Reason why internet connection work very slow(HOT TOPIC)


Reason why internet connection work very slow(HOT TOPIC)

There are several things to consider.

1. You are at, or beyond, the distance limits of your router (wiresless transmitter). Move closer to see if the problem is resolved.
2. There is interference between your PC and the wireless router, such as a 2.4GHz cordless phone, microwave oven, flourescent lights, etc. Temporarily disable the devices, one by one, until you determine the problem.
3. The antenae on either your router or PC is loose. Tighten each.
4. Your PC may be infected with a virus, trojan, or spyware that is eating up your bandwith, and causing packet loss.
Download the programs linked below. Install them. Update them. Scan your pc with them, and do so weekly.

If you have System Restore turned on, the Restore files may be infected, and trying to reinfect your pc. I turn off that feature, reboot to delete the files, then turn it on after a full system scan with AVG.
Turning off System Restore.
(right-click My Computer, Properties, System Restore tab, check the box to turn off System Restore on all drives.)

Restart your PC, and hold down the F8 key.
When you see the Boot Menu appear (black screen white letters), choose SAFE MODE.

Run a FULL SYSTEM SCAN with AVG.
You may heal or quarentine anything found.

You can also run Spybot and AdAware while in Safe Mode. I suggest you do a full system scan. Get rid of anything they find.

To exit Safe Mode, just restart your PC normally.

AVG Antivirus - Free Antivirus Software
Ad-Aware - Free Antispyware Software
Spybot Search&Destroy - Free Antispyware/Antitrojan Software
Trend Micro HijackThis - Free program to turn off Browser Hijackers
CW Shredder - Free program to remove the ability of malware to point your browser ot CoolWebSearch and its affiliates

One REALLY great feature of Spybot Search&Destroy, is its ability to help your PC block known spyware/hijacker sites. Just use the Immunize feature.

Hope this helps.

There are several things to consider.

1. You are at, or beyond, the distance limits of your router (wiresless transmitter). Move closer to see if the problem is resolved.
2. There is interference between your PC and the wireless router, such as a 2.4GHz cordless phone, microwave oven, flourescent lights, etc. Temporarily disable the devices, one by one, until you determine the problem.
3. The antenae on either your router or PC is loose. Tighten each.
4. Your PC may be infected with a virus, trojan, or spyware that is eating up your bandwith, and causing packet loss.
Download the programs linked below. Install them. Update them. Scan your pc with them, and do so weekly.

If you have System Restore turned on, the Restore files may be infected, and trying to reinfect your pc. I turn off that feature, reboot to delete the files, then turn it on after a full system scan with AVG.
Turning off System Restore.
(right-click My Computer, Properties, System Restore tab, check the box to turn off System Restore on all drives.)

Restart your PC, and hold down the F8 key.
When you see the Boot Menu appear (black screen white letters), choose SAFE MODE.

Run a FULL SYSTEM SCAN with AVG.
You may heal or quarentine anything found.

You can also run Spybot and AdAware while in Safe Mode. I suggest you do a full system scan. Get rid of anything they find.

To exit Safe Mode, just restart your PC normally.

AVG Antivirus - Free Antivirus Software
Ad-Aware - Free Antispyware Software
Spybot Search&Destroy - Free Antispyware/Antitrojan Software
Trend Micro HijackThis - Free program to turn off Browser Hijackers
CW Shredder - Free program to remove the ability of malware to point your browser ot CoolWebSearch and its affiliates

One REALLY great feature of Spybot Search&Destroy, is its ability to help your PC block known spyware/hijacker sites. Just use the Immunize feature.


What Are Spyware, Adware, and Trojan Horses?


In a narrow sense, spyware is a term for some tracking technologies (specifically, executable applications) deployed on your computer without adequate notice, consent, or control. Spyware can monitor your activities online and/or perform functions without your knowledge or consent. Depending on the program, spyware can track and report on every Web site you visit, generate pop-up advertising, change your home page and browser settings, or record every key you press.

In its broader sense, spyware is also commonly used as the overall name for most types of potentially unwanted technologies detected by popular anti-spyware programs.

These technologies are implemented in ways that impair your control over the following: collection, use, and distribution of your personal information; material changes that affect your desktop experience, privacy, or system security; and use of your system resources. These are items that users of anti-spyware software will want to be informed about and that they may want to easily remove or disable.

