<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>virus &#8211; RLS Computer Services</title>
	<atom:link href="https://rlscomputers.co.uk/tag/virus/feed/" rel="self" type="application/rss+xml" />
	<link>https://rlscomputers.co.uk</link>
	<description>Making IT Work for You</description>
	<lastBuildDate>Wed, 26 Feb 2025 09:03:31 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://rlscomputers.co.uk/wp-content/uploads/2023/01/RLS_logo_new_44x55.jpg</url>
	<title>virus &#8211; RLS Computer Services</title>
	<link>https://rlscomputers.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">218184854</site>	<item>
		<title>How to Spot a Phishing Email</title>
		<link>https://rlscomputers.co.uk/2014/06/17/how-to-spot-a-phishing-email/</link>
		
		<dc:creator><![CDATA[Rob Lucas]]></dc:creator>
		<pubDate>Tue, 17 Jun 2014 11:27:40 +0000</pubDate>
				<category><![CDATA[Viruses / Malware]]></category>
		<category><![CDATA[hoax]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[SPAM]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://www.rlscomputers.co.uk/news/?p=300</guid>

					<description><![CDATA[I get several calls on this subject PER DAY!! and mainly the question I get asked is: How do I spot a Phishing email? What is Phishing? First I will explain what Phishing is; Phishing is a way of fraudulently &#8230; <a href="https://rlscomputers.co.uk/2014/06/17/how-to-spot-a-phishing-email/">Read More</a>]]></description>
										<content:encoded><![CDATA[<p>I get several calls on this subject PER DAY!! and mainly the question I get asked is: How do I spot a Phishing email?</p>
<p><strong>What is Phishing?</strong></p>
<p>First I will explain what Phishing is; Phishing is a way of fraudulently acquiring sensitive information, such as credit card, bank account, login details or any other piece of personally identifiable information by tricking users with official-looking email messages. They appear to have come from legitimate sources by the sender (<strong><em>thief</em></strong>) using official looking logos, company addresses, names and visual links in a hope that the recipient (<em><strong>you</strong></em>) opens the attachment or click on the rogue link to start the criminal activity (<strong><em>hack, infection by Trojan or malware</em></strong>).</p>
<p><strong>What to Look Out For?</strong></p>
<p>Here are a few clues on what to look out for when spotting a Phishing email.</p>
<ol>
<li>Check where the email came from, examine the senders email address. It might have come from a public email address (i.e. xxx@outlook.com or xxx@yahoo.co.uk).</li>
<li>Look at bogus attachments, if it has a PDF, Zip or Word document attached doesn&#8217;t make it real or legitimate.</li>
<li>PANIC!, if an email has created a sense of impending doom if you don&#8217;t act TODAY! then be suspicious.</li>
<li>Links that sound correct can very easily be faked. This link for example should take you to our website <a href="http://www.bbc.co.uk" target="_blank" rel="noopener">www.rlscomputers.co.uk</a>, when it actual takes you to the BBC website. If you are unsure NEVER click on a link and always visit the website site directly yourself.</li>
<li>Grammer is a major clue to Phishing email attacks, sometimes the dialect is a very obvious tell but can be over looked.</li>
</ol>
<p><strong>What Does a Phishing Email look Like?</strong></p>
<p>I have collected some examples over time, so some of these are old but still lethal (some details have been masked for security reasons). <a href="http://www.rlscomputers.co.uk/news/wp-content/uploads/2014/06/Bank_Phising1.jpg"><br /></a><a href="https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1.jpg" target="_blank" rel="noopener"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-3812 size-medium" src="https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-212x300.jpg" alt="" width="212" height="300" srcset="https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-212x300.jpg 212w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-724x1024.jpg 724w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-768x1086.jpg 768w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-1086x1536.jpg 1086w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-57x80.jpg 57w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-214x303.jpg 214w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-495x700.jpg 495w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-672x950.jpg 672w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1-764x1080.jpg 764w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/Bank_Phising1.jpg 1191w" sizes="(max-width: 212px) 100vw, 212px" /></a> <a href="https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media.jpg" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-3814 size-medium" src="https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-300x147.jpg" alt="" width="300" height="147" srcset="https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-300x147.jpg 300w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-1024x502.jpg 1024w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-768x377.jpg 768w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-612x300.jpg 612w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-163x80.jpg 163w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-394x193.jpg 394w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-915x449.jpg 915w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media-1240x608.jpg 1240w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/virgin-media.jpg 1460w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://rlscomputers.co.uk/wp-content/uploads/2014/06/rbs_screen01-mail.jpg" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-3815 size-medium" src="https://rlscomputers.co.uk/wp-content/uploads/2014/06/rbs_screen01-mail-300x184.jpg" alt="" width="300" height="184" srcset="https://rlscomputers.co.uk/wp-content/uploads/2014/06/rbs_screen01-mail-300x184.jpg 300w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/rbs_screen01-mail-490x300.jpg 490w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/rbs_screen01-mail-131x80.jpg 131w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/rbs_screen01-mail-394x241.jpg 394w, https://rlscomputers.co.uk/wp-content/uploads/2014/06/rbs_screen01-mail.jpg 653w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><strong>What Can I Do To Stop it?</strong></p>
<p>You can&#8217;t stop all of it, but you can avoid a nasty outcome and reduce it down considerably by following these guidelines.</p>
<ul>
<li>Never send sensitive account information (<strong>PIN codes, passwords, account reminder phrases or mothers maiden name</strong>) in an e-mail message.</li>
<li>Never go to a sensitive site through an e-mail link; always type the site name in your browser (such as www.paypal.com)</li>
<li>Never open attachments from a untrusted or unknown source (<strong>this includes PDF and Zip files</strong>)</li>
<li>Never share your passwords with <span style="text-decoration: underline;"><strong>anyone</strong></span>.</li>
<li>If your bank requires verification, do it over the phone or in person.</li>
<li>Verify any person who contacts you unsolicited, claiming to be customer support from a company (<strong>if they have to ask who you are, then they don&#8217;t know who you are</strong>)</li>
<li>Always report fraud to the company that the thief is portraying to be or represent.</li>
<li>SPAM / Junk block the Phishing emails, then delete them.</li>
<li>Make sure you empty your SPAM or Junk folders and email bin frequently (I do it daily)!</li>
</ul>
<h1>Seek technical advice on this if you are not sure.</h1>
<p style="color: #373737;">Contact<br />RLS Computer Services – IT Support<br />01553 776937<br />Email support@rlscomputers.co.uk</p>
<p style="color: #373737;"><strong>You can report scams to:</strong></p>
<p>Citizens Advice Consumer Helpline 03454 04 05 06 or <a href="http://www.adviceguide.org" target="_blank" rel="noopener">www.adviceguide.org</a></p>
<p>Action Fraud (UK’s National Fraud Office) 0300 123 2040 or <a href="http://www.actionfraud.police.uk" target="_blank" rel="noopener">www.actionfraud.police.uk</a></p>
<p>National Cyber Security Centre <a href="https://www.ncsc.gov.uk/guidance/phishing" target="_blank" rel="noopener">https://www.ncsc.gov.uk/guidance/phishing</a></p>


