SPONSOR By X10TV.com

Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

  HOMEPAGE

 

 

DIRECTORY CATEGORIES

X10tv Main Category
Articles
eBooks
YouTube
Stories Book
Movies & TV Series
Music

Articles Part 1
1-Automotive
2-Business Articles
3-Business_Articles/
4-Cars
5-Children_Articles
6-Communications_Articles
7=Computers_Articles
8-Debt_Website
9-Education_Articles
10-Family_Articles
11-Fashion_Articles
12-Finance_Articles
13-Food_Articles
14-Health_Articles
15-HomeImprovement_Articles
16-Legal_Articles
17-Loans_Website
18-Reference Articles

Articles Collection Part 2

19-accounting
20-acne
21-adsense
22-advertising
23-aerobics
24-affiliate
25-alternative
26-articles
27-attraction
28-audio-streaming
29auto-care
30-auto-parts
31-autoresponder
32-aviation
33-babies-toddler
34-baby
35-bankruptcy
36-bathroom
37-beauty
38-bedroom
39-blogging
40-body-building
41-book-marketing
42-book-review
43-branding
44-breast-cancer
45-broadband-internet
46-business
47-business-loan
48-business-plan
49-cancer
50-car-buying
car-51-insurance
52-car-loan
53-car-maintenance
54-career
55-cars
56-casino
57-cell-phone
58-chat
59-christmas
60-claims
61-coaching
62-coffee
63-college-university
64-computer-pc-tips
65-cooking
66-cooking-tips
67-copywriting
68-cosmetics
69-craft
70-creative-writing
71-credit
72-credit-cards
73-credit-repair
74-currency-trading
75-data-recovery
76-dating
77-debt-relief
78-diabetics
79-diet
80-digital-camera
81=diving
82-divorce
83-domain
84-driving-tips
85-ebay
86-ebook
87-ecommerce
88-email-marketing
89-emarketing
90-essay
91-ezine
92-fashion
93-finance
94-fishing
95-fitness
96-flu
97-furniture
98-gambling
99-gardening
100-golf
101-google
102-gps
103-hair
104-hair-loss
105-hdtv
106-health-insurance
107-heart-disease
108-hobbies
109-holiday
110-home-business
111-home-improvement
112-home-organization
113-interior-design
114-internet-tips
115-investment
116-jewelry
117-kitchen
118-ladies-accessories
119-lawyer
120-lcd-plasma
121-legal
122-life-insurance
123-lingerie
124-love
125-mailing-list
126-make-money
127-mortgage
128-mp3
129-music
130-network-marketing
131-online-shopping
132-paid-survey
133-pc-games
134-perfume
135-personal-injury
136-ppc
137-pregnancy
138-publishing
139-real-estate
140-recipe
141-recreation
142-relationship
143-resume
144-romance
145-rss
146-sales-letter
147-self-employment
148-seo
149-shoes
150-small-business
151-smoking
152-software
153-spam-blocking
154-sports
155-spyware
156-stress
157-trading
158-travel
159-vacation
160-video-conferencing
161-video-streaming
162-virus
163-voip
164-web-hosting
165-website-traffic
166-wedding
167-weight
168-wine
169-women
170-writng-tips

Articles Collection Part 3

171-+BONUS-ARTICLES
172-/ 25 Home Business PLR Articles
173- / 25DatingRelationshipsPLRArticles0613
174- / 25InternetMarketingPLRArticles
175-Affiliate-Marketers
176-After School Activities
177-Articles-Marketing
178-Baby
179-Blogging
180-Car-Rental
181-Car-Stereo
182-Cell-Phone
183-Coin Collecting
184-Credit Card
185-Depression
186-Diamonds
187-Diet PLR Articles
188-Digital-Camera
189-eZine Marketing
190-Family Budget
191-Fishing
192-Gardening
193-Golf
194-Google Sense
195-Home Schooling
196-Home-Theater
197-Job Search
198-Making Money With Articles
199-monsterplr15000articles
200-New-York
201-Newport Beach
202-Opt-In-List
203-Paint Ball
204-Podcasting
205-San Diego
206-Scotch
207-Ski vacations
208-Collectibles Sports Car
209-Web Design
210-Web-Traffic