Adware is a subset of the broader spyware category, which is designed to
deliver targeted advertising to your Web browser, especially through the use of pop-up ads. Adware is often bundled with other software programs, such as peerto- peer file-sharing software, games, or other utilities that can be downloaded for free from the Web. Adware knows what kinds of ads to deliver to you because it tracks the places you surf. For instance, if you surf to a car rental site, an adware program might generate a pop-up ad that a competing car rental company has paid the adware company to deliver to you. Besides tracking your behavior and annoying you with ads, adware may also open a connection on the Internet to report your surfing habits back to a central server. This information, which may
include your age, your sex, your shopping habits, and even your location, is used to conduct "market research" to attract new clients.

Trojan horses are programs that claim to be something they are not. For
instance, a Trojan horse may advertise itself as an amusing animation clip, a screen saver, or a free software program that promises to do something cool or helpful. But Trojan horses also include unadvertised functions (if, in fact, the advertised function works at all). The most common goal of a Trojan horse is to install a back door on your computer or steal passwords. A back door lets attackers control your machine remotely. Some classes of spyware can be considered Trojan horses because they arrive under false pretenses. For instance, you may have downloaded a neat little screen saver with pretty butterflies on it that also happens to monitor
your Web-surfing habits or log your keystrokes. Trojan horses often rely on viruses, worms, and social engineering to get unsuspecting users to download them. The term Trojan horse has become shorthand for any program that resides on your computer and provides remote access to an unauthorized person or performs unwanted functions. Most anti-virus (AV) software and some anti-spyware software can detect Trojan horses.
Spyware, adware, and Trojan horses can't replicate themselves. Thus, these categories of applications need other ways to spread. For instance, Trojan horses may be delivered as part of the payload of a worm or virus, included as an e-mail attachment, or bundled with other software. Spyware and adware use similar techniques to spread, but they are most frequently downloaded as part of a "free" file-sharing program or software utility or via drive-by downloads (in which you visit a Web site that installs the program without your permission).


Defining Spyware and Adware
While security risks such as spyware and adware can be seen as an extension of the virus problem, there are significant differences in how these programs are judged as desirable or undesirable and whether you want them on your machine.
Viruses, worms, and Trojan horses are always undesirable and should be automatically removed from a computer. Many types of programs classified as adware and spyware are also high-risk and can have a significant negative impact on computer performance or invade your privacy by transmitting personal information to a third party.

However, other adware programs are low-risk. They can deliver useful functionality such as games or utilities and have a relatively small impact on privacy and computer performance. Just as broadcast television programs are free because television companies earn revenue from advertising, many software programs are free to download because they too rely on advertising to generate income. Such software programs are called ad-supported programs. They include adware to deliver targeted ads. Some ad-supported software programs seek the user's consent before installing adware; others do not. Still others operate in a gray area in which user consent is part of the "fine print" of a software license agreement. We'll examine these distinctions and what they mean to you more closely in subsequent sections.

The broad range of spyware and adware or potentially unwanted programs can be divided into two general categories: high-risk or malicious programs and low-risk programs. Security researchers assign spyware and adware programs to one of these categories depending on how the programs are installed, what data they try to export from your computer, what impact they have on your computer's performance, and what you are led to understand about their operation and intent. When security researchers investigate a program's behaviors to determine risk, they look at a number of key areas, including installation characteristics, stealth properties, privacy impact, integrity impact, performance impact, and ease of removal:

Does the program impact system stability or slow down the network connection?
Does the program launch pop-up advertisements? If so, how frequently?
Does the program serve as a means of downloading and installing other security risks (such as additional spyware and/or adware Does the program replace the browser home page or alter search options or behavior?
Does the program cause the release of confidential, sensitive information such as bank account numbers and passwords?
Does the program cause the release of less-sensitive data such as tracking of Web-surfing habits?
Does the program have a privacy policy, and does its behavior match the stated policy?
Does the program try to hide itself or avoid being uninstalled by the user, including an unsolicited reinstallation and techniques to restart user terminated processes?
Does the program lack an uninstall feature or fail to register in the Microsoft Windows Add or Remove Programs area?
Does the program install itself silently, with little or no indication to the user?
Does the program lack a user interface?
Does the program conceal its processes or hide them from the user using an obscure name?
Is the user notified of the program's presence only through an End User License Agreement (EULA)? Does the EULA appear to relate to a different program?

