{"id":46,"date":"2008-06-17T10:17:47","date_gmt":"2008-06-17T14:17:47","guid":{"rendered":"http:\/\/www.theforcefield.net\/wordpress\/?p=46"},"modified":"2008-08-15T11:42:23","modified_gmt":"2008-08-15T15:42:23","slug":"episode-21-the-business-of-malware-part-1","status":"publish","type":"post","link":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/","title":{"rendered":"Episode 21 &#8211; The Business of Malware Part 1"},"content":{"rendered":"<p><font face=\"Arial, sans-serif\"><font size=\"2\">This week we are going to talk to Chris Bequeath and find out how he went into the malware removal business, learn about the different types of badware out there today and how we can offer malware removal solutions to our customers at a reasonable cost and still earn a profit. Part 1 of a three part series.<\/p>\n<p><strong>TechPodcasts Promo Tag :10<br \/>\nIntro 1:19<\/p>\n<p>Billboard 4:09<\/strong><br \/>\nRecently I was invited to attended The Virus Hunters Workshop, an all day event sponsored by <a target=\"_blank\" title=\"Kaspersky Labs\" href=\"http:\/\/www.kaspersky.com\">Kaspersky Labs<\/a>. The Virus Hunters Workshop will also be hosted in Reston, VA and Boston, MA. Registration is closed for Reston but if you are in the Boston area you may be able to register for that event scheduled for June 24 and 25, 2008. You can register at <a title=\"Virus Hunters Workshop\" href=\"http:\/\/www.virus-hunters.com\">www.virus-hunters.com<\/a>.<\/p>\n<p><strong>News and Comment segment 4:10<\/strong><br \/>\nFirefox 3.0, the next incarnation of the popular and powerful web browser from <a target=\"_blank\" title=\"The Mozilla Foundation\" href=\"http:\/\/www.mozilla.org\/\">The Mozilla Foundation<\/a>, is scheduled for official release Tuesday, June 17, 2008. The Force Field will participate in <a target=\"_blank\" title=\"Firefox Download Day 2008\" href=\"http:\/\/www.spreadfirefox.com\/en-US\/worldrecord\">Firefox Download Day 2008<\/a> with a launch party. A page and forum will be available at TheForceField.net to download and discuss the new browser at the time of launch.<\/p>\n<p>iPods and other mobile media devices are becoming a growing threat to IT security, according to a recent survey by Credant Technologies. The survey report, called \u201c<a target=\"_blank\" title=\"Free Survey Report\" href=\"http:\/\/theforcefield.tradepub.com\/free\/w_cred06\/\">iPods \u2013 What You Don&#8217;t Secure Could Hurt You<\/a>, polled 323 IT professionals about the potential security impact of mobile media devices in the workplace and found that although it is a concern, many are not prepared to deal with it. The Survey Report is free to professionals who qualify. To download the Survey Report, simply visit  <a target=\"_blank\" title=\"Free Survey Report\" href=\"http:\/\/theforcefield.tradepub.com\/free\/w_cred06\/\">http:\/\/theforcefield.tradepub.com\/free\/w_cred06\/<\/a> or click on the link in the show notes in the RSS feed for this episode.<\/p>\n<p><a target=\"_blank\" title=\"Computerworld Article\" href=\"http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&#038;articleId=9098159&#038;source=NLT_AM&#038;nlid=1\">Computerworld<\/a> reports that Microsoft recently became a sponsor of <a target=\"_blank\" title=\"The Open Source Census\" href=\"https:\/\/www.osscensus.org\/index.php\">The Open Source Census<\/a>, and organization that tracks installation of open source applications on computers and promotes the adoption of open source software. Perhaps Microsoft really is ready to embrace open source. Time will tell.<\/p>\n<p><strong>Commercial Break 1:00<\/strong><br \/>\n<a title=\"Alternageek\" target=\"_blank\" href=\"http:\/\/alternageek.com\/\">Alternageek Podcast<\/a> Promo :30<\/p>\n<p><a title=\"The Caffination Podcast\" target=\"_blank\" href=\"http:\/\/www.caffination.com\/\">The Caffination Podcast<\/a> promo :30<\/p>\n<p><strong>Intro to Interview 2:09<\/strong><br \/>\nThis week we are going to talk to Chris Bequeath, owner of <a target=\"_blank\" title=\"Business Network Solutions\" href=\"http:\/\/www.bnsmidwest.com\/\">Business Network Solutions<\/a> and find out how he went into the malware removal business, learn about the different types of badware out there today, some common mistakes made when attempting to remove malware from computers and how we can offer malware removal solutions to our customers at a reasonable cost and still earn a profit in part 1 of a three part series.<\/p>\n<p><strong>Chris Bequeath Interview 22:45<\/strong><\/p>\n<p><strong>Wrap up and Close  :46<\/strong><\/p>\n<p>\u00a92008 Savoia Computer. All rights reserved.<\/p>\n<p><\/font><\/p>\n<div class=\"powerpress_player\" id=\"powerpress_player_6859\"><audio class=\"wp-audio-shortcode\" id=\"audio-46-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"http:\/\/media.blubrry.com\/theforcefield\/media.techpodcasts.com\/theforcefield\/media.libsyn.com\/media\/theforcefield\/The_Force_Field_21.mp3?