‏إظهار الرسائل ذات التسميات Types. إظهار كافة الرسائل
‏إظهار الرسائل ذات التسميات Types. إظهار كافة الرسائل

الأحد، 8 أبريل 2012

Types of Computer Viruses and How to Prevent Them

Computer viruses are an interesting thing and as much as we all hate them you can't deny how well-bred these beasts have become. They can do an amazing amount of damage in a very short time showing us how destructive the nature of human beings as a race can be. However, computer viruses can take years to engineer and with their ability to spread at alarming rates undetected through the most sophisticated prevention systems demonstrates just how complex the human mind has become.

Some of the most well known and most destructive virus's shutdown massive corporations until the virus could be contained. The ILOVEYOU virus erupted in the year 2000 and forced companies like Microsoft to shut down all of their email servers, an amazing feat considering the simplicity of the virus.

I wanted to take a moment to discuss some of the types of viruses and some of the things you can do to better protect yourself by becoming a better decision maker when using technology like email and internet.

A virus by definition is a small piece of computer code that embeds itself to what would otherwise be a safe program. They are called viruses because the spread just like a biological virus would and just like a living virus, a computer virus needs a host to live off of. Also, like viruses, computer viruses are very small in comparison to software programs. A common piece of software that could get infected would be your Internet Explorer web browser. When the browser is infected, every time you launch it the virus is launched to and does its dirty work. A virus's purpose of existence is to spread to as many computers as possible as fast as possible. Once the virus as infected as many computers as it can, systems begin to fail like security systems and a possible hacker can make his move.

A worm is another type of virus that utilizes security flaws (holes) in a piece of software or an operating system to exploit. Once a system is infected, the worm scans the network for other available host who also disclose the security hole so that it can replicate itself. Worms can spread very fast. For example, the Code Red worm replicated itself over 250,000 times in about nine hours in the summer of 2001. The destructive nature of a worm is to spread as fast as it can and cause congestion on networks bringing it to a stop - just like many living worms on earth!

Another common virus seen is called a Trojan horse. As you may imagine, this virus gets its name from the tale of the Trojan War when the Greeks pretended to sail away but instead hid inside a wooden horse outside the gates of Troy. The Trojans pulled the horse into their city as a victory trophy allowing the Greeks passed the city walls and eventually taking over Troy. A computer Trojan horse also disguises its self to trick a user into letting it into their computer. It may be hiding in a game or media file you download from the internet, or it may be a software program for school or work. Once the file is downloaded and executed, the virus is let free into your system.

Finally there is the email virus which is simply a virus spread via email. This type of virus will email hide in an email and when the recipient opens their email it will infect their system and then resend itself to other people who are in the recipient address book. The virus will send messages over and over trying different types of messages to coax someone to open it.

There are several steps someone can take to prevent these types of viruses.

The first line of defense it to keep your system up to date. May users do not take the time or simply ignore update their software. Many of the updates that software venders are security fixes. The longer you wait to update your computer the better chance you have of getting a computer virus.

Antivirus software can also be very helpful. These types of programs dedicate themselves to protecting user's computers and personal information. Some are free and some charge a one -time fee and possibly even a monthly fee. The best antivirus software to use is debatable and beyond the scope of this article. However, any antivirus is probably better than none.

Use common sense. If something looks off or too good to be true it normally is. Don't open emails or download files sent from people you don't know. Read messages that your computer prompts you with instead of just clicking "Continue" because it closes the window.

Finally, educate yourself on general internet safety. A few moments of your time may keep your financial and personal well being safe.

About the Author
Cory Clough is a web programmer and developer for many first class websites and has worked on several high profile projects. He enjoys playing guitar and the outdoors.

http://dubuque-computer-repair.com/
http://coryclough.info/


View the original article here

الجمعة، 6 أبريل 2012

Types Of Intrusions And The Use For Spyware Protection Software

There are many ways to delete any kind of intrusion from your system. If you know a lot about computers, then you may already know something about viruses. Viruses are pesky codes that enter our computers and infest various files. They often multiply inside the system and the bad thing is that they often replicate themselves, infect other files and then spread again. They can even infect the kernels in your computer which then in turn corrupts the computer's operating system.

Once you detect your computer to have a virus, you can manually remove them yet it would actually be really hard to pinpoint all of them especially the code that causes all of them to work. The only way to remove them in a system would be through spyware protection software. Yes, through the use of your protection software and your common sense, you would be able to remove them in a snap.

In essence, there are other types of intrusions that can enter your system. One of which are malware programs. Malwares are programs and files that are created to have only one purpose, and that is to wreck havoc inside your PC. Examples of malware are typical viruses, Trojan horses, hijackers, spyware and other forms of adware. It is critical to use spyware protection software once you detect such files in your computer. If you are not too careful with malware, you might end up reformatting your computer. Another type of vicious programs that are shared either through media or through anonymous emails is spyware. Spywares are actually examples of programs that damage your PC.

The difference of spyware to malware is that your typical spyware is not a virus. Instead, it is actually more like a malicious collection of codes that works the same way as malware. Usually, hackers use this type of intrusion in order to collect sensitive information from hosts. They often spread spyware through free programs and free downloading sites. The best way to remove such malicious programs would still be through the use of spyware protection software and detection programs.

Another type of intrusion is the adware. This type of intrusion is based on advertisements. Once they enter your system, they would often pop-out in your screen containing all sorts of displays and advertisements. In a nutshell, adware is based on a generating program that displays advertisements even though the system is not running online. Adware is not as vicious as malware and not as conspicuous as spyware but it is actually the peskiest. Adware programs can pop out anytime even if you are playing a game or typing and they can lower the speed of your computer. In order to remove them using spyware protection software or adware specialized tool should be used.

For added information on spyware protection software and other topics relating to spyware protection virus go to spyware protection virus website.


View the original article here