Articles Collection Part 4
211-Adsense
212-Advertising
213-Affiliate Marketing
214-Affiliate Marketing On The Internet
215-Affiliate Success
216-Affiliate-Marketers
217-After School Activities
218-Air Purifiers
219-alternative energy
220-American History
221-Art Auctions
222-Articles-Marketing
223-Articles250
224-artmarketing
225-AspenNightlife
226-Astronomy
227-Atkins Diet
228-ATV
229-autism_articles
230-Auto Navigation Systems
231-Auto Responders
232-Auto sound systems
233-Auto-Leasing
234-Autoresponders
235-Baby
236-Backyard Activities
237-Bargain Hunting
238-Bathroom Remodeling
239-BBQs
240-Beach Vacations
241-Beach-Vacations
242-Beauty
243-biography
244-Black History
245-Blog Marketing
246-Blogging
247-Blogs
248-Bluetooth Technology
249-Breast Feeding
250-business
251-Buying A Boat
252-Buying Paintings
253-Candle Making
254-Car-Rental
255-Car-Stereo
256-Carpet
257-Cats
258-CD duplication
259-Cell-Phone
260-Choosing the Right Golf Clubs
261-Christmas Shopping
262-Cigars
263-Closet Organizers
264-Coin Collecting
265-College Scholarship
266-COMPUTER GAMES & SYSTEMS
267-COMPUTERS, LAPTOPS, SMARTPHONES
268-Contact Lenses
269-Cooking
270-copywriting
271-Craigslist
272-creating an online business
273-Credit Card
274-Credit Cards
275-criminology
276-Cruise Ships
277-Dance
278-Data Recovery
279-Dating Women
280-Decorating for Christmas
281-Dental Assistant
282-Depression
283-Diamonds
284-Diesel VS Gasoline vehicles
285-Diesel-VS-Gasoline-vehicles
286-Dieting
287-Digital-Camera
288-Disneyland
289-Dogs
290-eBay
291-Education
292-elliptical trainers
293-Email Marketing
294-entrepreneur
295-Excavation Equipment
296-Excavation-Equipment
297-Exercise
298-eZine Marketing
299-Family Budget
300-Fashion
301-finance_and_insurance
302-Fishing
303-Fitness
304-foods and bevarages
305-Forex
306-Formula D Racing
307-Fruit Trees
308-Fruit-Trees
309-Gambling
310-Garage Remodeling
311-Gardening
312-general
313-Golden Retriever
314-Golden-Retriever
315-Golf
316-Google Sense
317-googleadsense
318-Government
319-Health_Insurance_articles
320-Healthy Eating
321-High Definition Video Cameras
322-High-Definition-Video-Cameras
323-Hiking and Camping
324-Hobby Articles
325-Holiday Games & Activities
326-home and constructions
327-home decorating
328-Home Schooling
329-Home Security
330-Home Theater Systems
331-Home-Theater
332-Hunting
333-hypoallergenic dogs
334-International Airports
335-investing
336-Ipod Video
337-Ipod-Video
338-Jewelry-Wholesale
339-JewelryWhsl
340-Job Search
341-junior golf
342-Kitchen
343-Kitchen Remodeling
344-Koi
345-La Jolla California
346-La-Jolla-California
347-Las Vegas
348-Law
349-Law_order_crime
350-Making Money With Articles
351-Marketing
352-Marketing Your Business On The Internet
353-Martial Arts
354-medicines_and_healthcare
355-Membership Sites
356-Mexico Vacations
357-Microbrews
358-Mini Blinds or Wood Shutters
359-Mini-Blinds-or-Wood-Shutters
360-mobility scooters
361-Monograms
362-Motor Homes
363-Motorcycles and Scooters
364-Mountain Biking
365-Myspace
366-New Air Travel Rules
367-New Years Eve Party Planning
368-New York
369-Newport Beach
370-Niche Marketing
371-Nursing Assistant
372-Office Chairs
373-Online Shopping
374-OptInList
375-Outsourcing Ebooks and Software Jobs
376-Paint Ball
377-Personal Loans
378-pet health care
379-Pets
380-pH Miracle Diet
381-Photography
382-Podcasting
383-politics
384-Pool Accessories
385-Porsche
386-Power Tools
387-Pre-Paid Legal
388-Private Jet Charters
389-Private Label Resell Rights
390-Private Yacht Charters
391-Rawfood
392-RC Hobbies
393-Re-Financing
394-Real Estate
395-Reference
396-remote control helicopters
397-Renting A House Or Apartment
398-Retirement Planning
399-San Diego
400-SanFransisco
401-Satellite Radio
402-Satellite-Radio
403-Scotch
404-Seattle
405-Self Improvement Articles
406-Self-Help
407-Show Business
408-ski vacations
409-Skiing Locations
410-Skincare
411-SkVacations
412-Sleepingbaby
413-Snowboarding
414-Snowmobiling
415-Social Networking
416-Sports
417- collection Sports Car
418-St. Thomas Vacations
419-Summer Vacations
420-Supercross Racing
421-Superfoods
422-Surround Sound
423-Swimming Pools
424-Swimming-Pools
425-Tattoos
426-tech_gadgets
427-Tennis
428-Thanksgiving Party Articles
429-Theater Arts
430-Time-Share Investments
431-TootAche-ToothCare
432-Toothache and Tooth Care
433-Top Golfing Accessories
434-Tracking Software
435-Travel Tips To European Countries
436-UniversalStudioTours
437-Vacuum Cleaners
438-Vacuum-Cleaners
439-Valentines Day
440-Vegetarian
441-Video Sites
442-video streaming
443-Vitamins
444-Vitamins and Supplements
445-WAHM
446-Wart Removal
447-Web Design
448-Web-Traffic
449-webtraffic
450-Wedding Favors
451-Wedding Games & Activities
452-Weight Lloss
453-Weight Loss
454-Wine And Spirits
455-Womens Issues
456-yoga
457-YouTube

