Wednesday, January 4, 2012

Help protect your computer from viruses

Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or worse, fatal to your computer. Individuals who create these viruses, estimated at 10-15 new day, the electronic version of terrorists. Their goal is to inflict havoc and destruction to many people as possible by disabling, steal, damage or destruction of computer and information resources. Often they have no specific target in mind, so no one is safe. If you access the Internet, share files or your computer with others, or load anything from diskettes, CDs or DVDs on your computer, you are vulnerable to viruses.

Fortunately there are good guys working just as hard as the hackers to develop cures for viruses as quickly as they send them off into cyberspace. And there are many things you can do to keep your computer from catching viruses in the first place.

Defining Viruses:
A virus is a small computer that can copy and spread from one computer to another, with or without the help of the user. However, viruses typically do more than just fruitful and multiply, which is bad enough in itself, because the pig system resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often they can not deliver their cargo to an unsuspecting user does something to the virus to execute its programmed function. This could be as simple as clicking on an innocent looking file attachment with an. Exe (executable) extension.

Catching a Virus:
Most viruses are spread via e-mail attachments, because it's the easiest way to do it. Although Macintosh, Unix and Linux systems can catch viruses, hackers are particularly keen on exploiting the security weaknesses in anything Microsoft, particularly Microsoft Outlook and Outlook Express. Due to the popularity of this software, hackers maximum value for money, and they probably get some satisfaction from continually remind Microsoft that being big does not mean you're perfect.

Solution 1: Anti-virus software
The first line of defense is to install anti-virus software. Be extra safe, also install firewall software, now included in some anti-virus packages. This software can scan your disks for viruses and neutralize them. Here are some features in the evaluation of anti-virus software to consider.
- Compatibility with your operating system - Make sure the software works with your system, especially if you have an older operating system like Windows 98.
- Firewall software - If it is not included, find out if it is available. If you must buy it from another supplier.
- Automatic background protection - This means your software will constantly scan behind the scenes for infections and neutralize them as they appear. This provides some peace.
- Automatic, frequent updates - Because new viruses appear every day, you want regular updates. It's even better if they occur automatically when you connect to the Internet. If automatic update is not listed, you must meet the vendor's website and download updates yourself checked. This is vital, because you will not be protected against new viruses if your software is outdated.
- Disaster recovery - Software with a utility to help you get your system back to normal after a virus attack is always good to have.
- ICSA certification - The International Computer Security Associatioin has standards for the detection rates of anti-virus software. Make sure your software has the ICSA certification.
- Technical support - It's a good idea to package a free technical support, either online or via a freephone number offering select. If you're ever felled by a virus, you need it. Some anti-virus software vendors are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan), Trend Micro Inc. (PC-cillin), and Zone Labs Inc. (Zone Alarm Suite).

Solution 2: The Virus Scan
If you have a particularly juicy attachment that you're dying to open, save it to your Windows desktop and run your anti-virus software at first. To do this, click once gently on the file to your desktop ... not really open ... Then right click and choose Scan with (Name of Anti-Virus Software) to activate a virus scan.
If it is infected, your anti-virus software to neutralize, or at least tell you the attachment is too dangerous to open. On the other hand, do not feel guilty if the thought of saving a potentially malicious file on your system is enough to make your eagerness to open it and make you immediately delete under control.

Solution 3: Delete first, ask questions later.
Any doubt about the origin of an e-mail, the best thing to do is to remove without opening or viewing. However, some viruses such as Klez, propagate by fishing in those address books and sending themselves from any contact they find to another random contact. You can use a virus just by people in your address book, even if you're not an e-mail them anything. She gets it from someone else in your address book, which really makes life confusing. Because of the proliferation of porn on the Internet, e-mail viruses often tempt victims by using sexual filenames, such nudes.exe. Do not fall for.
Solution 4: Beware of virus hoaxes
E-mails warning you about viruses are almost always hoaxes. You may be inclined to believe them, because you typically receive them from well-meaning friends, that they receive from friends, etc. These e-mails themselves usually no viruses, but some have actually fallen into the hands of hackers who loaded them with viruses and has happily on their way as a sick joke.

The proliferation of e-mails about virus hoaxes can become nearly as bad as a real virus. Think about it, if you obey an e-mail that tells you to forward to everyone in your address book, and they they do it, and it's long enough, you could bring the Internet to its knees. If you ever want to verify a virus warning, your anti-virus vendors have a list of hoaxes on the website. It is in the business of providing the fixes, so it will know which viruses are real.

Solution 5: Beware of file extensions
The extension of a file name of the three characters that come after the dot. Windows are now hidden by default filename extensions, but it's not a good idea. Just able to see a suspicious extension and deleting the file before opening it can save you from a virus infection.

