https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ Tech-Talk: How to Protect Yourself from Computer Viruses

How to Protect Yourself from Computer Viruses

 

How to Protect Yourself from Computer Viruses

 


Basic rules to avoid being contaminated with computer viruses. They are accompanied by a review of some downloadable Antivirus Software from the Internet.

Computer viruses have become a constant nightmare, especially for email users. It is very likely that you or someone you know has been the victim of these annoying computer 'bugs' that appear where you least expect it.

To propagate their creations and achieve their ends, those who manufacture Viruses frequently appeal to deep emotional inclinations of their possible victims such as: fear, curiosity, desire, sex, greed, compassion or even natural goodness, to achieve its ends.

Many times they warn their victim through an email in which they inform him that his computer is infected with a dangerous virus that will erase all the information contained in the hard drive. They kindly offer the software that will solve the problem or an Internet address from which it can be downloaded. The truth is that when the victim executes these programs, the real virus is activated or the computer is left unprotected for the 'crackers' to enter, who can use it, without being discovered, to attack third-party systems.

In other cases, they take advantage of the curiosity and ignorance of their victim to get her to open an infected email message, with arguments such as that when she opens it she will be able to see nude photos of a famous actress or the latest images of some current news. Many of these messages come from people you know, who have already infected your computer; in this way, mistrust about the authenticity of the message is avoided.

For example, a worm called “Prestige” spreads by means of an email whose subject (subject) reads: "UNPUBLISHED photos of the PRESTIGE at the bottom of the Atlantic". However, what the attachment actually includes is not photos, but a computer virus. The "Sir Cam" Virus is another example that has deceived thousands of users around the world. It comes in an attached file (attachments) to an email message whose subject (subject) says: "Hello, how are you?"; In addition, you can read in the body of the message: "I am sending you this file so that you can give me your point of view. See you soon." When the user opens the file to review it and thus be able to give an opinion, the virus infects the computer and is automatically forwarded to those who appear in the address book of the infected user. For this reason, the virus arrives regularly forwarded by a known person.

For your information, below we list a series of basic rules that will help you protect yourself from computer viruses:


·   Install reliable Antivirus software on your computer (see list of options in the next section).

 

·         Update your Antivirus software frequently (minimum twice a month).


·     Scan any email with up-to-date Antivirus Software before opening it, even if you know the sender.

 

·      Always scan files on floppy disk or CD-Rom with Antivirus software before opening or copying them to your computer.

 

·      Do not download, let alone run, attachments (attachments) to an email message without first checking with the person who supposedly sent the message, if they actually did.

 

·       Never run a program of unknown origin, even if the Antivirus software indicates that it is not infected. This program may contain a Trojan or a sniffer that forwards your password or other information to someone else.

 

·  Install software update patches released by manufacturing companies to fix vulnerabilities in their programs. In this way, you can deal with the effects that can be caused by the execution of files with malicious code.

 

·        Be careful with messages alluding to erotic situations (erotic version of the tale of Snow White and the Seven Dwarfs, photos of naked women, photos of famous artists or athletes, etc.).

 

·         Never open files attached to an email message whose extension is ".exe", ".vbs", ".pif", ".bat" or ".bak".

 

·  Make sure the attached file does not have a double extension. For example: "FileName.php.exe".

 

·         Avoid e-mail sharing of files with jokes, pictures or photos.

 

·         Visit frequently sites that offer information about the latest viruses.

 

·        Make a backup copy of your computer's data as often as you see fit. This way, if a virus attack occurs, it is easy to recover safe copies of all files.

 

·    Subscribe to an email notification service for new viruses. Finding out about their existence and how they behave in time is one of the most effective ways to avoid contagion


·      If your computer is behaving strangely and you suspect that it has been infected by a Virus, visit the websites of the Antivirus software manufacturers and look for information about the new Viruses; generally, there it is indicated how to disinfect the computer.

 

·  Most applications that accept macro code have security settings that can be configured. If you use Internet Explorer, choose [Tools / Internet Options], click the "Security" tab and then select the "Internet zone". Press the "Security Level" button to examine the security options, or press the "Preset Level" button to ensure the security level is set to Medium. To find the Netscape Navigator security settings, choose [Edit / Preferences], and select "Advanced" in the Category window. Don't forget the macro security settings for your application. In Word, Excel, or Outlook 2000, choose [Tools / Macro / Security] and make sure its value is set to "Medium" or "High".

 

·         Do not share floppy disks. Even a well-meaning friend can unknowingly infect you with a virus, Trojan horse, or worm. Label your floppy disks clearly so you can distinguish yours and do not loan them out. If a friend lends you a floppy disk that is not theirs, suggest an alternative method of sharing files.

 

·   When you do not understand a term used by virus experts, go to the sites of manufacturers of Antivirus software where you can find glossaries of the words used in this sector of the computer industry.

 

·    Be wary of unsolicited e-mails that offer you the opportunity to download music exchange software, antivirus programs, or photos.


·       Ignore chain-type messages that offer instructions to delete a file from your computer, arguing that it is a dangerous virus that will be activated within a few days. Generally, the suspected infected file is not a virus but an operating system file.

 

·     Never accept unsolicited advice to disinfect your computer from a dangerous virus. If someone warns you that your computer is infected, update your Antivirus Software and check all files on the computer.

 

·       Be wary of unfamiliar Websites where you can find free software or product promotions with incredibly low prices.

ANTIVIRUS SOFTWARE OPTIONS

Antivirus programs detect viruses by making a comparison between the files stored on the computer and a library of signatures that identify each virus. This means that the Virus must first be known (and therefore someone must have been infected) before developing the signature for that Virus.

It is very important to keep the Virus signature database of your Antivirus Software updated because new Viruses appear daily.

 

No comments:

Post a Comment