Computer Viruses: Protecting Your Computer from Unwelcome Intruders.

Avoiding Viruses
Tips to not get Viruses
However, it is wrong to assume that the danger to your computer and sense of security disappears as soon as you exit cyberspace. While new break-ins can only take place while you're connected to the Internet, many computer viruses that sneak into your computer while you're logged on don't unleash their destructive fury until after you've logged off and opened a tainted file.
Viruses such as the "I Love You" or "Anna Kournikova" bugs are well-known to anybody who uses a computer as a part of their everyday life, and the damage such viruses unleash can be devastating. Viruses are programs that replicate themselves inside a computer. After viruses replicate, many carry out damaging instructions that have been programmed into them.

The majority of computer viruses attack computers through e-mail attachments, so you should never open an attachment that contains a virus. The best way to find out whether an attachment is safe is to scan it with software that searches for viruses and then alerts you when one is discovered.
Antivirus programs detect viruses by scanning the files on your PC and checking them against a list of virus signatures that identify when a virus is present. If a virus is spotted, the software will alert you and warn you not to open the suspect file. It's important to consistently update the software, as new viruses pop up all the time and won't be detected by an out-of-date list of signatures.
Those who use online e-mail may already have this service provided to them for free. For example, all mail sent to Hotmail accounts automatically receives a quick scan from an antivirus program called McAfee. But those using such popular non-Web-based programs as Microsoft Outlook should consider purchasing highly regarded anti-virus software such as McAfee VirusScan (www.mcafee.com), Symantec's Norton AntiVirus (www.symantec.com) or Panda Antivirus Platinum (www.pandasoftware.com).
Antivirus software has become an increasingly necessary as viruses become more sophisticated - some viruses are even designed to attack Outlook address books, which means that the virus you unleash upon your own computer will instantly be sent to all of the computers of friends and loved ones. Scary stuff!
To stay on top of the latest viruses, check out the WildList Resource , a site that offers a list of the latest viruses gumming up computers throughout the world. The site also offers a place for you to help out your fellow Internet surfers by reporting viruses you may have discovered firsthand.
Encrypting Your Mail
Viruses aren't the only threat connected to e-mail. The very messages themselves can fall into the wrong hands, creating a security breach that allows strangers to read your sensitive information or private thoughts. Again, the risk of this happening is very small, but it is possible.
Encrypting your e-mail is a good way to secure your messages. Encryption is a method where the letters in a sender's message are scrambled during transmission. When the message arrives in the inbox of the intended recipient, it is unscrambled. The process takes place via the use of keys. The sender's key is called a private key. Senders need to give public keys to whomever they want to have the capability to unscramble those messages.
There are two primary ways to create keys: through PGP (Pretty Good Privacy) software and digital certificates. PGP is available to home computer users as a free download and can be used as a plug-in with many e-mail programs, including Microsoft Outlook. This very popular software gets rave reviews for its efficiency and ease of use.
Perhaps the biggest problem with PGP is actually finding the right version for you. Type "PGP" into a search engine and you'll come up with scores of sites that offer versions of the software designed for different systems. You'll have to hunt around to find the best version for you.
Digital certificates also allow you to encrypt your e-mail and determine who will get readable versions of your messages. When you send a copy of your certificate to potential recipients, they can automatically receive any message you get.
Some companies offer digital certificate services to employees. VeriSign (www.verisign.com) also offers the service. It's free for 60 days, and then costs approx $14.95 per year.
Keeping PCs Virus-Free
How to keep your PC Virus-Free
You've got the chills, your stomach is rolling, your throat is sore and now your fever is soaring. Yep, you caught a virus, and if you're not very careful, you'll spread it to everyone you see. Who's responsible for you feeling so lousy? Just about anyone with whom you might have crossed paths.
We all have battled such nasty flu bugs, but our computers have it even worse: they are susceptible to viruses year-round. There is a reason tech-types named those nasty bits of code that wreak havoc on your computer "viruses." After all, like the dreaded biological viruses, they are highly contagious, hard to get rid of and often find their way into systems through otherwise innocent means.
Fortunately, preventing or getting rid of computer viruses is usually quicker than recovering from the chills-and-fever rollercoaster, and can be usually accomplished by simply remaining vigilant. However, internet security is becoming increasingly complex, (even to the point now that there are now specific courses in what is called information assurance training) and one often needs to take proactive steps to ensure maximun protection from computer viruses and prevent your computer becoming a zombie computer .