<p></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">998</post-id>	</item>
		<item>
		<title>PC TELEPHONE SUPPORT SCAM</title>
		<link>https://rlscomputers.co.uk/2014/03/22/pc-telephone-support-scam/</link>
		
		<dc:creator><![CDATA[Rob Lucas]]></dc:creator>
		<pubDate>Sat, 22 Mar 2014 10:52:02 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[hoax]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[telephone]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://www.rlscomputers.co.uk/news/?p=222</guid>

					<description><![CDATA[One morning, I was sat at my desk in the office when the phone rang. &#8220;RLS Computer Services, how can we help you?&#8221; I said, with that a lady responded that she was from a &#8220;Microsoft&#8221; company that had detected &#8230; <a href="https://rlscomputers.co.uk/2014/03/22/pc-telephone-support-scam/">Read More</a>]]></description>
										<content:encoded><![CDATA[<p>One morning, I was sat at my desk in the office when the phone rang. &#8220;RLS Computer Services, how can we help you?&#8221; I said, with that a lady responded that she was from a &#8220;Microsoft&#8221; company that had detected a problem with my computer. What followed was a conversation that just made me laugh and angry at the same time.</p>
<p>What you are about to hear is a telephone recording of that conversation.</p>
<p>We recorded it to show people the tricks and techniques these people use to manipulate users to &#8220;Thinking&#8221; their PC is infected or faulty by showing them technical information on your PC that would scare you in believing that your PC is indeed faulty or infected with a virus.</p>
<p>View on YouTube: <a href="http://youtu.be/FrENiWwcyw0">PC TELEPHONE SUPPORT SCAM</a></p>
<p><iframe src="//www.youtube.com/embed/FrENiWwcyw0?rel=0" height="315" width="560" allowfullscreen="" frameborder="0"></iframe></p>
<p>Also Read:</p>
<p><a title="Beware Cold Calling IT Scams" href="http://www.rlscomputers.co.uk/news/?p=23">Beware Cold Calling IT Scams</a></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">995</post-id>	</item>
		<item>
		<title>Cryptolocker Ransomware: Your Data’s Worse Nightmare</title>
		<link>https://rlscomputers.co.uk/2013/10/11/cryptolocker-ransomware-your-datas-worse-nightmare/</link>
					<comments>https://rlscomputers.co.uk/2013/10/11/cryptolocker-ransomware-your-datas-worse-nightmare/#comments</comments>
		