To see file extensions in your directory listings on Windows XP desktop, click the Start button | Control Panel | Folder Options | View tab. Check the box for Hide extensions for known file types. Click Apply | OK. System files are still hidden, but you'll be able to extensions for all files you need to be concerned with seeing. Viruses often live on files with these extensions -. VBS, SHS, pif, Ink -... And they are almost never legitimately used for attachments.

Solution 6: Disable the SHS extension.
A dangerous extension you can easily switch is. SHS. Windows will not recognize him and will notify you before you attempt. SHS file. The extension is usually just used for "scrap object" files created in Word and Excel when you highlight text and drag it to the desktop for pasting into other documents. If this is not something you ever do, or you have Word and Excel 2000 or later, giving you up to 12 items on the Clipboard, click the Start button | Control Panel | Folder Options | File Types tab. Under Registered file types, scroll down and highlight the SHS extension. Click Delete | Yes | SignUp | OK.

Solution 7: Dealing with double extensions
When you turn on your extensions in Windows, you will be able to detect viruses that piggy-back on themselves innocent looking files with a double extension, such as happybirthday.doc.exe. Never trust a file with a double extension - it goes against nature.

Solution 8: Beware of unknown exe files.
A virus is a program to be executed for his dirty work, so it can. Exe extension. Unfortunately, this is the same extension used by legitimate program files. So, do not panic if you find files named Word.exe or Excel.exe on your system - giving your Microsoft software. Just do not ever open a file with a. Exe extension if you do not know what the file purpose.

Solution 9: Watch out for icons
Viruses in attachment files have been known to the shape of familiar looking icons of text or photo files, like the wolf in the henhouse to take. If you have an unexpected attachment, do not open it without first using your anti-virus software.

Solution 10: not available through the public newsgroups
What better place for a hacker to lurk and stick his virus than in the middle of a crowd? Sooner or later, someone is required to download the virus and to get things going. Not to download files and programs from newsgroups or bulletin boards, or open email attachments from strangers in chatrooms ("Let's exchange pictures!") Without first scanning with your anti-virus software.

Solution 11: Avoid bootleg software
This may seem like a no brainer, but sometimes that tiny price tag on a popular but expensive package can be too good to resist. Resist! Also be careful about accepting party software. You do not know where it is, and what may have started as a perfectly clean package could have become infected during installation on someone else's infected computer.

Solution 12: Protect macros in MS Word, Excel and Powerpoint
A common type of virus uses macros. Macros are sets of stored commands that users can save as shortcuts to perform long functions in just a few keystrokes. A macro virus may perform such mischief changing file types from text files or spreadsheets into templates, lock keyboards, and deleting files. Word, Excel and PowerPoint with protection against macro viruses. To make sure yours is activated, open each application, click on the Tools | Macro | Security. On the Security tab, make sure Medium or High is selected. Clcik OK. If you are already infected with a macro virus, you will notice that the steps of this procedure are unavailable because the virus has disabled them. In that case, a virus scan on your system to see if your anti-virus software can kill the virus.

Solution 13: Use passwords
If you share your computer, it's a good idea to assign everyone a password. Passwords must be a combination of letters and numbers no less than eight characters long, and preferably nonsensical. Never write passwords and stick them anywhere near the computer. Assign passwords in Windows XP, click the Start button | Control Panel | User Accounts. Follow the prompts to assign / change passwords.

Solution 14: Update Software
Microsoft releases patches for the constant security holes in its operating system and applications software. however not be drawn into complacency if you have Windows Update automatically checking things for you. Update checks for patches for bugs in the OS, not for security problems.
For the latest security hotfixes (as Microsoft calls them), visit http://www.microsoft.com and search for hotfixes for all your Microsoft software, particularly Outlook and Outlook Express.
Microsoft has a free downloadable package called Microsoft Baseline Security Analyzer (MBSA) that scans your system for missing hotfixes. It works with Windows 2000 and XP Home and Professional. It does not support Windows 95, 98 or ME.
To download the MBSA, go to the part of the Microsoft TechNet Web site. Be warned that the information is written in techie language, so you can be daunting.
Last words:
Now that you have a number of ways to prevent and deal with viruses do, let's wrap things with some solution you probably heard it before, but have ignored.
- Back up your files regularly - If a virus crashes your sytem, you'll feel much better if you back up all your important files. Make backups on one media from the computer, such as floppy disks, Zip disks or CD's. Scan for viruses before using them the way to ensure that they are not infected. If they are, they will do you no good if you ever have to use them because they simply pass the virus back to your computer.
- Create a boot disk - Create an emergency boot diskette before you have a problem, so you can start your computer after a serious security problem To make a boot disk with Windows XP, put a blank floppy in the drive. Open My Computer, right-click the floppy drive. Click Format. Format options, click on an MS-DOS startup disk. Click Start. Store the disk in a safe place. With a little luck, you'll never have to use.
- Turn off your computer - DSL and cable connections "always on" can be useful, but you should always turn the computer off when not in use. Hackers can not go to a machine off.

No comments:

Post a Comment