How to Protect Yourself from
Computer Viruses
Basic rules to avoid being contaminated with computer viruses. They are accompanied by a review of some downloadable Antivirus Software from the Internet.
Computer viruses have become a constant nightmare, especially for email users. It is very likely that you or someone you know has been the victim of these annoying computer 'bugs' that appear where you least expect it.
To propagate their creations and achieve their ends, those who manufacture Viruses frequently appeal to deep emotional inclinations of their possible victims such as: fear, curiosity, desire, sex, greed, compassion or even natural goodness, to achieve its ends.
Many times they warn their victim through an email in which they inform him that his computer is infected with a dangerous virus that will erase all the information contained in the hard drive. They kindly offer the software that will solve the problem or an Internet address from which it can be downloaded. The truth is that when the victim executes these programs, the real virus is activated or the computer is left unprotected for the 'crackers' to enter, who can use it, without being discovered, to attack third-party systems.
In other cases, they take advantage of the curiosity and ignorance of their victim to get her to open an infected email message, with arguments such as that when she opens it she will be able to see nude photos of a famous actress or the latest images of some current news. Many of these messages come from people you know, who have already infected your computer; in this way, mistrust about the authenticity of the message is avoided.
For example, a worm called “Prestige” spreads by means of an email whose subject (subject) reads: "UNPUBLISHED photos of the PRESTIGE at the bottom of the Atlantic". However, what the attachment actually includes is not photos, but a computer virus. The "Sir Cam" Virus is another example that has deceived thousands of users around the world. It comes in an attached file (attachments) to an email message whose subject (subject) says: "Hello, how are you?"; In addition, you can read in the body of the message: "I am sending you this file so that you can give me your point of view. See you soon." When the user opens the file to review it and thus be able to give an opinion, the virus infects the computer and is automatically forwarded to those who appear in the address book of the infected user. For this reason, the virus arrives regularly forwarded by a known person.
For your information, below we list a series of basic rules that will help you protect yourself from computer viruses:
· Install
reliable Antivirus
software on your computer (see list of options in the next section).
· Update your Antivirus software frequently (minimum twice a month).
· Scan any email
with up-to-date Antivirus
Software before opening it, even if you know the sender.
· Always scan
files on floppy disk or CD-Rom with Antivirus software
before opening or copying them to your computer.
· Do not
download, let alone run, attachments (attachments) to an email message without
first checking with the person who supposedly sent the message, if they
actually did.
· Never run a
program of unknown origin, even if the Antivirus software
indicates that it is not infected. This program may contain a Trojan or a
sniffer that forwards your password or other information to someone else.
· Install
software update patches released by manufacturing companies to fix
vulnerabilities in their programs. In this way, you can deal with the
effects that can be caused by the execution of files with malicious code.
· Be careful with
messages alluding to erotic situations (erotic version of the tale of Snow
White and the Seven Dwarfs, photos of naked women, photos of famous artists or
athletes, etc.).
·
Never open
files attached to an email message whose extension is ".exe",
".vbs", ".pif", ".bat" or ".bak".
· Make sure the
attached file does not have a double extension. For example:
"FileName.php.exe".
·
Avoid e-mail
sharing of files with jokes, pictures or photos.
·
Visit
frequently sites that offer information about the latest viruses.
· Make a backup
copy of your computer's data as often as you see fit. This way, if a virus
attack occurs, it is easy to recover safe copies of all files.
· Subscribe to an
email notification service for new viruses. Finding out about their
existence and how they behave in time is one of the most effective ways to
avoid contagion
· If your
computer is behaving strangely and you suspect that it has been infected by a
Virus, visit the websites of the Antivirus software
manufacturers and look for information about the new Viruses; generally,
there it is indicated how to disinfect the computer.
· Most
applications that accept macro code have security settings that can be
configured. If you use Internet Explorer, choose [Tools / Internet
Options], click the "Security" tab and then select the "Internet
zone". Press the "Security Level" button to examine the
security options, or press the "Preset Level" button to ensure the
security level is set to Medium. To find the Netscape Navigator security
settings, choose [Edit / Preferences], and select "Advanced" in
the Category window. Don't forget the macro security settings for your
application. In Word, Excel, or Outlook 2000, choose [Tools / Macro /
Security] and make sure its value is set to "Medium" or
"High".
·
Do not share
floppy disks. Even a well-meaning friend can unknowingly infect you with a
virus, Trojan horse, or worm. Label your floppy disks clearly so you can
distinguish yours and do not loan them out. If a friend lends you a floppy
disk that is not theirs, suggest an alternative method of sharing files.
· When you do not
understand a term used by virus experts, go to the sites of manufacturers of Antivirus software where
you can find glossaries of the words used in this sector of the computer
industry.
· Be wary of unsolicited e-mails that offer you the opportunity to download music exchange software, antivirus programs, or photos.
· Ignore
chain-type messages that offer instructions to delete a file from your
computer, arguing that it is a dangerous virus that will be activated within a
few days. Generally, the suspected infected file is not a virus but an
operating system file.
· Never accept
unsolicited advice to disinfect your computer from a dangerous virus. If
someone warns you that your computer is infected, update your Antivirus Software and
check all files on the computer.
· Be wary of unfamiliar Websites where you can find free software or product promotions with incredibly low prices.
ANTIVIRUS SOFTWARE OPTIONS
Antivirus programs detect viruses by making a comparison between the files stored on the computer and a library of signatures that identify each virus. This means that the Virus must first be known (and therefore someone must have been infected) before developing the signature for that Virus.
It is very
important to keep the Virus signature database of your Antivirus Software
updated because new Viruses appear daily.
No comments:
Post a Comment