![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Viruses and Worms: The Problems and Their Solutions
History and Background The virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Bugs and glitches could cause damage unintentionally, but a virus created havoc intentionally, and therefore often caused much more damage then just glitches in software. Technically a virus must be in a host file and spread manually by people, versus a worm which spreads by an automated process and doesn't require a host file, but we will include worms as part of the term virus. Therefore, the threat of viruses quickly multiplied expotentially. One computer infected by a virus is manageable, but a virus spreading uncontrollably and automatically can cause damage to sometimes entire populations. And with the introduction of the Internet, billions of computers worldwide could be accessed with a click of a button. These abilities are what made the virus probably the greatest security to personal computers in the 21st Century. What kind of damage will it inflict? Since up to 100 new viruses are discovered every minute by anti-virus industries worldwide, the damage they inflict varies considerably. Some will display an annoying popup. Some will swap your mouse buttons. Some will uninstall Internet Explorer. Some will delete all your personal files. And some, though rare, will slow down your computer fan to the point that your computer processor starts smoking. All have 1 thing in common - they reduce your productivity in some way and they inhibit you from comfortably using your PC. Therefore you must take several precautions to insure you do not to become infected with viruses. With just a few simple security measures, the chances of getting infected with a virus can be cut down by over 90%. Security Measures The most important step - Be careful of everything you do on the Internet! It is extremely rare for a computer to get infected by a virus if you only download and browse trustworthy sites and emails. If an email has an attachment and looks suspicious it is very likey to be a virus. If a site is providing illegal or inappropiate content, it should be considered a risk. These are basic rules of safe browsing of the Internet and unfortunately, most people only learn these rules after a disaster. Don't learn from experience! Don't let it happen in the first place. Keep your system up-to-date. Nearly every major virus threat to operating systems are patched soon after discovery. Visit your operating system update website often, which is www.windowsupdate.com for Windows users. Get a reliable antivirus solution. The most common is Norton Antivirus, but I personally do not like its unreliability and incompatibility with many PCs. On the otherhand, it is probably the most user friendly antivirus solution on the market, and is probably best for PC beginners. If you're looking for a free yet extremely reliable and easy-to-use antivirus solution, Avast may be your answer. I am currently running Avast and am very happy with it. I previously tried Norton Antivirus, Norton Client Security, NOD32 Antivirus and McAfee Antivirus, but each had their own individual problems and so I had to constantly change antivirus software until I finally reached Avast. Some people go overboard and install many other security measures but I don't recommend this. These measures only hog resources, confuse users and cause conflicts with other software. Some of this software includes firewalls, memory explorers and file protection. References www.wikipedia.org us.mafee.com www.netmom.com www.pcworld.com Links Avast Antivirus - www.avast.com Soroush King is a certified programmer, adept in VB, C++, Delphi, as well as web developer and scripter, having considerable knowledge of both PHP and Perl. He also owns and manages several professional websites. This article was originally published at http://www.articlesandtools.com/adware.php For more information on computer security visit http://www.articlesandtools.com. If you would like to use this article anywhere else, please just notify me by sending an email to kingofkings@gmail.com (you don't have to wait for a response, as this is just a notification, not permission). Please refer on the page that the author of the article was I, Soroush King, and also please note that the article was originally published at http://www.articlesandtools.com/adware.php by providing a link.
