monitoring programs would be used against journalists, activists or human rights activists denounced the organizations. For the Alliance include Amnesty International, the Digital Society and the American net activists the Electronic Frontier Foundation (EFF) and Privacy International.
PC foreclose: Best Safety Tips
Install software updates
Criminals use software vulnerabilities to inject malicious software on your PC. For protection, check yourself regularly that your programs are outdated! Update outdated applications via an update. If possible, set that your programs keep themselves current via automatic update.
Install Windows updates
In addition to application updates, you should regularly install Windows updates. The updates plug security holes in your operating system. Tip: Configure so that the system automatically applies Windows Updates. Press the Windows key and press R, type wuapp and click OK. Select Modify settings and activate the setting Install updates automatically (recommended).
Upgrading to newer Windows
Start using Windows XP? Then you should upgrade to Windows 7 for security reasons or 8.1. Since April 2014 Microsoft provides namely no security updates for the operating system more elderly. If your PC meets the requirements for systems, see the Windows 7 Upgrade Advisor or Windows 8.1 Upgrade Wizard out.
Foreclose PC via firewall
Use a firewall! Such a fire wall fends off attacks by hackers and prevents unauthorized programs contact the Internet. Firewalls are available in both routers and in the form of Windows software. For best protection you combine hardware and software firewall. Do not you want to use the operating system’s firewall, install as the ZoneAlarm Free Firewall As with anti-virus software here: Only use a software firewall, otherwise the system could operate unstable.
Use complex passwords
Use with any Internet service another password. Each password should be constructed as complicated as possible. We recommend at least eight characters, uppercase and lowercase letters, numbers and special characters. Tip: Use the first letter of a sentence to obtain safe and at the same time easy to remember passwords. An example: “My two PCs I use the operating systems Windows 7, Windows 8 and Linux =” AmzPnidBW7, W8uL.
Uninstall Unnecessary Programs
Uninstall programs you do not need. In this way, you reduce the attack surface for malware. To get rid of unnecessary applications, press the Windows key and R type, and click OK. Double-click a program that you no longer need, and follow the uninstall wizard.
Remove superfluous browser plug-ins
Crap you not only with Windows programs, but also in your browser plug-ins from time to time. In Firefox, press the Alt key, click Tools, Add-ons and extensions in the category of all unwanted add-on programs, click Remove. Lastly, click Restart Now. Users of Chrome, click the Setup icon at the top right, click Tools and Extensions. By clicking on the trash icon and remove delete unwanted plug-ins.
Load programs only from reliable sources
Download new software downloaded only from reliable sources. Recommended for programs of any kind is about the viruses tested the download area of ââCOMPUTER BILD For other sources sometimes you run the risk that you will get the installation programs that install next to the desired software unwanted components (called junkware).
Check websites in doubt
You are not sure whether a site is trustworthy? Check it on URLVoid! On the side of the address of the web page that will appear questionable. After clicking Submit estimates appear from over 20 services for the safety assessment.
Avoid websites with illegal content
Keep yourself away from sides, on which illegal content. These include the very latest movies, free music from the charts or applications that render the trial versions for free full version. The offer may seem tempting, but almost always here there are also plenty of malicious programs.
Beware of rogue advertising
With advertising banners also states: Watch out! Advertising on some sites leads to dubious offers. There is, for example, Trialware paid tuning software, their removal is not always easy. Do you want to try a advertised software that works safely in a virtual PC as VirtualBox
Do not open e-mail attachments from unknown senders
Receive an e-mail from an unknown person you, you better leave it alone. If a file is attached, it may just be a virus or trojan. In particular, in the context of current events alleged profits or job offers criminals often send e-mails with a defective Annex.
Use User Account Control
Since Vista bring Windows operating systems, the protective function UAC (User Account Control) with – User Account Control. It protects your PC from unwanted changes. Start or install such a program, first, a warning window will appear. Only when you confirm the message, it goes on. Verify that the user account control is on: Press the Windows key and press R, type userAccountControl settings and confirm with OK. Per slider switch UAC if necessary.
Do not rely on Windows passwords
Windows passwords do not provide basic protection, but more. With special boot CDs, such as the COMPUTER BILD emergency DVD Free, the secret words are easily resettable. Better protection for sensitive data provides an encryption; recommended, for example VeraCrypt A BIOS password improve security: you start your PC, press the appropriate key to enter the BIOS setup, such as F2. You can set a password without your future will not boot PC.
If the examination strike, activists strongly advise not to use the computer. One should therefore no longer connect to the Internet. “We recommend that you speak with an expert. The could examine the technical details and may help remove malware from your computer.
Detect is not a complete protection
While emphasizing the activists that their tool does not guarantee complete security, “Even if Detect finds no traces of spyware on a computer that does not mean that there is no present. Providers could change about their programs to be no longer detectable. (With material of dpa)