To qualify as high-risk or malicious spyware and adware, programs must have significant impact on system stability and/or performance or release confidential, sensitive information and/or exhibit stealth behaviors such as a silent installation, no user interface, and concealment of application processes. Examples of highrisk programs can include keystroke loggers, browser hijackers, and dialers.

Malicious spyware is illegal and therefore is employed by criminals who want to steal from you. Malicious spyware gets installed on your computer through software vulnerabilities, worms and viruses, social engineering, and drive-by downloads.

Low-risk programs include many popular commercial adware or ad-assisted
programs. However, some adware generates multiple pop-up ads and performs other unwanted functions, like changing your home page, directing you to unfamiliar search engines, or installing toolbars in your Web browser that you didn't

Spyware Definitions

Term Definition

Spyware Spyware is a general class of software programs that monitor computer activity and relay that information to other computers or locations on the Internet. Among the information that may be actively or passively gathered and transmitted by spyware are passwords, log-in details, account numbers, personal information, individual files, and personal documents. Spyware may also gather and distribute information related to the user's computer, applications running on the computer, Internet browser usage, and other computing habits. Spyware is usually loaded onto a user's computer without the user's knowledge and is created by underground attackers or criminals.

Adware Adware is a type of advertising display technology-specifically, executable applications whose primary purpose is to deliver advertising content. Many adware applications also perform tracking functions and therefore may also be categorized as tracking technologies. Consumers may want to remove adware if they object to such tracking, do not want to see the advertising generated by the program, or are frustrated by its effects on system performance. Some users might want to keep particular adware programs if their presence is a condition for the use of other free software. Adware is created by commercial software companies rather than criminals and is often bundled with popular free software, such as file-sharing programs. Some adware describes its functions in a license agreement and provides uninstall options; other adware may install itself without a user's permission and thwart attempts at removal.

Keystroke logger Keyloggers are tracking technologies that surreptitiously record (also known as a keylogger) keyboard activity. Keyloggers typically either store the recorded keystrokes for later retrieval or transmit them to the remote process or person employing the keylogger via e-mail. Keystroke loggers are used to steal passwords and other identity information.

Browser hijacker Browser hijackers reset your home page and redirect your browser to unwanted or unknown search engines or other Web sites. Some browser hijackers can prevent you from restoring your home page. Browser hijackers work by deleting the entry for the home page you've selected and inserting their own in a special file that your computer consults (the hosts file). They also might intercept search queries typed into a legitimate search engine and display their own results.

Browser Helper Object (BHO) BHOs are companion applications for Microsoft Internet Explorer (IE) that run automatically whenever IE is launched. They are a form of state management tool. Many tracking technologies or advertising display technologies are implemented as BHOs. BHOs can search the Web pages a user visits and replace banner ads generated by the Web server with targeted ads. BHOs can also monitor and report on a user's surfing behavior and may reset a user's home page. Note that not all BHOs are malicious; many legitimate Web browser toolbars are BHOs. Trojan horse Trojan horse software masquerades as an innocuous or useful program to trick a user into installing it. Once installed, the Trojan horse engages in unwanted or unadvertised functions. Remote Access/ RATs are executable applications designed to allow remote access Administration Tool (RAT) to or control of a system. They are a type of remote-control technology. Many legitimate uses of RATs do not pose security threats, but they can be used maliciously, especially when used by someone other than the computer's legitimate owner or administrator. Dialer Dialers are programs that use a computer's modem to make calls or access services. Users may want to remove dialers that can result in unexpected phone numbers being dialed or unexpected telephone charges. Dialer is a colloquial term for dialing technologies


Digital Music



Digital music takes up a lot of space--about 10 MB for every minute
of stereo sound. But, as it turns out, there's a lot of information
in every second of uncompressed digital sound that your ear doesn't
need to hear a song. Codec (compressor/ decompressor) algorithms
shrink an audio file's size, without making the music it contains
sound too much worse. Without codecs, you wouldn't be able to
download, e-mail, or stream digital music over the Internet--the
files would be huge. We'll talk more about how codecs work later on.
For now, let's take a look at some of the most popular codecs out
there.

