In this video, I talk about the recent problems I have had with my computer, initially started by a virus/malware issue that caused hardware damage to an 8GB stick of RAM & a 2TB Hard Drive.
I then go on to discuss anti-virus/malware and backups, both local & cloud-based.
At about the 06:15 point in the video, I mention a link for Copy.com .
With Copy.com, you get 15GB to start plus an extra 5GB if you get it through my link.
20GB is not bad for a free account!
PC Problems, Virus, Firewalls and Backups?
You may well ask what all of this has got to do with Internet Marketing or running an On-line Home Business.
Surely this topic belongs in a blog focused on IT or computer related stuff!
Well, yes, it is ” IT or computer related stuff”, but without a computer of some description it would be impossible to access the Internet – let alone run a business on it. Admittedly, there are tablets and smartphones, but it is generally easier and more efficient to use a desktop or laptop computer for this task.
However, if a tablet or smartphone is your preferred device, then please forgive my impertinence. But bear in mind that any device that accesses the Internet is potentially vulnerable and requires protection.
Also, this post concerns a PC, because that is what I use and what was attacked. But don’t get too smug if your ‘tech’ of choice is made by Apple Computers.
So, welcome to my latest post that unashamedly focuses on the computer or other devices we all use every day and maybe even take for granted.
The Computer “Thingy” That Gets Me To My Website
Taken for granted and mostly overlooked, except when needed, that box of electronics that sits on your desk or lap is under constant threat when connected to the Internet. Unscrupulous people all over the world are always on the lookout for a vulnerable computer that can be exploited to gain access to your personal and financial information. They can also use it to launch attacks on other vulnerable machines, or even relay spam and phishing emails through it so it looks as if the messages are coming from you.
There’s no need for paranoia, just an awareness of the fact that threats are always out there.
The crowd of sniveling under-rock-dwellers that spend their miserable little lives writing malicious code for the purpose of causing maximum disruption or stealing sensitive information, have been busy expanding their repertoire of coding mayhem into the realms of Apple’s OSX & IOS as well as Linux and Android Operating Systems.
During the course of my career, I have met a lot of very intelligent and talented individuals, who live and breath hardware and sof tware design. Most of them are still working very happily writing software and/or designing electronic products. Unfortunately, some have been led down a darker path, donning a “black hat” and wasting their considerable talents, by focusing on malicious software creation, cracking and hacking. I don’t know why – maybe some kind of traumatic incident in their personal or business life acted as a catalyst and triggered a vengeful mindset.
But who really knows the reasons why? Except, maybe, the individuals themselves.
The takeaway here is Vigilance .
Don’t become a sitting duck by thinking that it’s only Windows based PC’s that are vulnerable. There are always people, somewhere, actively working on exploits and thinking up different methods to gain access and take control of all popular operating systems, including OSX, IOS, Android and the more popular distributions of Linux.
Always ensure that the computer or device you work with, has known and respected Anti-Virus and Anti-Malware programs running, that receive at least daily updates to their definitions databases, so they are always prepared for the most current piece of nasty coding lurking out there. Also, always try to work behind a firewall, whether it’s the one built into your broadband router, as most are these days, or a software version installed on your computer/device.
Remember that everything is secure and robust before someone decides to launch an attack.
It’s only after the event when weaknesses are exposed. But, by that time, it is much too late.
My PC suffered a virus attack, although it didn’t look like that was the problem at first.
But, after a lot of investigation, research and diagnostics, I tracked all the problems down to a file with the magnificent name of zlibwapi.dll.wwbak that was sitting very nonchalantly in the system32 directory.
Now, there is a file called zlibwapi.dll which is associated with the zlib data compression library (zlib.dll). As ‘wapi’ is contained in the name, it would suggest that this file is a Windows Application Programming Interface (WAPI) that would act as an interface to an application requiring access to the library of functions contained within zlib.dll (dll = Dynamic Link Library).
So it’s quite normal to find both zlib.dll & zlibwapi.dll files on a PC, as there are many applications that use the compression functions in the library. Those that immediately spring to mind are any that manipulate photo, video or other graphics files. A quick search on my PC shows the files used extensively within Adobe applications as well as Camtasia and various video conversion programs.
I’ll be writing more on this in future posts, so stay tuned!