how to safeguard your computer from virus

0
1279

Computer virus’s area unit deadly. They usually unfold with none apparent contact and may be a nuisance, or perhaps worse, fatal to your pc. people World Health Organization produce these viruses, calculable at 10-15 new ones each day, area unit the electronic version of terrorists. Their goal is to visit mayhem and destruction on as many folks as potential by disabling, stealing, damaging, or destroying pc and knowledge resources. Often, they need no specific target in mind, therefore nobody is safe. If you access the web, share files or your pc with others, or load something from diskettes, CDs, or DVDs onto your pc, you’re at risk of viruses.

Fortunately, there area unit sensible guys operating even as arduous because the hackers to develop cures for viruses as quickly as they send them off into Net. And there area unit several belongings you will do to stay your pc from catching viruses within the initial place.

Defining Viruses:

A virus may be a little worm that may copy and unfold itself from one pc to a different, with or while not the assistance of the user. However, viruses usually do over simply be fruitful and multiply, that is unhealthy enough in itself as a result of it hogs system resources. the rest virus’s area unit programmed to try and do, from displaying annoying messages to destroying files, is termed their payload. Often, they cannot deliver their payload till AN unsuspecting user will one thing to create the virus execute its programmed perform. this might be as straightforward as clicking on AN innocent wanting file attachment with the .exe (executable) extension.

Catching a Virus:

Most viruses area unit unfold through e-mail attachments as a result of it is the simplest way to try and do it. though Macintosh, Unix, and UNIX operating system systems will catch viruses, hacker’s area unit significantly keen on exploiting the protection weaknesses in something Microsoft, significantly Microsoft Outlook and Outlook categorical. owing to the recognition of this code, hackers get most bang for his or her buck, and that they in all probability get some satisfaction from regularly reminding Microsoft that being huge doesn’t suggest you are good.

Solution 1: Anti-virus code

Your initial line of defense is to put in anti-virus code. To be further safe, additionally install firewall code, that is currently enclosed in some anti-virus packages. This code will scan all of your drives for viruses and neutralize them. Here area unit some options to think about once evaluating anti-virus code.

– Compatibility together with your along with your} OS – confirm the code works with your system, significantly if you’re victimization AN older OS like Windows ninety eight.

– Firewall code – If it is not enclosed, resolve if it’s obtainable. If you need to, perish from another marketer.

– Automatic background protection – this suggests your code can perpetually scan behind the scenes for infections and neutralize them as they seem. This provides some peace of mind.

– Automatic, frequent updates – as a result of new viruses seem on a daily basis, you will need regular updates. It’s even higher if they occur mechanically once you connect with the web. If automatic change is not enclosed, you’ll need to examine the vendor’s web site and transfer updates yourself. this is often vitally vital, as a result of you may not be shielded from new viruses if your code is out of date.

– Disaster recovery – code with a recovery utility to assist you get your system back to traditional once an outbreak attack is often sensible to own.

– ICSA certification – The International pc Security Association has standards for the detection rates of anti-virus code. confirm your code has the ICSA certification.

– Technical support – it is a sensible plan to pick out a package that gives free technical support, either on-line or through a fee range. If you are ever cut down by an outbreak, you’ll would like it. Some anti-virus code vendors area unit Symantec Corporation (Norton Antivirus), McAfee Corporation (McAfee Virus Scan), Trend small INC. (PC-cillin), and Zone Labs INC. (Zone Alarm Suite).

Solution 2: The Virus Scan

If you receive a very juicy attachment that you are dying to open, reserve it on your Windows desktop and run your anti-virus code on that initial. To do this, click once gently on the file on your desktop … do not truly open it … then right click and opt for Scan with (Name of Anti-Virus Software) to activate an outbreak scan.

If it’s infected, your anti-virus code might neutralize it, or a minimum of tell you the attachment is just too dangerous to open. On the opposite hand, do not feel guilty if the terribly thought of saving a doubtless damaging file anyplace on your system is enough to quell your keenness to open it and cause you to delete it like a shot.

Solution 3: Delete initial, raise queries later.

When doubtful concerning the origin of AN e-mail, the simplest issue to try and do is delete it while not previewing or gap it. However, some viruses, like Klee, propagate by fishing in people’s address books and causation themselves from any contact they notice to a different random contact. you’ll be able to unfold an outbreak simply by having folks in your address book, notwithstanding you do not truly e-mail them something. they’re going to receive it from somebody else in your address book, that very makes life confusing. owing to the proliferation of porno on the web, e-mail viruses usually tempt victims by victimization sexual filenames, like nudes.exe. do not fall for it.

Solution 4: watch out for virus hoaxes

E-mails warning you concerning viruses area unit nearly always hoaxes. you’ll be tempted to believe them as a result of you sometimes receive them from well-meaning friends, World Health Organization received them from friends, etc. These e-mails themselves typically are not viruses, however some have truly fallen into the hands of hackers World Health Organization loaded them with viruses and forwarded them blithely on their manner as a gag.

The proliferation of e-mails concerning virus hoaxes will become nearly as unhealthy as a true virus. accept it, if you adapt AN e-mail that tells you to forward it to everybody in your address book, and that they they are doing it, and this goes on long enough, you may bring the web to its knees. If you ever need to verify an outbreak warning, your anti-virus marketer might have a listing of hoaxes on that web site. It’s within the business of providing the fixes, therefore it’ll understand that viruses area unit real.

Solution 5: watch out for computer file name extensions

The extension of a computer file name is that the 3 characters that come back once the dot. Windows currently defaults to concealment computer file name extensions, however it’s not an honest plan. simply having the ability to envision a suspicious extension and deleting the file before gap it will prevent from an outbreak infection.

