Once a user's system is infected with malware, his bandwidth would be wasted on the spread of malware and spam and phishing attacks. In fact, most hosts have run into this situation.

In a perfect world, if the user's system is infected with botnets, he would not only receive the prompt message from the ISP, but also be isolated until he is confirmed to meet the “security requirement” of not being infected again.

From the point of global limits, what are users' attitudes to this management? What are the advantages and disadvantages of this mode? And how do security experts and fighters against the cyber crime think about this problem? Now, let us get to know about it.

A survey released by Abuse Working Group in 2010 shows that 65%of users blame Internet service providers and e-commerce service providers for causing spate of computer virus, spyware, and regular spam mails contained in fraudulent e-mails. And the next one to be criticized is anti-virus software providers.

Chaney declared, “If a device is indentified to pose a threat to the Internet, the user must be notified, and the device must be cleaned up, too. Before the job is done, the device should be prohibited from connecting to the Internet. We should try to reduce risks of infected devices contaminating others, or disrupting normal Internet activities in other ways.”

This advice pushes Internet service providers on the cusp again.

Internet service providers are standing at a unique position of revolution, just like ISP. And they are also standing at the best position as a distribution channel. They can provide (security) protection to users by relying on the shape of service. Their status will not be fluctuated as long as they choose the right technology.

We do not lack relevant solutions now. In addition to common reasons of posing a threat to the network's reputation and increasing potential income likely, some Internet service providers also claim that they need reasonable incentives to provide security services, but if they provide the wrong choice to users, the effect will be even worse. For example, in Australia, Internet service providers have already offered regulations aiming at limiting voluntary act of users infected with malware to connect to the Internet. By using “Walled Garden” guidelines, Germany insists on doing so these years, and passes the whole Germen anti-botnet solutions.

Only when marketing staffs of ISP recognize that security is service, this measure would become the most valuable asset of overall differentiation strategy, and effects of allowing users to access Internet happily and being considered to be responsible companies with industry credibility and having real concern to Internet reputation would be achieved.

Therefore, for the ISP, they should re-position themselves and regard the companies as socially responsible enterprises. They should not just serve as purely anti-virus software distributors, they should train their end users before they access to the Internet and when they are surfing the Internet. They should also cut off network connection of users infected with malware and message corresponding measures, isolate them and train them about standard security awareness course through a game or a simple questionnaire.
In nowadays, computer is the thing you must have as it can help you to deal with lot of things. Due to the fast development of science and technology, computer becomes more affordable now. So it not strange that you find almost everyone has one computer. However, as everything is not completely perfect, when people are using computer, they will often meet with some problems, such as hackers.
Let’s just rethink some situation happened in your daily life. Do you ever meet with the problem that the computer system halts firstly, but later it works again? Do you notice that the hard disk works while you do not use it at all? Do you find that the system works slowly even though you do not run any process? If your answers to these questions are all yes, then you need to check your computer and find out whether you have been attacked by hackers or not.
When you are going to do the checking job, first you need to scan the whole system with some systemcare software and to see whether you have been attacked or not. Here I recommend the Advanced SystemCare PRO 3 to you, which is very good at system maintenance and spyware detecting. Besides the professional PC tool, you also can take some other easy methods to check whether you have been attacked by hackers. For example, you can check the c:autoexec.bat and the c:config.sys. In this case, you can find some abnormal situations. Or you can check the windows catalogues. If there are viruses or abnormal files, you can find them quickly.
When you find the viruses, you should take action at once. Generally speaking, we can seek help from the anti-virus software. Some good software can deal with virus easily, but some are useless and can help you nothing. So choose one piece of good anti-virus software is very important. So here comes the Advanced SystemCare PRO 3 again, which can quickly scan the whole system and find out all the harmful stuff, such as the junk files, virus, spyware and so on. Such software can fix all the problems for in several minutes.
What’s more, to keep your computer safe, you need to update your anti-virus software regularly. Everything is changing. To deal with the latest virus and hackers, the software also need to change and update. In this way, you can ensure the software is still functional. Renew the anti-virus software regularly and it can work better for you.
Besides the virus or hackers, there are lots of thing you should pay attention to, such as the registry or disk maintenance. You need to deal with these problems carefully. And the fun of surfing the Internet comes at last when you solve all the problems.
Many people may come across ARP attack. Such situation could be frequently seen in local area network. ARP attack may add malicious software, codes or even virus to the terminal computers. In order to defend against ARP attack, we should know the related protocol.

In the LAN, ARP protocol, which stands for Address Resolution Protocol, is used to transform IP address into MAC. This protocol plays important role to ensure the online security. The basic function is to search for targeted MAC address via IP address of terminal devices. If the hackers could make fake IP address and MAC codes, they could fulfill ARP cheating and then they could bring large quantity of ARP information to set barrier in the internet environment.

If some of terminals run the Trojan procedure with ARP cheating, it may fool all terminals and routers in the network. By doing so, all online data streams should be through the infected terminals. Other users may turn the media for online surfing via the infected computer. If users do not want so and change the related settings, the online connection would be shut down. The virus-infected terminal may usually fake the settings for line-off syndrome. And users have to log in the server once again. During such troublesome process, the virus may keep eyes on user's account with passwords, and then successfully steal them. Seen from the historic records of the router, we may see the similar address of MAC Old. That may mean the track of ARP cheating in the local network. When the spyware stops running, the terminal may recover its real MAC address on the router.

When it comes to the solution, the key point is not to build your security trust relations on the basis of IP address or MAC. The static MAC-IP list should be set and do not let control machine change your transforming list. If it is necessary, try to stop the utility of ARP and save it onto the related schedule forever. It is suggested to use ARP servers. Through the automatic checking of server, it can respond to ARP broadcasting. When sending IP address, proxy could be used and the hardware may set to block ARP attack. At the same time, we may utilize the adware remover to keep away the potential attack. Be aware that the utilization of Hub and Network Bridge could not stop the cheating from ARP. Network manager could in-time make use of IP data pack to gain the permission of rarp permission, and then check the reality feature of ARP.