There are other potentially unwanted programs that are often confused with viruses are Trojans, worms and logic bombs. The difference lies in the fact that these programs do not have the ability to multiply in the infected system. However, a virus, as well conceived, can be spread without your help. Because an infected program must be running for the virus is active. While we're not touch the infected program is harmless. However, some programs are sometimes set to automatically perform potentially dangerous actions without real user interaction. Thus, the automatic opening of an e-mail preview pane may well open an infected file if your application has not been patched against this flaw. Virus writers have shown great ingenuity to entice the user to perform their work by exploiting such overconfidence or, conversely, generating panic among the latter.
How a Virus is Spread
The main route of infection is electronic mail and, in particular, that often accompany attachments to messages. Browsing and reading the mails is of no risk, while not try to download a file. A virus , finally, after all, is a program that needs to be run in order to infect your system. These malicious programs often hide in files with extensions EXE or DOC. The best advice I can give is to never open executable files (. EXE) that come attached to an e-mail and verified by an anti-virus program all received Word files (. DOC) before opening. In this way, we will have prevented more than 90% of the risk.
A known virus is transmitted through e-mail in an executable file is the HAPPY99.EXE. When you open the file fireworks are congratulating the new year and users will forward it to each other naively believing that the program only does this. However, while watching the animation, the user's PC is infected. Sometimes EXE files are also sent justifying that are compressed, either in the mail or through an IRC, but we know that this format does not improve compared with ZIP compression, and could always be sent in the latter format. To avoid this situation, it is best never to open these files. If not open, even if they reside on your computer, the virus may not carry the infection.
Word files (. DOC) are also very dangerous and we must exercise caution before opening a file of this type. Word documents can contain macros to automate repetitive tasks. These macros, which were originally designed to help users in their daily work quickly and due to their power, were also used by viruses to run malicious code. If all you want to send is a simple text, it is always preferable to use a text file (. TXT) rather than a Word file (. DOC), or directly include the text in the message body.
Other types of files can contain viruses, but their likelihood of infection is much lower than the two previous formats. For added security, should have enabled a anti-virus while browsing the Internet or read our e-mail. Besides, the anti-virus should be updated regularly, otherwise it will be as much as not using any protection. The objective of the virus is always played in the shortest possible time without the user noticing. For Happy99, drew on the ingenuity of receiving the message to innocently forward it to all your friends. This is the very functioning of Babylon, published in December 1999, which hides in an executable file whose icon represents the face of Santa Claus. When you open this file, the user considered harmless, the virus carried the infection. Other viruses, like Melissa, do not need the intervention of reading the mail message to spread: automatically forwarded to the first address of the Outlook calendar.
Can a virus destroy my PC? A virus does ceases to be a program and all you have at your fingertips is to modify the information (eg, deletion) that is stored on your PC. But you can not physically damage your computer components. However, there is a code that is vital to any machine and is responsible for it to boot. This code resides in the BIOS, as well as motherboard manufacturers can update their code to add new features, also can alter the virus, although with very different purpose. This is the beginning of operation of the CIH virus, and in case of infection, can prevent a PC to boot: the screen would remain black when you press the power button without showing the letters of the beginning.
The Trojans, have a completely different operation. Are based on two components: a server side and another client. The first was installed on the infected computer and the second on a remote computer. The virus has sent from the client side is capable of handling the infected computer remotely and to collect all the codes and passwords that the user is entering at that time.
Anti-virus programs can detect virus before infection occurs or disinfected in the event that either occurred. Usually have several modules. The principal is the scanner to scan files that you indicate. We can open it from the Start menu or even in the most anti-virus, selecting files and clicking the right mouse button. The second module is the memory resident. This program remains vigilant scanning all files we open our normal work and report if it finds a virus. Finally, we update module, which facilitates the updating of the virus database via the Internet.
Confronting anti-virus there are different positions. Some are installed anti-virus program and forget about it, being soon outdated. Others, in their obsession to keep your system virus free, do not trust one and installed several. Either situation is not desirable, first because the anti-virus will be unusable and the second, because several anti-virus will make your computer run more slowly and produce conflict with each other. Others prefer not to use any anti-virus resident in memory and scan only those files that may contain viruses, avoiding all risk situations discussed earlier.
The issue of anti-virus has at least ten years playing in the market, and now everyone knows that there are viruses for computers, perhaps few know the workings of malicious code, but the vast majority of people who have access to a computer, have encountered some strange things, which we call viruses that may damage the operation of the machine. Therefore, how to select a good anti-virus is essential, since the information kept on the hard drive has great value for those who created it. When selecting an anti-virus should not get carried away with marketing a specific product, nor for that is that everyone uses, but we must take into account several features that a product must meet to avoid infection and thereby lose our information.
