Tips to Avoid Malware

 Tony Dumas, April 2014

Certain websites and programs should be avoided when online. Given the prevalence of malware, advertising and marketing software and other malicious programs, this list can serve as a guide to what types of websites and programs can pose a risk to your computer and information. Please be aware that even legitimate, well-maintained business and institutional websites can occasionally be infected so no list can guarantee that you will never encounter a virus or other malware while Internet browsing.

There are additional protections you can use, such as browsing the web only when using a non-administrative computer account. For more information on protecting yourself while online, go to or contact your departmental IT Support or UNH Information Security Services.

Dangerous Websites: 

  • Pornographic sites
  •  “Free Service” third-party sites
  • Music/Video/Software piracy sites offering “free” or “cracked” downloads, “Warez” etc.
  • Peer-to-Peer (P2P) sites
  • Obscure search sites. Use mainstream search engines such as Google, Yahoo or Bing.
  • Websites that require a download to access or use, or which try to force a software installation
  • Web-based Flash or Java games
  • Pay-To-Click services
  • Coupon or “Deal” sites
  • Third-party fee-based sites offering services that are often obtainable without cost from the original source. These include but are not limited to credit report sites, government information, and public databases, texts of state and federal laws, travel information, maps and directions.  Free Online Quizzes
  • Free People Search Sites More site-specific information can be found here:

Risky Software

Free software downloads should be avoided as much as possible, as many applications are embedded with undesirable or malicious software of some kind. The quality of the software varies widely and may cause computer problems in addition to the effect of the embedded malware. Software downloads to avoid include the following:

  • Toolbars
  • Icons
  • Screen savers
  • Mouse pointers
  • Wallpapers (static or automatically rotating)
  •  “Exclusive” offerings
  • Downloaders for music, movies & hacked programs
  • Fake antivirus and security programs
  • Registry Cleaners
  • Computer Optimizers
  • Internet “Speed-ups”
  • Search Engine Settings “Protectors”
  • Coupon generators
  • Product Key Generators
  • Electronic Greeting Cards
  • Animated desktop characters or animals (“eSheep”)
  • Spying tools
  • Malware generators and toolkits
Custom Fields
  • Department: Information Security Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
Using Facebook, Google or other Social Login Services
Viewed 1030 times since Fri, Aug 26, 2016
Policies on IT resources
Viewed 3064 times since Wed, Mar 25, 2015
Should you send or receive UNH personally identifiable information by email?
Viewed 1312 times since Thu, Jun 9, 2016
Phishing and Spam
Viewed 5699 times since Wed, Apr 29, 2015
Find sensitive data before the bad folks do!
Viewed 1081 times since Mon, Jun 27, 2016
Tips for Keeping Your Devices Secure
Viewed 719 times since Fri, Aug 4, 2017
SEED: Safe Electronic Equipment Disposal Instructions
Viewed 2685 times since Mon, Apr 27, 2015
UNH Campus Virus Protection
Viewed 21449 times since Wed, Aug 12, 2015
File-Sharing Policy
Viewed 910 times since Tue, Jun 2, 2015
Back-up your files today!
Viewed 1102 times since Mon, Nov 16, 2015