Welcome to YLOAN.COM
yloan.com » Computers & Internet » Computer Viruses - Learn to make your computer safe
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Computer Viruses - Learn to make your computer safe

Computer Viruses - Learn to make your computer safe


A virus is computer code that somehow finds its way into your computer without your knowledge. It communicates with your computer's operating system and memory troublseome and doing things in your computer, often without your knowledge. Most people do not even know they are infected by a virus, until all of a sudden, their computer slows to a crawl or not working at all. This occurs when the virus is all available memory that should be used to run your programs using. Serious viruses can destroy hard drives, software ruins, delete important files, steal your identity and the cost of the victim a lot of money and time. Some viruses can, all by themselves, move in networks and sneak through security systems. Viruses are very bad and should be kept on your computer.

It seems that the virus first appeared when the Internet was just beginning and only used by the Ministry of Defense and various universities. Since then they have become much more sophisticated and more dangerous. All viruses are created by man and, unfortunately, there are plenty of bad guys out there either to make room for profit (as a way to attach themselves to programs on your computer and then copy each key touch you make, including Your credit card information) or because they are sick puppies with too much time on their hands.

Almost all viruses are associated with a program executable file. These files end in extensions such as. Exe and. Com. This means that the virus is harmless to that specific application is opened or launched. Then the chaos begins. This is why it is very dangerous to an email attachment to open it unless you know exactly who the sender is and what is in the Annex.


What about worms and Trojan horses? A worm is a type of virus that can multiply and use large amounts of memory on your computer. However, a worm does not attach itself to another program. It increases only general havoc in memory. As a good wine, he also travels well. Worms use the file transfer functions in your operating system to easily move from computer to computer. E-mail files are a good example of this possibility. A worm is not tied to a program file as a virus, but has the ability to continuously replicate itself. For example, can attach to each name in your e-mail address book and sends itself in an email to all your contacts. Then the same happens to them and on and on and on. They consume so much memory and network bandwidth (the size of your pipeline Inter or Intranet) that they Web servers, network servers and individual workstations to bring to their knees. Worms are just used for slowing down networks and computers. Now, more advanced versions tunnel computers and keep the bad guys remotely control your computer.

Readers of Homer's Odyssey know the Trojan horse was a gift from the people of Troy for the citizens of Athens. Instead, soldiers were hidden in the giant wooden horse, and at night she slipped and easily conquered the Greek city sleeping. A computer Trojan horse works the same way. It seems a legitimate piece of software that is well and good, but once it is opened quickly mischief occurs. Trojans used to cause some stupid problems like changing icons on the desktop or wallpaper. Now they can destroy files, and more significantly to create a "backdoor" on your computer where poor people can enter without your knowledge, and access your personal information. Obviously this only occurs when your computer is online. However, with more and more people using broadband Internet access and always leaving their computers are becoming very common Trojans. The good news is that, by definition, Trojan horses do not replicate themselves and can infect other files.

Another type of virus called an e-mail virus. That's because it arrives in your e-mail. E-mail viruses are viruses, worms or Trojan horses, but separately reported because the mail is an important part of our culture and most of us send and receive e-mail every day. Email viruses come as attachments to seemingly innocuous e-mails. However, the second the attachment, the virus is unleashed on your unsuspecting computer access. To prevent this, simply follow a few basic rules.

1. Not, under any circumstances, open an attachment unless you know who the sender is and exactly what was in the attachment. Remember that a worm hijack an email list and send infected e-mails without the knowledge of the sender.

2. Anti-virus filters to search for files ending in. Exe and. Com. These are executable programs and a dead giveaway that the attachment is a virus. The bad guys know this and often hides these files in WinZip or Stuffit programs. Be especially cautious of an attachment that arrives in a. Zip or. Sit format. Now we know a bit about those pesky critters, what can we do to ensure our computer or network is not infected. Do not underestimate the people who actually code of the virus. They are very smart computer geeks and understand far more than most of us about the vulnerabilities that are built into every computer, especially those using Microsoft operating systems and Microsoft Internet Explorer. This is because since almost everyone uses Microsoft software, which is where the attackers focus their efforts. Microsoft programers are constantly working to close holes in their software and they continually provide updates and patches to guard against the virus invasion.