MORE RESOURCES: Daily Briefing Jan. 29: Friday night terror attack tests national security minister The Times of Israel Paul Pelosi attack: Security camera video shows break-in by David DePape CBS San Francisco Security forces seal home of terrorist who carried out deadly Jerusalem attack - The Times of Israel Security forces seal home of terrorist who carried out deadly Jerusalem attack The Times of Israel RTD installs new security cameras at Table Mesa Park-N-Ride garage in Boulder Denver 7 Colorado News What is TikTok’s cyber-security ‘Project Texas’? Does it have anything to do with Texas? KXAN.com Security cabinet decides to 'strengthen settlements,' seal off terrorist's home The Times of Israel Security cabinet decides to ‘strengthen settlements’ after Jerusalem terror attack The Times of Israel Data Privacy Day: The Importance of Managing Your Data Security Posture | Eureka Security Security Boulevard The Basics of Cloud Security For SMBs: Zero Trust, CNAAP, and More Small Business Trends Food Security: Strengthening Africa's food systems Brookings Institution U.S. Seeks Security Council Allies Against Russia The Wall Street Journal Biden Administration Announces Additional Security Assistance for ... Department of Defense Assistant Attorney General for National Security Matthew G. Olsen ... Department of Justice Playa Del Carmen Adding More Security Cameras To Keep ... The Cancun Sun ImagineIF trustees hold special meeting on library security concerns Daily Inter Lake Unlawful Southwest Border Crossings Plummet Under New Border ... Homeland Security Denver cybersecurity expert calls proposed TikTok ban security theater Denver 7 Colorado News Affidavit: Suspect pulled out gun on security guard at Ojos Locos Laredo Morning Times Nationwide Data Leaks Raise Security Concerns New Bloom Magazine Russia's major offensive planned by one-year anniversary of invasion, top security official warns Fox News Security policy reduces homicides rate in El Salvador Prensa Latina USENIX Security ’22 – Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu L... Security Boulevard Scam Alert | NEWS | DIVISION OF PUBLIC SAFETY & SECURITY University of Michigan Iran Official Says Recent Protests Posed 'Serious Security Challenge' ایران اینترنشنال Maryville University designated as a National Center of Academic ... Maryville University News Digest of Recent Articles on Just Security (Jan. 21-27) Just Security Scottsdale business rethinking security after fourth Molotov cocktail incident this month Arizona's Family PA doubles down on decision to end security coordination The Jerusalem Post New Orleans walking krewes struggle to afford carnival security FOX 8 Local First Cleveland Heights HS updates security policy after 50-student brawl at basketball game WJW FOX 8 News Cleveland How Schools Have Boosted Security as Shootings Become More Common The New York Times Texas congressman says both parties grandstand on border security YakTriNews KAPP-KVEW DHS Announces Process Enhancements for Supporting Labor ... Homeland Security More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense At Marine Raiders' homicide trial, questions center on security video Marine Corps Times Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security IDF gives all-clear to West Bank settlement after suspected attack attempt The Times of Israel 20 Careers You Can Get with a Homeland Security Degree | Keiser Keiser University API Security Is the New Black Dark Reading Remarks by President Biden on Border Security and Enforcement The White House Microsoft ends Windows 7 security updates TechCrunch Identity Thieves Bypassed Experian Security to View Credit Reports ... Krebs on Security Russia's Lavrov Pledges Security Training to Eswatini The Moscow Times Microsoft ends Windows 7 extended security updates on Tuesday BleepingComputer Poland reviews security after divers found near key port The Associated Press - en Español PayPal accounts breached in large-scale credential stuffing attack BleepingComputer Verona area schools to beef up entrance security Channel3000.com - WISC-TV3 |
![]() |
![]() |
![]() |
RELATED ARTICLES
How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. 3 Steps to Ending Scams and Virus Problems Watching how the traditional media covers the latest virus or scam would make one think we are all innocent victims and it is the "evil Internet" at work once again. News flash! Innocent? More like uninformed. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. Is Adware - Spyware Putting Your Privacy at Risk Do you sometimes notice your computer running slower. Is your computer acting strange almost like its possessed? Well, it just may be plagued with Spyware. New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.I founded CPAsites. SCAMS - Be Aware - And Report When Necessary The Internet is a vast International Network of people and businesses - and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam - to take your dollars and run. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. Protection for Your PC - Painless and Free! Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. Internet Privacy Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. Top 10 tips for Safe Internet Shopping Over £5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. How To Avoid Hackers From Destroying Your Site? Recently, my site and other internet accounts ( http://www.nabaza. ![]() |
home | site map |
© 2006 |