		<dc:creator><![CDATA[Rob Lucas]]></dc:creator>
		<pubDate>Fri, 11 Oct 2013 11:34:01 +0000</pubDate>
				<category><![CDATA[Viruses / Malware]]></category>
		<category><![CDATA[Cryptolocker]]></category>
		<category><![CDATA[help]]></category>
		<category><![CDATA[Infected]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://www.rlscomputers.co.uk/news/?p=204</guid>

					<description><![CDATA[Calling all PC users, we from time to time warn you of the dangers of viruses and Trojans, etc. but I felt that an update is CRITICAL, due to a relatively new strand of malware referred to as “ransomware”. It &#8230; <a href="https://rlscomputers.co.uk/2013/10/11/cryptolocker-ransomware-your-datas-worse-nightmare/">Read More</a>]]></description>
										<content:encoded><![CDATA[<p>Calling all PC users, we from time to time warn you of the dangers of viruses and Trojans, etc. but I felt that an update is <strong>CRITICAL</strong>, due to a relatively new strand of malware referred to as “ransomware”. It is designed to extort money from computer users by holding computers and files hostage until the computer user pays a ransom fee to get them back.</p>
<p>Although this is a very clever scam, the malware is typically unsuccessful in actually locking computer files if the ransomware is caught and dealt with promptly by a professional. Unfortunately, all that has changed with a new piece of ransomware that is so severe it has been described as “game changing” within the IT industry.</p>
<p>Today I received a report that a client was infected with a piece of ransomeware called “Cryptolocker” that will first hijack your PC and at the same time begin to encrypt your most popular file types, like Word, Excel, jpg’s, PDF, etc. so you cannot open them. The process is executed in stealth mode and once the process is complete the screen is then hijacked with the following message.</p>
<p><a href="http://www.rlscomputers.co.uk/news/wp-content/uploads/2013/10/cryptolocker-ransomware.png"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-205" src="http://www.rlscomputers.co.uk/news/wp-content/uploads/2013/10/cryptolocker-ransomware.png" alt="cryptolocker-ransomware" width="473" height="371" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The major twist is that unless you pay the ransom (normally around $300) there is no way to decrypt the files and <strong>THEY WILL BE LOST FOREVER</strong>.</p>
<h2>How to catch it</h2>
<p>Cryptolocker is spread through malicious hyperlinks shared via social media and spam emails, like fake UPS tracking and TAX refund notification emails. Once the attachment or link is opened, the computer becomes infected immediately, and the virus begins the encryption process.</p>
<h2>Prevention Checklist</h2>
<ul>
<li>Use a professional, quality antivirus software program (Like from Panda Security) and keep it updated daily and malware free.</li>
<li>Keeping your operating system up-to-date with the latest patches. You should check if any updates exist for your system.</li>
<li>For on-going protection, ensure that you are running effective and up-to-date security software and don’t turn off any obvious security measures (e.g. Firewalls)</li>
<li>Make sure you keep back-up copies of important/precious files (documents/pictures etc.) which would be very hard or impossible to reproduce if they are lost</li>
<li>Never open attachments or links in emails you don’t recognise or links in shared social networks.</li>
<li>Scanning all files downloaded online – and only downloading files from trusted sources.</li>
<li>After following the above steps you feel there is still a problem or if you are not sure what to do, seek further expert advice. Doing nothing could very easily cause you problems later!</li>
</ul>
<h2>What to do if I get infected?</h2>
<p>If you are infected <strong><span style="text-decoration: underline;">STOP</span></strong> don’t do anything more. Turn off your PC and contact us <strong><span style="text-decoration: underline;">IMMEDIATELY</span></strong> and don’t be tempted to switch it on again until it is sorted.</p>
<h2>Is there any way of getting my files back?</h2>
<p>Sorry NO, unless you pay the ransom or you have a clean data backup stored in an offsite facility.</p>
<p>I will echo the advice of our Cybercrime Forensics Specialist Group:-</p>
<h1 style="text-align: center;">Seek advice on this if you are not sure – the worst thing to do is to do nothing.</h1>
<p>Contact<br />
RLS Computer Services &#8211; IT Support<br />
0844 334 2020<br />
Email support@rlscomputers.co.uk<br />
or Like Us on <a href="http://www.facebook.com/rlscomputers" target="_blank" rel="noopener">Facebook</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rlscomputers.co.uk/2013/10/11/cryptolocker-ransomware-your-datas-worse-nightmare/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">992</post-id>	</item>
		<item>
		<title>Be Safe, Not Sorry!</title>
		<link>https://rlscomputers.co.uk/2012/11/08/be-safe-not-sorry/</link>
					<comments>https://rlscomputers.co.uk/2012/11/08/be-safe-not-sorry/#comments</comments>
		