Therefore the first step is to make sure that your software with the latest updates to keep. They are free, and it only takes a few minutes. Use the automatic update feature that comes with software and when he wants to download a patch or an update, let it. It may be the computer restarts, but better than a blank hard drive or let someone steal your master card number. The automatic update program can be found in your system tray on your Start menu. This is the list of programs available at the time in your Start Menu .. There is an easy wizard that you set and the program automatically checks and downloads new patches and updates will follow. You can also use programs like Big Fix, a free program that constantly monitors your current computer automatically downloads protection updates and fixes and patches to your computer operating system security up-to-date. Great fix is no anti-virus program. It just keeps your Microsoft operating system with the latest updates. You can find and download this free software http://www.bigfix.com. Big Fix is recommended by Jamison Software.

Next, consider installing anti-virus software. Some of the big names you may recognize, Norton Anti-Virus and McAffee. They are just a few of the many anti-virus programs on the market. You should also consider a firewall, which is part of or a convenient add-on for most antivirus programs. Firewalls are hardware devices (if you have a network with a router, a basic firewall is probably a part of the router) and more generally, software programs. A firewall is designed to provide you viruses, worms and Trojan horses to attack your computer and from the rental of spyware files that are already on your computer to the internet with a site that can do damage to your computer or take your on-line activities. This is done through a series of filters that identify and block bad files. If the firewall is part of a hardware component such as a router, it usually can not be changed or updated. Software firewalls can be continuously updated as new viruses are discovered.

The anti-virus software works behind the firewall. It scans your computer for viruses and, more importantly, solve problems caused by the virus. She places the virus in a quarantine folder, so it can not do more damage. The programs also cure any legitimate files infected by the virus by stripping the bad code away from the right file. They do this in two ways. First, they compare files in your computer to the anti-virus dictionary that is part of the program and downloaded to your computer. They also look for suspicious behavior from a program running on your computer. For example, a program, suddenly, in an attempt to an online connection. Anti-virus programs offer automatic updates so the latest threats can be added to your computer. That is why most programs are sold on a subscription basis.


A problem with anti-virus programs is that they tend to be much memory the computer. Believe it or not, programs like Norton and McAffee actually up to 15 programs in the background (you do not know they're running on your computer, but they are) while you work on your computer. If you do not have enough memory, these programs can slow your computer down, just like real viruses. That's why you need to make sure you have enough memory in your computer before anti-virus software. While most programs recommend 128 KB (kilobytes) of RAM (Random Access Memory) installed on your computer, we recommend you install at least 256 (kilobytes) of RAM (Random Access Memory). Memory is not that expensive and is easy to install. It's better than staring at a "slower than molasses" computer. Jamison recommends AVG Anti-Virus Software System as the best anti-virus program we've used. We run AVG Anti-Virus System by Grisoft, Ltd. on our computer and are totally satisfied for the following reasons:

1. AVG is only three programs in the background, which means your computer will simply run faster. We run a high memory usage programs like Adobe Illustrator and Photoshop and Macromedia Dreamweaver and Flash on our computers and quickly found there was no difference in performance after the AVG installed.

2. Their customer service department responds quickly to identify and update the directory when new viruses are discovered. To test their response, we ran a computer online without a firewall for three months. During that period two viruses which were not found in the AVG folder attacked our computer. Within hours of these viruses add updates to the directory are added to the automatic downloads and viruses were removed from our test computer. If you are in the market for a major anti-virus program, we recommend AVG Anti-Virus with Firewall System. You can purchase the program or a free trial period of 30 days on http://www.jamisonsoftware.com.

To learn more about AVG and other software you go to => http://www.jamisonsoftware.com
Fix a slow running computer - How To Stop your computer running slow and freezing How Do Batteries Affect Cordless Drills? Prevention is the best cure for a Computer Virus Top Selling Laptop Computers And How To Choose How to Get Rid of Spyware and Adware From Your Computer Marketing Brochures: The Appreciation of Brochure Printing Evolution of the Computer Mouse New Advancements for Funeral Programs Why You Need A Good Quality Laptop Case Pros of Cheap Label Printing Stickers Printing for Domestic and Personal Use Watch Californication Season 4 Episode 9 IN DVD COPY Strategies Regarding Fruits That Improve Memory Competencies
print
www.yloan.com guest:  register | login | search IP(3.15.158.134) Ohio / Columbus Processed in 0.011660 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 30 , 10516, 55,
Computer Viruses - Learn to make your computer safe Columbus