_=1\" \/><a href=\"http:\/\/media.blubrry.com\/theforcefield\/media.techpodcasts.com\/theforcefield\/media.libsyn.com\/media\/theforcefield\/The_Force_Field_21.mp3\">http:\/\/media.blubrry.com\/theforcefield\/media.techpodcasts.com\/theforcefield\/media.libsyn.com\/media\/theforcefield\/The_Force_Field_21.mp3<\/a><\/audio><\/div><p class=\"powerpress_links powerpress_links_mp3\" style=\"margin-bottom: 1px !important;\">Podcast: <a href=\"http:\/\/media.blubrry.com\/theforcefield\/media.techpodcasts.com\/theforcefield\/media.libsyn.com\/media\/theforcefield\/The_Force_Field_21.mp3\" class=\"powerpress_link_pinw\" target=\"_blank\" title=\"Play in new window\" onclick=\"return powerpress_pinw('https:\/\/www.theforcefield.net\/podcast\/?powerpress_pinw=46-podcast');\" rel=\"nofollow\">Play in new window<\/a> | <a href=\"http:\/\/media.blubrry.com\/theforcefield\/media.techpodcasts.com\/theforcefield\/media.libsyn.com\/media\/theforcefield\/The_Force_Field_21.mp3\" class=\"powerpress_link_d\" title=\"Download\" rel=\"nofollow\" download=\"The_Force_Field_21.mp3\">Download<\/a> (33.4MB) | <a href=\"#\" class=\"powerpress_link_e\" title=\"Embed\" onclick=\"return powerpress_show_embed('46-podcast');\" rel=\"nofollow\">Embed<\/a><\/p><p class=\"powerpress_embed_box\" id=\"powerpress_embed_46-podcast\" style=\"display: none;\"><input id=\"powerpress_embed_46-podcast_t\" type=\"text\" value=\"&lt;iframe width=&quot;320&quot; height=&quot;30&quot; src=&quot;https:\/\/www.theforcefield.net\/podcast\/?powerpress_embed=46-podcast&amp;amp;powerpress_player=mediaelement-audio&quot; title=&quot;Blubrry Podcast Player&quot; frameborder=&quot;0&quot; scrolling=&quot;no&quot;&gt;&lt;\/iframe&gt;\" onclick=\"javascript: this.select();\" onfocus=\"javascript: this.select();\" style=\"width: 70%;\" readOnly><\/p><p class=\"powerpress_links powerpress_subscribe_links\">Subscribe! <a href=\"https:\/\/itunes.apple.com\/podcast\/the-force-field-podcast\/id208073461?mt=2&amp;ls=1#episodeGuid=http%3A%2F%2Fwww.theforcefield.net%2Fwordpress%2F%3Fp%3D46\" class=\"powerpress_link_subscribe powerpress_link_subscribe_itunes\" target=\"_blank\" title=\"Subscribe on Apple Podcasts\" rel=\"nofollow\">Apple Podcasts<\/a> | <a href=\"https:\/\/subscribebyemail.com\/www.theforcefield.net\/podcast\/feed\/podcast\/\" class=\"powerpress_link_subscribe powerpress_link_subscribe_email\" target=\"_blank\" title=\"Subscribe by Email\" rel=\"nofollow\">Email<\/a> | <a href=\"https:\/\/www.theforcefield.net\/podcast\/feed\/podcast\/\" class=\"powerpress_link_subscribe powerpress_link_subscribe_rss\" target=\"_blank\" title=\"Subscribe via RSS\" rel=\"nofollow\">RSS<\/a> | <a href=\"https:\/\/www.theforcefield.net\/podcast\/subscribe\/\" class=\"powerpress_link_subscribe powerpress_link_subscribe_more\" target=\"_blank\" title=\"More\" rel=\"nofollow\">More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>This week we are going to talk to Chris Bequeath and find out how he went into the malware removal business, learn about the different types of badware out there today and how we can offer malware removal solutions to our customers at a reasonable cost and still earn a profit. Part 1 of a &#8230; <a title=\"Episode 21 &#8211; The Business of Malware Part 1\" class=\"read-more\" href=\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/\" aria-label=\"Read more about Episode 21 &#8211; The Business of Malware Part 1\">Read more<\/a><\/p>\n","protected":false},"author":351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-46","post","type-post","status-publish","format-standard","hentry","category-episodes"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Episode 21 - The Business of Malware Part 1 - The Force Field Podcast<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Episode 21 - The Business of Malware Part 1 - The Force Field Podcast\" \/>\n<meta property=\"og:description\" content=\"This week we are going to talk to Chris Bequeath and find out how he went into the malware removal business, learn about the different types of badware out there today and how we can offer malware removal solutions to our customers at a reasonable cost and still earn a profit. Part 1 of a ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"The Force Field Podcast\" \/>\n<meta property=\"article:published_time\" content=\"2008-06-17T14:17:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2008-08-15T15:42:23+00:00\" \/>\n<meta name=\"author\" content=\"Rick\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/\"},\"author\":{\"name\":\"Rick\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/person\/6b054b6406d3682772e380c1043dbd31\"},\"headline\":\"Episode 21 &#8211; The Business of Malware Part 1\",\"datePublished\":\"2008-06-17T14:17:47+00:00\",\"dateModified\":\"2008-08-15T15:42:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/\"},\"wordCount\":441,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#organization\"},\"articleSection\":[\"Episodes\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/\",\"name\":\"Episode 21 - The Business of Malware Part 1 - The