Privacy and Security – Symptoms of an Infected Computer

  • Is your computer acting strangely?
  • Are you barraged with incessant pop-ups and advertising?
  • Do programs and webpages run much slower than they ever have before?
  • Do you see files and toolbars that you don’t recognize and don’t remember installing?

If you answered yes to any of these questions, Great Lakes Technology can help. You may be infested with Spyware, Malware or Adware and it’s a worse problem than you may think.

How Did I Get It?

Every time you visit a webpage or click an email you are downloading information into your computer. Depending on where you visit you may be getting much more than just graphics and text. Simply having antivirus software is not enough. Many of these perpetrators have resorted to blatant trickery in order to worm into your digital life.

More and more shady webmasters are filling the net with programs and components that track where you go, what you do and who you are. Some of these programs can even allow unauthorized access and control of your computer or worse dial into 1-900 numbers and charge your phone bill. This problem is more serious than you think and if you have any of these symptoms or think you do we can help.

In an effort to thwart this ever-increasing problem the IT Security and Privacy professionals at Great Lakes Technology are working with local Legislators to help put an end to this problem by drafting new laws to protect the freedom and power of the internet. Our team is at the forefront of the fight helping to stomp out these problems and protect your privacy, personal and financial information from these electronic vagrants, thieves and con-men. Call one of the numbers below or click here to request a free consultation for your home or business.

” Man is still the most extraordinary computer of all.”

– John F. Kennedy


A general term for a program that monitors or logs your actions or keystrokes without your knowledge. While sometimes sinister, like a remote control program used by a hacker, software companies have been known to use spyware to gather data about customers. The practice is generally frowned upon and is becoming commonplace; violating privacy and security.


MALicious softWARE, including viruses, worms, Trojans (backdoors), and other components that can launch an attack or cause attacks to be launched through an unsuspecting third party computer. Sometimes referred to as rogue programs these components can leave a computer wide open and allow the owner of the program complete control.


This menace goes beyond the reasonable advertising that one would expect from freeware, shareware or common webpages. Usually in the form of a separate program or component that is installed at the same time as a shareware or freeware program or through a webpage. These programs usually continue to generate advertising even when the user is not running the originally desired program and some even go so far as to contact their creators in the early hours of the morning or behind the scenes to deliver precision advertising based on your habits and activity.