MP3: Developed by a German software company and can be played on
most players you can find.
WMA (Windows Media Audio): Microsoft's codec. You have to use
Microsoft Windows Media Player to encode WMA files, but many
software players can then decode, or play back, your music.
Ogg Vorbis: An open-source codec--It's totally free and has no
licensing requirements, which has helped it gain popularity.
MP3 Pro: A fairly new codec that attempts to achieve the same audio
quality in smaller file sizes than MP3. It's backward compatible
with existing software MP3 players, so you may see more of it in the
future.
ACC (Advance Audio Coding): Another codec that offers excellent
sound at low-bit rates. Apple Computer uses AAC for the audio
portion of its QuickTime format.
RealAudio: One other file type you might come across is RealAudio.
RealAudio files are usually streamed, rather than downloaded--we'll
talk more about what that means later on. A significant number of
Internet radio stations broadcast in the RealAudio format, playable
by RealPlayer, or RealOne as it's now called. We're not going to use
this format for our projects.



Some of the bigger Web sites that offer music you can legally
download are:

MP3.com
iTunes
MSN Music
AOL
Launch.com: Now part of the Yahoo! Network, this Web site lets you
create your own custom station by rating songs, artists, albums,
genres, and subgenres, or you can listen to other sponsors' radio
stations.
Epitonic.com: An excellent source for MP3 downloads and streams of
cutting-edge music. Its knowledgeable staff of music experts makes
its presence known on the Web site, separating this site from other
free or subscription-based music sites.
Garageband.com: Lets bands upload their own music for others to
download and rate. Dig around on the Web site--you'll find a
terrific variety of artists outside the mainstream.
So how do you know if you're committing copyright infringement? The
rules depend on the content you're dealing with. If you copy
something from an unprotected format such as a CD, you haven't
circumvented copyright protection, but your right to copy the
content would still depend on how a court saw your actions relative
to what is allowed by the fair use doctrine.

In a nutshell, you don't automatically have the right to rip and
burn copies of music--even if you purchased it. Just because you can
find a downloadable copy of a song online doesn't mean it's legal to
grab it and save it to your hard drive.

For example, it's possible to save streamed music with a piece of
software called Total Recorder, which essentially grabs the audio
right from your sound card as the decoded stream is being played.
But recording copyrighted, encrypted streams is a felony against the
DMCA (Digital Millennium Copyright Act).

Subscription Services and Other Issues
So how can you legally download the latest hits? You can do so
through a subscription service. You can pay a monthly fee to
download copyrighted music and compensate copyright owners in the
process. Unfortunately, the copyright protection these Web sites
apply to their files often renders the downloads illegal to use as
source material, since you'd have to circumvent copyright protection
to turn them into WAVs. But for personal listening, subscription Web
sites can be worth the price of admission. MSN Music, Amazon,
Listen.com, Emusic.com, the new Napster.com, and Andante.com, all
offer downloads in exchange for a monthly fee; the iTunes.com Store
lets you download individual songs for $.99 each--with no monthly
fees.

Burn A CD:
The basic process, regardless of the program you use, is simple:

You insert a music CD in the drive, and instead of playing it, you
use the software of your choice to copy the entire contents of the
CD to your hard drive and save it as WAV on a PC or AIFF on a Mac.
You're making an exact copy of every bit - literally! This process
can take anywhere from a few minutes to about an hour, depending on
how up-to-date your equipment is.
After the copy of the CD is on your hard drive, you can eject the
original, insert a new, blank CD-R, and copy the contents from your
hard drive onto the CD-R. The result is an audio CD you can play on
any CD player.

Be Your Own Radio Station
How many people do you know who have a personal radio station? The
answer is none (legally, anyway)--because the FCC won't allow it.

But you can Webcast your own show--worldwide--and often for free.
Using the Internet, you can transmit your own show to as many other
computers as allowed by your station's connection and processor
speeds. Unlike other radio media, the Internet always has room for
another station--yours included. You just need to choose an approach
that matches your levels of commitment, both financial and temporal.

The easy way to broadcast online: head over to Launchcast and set up
your own station for free. It's easy to follow the instructions and
begin rating genres, artists, albums, and songs. The more you rate,
the more your station reflects your tastes. You don't need to have
your own music or bandwidth--you're selecting the songs and
streaming your station from an online catalog.

Eventually, you'll want to Webcast songs from your own music
collection. You can program your own station with a little help from
Live365; upload your MP3s to the server, and stream them. You'll pay
a bit--$5 per month or more (depending on how much you want to
stream)--but you can try a 14-day free trial first.

When you choose music for your Live365 station, the sky's the limit.
You can Webcast all the copyrighted music you want, legally, because
Live365 uses your monthly fee to take care of the royalty payments.