Get Adobe Flash player

Contact Information

C/Victoria, 37-5ºB
Malaga, 29012
Phone: 696 142 582

Visitors Counter


Barra izquierdaNoticiasRSSFacebookTraducir a españolBarra derecha

Introduction Services Facebook Twitter


Info Internet threats


For someone who uses your computer at home, the presence of viruses, worms and spyware is a nuisance. However, when dealing with a company whose operation depends on its infrastructure, the issue is crucial.

If one is not properly protected, the malware can get to sneak into the computer in different ways: Internet, download a program, an email, an infected file in a USB key, etc. However, it seems, the more there is now, as the case may be managed in INTECO (National Institute of Communication Technology), are infections via browser. Its technical name is Driveby, Download, and consists in the existence of some web pages that exploit a vulnerability in the browser itself or plugins of the same (like Adobe Reader, Flash, Jave, etc). So inject malicious code from your original code. Should you find a vulnerability, it will run a script that invokes the download of an executable file (malware) from another server.

Therefore, in this area becomes very important Windows updates, which not only provide the update on the security issue that are intended to cover all security holes found so far, but also adds new features needed and faster performance in different environments and situations.

pc infectado

It is generally believed that in the field of computer security is something you can buy. As they say, to install an antivirus, a firewall, spyware detection and spam blocking software, we can be sure of being protected. But now these tools are no longer sufficient because the threats are changing and the authors and are not kids looking for excitement, but criminals who go for our money. Therefore, it would seem to suggest that we now focus more attacks to steal data at destruction. At least that's what Greg Day thinks, security analyst at McAfee: "The crackers were motivated by the desire for recognition and build a reputation, but now work for sophisticated criminal groups trying to profit from innocent users. And as a result, cybercrime is growing largely in Europe. Currently routine repeated physical crimes such as extortion and robbery, but within an electronic environment in which the cyber-criminal can hide behind a computer terminal, with the assurance that their business will be difficult to track without a doubt". The viruses were originally created with the intention of causing harm in the long term or as a prank on time, but the current alternatives focus primarily on stealing sensitive personal information and valuable hard disk (credit card numbers and bank account data online users).

On the other hand, programs like "Trojan" allows hackers to remotely connect to your computer and capture your keystrokes as you doing that, while computers with broadband connections are used as gateways to send millions of spam messages.

The real problem lies in the technical sophistication of this new generation of attacks, such as rootkits that are famous for their ability to outwit the virus, which will count for nothing if you happen to enter one in the system with privileges to camp to ease. Do not expect that firewalls prevent outgoing connections, because Panda Software reports that the malicious software is finding new ways to access data from the machines. Some of these methods are simple (like disabling the firewall) and other advanced ( for example, "inject" code into a process that has permission to access the Internet), and many of them exploit vulnerabilities in common and popular applications such as instant messaging. Many of the symptoms manifest in the form of slow PC, unexplained activity or network hard drive (like flashing lights on the modem) or sudden blockage of the system.

At the same time, along with the latest attacks, the old methods are also finding new ways of breaching the defenses.

Another area of security that takes center stage will be to protect children online. As their children face similar dangers to those who threaten you no doubt will be necessary to protect them from inappropriate content, whether it comes from a Web page as if coming from a stranger who stands at the other end of a chat program.



In addition to the virus, who have been with us a whopping 25 years, and some other threat that has been adding to the list, now abounds new attack on the Internet: spyware. Although in reality some time ago who lives with us and may not be a problem again, now more than ever needs effectively prevented with the same intensity as using an antivirus and a firewall. In fact, it is becoming increasingly clever to sneak into your system.

According to recent studies, eight out of ten computers are infected by some kind of spyware, which can sometimes be as dangerous as a virus. Without the consent of the user's computer, statistical information is gathered by monitoring their online activity (though sometimes do not stop here and steal private information) for distribution to advertising companies or other organizations that might be interested in purchasing. Sometimes they can force your PC to a particular behavior. For example, it could happen that when you open your browser home page changed without your consent.

You could also add a new toolbar to Internet Explorer or force him to use a particular search engine. These intrusions are not only annoying, but can also have an adverse effect on system performance. If you notice that your PC takes a long time to boot up and the speed of your Internet connection is far from the promised by their supplier, it is likely that your computer is infected with spyware.

The entry points spyware can range from the request of many web pages of the need for notice or spikes particular link, the installation of shareware or freeware applications through instant messaging or chat.

Wi-Fi insecurity


Do you notice a sudden drop in download speed and Internet operator says it's all right? In this case you may be introduced into its Wi-Fi network and are using it illegally. The problem is that wireless networks are more vulnerable than wired.

Wireless computers talk to each other through a communications channel of radio waves. These waves travel through the air and are easily caught by someone outside the system, unlike cable platforms in which to capture a communication is necessary to physically connect the thread.

One fact in wireless networks is undeniable: they are never safe with the default settings. With the intention to be as user-friendly as possible, some manufacturers do nothing to protect their products. As a result, it is estimated that approximately 10% of Wi-Fi networks around the world still in its initial state is not protected, while around 75% use an insecure security type, accessible to anyone who tour the streets looking for your down payment or any neighbor that is in its range that has expertise and adequate computer equipment. So, if it manages to avoid entering directly or you can use your wireless security your wireless network allowing impunity both connect to the Internet using your connection and access your personal files or worse infecting the system with viruses, worms, trojans, also occupying the width of you pay band and thus slowing down the browsing speed.

As proof, we leave a very illustrative picture of the moment, using tools readily accessible through Internet, a WEP key is decrypted.

Info System freeze

congelacion del pc

This is a procedure to protect computers from any change or problem regardless of whether accidental or intentional, so that through the right tools can "freeze" the configuration of your computer to restore it later if necessary. So thanks to this system, we can restore at any time a PC to its original state, avoiding concerns with possible problems installing software, virus, etc.

The functioning of this kind of software is as follows:

  • While enabled, the computer is "frozen" and any changes you make (inevitable configuration changes, accidental system misconfiguration, malicious software activity, and incidental system degradation) will be removed when you restart the PC, namely, machine returns to state protection was activated.
  • When disabled, the computer can stay "unfrozen", namely, any changes you make (such as Windows Update, a software installation, etc) will be maintained unless it is manually reversed.
  • In addition, users can create a partition "thawed", so that data can be stored and not removed to reset the machine.

All of this is the best solution for permanent protection of the computers in the following environments: education (including schools, universities, etc), government agencies, libraries, health (hospitals, nursing facilities, etc) and especially in Internet cafes, where each once a user leaves a PC, it restarts and again in the initial state, so that another user can use it to its original state.

Ok Services

PCSOPORTE guarantees our customer a safer working scenario through the following mechanisms:

Angulo azul superior
  • Elimination of all forms of malware (viruses, Trojans, rootkits, spyware, etc ) and malware.
  • Safety audit to examine the level of system protection.
  • Establishment of a local user policy more restrictive.
  • Windows settings to improve the level of system protection.
  • Installing the latest security patches for Windows update.
  • Installing and configuring security packages of great prestige and effectiveness, with little impact on system resources.
  • Strict backup policy for the safeguarding of data storage media both local and remote storage servers.
  • Intrusion detection Wi-Fi network and configure it to improve its security.
  • Freezing the system to avoid a possible change that might affect the stability and security of Windows and integrity of sensitive data.
Angulo azul inferior