How to Protect Our PC using
Antivirus
The most common means of entry for
viruses are:
1. Removable disk drives
(floppy disks, CD-ROM, ZIP drives, pen drives etc.)
2. Internet (browsing,
via email, when downloading files etc.)
3. A computer network of
a company in which files of all kinds are shared, which if infected, can end up
spreading to all the computers on the network.
The files most susceptible to
infection are those found on a storage medium such as hard drives or floppy
disks. More specifically, all files, files or documents that have the
characteristic of being programs will be infected. Although these are the
most normal, there are also viruses that are responsible for infecting files
that are not programs, such as files that contain macros. These macros are
programs that the user can include within a certain type of file and that allow
the execution of other programs or other commands that can be lethal to our
computer.
Due to all this, an antivirus is the defensive system against viruses, worms,
Trojans and other threats par excellence. Today a computer without antivirus or one that is
not updated is exposed to all kinds of attacks whose disastrous results range
from the loss of vital data to the spying of everything we do with it. Having
an antivirus has become essential for our team, especially if we speak at a
business level, although it is being used more and more on a personal level,
since the cost of an antivirus is not comparable to what the recover data lost
due to a virus.
There is a wide range of antivirus models to
choose from, and the prices are very attractive due to the competition. In
addition to paid antivirus, there are many other free antivirus, which,
although they will not have as extensive a virus database as the others, offer
excellent protection against many of the viruses that circulate on the network.
In any case, whether we choose a professional antivirus or a free one,
the important thing is that our computer has one of these programs, since it
will always be better than not having any protection system. We will be even
safer under the surveillance of two antivirus, although before venturing, we
must inform ourselves of the incompatibilities of some brands with others.
What we should never do is have more
than one active antivirus, since we could have serious security problems and
even hang the computer.
These are some addresses of antivirus
programs where we can analyze our equipment online, test them, and if we are
satisfied to buy them:
·
Protegent Antivirus Software
·
Norton
·
MacAfee
· AVG Antivirus
2.
A Firewall or Firewall.
When a computer accesses the Internet, it communicates through
"doors" called connection ports. There are 65,535 channels
through which data can enter or leave our computer, so that someone can attempt
an intrusion through any of those ports. In reality, intrusion is not that
easy because if we try to access a computer through a port and it is not
listening, it will be impossible. But Windows opens by default several
ports that leave our computers very vulnerable. A good firewall should close
all ports that are not in use and prevent any connection through
them. This greatly guarantees our safety.
Contrary to anti-virus guidelines, two firewalls should never be installed at
the same time. Interference between the two can cause unintentional port
openings that would make our computer more insecure. Two examples of good
firewalls are ZoneAlarm and Tiny, in addition to the Norton,
Panda, and MacAfee mentioned above.
Operation of a Firewall
A firewall consists of a software or
hardware-based mechanism that is placed between two networks, usually between a
LAN and the Internet, and that allows certain connections and blocks others by
following previously configured rules. Firewalls, as I mentioned before, can be
a special program that is installed on a PC, or a hardware device that performs
this function or that can even be implemented in certain devices such as
routers.
Personal firewalls like Zone Alarm, Tiny or Black ICE, are Firewalls based on
Software but that only protect the machine that has it installed. They are
designed for small networks or individual users. On a personal level or for a
small organization, if these programs are complemented with other types of
software such as antivirus,
we would achieve a more than acceptable level of security.
They all really have the same purpose,
which is to block certain types of network traffic that are considered
inappropriate. Despite this, there are two ways to block this traffic,
filtering at the network layer or at the application layer:
1. A network layer
firewall filters packets based on predefined rules that indicate destination or
source addresses and a port number.
2. An application-based
firewall acts as a Proxy and prevents traffic between two networks but allows
certain applications inside the network to be accessible to certain outside
software.
If we want to see a working Firewall, in this link there is a video that shows how the network works and how the Firewall accepts or rejects the packets that arrive according to the rules.
3. An Antispyware
Spyware is spyware created in order to
collect information from the user who has it installed and, in most cases,
without this user being aware of what is happening.
There are several types of spyware, so we can call them according to the
function that their malicious code
performs:
- Adware : they open
windows (pop-ups) in which advertising is displayed while we run applications.
- Spyware : small
program that is installed on our computer to steal our data and spy on our
movements through the network, collecting data on the websites we visit.
- Hijackers : program
that redirects the Internet browser to pages of your choice ?? hijacking
?? the home page or search page of our browser.
- Dialers : program
capable of modifying the telephone number with which we connect to our ISP
(Internet Service Provider) so that we can call an additional rate number at
the cost that this entails. (906; 806; 807; etc).
Some are installed automatically
without our consent, they are not classified as viruses but they invade our
privacy and in most cases endanger the stability of the system and especially
the operation of the browser or email client, and may even collect information
about us and our PC. Others are installed when we download extras for
our browser such as toolbars (additional toolbars). There are certain programs
that can collect information on our browsing habits to compile complex
consumption statistics, usually for commercial purposes.
The solution to get rid of those programs that we sometimes pick up
unintentionally when we install a freeware program is to install antispyware on
our computer.
There are some antivirus on the market that also detect and eliminate those
spyware programs, such as per Antivirus Software,
which, in addition to updating its virus database, also updates it with spyware
and adware, giving us the option to eliminate them if we wish. There are many
programs that eliminate spyware, many of them specific to some of them, but the
ideal is to complement our antivirus with an anti-spyware program such as Ad-aware or SpyBot
Search & DestroyIt would even be convenient to have both installed, since
there are times when what one is not capable of eliminating, the other can,
also they do not cause problems with each other as happened with antivirus and
its interface can be put in Spanish.
No comments:
Post a Comment