![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Virus Prevention 101
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar? Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse. For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. Worms reside in active memory, are self replicating, and usually use native operating system components to do so. Trojans are programs in which malicious or harmful code is contained inside apparently harmless programming or data. Viruses are pieces of programming code that cause some unexpected and usually undesirable event. All of them can really ruin your day. Everyone who uses a computer can catch a virus. Borrowing disks, swapping floppies, moving data from one machine to another, sending and receiving e-mail, the list goes on. If you use the Internet, your chances increase, even if you use a dial-up modem. Some viruses can be caught just by visiting infected websites. There are over 50,000 active viruses today. But on any given day, only a few hundred viruses pose a serious threat to your computer. Some of the most destructive--Melissa, Love Letter, and more recent Blaster--caused millions of dollars in damage. Many systems and networks never completely recover from a virus attack. Though a virus protection program is imperative to your computer's health, it does not in any way ensure your safety. To be effective antivirus programs require proper setup and frequent updates. Newer applications have built in updaters and if installed properly require almost mo maintenance. However, older programs required user interaction to get the latest definitions. In a corporate environment, a system can be installed in which the users have no dealings with the antivirus application at all. All monitoring is done by the network administrator and on the server level. A primary server with groups and group leaders can be defined during setup. Specific systems are assigned to groups usually based on their physical location. The primary server automatically gets its updates from the antivirus vendor. The group leaders then get their updates from the primary server and distribute them to all the members on a daily basis. The network administrator monitors one system that can control the scanning, updating and managing for the entire network. How can you stay protected? 1. Install anti-virus software and keep the virus definitions up to date. 2. Don't automatically open attachments and make sure your email program doesn't do so automatically. 3. Scan all e-mail attachments. 4. Configure your anti-virus software to boot automatically on start-up and run at all times. 5. Avoid downloading files you can't be sure are safe. This includes freeware, screensavers, games, and any other executable program. 6. Don't use floppies, but if you must, scan them before using them. 7. Educate yourself and your users to learn how to spot viruses. All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com. Greg Richburg a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. for wed design adn hosting, and KlickCommerce for Internet Marketing Strategies. Please visit http://www.klickcommerce.com/.
MORE RESOURCES: Tallahassee hospital IT security 'event' has signs of ransomware attack Tallahassee Democrat Gazprom security outfit raises concern of new Russia mercenary army Business Insider Pink Floyd’s Roger Waters Addresses U.N. Security Council About Russian Invasion of Ukraine Pitchfork Indonesian security forces search for NZ pilot taken hostage The Associated Press - en Español DoD and Danish Ministry of Defence Sign Security of Supply ... Department of Defense Ukraine: Meeting under the “Threats to International Peace and ... Security Council Report false The Hill Water security is a national security issue. Here's why World Economic Forum Security Think Tank: Poor training is worse than no training at all ComputerWeekly.com The Worldwide Cyber Security Consulting Services Industry is Anticipated to Reach $8.614 Billion in 2027 Yahoo Finance Drug distributor AmerisourceBergen confirms security breach BleepingComputer Remarks at a UN Security Council Briefing called by Russia on ... United States Mission to the United Nations Minerals Security Partnership Governments Engage with African ... Department of State River Cree Resort and Casino updates security with Genetec Security Magazine Joint Statement following a UN Security Council meeting on Syria ... United States Mission to the United Nations Estonian Intelligence Service Warns Of 'Security Risks' From Russia Radio Free Europe / Radio Liberty Metro Partnering With DC Police to Enhance Security NBC4 Washington Coal emissions must fall, but energy security is vital World Economic Forum CEO Of Security Company Sentenced To Five Years In Prison For ... Department of Justice Biden Administration Announces Additional Security Assistance for ... Department of Defense New FTX CEO says security so bad execs could have stolen $500M Business Insider Central American Security Conference (CENTSEC) 2023 U.S. Southern Command President Biden Announces Appointments to the President’s ... The White House Security Beefed Up At Fulton County Courthouse InkFreeNews.com U.S. is training Haiti police to combat gangs, but that’s not its only security worry - Miami Herald Memphis Police Chief Trained With Israel Security Forces The Intercept Analysis | Republicans Are Too Thirsty for Social Security Cuts The Washington Post DHS Announces Process Enhancements for Supporting Labor ... Homeland Security Application Security Must Be Nonnegotiable Dark Reading Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post Identity Thieves Bypassed Experian Security to View Credit Reports ... Krebs on Security |
![]() |
![]() |
![]() |
RELATED ARTICLES
HackAttack P C. owners are constantly at risk from attacks by hackers. If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. Phishing: An Interesting Twist On A Common Scam After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. Watch Out For That Scam The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003. Phishing: A Scary Way of Life The Federal Bureau of Investigation has identified "phishing" as the "hottest and most troubling new scam on the Internet."What is Phishing?Phishing is a scam initiated via e-mail. Spyware, What It Is, What It Does, And How To Stop It Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. Password Security and Safety There is nothing more important that password security in world of technology. It is the first step to creating a safe and secure environment. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. Protecting Your Children On The Internet If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. Check Out That Privacy Policy Before you enter your name, address or any other data in that form, STOP! Wait. Don't enter anything yet. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Website Security - Creating a Bulletproof Site in 5 Easy Steps When it comes to a secure website and passwords it is all in your hands to create a password that a hacker simply cannot crack. However, this will require that you be creative and use everything at your fingertips to create the strongest password possible for a secure web site. ![]() |
home | site map |
© 2006 |