Viruses,and,Malicious,Software computer Viruses and Malicious Software: How to Protect Your Computer


----------------------------------------------------------Permission is granted for the below article to forward,reprint, distribute, use for ezine, newsletter, website,offer as free bonus or part of a product for sale as longas no changes a Gone are those times when the companies and the organisations didn't need a hi-tech system to handle them. Owing to the considerable increase in the business sector and thus, an enormous increase in the complexity of the organisational struc


How to protect your computer from viruses and malicious software.Malicious software, or malware, is likely the most widespread problem faced by computer users today. As a computer technician, I find that about three out of four jobs I do for home computer users are to remove malware in one form or another.Malware programs come in several forms: Spyware and adware track your activities when surfing the Internet and bombard you with pop-up advertisements. Hijackers change browser start pages and redirect you to unwanted web sites. Viruses and trojans erase data and allow hackers to access your files. In many cases, the end result is that your computer becomes unusable and in need of repair.Many computer users try to protect their computers by installing anti-virus and firewall programs. While these programs are of value, they alone are not sufficient to fix and prevent all types of attacks. Many computers with up-to-date anti-virus and firewall software arrive at my door infested with malware to the extent that they are unusable.I have found user education to be the most effective deterrent to malware. Here is a list of things you can do to keep your computer healthy:1. Be skeptical of free softwareThere are many free software programs available on the Internet. Unfortunately, many of these are bundled with malware designed to display pop-up ads or monitor your browsing activities. Some even go further by regularly downloading additional malware without notifying you. Here are some common examples of free software that can contain malware:Screen saversAIM buddy iconsDesktop background picturesEmail “smileys”Peer-to-Peer music-sharing services Many troublesome adware programs are legal because they explain what they do in the license agreement, which the user typically must agree to before the program is installed. If you're not sure about a program, it pays to glance over the license agreement. You may be surprised what you are giving permission for. You should also be skeptical of spyware removal tools and pop-up blocker programs. Believe it or not, many of these tools actually contain adware and spyware themselves. If you're not completely sure about a piece of software, ask a savvy computer user or technician before installing it. There are some good freebies on the Internet, but there are many undesirable ones as well. To protect you computer, you must exercise discretion. Be very cautious about giving a web site permission to install software on your computer. A hacker with $20 and some spare time can construct a professional-looking web page that is designed to install malware on your computer. Some parents have found it necessary to forbid their children from downloading any software without permission.2. Install critical Windows updatesMany malware programs have the ability to infect your computer only because of a mistake made by Microsoft during the development of Windows or Internet Explorer. When Microsoft learns of these mistakes, the company releases updates to fix them. The well-known “Blaster” and “Sasser” worms infected millions of computers, all of which didn't have the latest Windows updates installed. These and other viruses could infect out-of-date computers without any action on the part of the user other than connecting to the Internet. If your computer is using Windows XP, you can configure it to receive updates automatically. To find the automatic update option, click Start, RIGHT-click My Computer, click Properties, and then click the Automatic Updates tab. If you are using an older version of Windows, or if you'd like to install the updates manually, visit windowsupdate.microsoft.com or click on Start > Windows Update (if you're using Windows XP, it will be found under Start > All Programs > Windows Update). 3. Don't open suspicious email attachmentsOne of the most common ways for viruses to spread is through the use of email attachments. Under usual circumstances, it is OK to read the text of an email that contains a virus. Your computer will not be infected unless you make the mistake of attempting to open the attachment. Although some viruses can infect even without the use of an attachment, this is normally not a problem if you keep your software up-to-date as described earlier in the article.Most people follow a simple rule that they assume will protect them: They do not open any attachment unless they recognize the sender. However, knowing the sender does not make an attachment safe. In fact, many viruses appear to be sent by somebody you know. Every day people are infected with viruses because they open an attachment on an email that appeared to come from a family member or close friend. Before you open a file attached to an email, make sure BOTH of these statements are true:1.You know the person who is sending the email.2.The email contains a personal message that describes the attachment and makes it clear the message was written by the person it appears to be from. A one line message like “open this, it's cool!” is not enough because many viruses are designed to automatically generate such messages.If the message is vague as to what the attachment is, email or call the sender to see if they intended to send it to you.4. Consider using an alternative web browserThe computer program that you use to look at web pages on the Internet is called a web browser. Microsoft Internet Explorer is the web browser that comes packaged with Windows, and is therefore used by the vast majority of computer users. Contrary to many people's assumptions, there are a handful of other free Internet browsers that meet or even exceed the ease of use and features of Internet Explorer. Many viruses and other malicious software infect computers by taking advantage of security vulnerabilities or “holes” in Internet Explorer. While vulnerabilities exist in other browsers, Internet Explorer is the one that is targeted most frequently by virus and malware authors. While keeping Internet Explorer up-to-date as described earlier in the article provides some protection, some security experts are recommending that users abandon Internet Explorer altogether. One of the most promising alternative browsers is called Mozilla Firefox, which can be downloaded free from www.mozilla.org. Firefox has been quickly gaining popularity in the recent months. Firefox also automatically blocks advertising pop-ups triggered by the websites you visit. You'll want to keep whatever browser you use up-to-date, as security problems are discovered even in non-Microsoft browsers occasionally. Firefox automatically informs you of updates when they become available.