		<dc:creator><![CDATA[Rob Lucas]]></dc:creator>
		<pubDate>Thu, 08 Nov 2012 13:53:50 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Chat Rooms]]></category>
		<category><![CDATA[children]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[kids]]></category>
		<category><![CDATA[Messenger]]></category>
		<category><![CDATA[paedophiles]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[social networks]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://www.rlscomputers.co.uk/news/?p=31</guid>

					<description><![CDATA[We all know that computers and technology are advancing at a rapid rate, and with faster broadband and 4G services being rolled out accessing these services can be easily obtainable from smartphones, tablets and personal computers. However, despite the numerous &#8230; <a href="https://rlscomputers.co.uk/2012/11/08/be-safe-not-sorry/">Read More</a>]]></description>
										<content:encoded><![CDATA[<p>We all know that computers and technology are advancing at a rapid rate, and with faster broadband and 4G services being rolled out accessing these services can be easily obtainable from smartphones, tablets and personal computers. However, despite the numerous educational facilities and Internet-safety software tools, it’s not just your PC at risk— your children are also at risk from online predators. In a recent survey on the TV programme “This Morning”, results revealed more than half of parents do not think their children are safe online.</p>
<p><strong>What is the problem or key issue?</strong></p>
<p>Simple answer: parental awareness. How many times do we need to hear “I don’t know what they get up to…” or “They know much more about these things…”? However, it only takes a scare, whether public or personal, to start the realisation that your kids are at risk. In any one week two-in-five calls we receive relate to Internet risks, which means those computers are either unprotected or with inadequate protection for use by young children.</p>
<blockquote><p>Here’s an example: we get a call from a parent who starts with a simple “My PC is slow, can you fix it for me…?” We collect the PC, and by analysing the problem find that it has been infected with a virus inherited through Messenger. When the issue is investigated further, and with the parents’ consent, we find well over 300 Messenger friends, the majority of which are unknown to the parents, with such bogus names as “sexy123” and “WillingIAm”, which leaves me in no doubt where these infections have probably come from.</p></blockquote>
<p>To emphasise the point, we are not just talking about a few computer infections, we are talking about a sophisticated network of paedophiles who use web sites, emails and social networks to trap children into believing they are interacting with peers of the same age group.</p>
<p><strong>“What can I do about it?”</strong></p>
<p>First, pay attention to what your children are doing: if your computer isn’t already in a public area of the home, put it there or, if you use a laptop, get the kids to use it in the living room area or kitchen or wherever <em>you</em> are.</p>
<p>Secondly, heed the advice of the professionals: services like <a href="http://www.thinkuknow.co.uk/" target="_blank" rel="noopener">www.thinkuknow.co.uk</a> have plenty of support and advice for keeping your children safe online.</p>
<p>Lastly, heed the advice of the IT professionals. As accredited IT professionals and members of Norfolk Trusted Traders, we have resources, software tools, advice and services — all tailored to protect the PC and your children.</p>
<p>If you would like help, or know what services we offer to help protect your PC, contact us at <a href="mailto:info@rlscomputers.co.uk" target="_blank" rel="noopener">info@rlscomputers.co.uk</a></p>
<p>For more information</p>
<p>Think You Know &#8211; <a href="http://www.thinkuknow.co.uk/" target="_blank" rel="noopener">www.thinkuknow.co.uk</a></p>
<p>ITV “This Morning” &#8211; <a href="http://www.itv.com/thismorning/life/crime-week-how-to-catch-a-paedophile/" target="_blank" rel="noopener">Crime week article</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://rlscomputers.co.uk/2012/11/08/be-safe-not-sorry/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">972</post-id>	</item>
		<item>
		<title>I Spy with My Little Eye</title>
		<link>https://rlscomputers.co.uk/2004/11/30/i-spy-with-my-little-eye/</link>
		
