https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ Tech-Talk: Computer Viruses: How to Prevent their Spread using ANTIVIRUS

Computer Viruses: How to Prevent their Spread using ANTIVIRUS

 

Computer Viruses:

How to Prevent their Spread using ANTIVIRUS




The user installs various types of licensed or unlicensed software on his computer, which try to protect the computer from virus attacks, these results in his computer becoming very slow.
It is impossible to avoid new virus attacks in operating systems (Windows XP, Vista, Linux, Mac, Solaris and others) even if they have greater computer security (current Firewalls, Antivirus, etc.).


There are pirate operating systems (Windows) that already have a Trojan virus (crack) included and when that system is installed, the virus has total control of the computer (zombie). The user trusts and provides all their data and performs transactions (banking, administrative and other operations) by simulating web pages showing an appearance as if it were original, including the padlock security icon at the bottom of the page and the URL: https: //, in this case the virus steals and sends the information to its destination that was programmed by the criminals.
The most important thing is that the user takes preventive measures to avoid the spread of viruses. So the best option is to prevent so as not to regret, so we present the following recommendations:

Basic prevention recommendations to protect the computer from any computer virus and reduce contagion by 50%:

·         Do not insert the input and output devices (I / O) of USB memory, Pendrive, CD-ROOM and DVD, when starting the boot of the legal operating system and create a virus-free boot disk.

·  Create accounts with limited privileges (operating system and Internet line). To prevent unauthorized installations of software or other activity and to create backups (copies) of the information.

·       Use a Firewall (USB, Internet, operating system) to prevent access to any unknown internal or external operation.

·        Change information (Encryption) for a different one known only to the user.

·   Deactivate the automatic reproduction of drives such as USB, CD-ROM, DVD. Do not automatically run the virus (autorun.inf), this is to avoid infecting the computer.

·         View the information of the I / O devices that may contain viruses such as: USB memory, CD-ROOM, DVD, Pendrive and hard disk there are two ways:

a) Select option start-my PC or computer-icon of folders - double click to open drive.
b) Select from the tools menu:
- Folder options-view-activate the option to show all hidden files and folders
- Deactivate the option to hide the protected operating system files and their extension.
With this, it allows us to see the hidden system files including their extension in order to view unknown infected files, if so, you must delete them.

·      Update legal software (Antivirus, operating system SP3 or higher, anti-spam, anti-spy, firewall).

 

·         Create a contact at the beginning (example: ¡!!!! 9999 with symbols and numbers) without an address in your email.

·         Downloading the information in an unsafe site can be done through another Linux operating system, so as not to infect the Windows operating system. There are fewer criminals who are dedicated to virus programming on a Linux operating system platform.

·         Do not provide your data, or carry out banking transactions on web pages that do not contain the security padlock icon at the bottom of the browser or have the https: // in the bar, in which they may contain codes malicious. If you want to feel more secure, you should copy the address http: //www.trabajo or https://www.trabajom.com (examples) in the browser bar instead of clicking on a hyperlink (link) within the Web page. There must be an antivirus with the characteristic of monitoring and detecting web pages with malicious code.

·         Do not use Internet Explorer, you can confidently use the MOZILLA browser.

·         Do not open attachments with a double extension or save those unknown emails that have a very small size, such as 66 Kilobytes or if several emails arrive and inform our contacts not to forward messages with viruses or false content or without using the Bcc box.

·         It is preferable to browse through an anonymous proxy.

·  Deactivate the message preview option, to avoid suspicious messages from opening automatically.

·      When you have a link using the file transfer protocol (FTP) in the browser, you have to be 100% sure when visiting the web page because an infected file can be downloaded to your computer, example: ftp: // address.

·       Use access codes (characters, symbols and digits) that are not associated with common user data, such as date of birth, nicknames, names of relatives, etc.

·        Uncheck the boxes of the processes that you do not know in the startup label of the operating system configuration utility (msconfig).

·        Find the normal.dot file and then delete it to prevent the spread of a macro virus. Write protect the normal.dot file and disable the automatic macros for the spreadsheet, Word, PowerPoint from the Tools, Macro and Security menu and then enable the media option.

·       Distribute RTF and CVS files.

 

No comments:

Post a Comment