Breaking News

How To Protect Your Computer From Viruses and Malware



What is a Computer Virus?

computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

Image result for how to protect your computer from virus


A computervirus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.


It is quite easy and simple for the viruses to sneak into a computer by dodging the defense systems. A successful breach can cause serious issues for the user such as infecting other resources or system software, modifying or deleting key functions or applications and copy/delete or encrypt data.


There are two types of ways in viruses operate, as soon as they land on a new device they begin replicating, while the second type plays dead until a particular trigger makes the malicious code to be executed. Thereby, it is highly important to stay protected by installing a robust antivirus program

Virus infection on your computer may cause a very serious damage and even loss on your business. You can just imagine it may wreck your system registry or your entire computer (with all your receivables data on it!) or all your HTML programs! It will come to total black out screen, it will not boot at all. But that is actually the worse scenario that may happen. 

How To Protect Your Computer From Viruses and Malware

If you're using an unsecured operating system, then installing virus protection software is a nice safeguard. Many anti-virus options are available for free online.

Image result for how to protect your computer from virus
If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses.
You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.

You should never double-click on an e-mail attachment that contains an executable. Attachments that come in as Word files (.DOC), spreadsheets (.XLS), images (.GIF), etc., are data files and they can do no damage (noting the macro virus problem in Word and Excel documents mentioned above). 

However, some viruses can now come in through .JPG graphic file attachments. A file with an extension like EXE, COM or VBS is an executable, and an executable can do any sort of damage it wants. Once you run it, you have given it permission to do anything on your machine. The only defense: Never run executables that arrive via e-mail.
By following these simple steps, you can remain virus-free

1. Keep your software up to date

Software makers like Microsoft and Oracle routinely update their software to fix bugs that could potentially be exploited by hackers. Oracle just released on Sunday an update to its Java software to fix a security hole hackers could have used to infect computers with malware.


The software patch came after the Department of Homeland Security sent out an advisory late last week about the security flaw recommending computer users disable the Java plug-in in their Web browsers.

2. Don’t click on links within emails

A good rule of thumb is if you don’t recognize a sender of an email, don’t click on any links within it. Microsoft says 44.8 percent of Windows virus infections happen because the computer user clicked on something.


3. Use free antivirus software

You don’t have to pay for software to protect your computer or for an annual subscription to maintain the latest virus protection. For Windows users, Microsoft Security Essentials is free. Avast is another free anti-virus program.


See our story Antivirus Software is a Waste of Money for more ideas.

4. Back up your computer

Do you regularly back up the information on your computer? If you don’t – and 29 percent of computer users fall into that category – you have no protection from calamites ranging from hard drive failure to your house burning down. If you value your data, back it up.


You have three basic backup options: an external hard drive, online backup service, or cloud storage. Use a service like Google Drive, and your files will be continually backed up to the cloud. And the price is right: free for up to 5 GB of data. For more, see Online Storage Wars: Which Virtual Storage Is Best.


5. Use a strong password
strong password is one that is complex, with a mix of letters, numbers, and symbols. While some people use the same password for everything, try to avoid that practice.


Password security company SplashData.com says the three most common passwords are password, 123456, and 12345678. The company recommends avoiding using the same user name/password combination for multiple online site logins.
When creating a password, use eight characters or more and, to make them easier to remember, try using short phrases separated by spaces or underscore marks – such as “car_park_city?”


Best idea? Use a free service like Last Pass to create and manage your passwords. You only have to remember one password: the one that opens your LastPass vault. Once you’ve opened it, LastPass will automatically log you in to every site you visit requiring a password. It’s really handy – check it out.


6. Use a firewall

Just because you have antivirus software running doesn’t mean you have a firewall. Both PCs and Macs come with built-in firewall software. Be sure to check that it’s enabled.


7. Minimize downloads

Make sure your Web browser’s security settings are high enough to detect unauthorized downloads. For Internet Explorer, the medium security setting is the minimum level to use.


8. Use a pop-up blocker

Web browsers have the ability to stop pop-up windows and allow you to set the security for accepting pop-ups. The federal On Guard Online site recommends never clicking on links within pop-up screens.


Even the most vigilant of computer users still run the risk of picking up malware. You should suspect a computer virus if your machine slows down, crashes, or repeats error messages.
Other clues include the computer failing to promptly shut down or restart, new toolbars you didn’t install, a changing home page, or a laptop battery draining faster than it should.


If you suspect your computer is infected, make sure your security software is updated, then scan the computer. If that doesn’t solve the problem, try typing a question into your favorite search engine to uncover forums where others might describe fighting and winning similar battles.



What can I do to protect myself from computer viruses and Trojans?

These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system.



Image result for how to protect your computer from virus

A computer virus is the most subtle of computer problems. It usually loads itself into your computer system when you run a program to which it has attached itself. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive. What it does then depends on the malevolence of its creator. Some viruses are nothing more than a practical joke.


 They may bring up a message like "Merry Xmas" or melt your display. Most of them though, either start destroying your system or your files immediately or on a date specified by their creators—like the much-publicized Michelangelo virus, which erases important pieces of your system on March 6.

 "Trojan horse" programs are similar to viruses in their effect on your system, but they can't reproduce themselves. They're usually a program disguised as something you might want to download onto your computer—for instance, a rogue, modified version of PKWare's PKZIP utility. But when you run the new program you just found, it can do anything from popping up a message to erasing your hard disk, as the rogue PKZIP utility really did.


In either case, you have to actually launch the infected program or the trojan horse for it to infiltrate your system. Though hoax e-mails, like the one about the "Good Times" virus try to make you believe otherwise, neither a virus nor a trojan horse program can do anything if you simply leave the malevolent file sitting on your hard drive.


Finding out that you copied a trojan horse onto your computer is remarkably easy. You launch the program, and the next thing you know, something completely unexpected happens—maybe your system is gone or your computer is laughing maniacally at you. But unless you notice your computer acting oddly before the virus has done its worst damage, you may very well not know you have it until it's too late.



Protect Your Computer From Trojan Horse Virus.

There are a few basic rules that computer users should follow to short-circuit viruses. The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble.



Image result for computer virus


Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software.Unfortunately, 'keeping it current' means updating it weekly, at least but most products today allow one to automate this process, but file downloads can be large and slow.



Factors to consider when buying an anti-virus package include cost, quality of tech support, how frequently the package self-updates and the platforms supported by the program.


Common sense is another good weapon in the fight against viruses. Be wary of opening any email attachments, even from your firends , especially if it has been forwarded to them.Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments.


If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later.If you don't keep it updated, you might was well be completely unprotected.


Prevention


Like sexually transmitted diseases(STDs), computer viruses existed prior to the popularity of the Internet, but as with the sexual revolution of the '70s, viruses have flourished with the widespread sharing of information. And, much like the efforts to control STDs, controlling computer viruses is to be done through education and practicing safe hex (a play on words which means to perform certain measures to protect your computer).


1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Not to mention the grief a current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.


2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updateable. New viruses are produced daily, so it's important to have software that can detect the latest threat.


Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly. Also, consider buying and using two different brands to be doubly protected. See our review of anti-virus programs.


3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).

4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.


If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.

5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs.


6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.


7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.


8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses.


9. Be aware of hoaxes. To increase mass hysteria, there have been many stories conjured up and spread by unknowledgeable users. 


No comments