1. The anti-virus software should update signature patterns or, at least once a week, ie as an end user I can keep up to date anti-virus to detect new viruses.
2. You must have a support team with access to a specialized laboratory in malicious code and a response time no longer than 48 hours, which can guide me in my language, if I get an infection.
3. Involving different methods of scanning and analysis of possible malicious code, to be able to detect unknown viruses.
4. The product should be modular and customizable, not all are equal, why this should be able to adapt to the needs of different users.
5. Must allow remote installation on a network both LAN and WAN,
6. Should consist of a centralized administration, where they can receive reports of virus, send updates and customization to different users.
These are the main features with which you must have an anti-virus to solve the problems I may have, to confront these evil bugs that could harm and disrupt the proper functioning of my computer. We must be aware that the creation of viruses is exponential and that we are exposed to infection at any time through the exchange of information, either via disk, email and Internet.
Prevention from Virus
Keep your operating system to date with its security updates: Periodically, security flaws are discovered in Windows, which are exploited by viruses to settle.
[Two ways to apply these patches:
- Set Windows to update itself automatically : You can go in Control Panel > Automatic Updates
- Look for updates yourself via Windows Update.
Notes:
- You must use Internet Explorer to run Windows Update. (Windows 98/ME/XP/2000)
- The updates are only possible if you have a valid license of Windows.
- Operating systems "cracked" does not enjoy the updates
- If problem applying updates, Windows Update returns an error code of the form 0xnnnnnnnn (where NNNNNN is a sequence of alphanumeric characters).
- A list of error codes is available on this page.
- You will find many tips to solve Windows Update site.
Protect your Windows-using Anti Virus
Antivirus resident, through its real-time shield, will continuously monitor the files that pass on your computer and prevent the opening of those containing a virus.
- Choose an effective antivirus: Some antivirus are better than others. Know before you buy. If your PC has a virus preinstalled, ask about its effectiveness before renewing the license. Preinstalled antivirus some are like sieves. Do not give in to the facility.
- If you do not want to invest in an antivirus fee, there are free.
Watch for programs that access the Internet using a firewall
A firewall monitors all traffic between your computer and the Internet. Any program wishing to access the Internet to send data and any program wishing to enter data on your computer from the Internet, must obtain permission from the firewall. The publishers of antivirus pay offer in their range of products, including antivirus suites and firewalls. But there is also some very good free firewall.
You can use software less popular with hackers than Internet Explorer and Outlook. Internet Explorer and Outlook are prey for hackers because they are used by the vast majority of Internet users. 80% of Internet users use Internet Explorer to navigate. Malware are optimized to trick IE. It contains a lot of security vulnerabilities, they do not make it easy and use of alternative programs. The Firefox browser from the Mozilla Foundation, for example, very advantageously replaces Internet Explorer.
Firewalls and antivirus, even the best are not infallible. It is therefore necessary to help a bit by following a few rules of caution:
- When you receive an email that you do not know the sender, asking you to open an attachment or click on a link to go to a site, show you suspicious.
- When you browse the internet, if you walk a little in areas of unrest net, never agree to install Active X controls on your computer.
- These are usually Trojans, dialers or whatnot that have a goal: you make life.
- Beware of P2P software Kazaa and I-mesh, to name a few, they are stuffed with adware. As for the files being shared ... they often reserve many surprises.
- Adult sites and sites of cracks are also major suppliers of all types of viruses.
Managed Monitoring Email - 1 in 140 emails were malicious content, and 80% of email is considered spam by Symantec. Managed service providers eliminate 99% of email spam and malicious attacks. Managed messaging services e-mail Filter for all email accounts and virtually eliminate all threats.
Corporate Antivirus Software - programs antivirus protection from costly computer repairs created by the malicious content that may have slipped through the network or loaded with a certain type of media (CD, flash drive, floppy, etc.) Most business owners understand the importance of installing an anti virus but do not understand the importance of buying the publishing business, as opposed to store bought the original version. The enterprise version is better because it uses fewer resources computer, provides a centralized location for scabies applications antivirus installed on workstations, reports of intrusions, downloads and pushes definitions of virus for workstations, and manages renewal of license.
Employee Policies - The best defense will not work if you take the hands of enemies and bring them to your command center and give them full access. Clear guidelines for Internet and computer use is essential to prevent malicious content off your computer. Windows Group Policies can be used to prevent users from violating policies computer, and deep packet inspection can be used to prevent users from violating the policies of the Internet.
Bookmarks