		<dc:creator><![CDATA[Rob Lucas]]></dc:creator>
		<pubDate>Tue, 30 Nov 2004 10:47:53 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Viruses / Malware]]></category>
		<category><![CDATA[adware]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://www.rlscomputers.co.uk/news/?p=20</guid>

					<description><![CDATA[Have you ever wondered how those pop ups that you absolutely hate got there in the first place and why every time you go onto the net you immediately get transported to a page that you didn’t ask for or &#8230; <a href="https://rlscomputers.co.uk/2004/11/30/i-spy-with-my-little-eye/">Read More</a>]]></description>
										<content:encoded><![CDATA[<p><span style="font-family: 'Arial Narrow'; font-size: medium;">Have you ever wondered how those pop ups that you absolutely hate got there in the first place and why every time you go onto the net you immediately get transported to a page that you didn’t ask for or how your telephone bill has suddenly gone sky high? Well the answer is simple it’s because of things like Spyware and Adware; this article will hopefully answer your questions.</span></p>
<p><span style="font-family: 'Arial Narrow'; font-size: medium;">Adware or ADvertised supported softWARE are programs included with other programs that you download willingly off the Internet (all those freebie tools and programs); these have been produced by semi professional programmers and distributed by online distribution companies. As the programs are free the company distributing them have to make money some how, so they attach a little adware program to the download that produces banner ads or pop ups every time you go on the net, There are several large media companies that ask them to place banner ads in their products in exchange for a portion of the revenue from banner sales (this is perfectly legitimate and is normally made clear in the licence agreement, (the one you click through and don’t read…) however not all pop ups are caused this way and some can be through using particular websites. Not to be confused with legitimate websites offering you additional products or services, these unwanted pop ups can be caused by downloading and installing whilst you are on the net and usually without you knowing.</span></p>
<p><span style="font-family: 'Arial Narrow'; font-size: medium;">Now, Spyware is a completely different kettle of fish, spyware as the name suggests peeks into your computer to gather information. Distributed in a similar way as adware its purpose is to report back to HQ with information on your surfing habits, action carried out while browsing, pages visited, programs installed on your computer, etc the company might state that it’s for market research, but you can never be sure and as the program has the capability of capturing this information it makes users extremely uneasy regarding their privacy.</span></p>
<p><span style="font-family: 'Arial Narrow'; font-size: medium;">The latest problem with intrusion is “The Dialler” or &#8220;Rogue Dialler&#8221; this can be strongly linked to websites with an adult theme but not always necessarily and could cost you hundreds of pounds in phone calls. When you visit one of these websites you are asked if you would like to access a member’s area if you agree a dialler program will be downloaded and installed. This dialler program will then dial out on your phone on a premium rate number (anything from £1.50 &#8211; £15.00 per min) in order for you to gain direct access to their website.</span></p>
<p><span><span style="font-family: 'Arial Narrow'; font-size: medium;">The answer to this is simple don’t download it, don’t install it, if you need to download these types of programs read the licence agreement or terms and conditions first and see if it includes some kind of advertising clause or data capturing facility and if so, don’t install it or in the case of diallers just <span style="line-height: 26px;">don&#8217;t</span> install at all. Some serious spyware can be used to capture your sensitive information and as such many anti virus programs now protect against spyware, adware and dialler programs. For more information on internet use and security contact RLS Computer Services on 01553 776937.</span></span></p>
<p><span style="font-size: medium;"><span style="font-family: 'Arial Narrow';">By Rob Lucas</span></span></p>
<p>RLS Computer Services</p>
<p>More information can be found on the <a href="http://news.bbc.co.uk/1/hi/programmes/breakfast/4052475.stm" target="_blank" rel="noopener">BBC News website</a></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">970</post-id>	</item>
	</channel>
</rss>
