14 home ways to protect your computer from viruses
Computer viruses are fatal. They often spread without any clear communication and can be a nuisance, or even worse, fatal to your computer. Individuals who manufacture these viruses, estimated at 10-15 new viruses per day, are the electronic version of terrorists. Their goal is to wreak havoc and destruction on as many people as possible by disrupting, stealing, damaging, or destroying computer and information resources. Often, they have no specific purpose in mind, so no one is safe. If you access the Internet, share your files or computer with others, or upload anything from CDs, or DVDs to your computer, you are vulnerable to viruses.
Fortunately, some good people work as hard as hackers to develop virus treatments as quickly as they send them into cyberspace. There are many things you can do to prevent your computer from catching viruses in the first place.
Definition of viruses:
The virus is small computer software that can copy itself and spread from one computer to another, with or without user assistance. However, viruses usually do more than simply be productive and replicate, which is bad enough in itself because it stifles the system's resources. Anything else viruses are programmed to do, from displaying annoying messages to destroying files, is called their payload. Often, they cannot hand over their load until the unsuspecting user does something to make the virus carry out its programmed function. This may be as simple as clicking on an innocent-looking file attachment with a .exe extension (executable).
Catching the virus:
Most viruses spread through email attachments because they are the easiest way to do it. Although Macintosh, Unix, and Linux systems can capture viruses, hackers are particularly keen to exploit security weaknesses in anything from Microsoft, especially Microsoft Outlook and Outlook Express. Given the popularity of this software, hackers get maximum buzz for their profit and may get some satisfaction from Microsoft's constant reminder that being big doesn't mean you're perfect.
Solution 1: Antivirus Software
Your first line of defense is to install antiviral software. To be safer, also install firewall software, which is now included in some antivirus packages. This software can scan all your drives for viruses and neutralize them. Here are some features to consider when evaluating antivirus programs.
- Compatibility with your operating system - make sure the software works with your system, especially if you use an older operating system such as Windows 98.
- Firewall software - If not included, find out if it is available. If you should, buy it from another seller.
- Automatic background protection - this means that your program will constantly check behind the scenes for infections and neutralize them as they appear. This provides some peace of mind.
- Automatic and frequent updates - due to the emergence of new viruses every day, you will want regular updates. It is best to happen automatically when you connect to the Internet. If the automatic update is not included, you will have to check the seller's website and download the updates yourself. This is very important because you won't be protected from new viruses if your software is out of date.
- Disaster recovery - It's always good to have a program with a recovery facility to help you get your system back to normal after a virus attack.
- ICSA Certification - International Computer Security Association has standards for antivirus software detection rates. Make sure your program is ICSA certified.
- Technical support - It is good to choose a package that offers free technical support, either online or through a free number. If a virus ever falls, you may need it. Some antivirus vendors are Symantec Corporation (Norton AntiVirus), McAfee Corporation (McAfee VirusScan) and Trend Micro Inc. (PC-cillin), Zone Labs Inc.
Solution 2: Clear the virus
If you receive a particularly exciting facility that you are eager to open, save it to your Windows desktop and run your antivirus software on it first. To do this, click once gently on the file on your desktop... Don't actually open it... Then click well and choose Scan using (antivirus software name) to activate the virus screening.
If infected, your antivirus software may neutralize it, or at least tell you that the facility is too dangerous to open. On the other hand, you don't feel guilty if the idea of saving a potentially harmful file anywhere on your system is enough to calm your eagerness to open it and make you delete it immediately.
Solution 3: Delete first, ask questions later.
When doubting the origin of the email, the best thing to do is to delete it without previewing or opening it. However, some viruses, such as Klez, spread by fishing in people's address books and sending themselves from any contact they find to another random contact. You can spread a virus once you have people in your address book, even if you don't email them anything. They will receive it from someone else in your address book, making life really confusing. Because of the prevalence of pornography on the Internet, email viruses often tempt victims using sex file names, such as nudes.exe. Don't fall in love with her.
Solution 4: Beware of virus shenanigans
Emails that warn you about viruses are always tricks. You may be tempted to believe them because you usually receive them from well-meaning friends, whom they received from friends, etc. These same emails are usually not viruses, but some have already fallen into the hands of hackers who carried them with viruses and cheerfully sent them on their way as a sick joke.
The spread of emails about virus shenanigans can become as bad as a real virus. Think about it, if you obey an email telling you to send it to everyone in your address book, and they do, and this lasts long enough, you can put the internet on its knees. If you want to check a virus warning, the antivirus seller may have a list of tricks on their website. It is in the field of providing repairs, so it will know the real viruses.
Solution 5: Beware of file name extensions
The extension of the file name is the three characters that come after the point. Windows now fail to hide file name extensions, but it's not a good idea. Just being able to see a suspicious stretch and delete the file before opening it can save you from the virus infection.