To see computer file name extensions altogether your directory listings, on the Windows XP desktop, click begin button | management Panels | Folder choices | read Tab. Clear the check box for Hide extensions of celebrated file varieties. Click Apply | OK. System files can still be hidden; however, you will be able to see extensions for all the files you wish to be troubled with. Viruses usually carry on files with these extensions – .vbs, .shs, .pif, .Ink – and that they area unit virtually ne’er licitly used for attachments.

Solution 6: Disable the .shs extension

One dangerous extension you’ll be able to simply disable is .shs. Windows will not acknowledge it and can warn you before attempting to open an .shs file. The extension is typically simply used for “scrap object” files created in Word and Excel once you highlight text and drag it to the desktop for pasting into alternative documents. If this is not one thing you ever do, otherwise you have Word and Excel 2000 or later, which permit you to own twelve things on the writing board, click the beginning button | board | Folder choices | File varieties tab. below Registered file varieties, scroll down and highlight the SHS extension. Click Delete | affirmative | Apply | OK.

Solution 7: managing double extensions

When you activate your extensions in Windows, you will be able to find viruses that piggy-back themselves onto innocent wanting files with a double extension, like happybirthday.doc.exe. ne’er trust a file with a double extension – it goes against Nature.

Solution 8: watch out for unknown .exe files

A virus may be a program that has got to be dead to try and do its dirty work, therefore it should have AN .exe extension. sadly, this is often an equivalent extension utilized by legitimate program files. So, do not panic if you discover files named Word.exe or surpass.exe on your system – they are your Microsoft code. simply do not EVER open Any file with an .exe extension if you do not understand what the file’s purpose is.

Solution 9: be careful for icons

Viruses in attachment files are celebrated to assume the form of acquainted wanting icons of text or image files, just like the wolf within the hen house. If you receive AN surprising attachment, do not open it while not initial running it through your anti-virus code.

Solution 10: do not transfer from public new groups

What higher place for a hacker to lurk and stick his virus than within the middle of a crowd? Sooner or later, someone’s absolute to transfer it and acquire the virus going. do not transfer files and programs from newsgroups or bulletin boards, or open attachments sent from strangers in chatrooms (“Let’s exchange pictures!”) while not initial scanning along with your anti-virus code.

Solution 11: Avoid bootleg code

This may look like a no brainer, however generally that small tag on a preferred however high-priced package will be too sensible to resist. Resist it! Likewise, use caution concerning accretive application code from others. you do not understand wherever it has been, and what might have come into being as a superbly clean package may became infected throughout installation on somebody else’s infected pc.

Solution 12: defend macros in MS Word, Excel, and PowerPoint

A common style of virus uses macros. Macros area unit sets of keep commands that users will save as shortcuts to perform long functions in only a number of keystrokes. A macro virus might perform such mischief as dynamical file varieties from text files or spreadsheets into templates, protection up keyboards, and deleting files. Word, Excel, and PowerPoint go together with macro virus protection. to create positive, yours is activated, open every application, then click Tools menu | Macro | Security. On the protection Level tab, confirm Medium or High is chosen. Click OK. If you’re already infected with a macro virus, you’ll notice that the steps of this procedure area unit out of stock because the virus has disabled them. therein event, run an outbreak scan on your system to envision if your anti-virus code will kill the virus.

Solution 13: Use passwords

If you share your pc, it is a sensible plan to assign everybody a positive identification. Passwords ought to be a mixture of letters and numbers no but eight characters long, and ideally nonsensical. ne’er write passwords and stick them anyplace close to the pc. To assign passwords in Windows XP, click the beginning button | board | User Accounts. Follow the prompts to assign/change passwords.

Solution 14: Update application code

Microsoft perpetually problems patches for the protection holes in its OS and applications code. however, do not be lulled into complacence if you’ve got Windows Update mechanically checking things for you. Update checks for patches to repair bugs within the OS, not for security issues.

To get the most recent security hotfixes (as Microsoft calls them), visit www.microsoft.com and appearance for hotfixes for all of your Microsoft code, significantly Outlook and Outlook categorical.

Microsoft additionally encompasses a free downloadable package known as Microsoft Baseline Security analyzer (MBSA) that scans your system for missing hotfixes. It works with Windows 2000 and XP Home and skilled solely. It does not support Windows ninety five, 98, or ME.

To transfer the MBSA, visit the TechNet section of the Microsoft web site. Be warned that the knowledge is written in tikka language, therefore you’ll notice it intimidating.

Last Words:

Now that you simply understand some ways that for avoiding and managing viruses, let’s wrap things up with some answer you have in all probability detected before however have unnoticed.

– copy your files often – If an outbreak crashes your system, you may feel far better if you’ve backup copies of all of your vital files. build the backup copies on a media that is break free the pc, like on diskettes, CDs, or nada disks. Scan them for viruses before you set them away to create positive they are not infected. If they’re, they’re going to does one no sensible if you ever have to be compelled to use them as a result of they’re going to simply transmit the virus right back onto your pc.

– build a boot disk – produce AN emergency boot floppy before you’ve got drawback a drag therefore you’ll be able to begin your pc once a significant security problem to create a boot floppy with Windows XP, place a blank floppy within the drive. Open My pc, then right click the floppy drive. Click Format. below Format choices, click produce AN disk operating system startup disk. Click begin. Keep the disk during a safe place. With luck, you may ne’er have to be compelled to use it.

– close up you pc – line and cable connections that area unit “always on” is also convenient, however you must invariably close up your pc once it’s not in use. Hackers cannot get to a machine that is supercharged off.