Viruses,and,Malicious,Software

computer

Equipment Rental Software – Features And Cost

Equipment rental management software is an essential thing these days for any equipment rental company.A well-developed equipment rental software provides you with a variety of features that can really help you maintain and organise your cus ...

computer

5 Big Reasons Why I Migrated From Angularjs To React

I have 5 main reasons for my angularjs to react migration. No, it's not a comparison on which is better. A comparison between apples and oranges would make no point. React is a library, and angular is a framework. Both can do stuff in their ...

computer

How to troubleshoot McAfee error 2318?

Security software means McAfee! For many computer users, McAfee antivirus is the only choice for security software as it provides all the features and tools which are necessary for device and data protection. This robust antivirus merely sho ...

computer

Manage Multiple Counter With AlignBooks Point of Sale

Fulfilling your businesss needs which can grow your firm is our aim. AlignBooks is better known for providing a strong pillar to newly started or midway businesss. Those companies who dont want to fall back with irregularity manage the inven ...

computer

How to Autoplay Embedded YouTube Videos

Source: How to Autoplay Embedded YouTube VideosEmbedding a video or audio enables the users to share their videos with any of their preferred sites or any social networking platforms. They can do so by copying the embedded link of the parti ...

computer

3 Major Mistakes to Avoid in Retail Business

Truth be told, nearly half of the retail businesses survive longer than four years and which can be something to ponder for a newbie before stepping into the industry. However, this being said, it is also true that you can excel in the indus ...

computer

Start Your Own Computer Repair Business

1. Know your street value. In the early 90's, running a PC repair business centered around selling parts and products, with service on the side. Today, it's about selling hours. If you run a business, you need to consider the X3 rule. That m ...

computer

How Establishments Show Up in Restaurant Searches

The revolutionary rise of technology has made things easy-peasy for consumers in the restaurant industry. Unlike the old days, the availability of innumerable platforms has made it possible for diners to choose from various searching options ...

computer

GuildWars 2 :

The last expansion pack for Guild Wars 2 was Path of Fire, which was released in 2017 and brings you a new enemy-Balthazar, the evil god of war. Although this doesn't sound like another expansion pack currently in production, some fans ma ...

computer

Customer Support at the time of COVID-19 Pandemic

COVID-19 is the worst crisis of our time as we observe social distancing protocols being imposed all around the world. While these measures are a step in effectively managing the COVID-19 pandemic, Hospitality and Retail businesses are confr ...

computer

How to Choose a Contract Management Solution (CLM)?

Contract life cycle management (CLM) systems can simplify and automate contract creation, negotiation, execution and storage. They are an intelligent alternative to the tedious hand tools formerly used for these tasks, which lacked visibili ...

computer

Contacting Google Live Person to Resolve Your Issues

Users are fond of all the Google supported products and look forward to the best services. Also, Google as a whole has never disappointed its users and helped them at every point with its commendable services. Also, being a customer-oriente ...

computer

how to uninstall discord

How to Uninstall Discord in Windows 10? has supported open source technologies, our tool is secure and safe to use. To uninstall a discord from your windows, you'll use this method which is given below.USING THIRD PARTY TOOLS1. Firstly, you ...