The most important thing you can do to protect yourself against viruses is keep your antivirus software updated.
We've all seen the headlines warning of the dangers of famous viruses: Melissa, Klez, the Sobig worm, Love Bug and more recently,Conficker and Stuxnet. We know we're supposed to watch out for them and take steps to prevent them, but what exactly are they?
By definition, a virus is a bit of computer code that is designed to self-replicate, or make copies of itself. When you run a program that's been infected, or start up an infected computer, the virus "comes alive" and attaches itself to other files, causing a all kinds of damage along the way.
Viruses have friends (or subcategories) called worms and Trojan horses.
Unlike viruses, which spread from file to file, worms spread from computer to computer through the Internet, often by sending themselves to everyone in your address book. Passive worms need some action from you to get to work, such as opening an e-mail attachment. Active worms take advantage of vulnerabilities in a system to run on their own. Simply opening an e-mail or previewing it can launch these aggressive bugs.
Yet another form of virus, a Trojan horse, gives the appearance of being an innocent game or screen saver, but can destroy files or let hackers in the back door. While a Trojan horse doesn't automatically spread, it still can cause significant damage.
Trojan horses are often used to steal personal information. Some of these viruses can lift passwords and user names by installing a keylogger while you're busy with the "fake" program it traveled in under. A keylogger can record your keystrokes and send this information elsewhere.
New Viral Strains
The latest twists on viruses are sophisticated blended threats, which use malicious code and computer hacking skills to do their damage. With this increasing threat, and with viruses spreading to other platforms, like mobile devices, phones, PDAs and instant messaging, antivirus vendors can relax, knowing their jobs are secure.
There are even virus hoaxes, which are those unsubstantiated e-mails that get forwarded rapidly around the world, causing needless worry. This technological game can create even more trouble if the hoax encourages taking action, such as removing essential programs from your system.
All types of viruses have what's known as a payload, the destructive code that shows up to let you know there's trouble in computing paradise. If you've ever had a screensaver pop up that you didn't want or need, had music play unexpectedly, or have been blasted with an obscene message or image as you're working on your annual holiday letter, you've probably been hit with a virus.
While these scenes might seem like mere annoyances, or make you feel like the victim of a practical joker with a sick sense of humor, there is usually more to a virus than meets the eye. Often, they can wipe out all the information on your hard drive, cripple your operating system, delete files or change stored information.
A common misperception of the damage that can be done with a virus is that it will corrupt your files. "Virus can corrupt your files, but it is more often that it corrupts Windows operating system files, " said Loes, of the Geek Squad. "If you cannot load Windows, you will not be able to access your files."
Preventative Medicine
The best way to prevent virus proliferation is to stop using e-mail. However, most computer users would agree that such a remedy is a bit drastic. Fortunately, you don't need to break your daily e-mail habits, if you take a few other, more reasonable preventative steps.
Security consultants stress the importance of keeping your antivirus software updated.The latest versions of Symantec's Norton AntiVirus and McAfee's Virus Scan both offer automatic updating. However good these are, remeber they are retroactive and only act on known viruses.Just recently Microsoft have reported a new virus where Microsoft Word attachements can be compromised.take nothing for granted!
Not so long ago, the major virus prevention advice was to not open e-mail attachments from strangers. Now, as viruses have gotten much smarter about how they spread, even e-mails from your best friend or colleague are suspect. Protect yourself by taking some of the following measures when you're working online:
Buy, install and update reputable antivirus software.
Never trust an executable file delivered by e-mail or downloaded from the Internet.
Do not open any files attached to an e-mail if the subject line is questionable or unexpected.
Always virus-scan an executable file before running it - even if you received it from someone you know.
Know the purpose of any attachment.
Back up your files regularly. If a virus destroys your files you'll be able to replace them with a backup copy.
When in doubt, always err on the side of caution and do not open, download, or execute any files or e-mail attachments.
At least once a month, visit the website for any software you use to download security patches.
Trojan horses usually are hidden in executable files with extensions such as .BAT, .EXE , .PIF , .COM and .VBS. Be careful downloading any of these.
However you choose to protect yourself, do it today. Too many people purchase antivirus software after they'd been hit. And, that's like getting a flu shot after you've spent a few days feeling miserable.


Comments

Popular posts from this blog

Download Huawei Modem Unlocker v5.8.1b by BOJS

Hidden Secret Service Menu Codes for Sony, Samsung, LG and Philips TV

Solving power supply problems (s.m.p.s)