To view file name extensions in all your directory lists, on the Windows XP desktop, click the Start button for control panels; Scan the check box to hide extensions of known file types. Click on the "OK" app. System files will remain hidden, but you will be able to see accessories for all files you need to care about. Viruses often live on files with these extensions - .vbs, .shs, .pif and .ink - and are almost legitimately not used for attachments.
Solution 6: Disable extension.shs
One dangerous extension that you can easily disable is .shs. Windows will not recognize it and will alert you before trying to open .shs. The extension is usually used only for scrap object files created in Word and Excell when the text is highlighted and pulled to the desktop to paste into other documents. If this is not something you do at all, or you have Word and Excell 2000 or later, allowing you to get 12 items on the clipboard, click the Start Button tab. Under the registered file types, scroll down and highlight the SHS stretch. Click Delete "Yes" App.
Solution 7: Handle double extensions
When you run your plugins in Windows, you will be able to detect viruses that return themselves to innocent-looking files with a double extension, such as happybirthday.doc.exe. Never trust a double extension file - it goes against nature.
Solution 8: Beware of unknown files.
The virus is a program that must be implemented to do its dirty work, so it may have an extension .exe. Unfortunately, this is the same extension that legitimate software files use. So, don't panic if you find files called Word.exe or Excel.exe on your system - it's your Microsoft software. Just don't open any file with an exe extension if you don't know the purpose of the file.
Solution 9: Watch out for icons
Viruses in annex files are known to take the form of icons with a familiar appearance of text or photo files, such as the wolf in the hen house. If you give an unexpected attachment, don't open it without running it first through your antivirus software.
Solution 10: Don't come down from general newsgroups
What is the best place for the infiltrator to lurk and stick the virus more than in the crowd? Sooner or later, someone is obliged to download it and release the virus. Do not download files and software from newsgroups, billboards, or open attachments sent from strangers in chat rooms ("Let's exchange photos!") Without first scanning your antivirus software.
Solution 11: Avoid bootleg software
This may sound like a no-brainer, but sometimes this small price on a package may be common but expensive too good to resist. Resist that! Similarly, be careful about accepting app programs from others. You don't know where it was, and what might have started as a perfectly clean package can become infected during installation on another infected person's computer.
Solution 12: Macro protection in MS Word, Excel, and Powerpoint
A common type of virus uses macro. Macros are sets of stored commands that users can provide as shortcuts to perform long functions in a few keystrokes. The macro virus may lead to such harm as changing file types from text files or spreadsheets to templates, locking keyboards, and deleting files. Word, Excel, and PowerPoint come with total virus protection. To make sure your apps are activated, open each app, and then click on the tools list. On the security level tab, make sure you choose Medium or High. Click OK. if you already have a macro virus, you may find that the steps of this procedure are not available because the virus has disabled them. In this case, get tested for the virus on your system to see if your antivirus software can kill the virus.
Solution 13: Use passwords
If you share your computer, it is good to set a password for everyone. Passwords should be a combination of characters and numbers that are at least eight characters long, preferably nonsensical. Never write passwords and stick them anywhere near a computer. To set passwords in Windows XP, click the Start button; the control panel; and the user's accounts. Follow the claims to set/change passwords.
Solution 14: Update the application software
Microsoft consistently issues security gap patches in its operating system and application software. However, don't calm down from complacency if you have Windows Update to automatically check things for you. Update patch checks to fix errors in the operating system, not for security problems.
For the latest vulnerabilities (as Microsoft calls it), visit www.microsoft.com and find hot holes for all your Microsoft software, especially Outlook and Outlook Express.
Microsoft also has a free downloadable package called Microsoft Baseline Security Analyzer (MBSA) that scans your system for missing hot holes. Works with Windows 2000 and XP Home and Professional only. It does not support Windows 95, 98, or ME.
To download MBSA, go to the TechNet section of Microsoft's website. Be careful that the information is written in the language of the technology, so you may find it daunting.
Last words:
Now that you know some ways to avoid viruses and deal with them, let's wrap things up with some solutions that you might have heard before but ignored.
- Back up your files regularly - if the virus breaks down, you'll feel much better if you have backups of all your important files. Back up on modes separate from your computers, such as CDs, or DVD. Scan for viruses before placing them away to make sure they are not infected. If it is, it will not benefit if you have to use it because it will transmit the virus back to your computer.
- Make a shoe disk - Create an emergency box disk before you have a problem so you can run your computer after a serious security problem to make the car box disk with Windows XP, and put an empty flexible disk in the drive. Open my computer, then click on the flexible drive. Click on the format. Within the formatting options, click Create MS-DOS Starter Disk. Click Start. Keep the disk in a safe place. With luck, you will never need to use it.
- Turn off the computer - DSL connections and cable "always on" may be convenient, but you should always turn off your computer when it is not in use. Hackers can't access a powered machine.