bo 14 Household Ways To Protect Your Computer From Viruses
back link building services=

!!

Join over 140k discussions or create one FREE


Cokoye is an Africans forum with over 500k members where people freely discuss issues. Register now to Join or start discussions FREE.

digital marketing

Author Topic: 14 Household Ways To Protect Your Computer From Viruses  (Read 1929 times)

0 Members and 1 Guest are viewing this topic.

Offline Webm

  • Cokoye Hero Member
  • *****
  • Posts: 3284
  • Karma: +0/-3
  • Gender: Male
    • View Profile
    • Nigerian Web hosting Company
Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or worse, fatal to your computer. People who create these viruses, estimated at 10-15 new day, are the electronic version of terrorists. Its purpose is to cause chaos and destruction of so many people as possible by disabling, stealing, damage or destruction of computer resources and information. Often, they have no specific goal in mind, so no one is safe. If you have access to the Internet, share files or your computer with others, or load anything from diskettes, CD or DVD into your computer, you are vulnerable to viruses.

Fortunately, there are good guys working as hard as the hackers to develop cures for viruses as quickly as you send them in cyberspace. And there are many things you can do to keep your computer virus capture in the first place.

Virus definition:

A virus is a small computer program that can copy and spread from one computer to another, with or without the help of users. However, the virus usually more than just be fruitful and multiply, which is bad enough in itself, since hogs system resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often, they can not deliver their payload until an unsuspecting user does something to make the virus execute its programmed function. This could be as simple as clicking on an innocent looking file attachment with a. Exe (executable) extension.

Catching a virus:

Most viruses spread through email attachments because it's the easiest way to do it. Although Macintosh systems, Unix, Linux, and can catch viruses, hackers are particularly interested in exploiting security weaknesses in anything Microsoft, particularly Microsoft Outlook and Outlook Express. Due to the popularity of this software, hackers get maximum bang for your money, and probably get some satisfaction constantly reminded Microsoft that being big does not mean you're perfect.

Solution 1: Anti-virus Software

Your first line of defense is to install an antivirus software. To be extra safe, also install firewall software, now included in some anti-virus. This software can scan all drives for viruses and neutralize them. Here are some features to consider when evaluating anti-virus software.

- Operating System Compatibility - Make sure the software works with your system, especially if you are using an older operating system like Windows 98.

- Firewall software - If not included, whether it is available. If necessary, buy from another supplier.

- Automatic background protection - This means your software constantly scans behind the scenes for infections and neutralize them as they appear. This provides some peace of mind.

- Automatic, frequent updates - Because new viruses appear every day, you'll want regular updates. It's even better if they occur automatically when connected to the Internet. If automatic updating is not included, you have to visit the manufacturer's website and download updates yourself. This is of vital importance as it is not protected against new viruses if your software is updated.

- Disaster recovery - Software with a recovery utility to help you get your system back to normal after a virus attack is always good to have.

- ICSA certification - The International Computer Security Associatioin has standards for detection rates of anti-virus software. Make sure your software has the ICSA certification.

- Technical assistance - is a good idea to select a package that offers free technical support, either online or through a toll free number. If you ever felled by a virus, you may need it. Some manufacturers of anti-virus software are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan), Trend Micro Inc. (PC-cillin) and Zone Labs Inc. (Zone Alarm Suite).

Solution 2: Detection of virus

If you receive a particularly juicy attachment that you're dying to open, save to the Windows desktop and run the anti-virus software in the first. To do this, click once gently on the file to your desktop ... not really open ... then right-click and choose Scan with (Name of Anti-Virus software) to activate the antivirus.

If infected, the anti-virus software may neutralize, or at least tell you the attachment is too dangerous to open. On the other hand, do not feel guilty if the very idea of ??keeping a potentially damaging file anywhere in the system is enough to satisfy his desire to open up and have it removed immediately.

Solution 3: Delete first, ask questions later.

If in doubt about the origin of an e-mail, the best thing to do is delete it without previewing or opening it. However, some viruses such as Klez, propagate by fishing in address books of people and sending themselves from any contact they find to another random contact. It can spread a virus with just the people in your address book, although it's not e-mail to anything. They are going to receive from another person in your address book, it really makes life confusing. Due to the proliferation of pornography on the Internet, e-mail viruses often tempt victims by using sexual filenames, such as nudes.exe. Do not fall into the trap.

Resolution 4: Beware of virus hoaxes

E-mail alerts about viruses are almost always hoaxes. You may be tempted to believe them, as they often receive well-meaning friends who received them from friends, etc. These e-mails usually are not viruses, but some have fallen into the hands of hackers who loaded the virus and sent merrily on their way as a joke in bad taste.

The proliferation of e-mails about virus hoaxes can become nearly as bad as a real virus. Think about it, if you obey an e-mail that tells you to forward it to everyone in your address book, and they do, and this goes on long enough, you can bring the Internet to its knees. If you ever want to verify a virus warning, your anti-virus vendor may have a list of hoaxes on its website. It is in the business of providing the fixes, so it is known that viruses are real.

Solution 5: Beware of filename extensions

The extension of a filename are the three characters that come after the point. Now, by default Windows hides file extensions, but not a good idea. Just being able to see a suspicious extension and deleting the file before opening it can save you from a virus infection.

To see file extensions in all directory listings, on the desktop of Windows XP, click Start button | Control Panel | Folder Options | View Tab. Clear the check box Hide extensions for known file types. Click Apply | OK. System files are still hidden, but you can see the extensions of all files that need to worry. Viruses often live on files with these extensions -.... VBS, SHS, PIF, ink - and they are almost never legitimately used for attachments.