Force Field Podcast\",\"isPartOf\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#website\"},\"datePublished\":\"2008-06-17T14:17:47+00:00\",\"dateModified\":\"2008-08-15T15:42:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.theforcefield.net\/podcast\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Episode 21 &#8211; The Business of Malware Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#website\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/\",\"name\":\"The Force Field Podcast\",\"description\":\"A podcast for and about IT Service Providers\",\"publisher\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.theforcefield.net\/podcast\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#organization\",\"name\":\"The Force Field Podcast\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/wp-content\/uploads\/2022\/06\/header.png\",\"contentUrl\":\"https:\/\/www.theforcefield.net\/podcast\/wp-content\/uploads\/2022\/06\/header.png\",\"width\":990,\"height\":100,\"caption\":\"The Force Field Podcast\"},\"image\":{\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/person\/6b054b6406d3682772e380c1043dbd31\",\"name\":\"Rick\",\"url\":\"https:\/\/www.theforcefield.net\/podcast\/author\/savoiaco2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Episode 21 - The Business of Malware Part 1 - The Force Field Podcast","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Episode 21 - The Business of Malware Part 1 - The Force Field Podcast","og_description":"This week we are going to talk to Chris Bequeath and find out how he went into the malware removal business, learn about the different types of badware out there today and how we can offer malware removal solutions to our customers at a reasonable cost and still earn a profit. Part 1 of a ... Read more","og_url":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/","og_site_name":"The Force Field Podcast","article_published_time":"2008-06-17T14:17:47+00:00","article_modified_time":"2008-08-15T15:42:23+00:00","author":"Rick","twitter_misc":{"Written by":"Rick","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/#article","isPartOf":{"@id":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/"},"author":{"name":"Rick","@id":"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/person\/6b054b6406d3682772e380c1043dbd31"},"headline":"Episode 21 &#8211; The Business of Malware Part 1","datePublished":"2008-06-17T14:17:47+00:00","dateModified":"2008-08-15T15:42:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/"},"wordCount":441,"commentCount":0,"publisher":{"@id":"https:\/\/www.theforcefield.net\/podcast\/#organization"},"articleSection":["Episodes"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/","url":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/","name":"Episode 21 - The Business of Malware Part 1 - The Force Field Podcast","isPartOf":{"@id":"https:\/\/www.theforcefield.net\/podcast\/#website"},"datePublished":"2008-06-17T14:17:47+00:00","dateModified":"2008-08-15T15:42:23+00:00","breadcrumb":{"@id":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.theforcefield.net\/podcast\/episode-21-the-business-of-malware-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.theforcefield.net\/podcast\/"},{"@type":"ListItem","position":2,"name":"Episode 21 &#8211; The Business of Malware Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.theforcefield.net\/podcast\/#website","url":"https:\/\/www.theforcefield.net\/podcast\/","name":"The Force Field Podcast","description":"A podcast for and about IT Service Providers","publisher":{"@id":"https:\/\/www.theforcefield.net\/podcast\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.theforcefield.net\/podcast\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.theforcefield.net\/podcast\/#organization","name":"The Force Field Podcast","url":"https:\/\/www.theforcefield.net\/podcast\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/logo\/image\/","url":"https:\/\/www.theforcefield.net\/podcast\/wp-content\/uploads\/2022\/06\/header.png","contentUrl":"https:\/\/www.theforcefield.net\/podcast\/wp-content\/uploads\/2022\/06\/header.png","width":990,"height":100,"caption":"The Force Field Podcast"},"image":{"@id":"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.theforcefield.net\/podcast\/#\/schema\/person\/6b054b6406d3682772e380c1043dbd31","name":"Rick","url":"https:\/\/www.theforcefield.net\/podcast\/author\/savoiaco2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/posts\/46","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/users\/351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/comments?post=46"}],"version-history":[{"count":0,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/posts\/46\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/media?parent=46"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/categories?post=46"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theforcefield.net\/podcast\/wp-json\/wp\/v2\/tags?post=46"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}