Solution 6: Disable the SHS extension.

An extension can be turned off is dangerous. Shs. Windows will not recognize it and warn you before attempting to open a file. Shs. The extension is usually only used for "scrap object" files created in Word and Excel when you highlight text and drag it to the desktop for pasting into other documents. If this is not something that once, or if you have Word and Excel 2000 or later, which allow you to have 12 items to the Clipboard, click the Start button | Control Panel Folder Options | File Types tab. Registered File Types, scroll down and highlight the SHS extension. Click Delete | Yes | Apply | OK.

Solution 7: Dealing with double extensions

When you turn on your extensions in Windows, be able to detect viruses that piggy-back on innocent looking files with double extensions, such as happybirthday.doc.exe. Never trust a double file extension - going against nature.

Solution 8: Beware of unknown exe files.

A virus is a program to run to do their dirty work, so you can have a. Exe. Unfortunately, this is the extension used by legitimate program files. Therefore, do not worry if you find files named Word.exe or Excel.exe on your system - software that is Microsoft. But do not you dare open any file with a. Exe, if you do not know what purpose the file is.

Solution 9: Watch out for icons

Viruses have been known attachments take the form of popular icons for text files or image, like the wolf in the henhouse. If you received an unexpected attachment, do not open without running through your anti-virus software.

Solution 10: Do not download from public newsgroups

What better place for a hacker to lurk and stick the virus in the middle of a crowd? Sooner or later, someone to unload and get the virus going. No download files and programs from newsgroups or bulletin boards, or open attachments from strangers in chatrooms ("Let's exchange pictures!") Without first analyzing your anti-virus software.

Solution 11: Avoid pirated software

This may seem obvious, but sometimes that tiny price in a popular but expensive package can be too good to resist. Resist! Also be careful about accepting application software from others. You do not know where you've been and what may have started as a perfectly clean package could have been infected during the installation of an infected person team.

Solution 12: Protect macros in MS Word, Excel and Powerpoint

A common type of virus uses macros. Macros are sets of stored commands that users can save as shortcuts to functions over in just a few keystrokes. A macro virus can do mischief as changing file types from text files or spreadsheets into templates, locking up keyboards, and deleting files. Word, Excel and PowerPoint come with macro virus protection. To make sure yours is activated, open each application, click the Tools | Macro | Security. In the Security Level tab, make sure you select medium or high. Clcik OK. If you are already infected with a macro virus, it is possible that the steps of this procedure are unavailable because the virus has been disabled. In that case, run a virus scan on your system to see if your anti-virus software can kill the virus.

Solution 13: Use passwords

If you share your computer, it's a good idea to assign everyone a password. Passwords must be a combination of letters and numbers no less than eight characters long, and preferably nonsensical. Never write passwords and stick them anywhere near the computer. To assign passwords in Windows XP, click Start button | Control Panel User Accounts. Follow the prompts to assign / change passwords.

Solution 14: Update application software

Microsoft constantly issues patches for security holes in your operating system and application software. however, do not be lulled into complacency if you have Windows Update automatically checking things for you. Update checks for patches to fix bugs in the operating system, not by security concerns.

For the latest security patches (as Microsoft calls them), visit www.microsoft.com and search for reviews for all Microsoft software, including Outlook and Outlook Express.

Microsoft also has a free downloadable package called Microsoft Baseline Security Analyzer (MBSA) that scans your system for missing patches. Works with Windows 2000 and XP Home and Professional. Not compatible with Windows 95, 98 or ME.

To download MBSA, visit the Web page from Microsoft TechNet. Please note that the information is written in techie language, so it can be daunting.

The last words:

Now that you know some ways to avoid and deal with viruses, let's wrap things up with a solution of what you've heard before, but have been ignored.

- Backup your files regularly - If a virus crashes your sytem, ??you will feel much better if you back up all your important files. Make backups on a medium that is separate from the computer, such as diskettes, CDs or Zip disks. Scan for viruses before putting them away to make sure they are not infected. If they are, they will do any good if you ever have to use because the virus is only transmitted back to your computer.

- Make a boot disk - Create an emergency boot diskette before you have a problem so you can start your computer after a serious security problem To create a boot disk with Windows XP, put a blank floppy disk in the unit. Open My Computer, then right click the floppy drive. Click format. Under format options, click Create a boot disk MS-DOS. Click Start. Keep the disk in a safe place. Hopefully, you'll never need to use it.

- Turn off your computer - DSL and cable "always" may be convenient, but you should always turn off the computer when not in use. Hackers can not get to a machine that is turned off.




Offline lopezsimmon

  • Posting For Fun!
  • **
  • Posts: 10
  • Karma: +0/-0
  • Gender: Male
    • View Profile
Once you have your application set up, make sure that you are secured from the newest germs. If you have a product new pc, the very first thing you should do after linking to the Online is to go to the web page of your anti-virus application to obtain the newest up-dates.


Offline Webm

  • Cokoye Hero Member
  • *****
  • Posts: 3284
  • Karma: +0/-3
  • Gender: Male
    • View Profile
    • Nigerian Web hosting Company
One more thing I observe is that one anti-virus doesn't have it all no matter what they claim, is safer to install at least two anti-viruses that are doing two different things. Eg spyware or adware addition to any anti-virus.


 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Which number is in the middle  55 6 88:

Related Topics


back link building services=