# Country
1 Afghanistan
2 Albania
3 Algeria
4 Andorra
5 Angola
6 Antigua and Barbuda
7 Argentina
8 Armenia
9 Australia
10 Austria
11 Azerbaijan
12 Bahamas
13 Bahrain
14 Bangladesh
15 Barbados
16 Belarus
17 Belgium
18 Belize
19 Benin
20 Bhutan
21 Bolivia
22 Bosnia and Herzegovina
23 Botswana
24 Brazil
25 Brunei
26 Bulgaria
27 Burkina Faso
28 Burundi
29 Côte d'Ivoire
30 Cabo Verde
31 Cambodia
32 Cameroon
33 Canada
34 Central African Republic
35 Chad
36 Chile
37 China
38 Colombia
39 Comoros
40 Congo (Congo-Brazzaville)
41 Costa Rica
42 Croatia
43 Cuba
44 Cyprus
45 Czechia (Czech Republic)
46 Democratic Republic of the Congo
47 Denmark
48 Djibouti
49 Dominica
50 Dominican Republic
51 Ecuador
52 Egypt
53 El Salvador
54 Equatorial Guinea
55 Eritrea
56 Estonia
57 Eswatini (fmr. "Swaziland")
58 Ethiopia
59 Fiji
60 Finland
61 France
62 Gabon
63 Gambia
64 Georgia
65 Germany
66 Ghana
67 Greece
68 Grenada
69 Guatemala
70 Guinea
71 Guinea-Bissau
72 Guyana
73 Haiti
74 Holy See
75 Honduras
76 Hungary
77 Iceland
78 India
79 Indonesia
80 Iran
81 Iraq
82 Ireland
83 Israel
84 Italy
85 Jamaica
86 Japan
87 Jordan
88 Kazakhstan
89 Kenya
90 Kiribati
91 Kuwait
92 Kyrgyzstan
93 Laos
94 Latvia
95 Lebanon
96 Lesotho
97 Liberia
98 Libya
99 Liechtenstein
100 Lithuania
101 Luxembourg
102 Madagascar
103 Malawi
104 Malaysia
105 Maldives
106 Mali
107 Malta
108 Marshall Islands
109 Mauritania
110 Mauritius
111 Mexico
112 Micronesia
113 Moldova
114 Monaco
115 Mongolia
116 Montenegro
117 Morocco
118 Mozambique
119 Myanmar (formerly Burma)
120 Namibia
121 Nauru
122 Nepal
123 Netherlands
124 New Zealand
125 Nicaragua
126 Niger
127 Nigeria
128 North Korea
129 North Macedonia
130 Norway
131 Oman
132 Pakistan
133 Palau
134 Palestine State
135 Panama
136 Papua New Guinea
137 Paraguay
138 Peru
139 Philippines
140 Poland
141 Portugal
142 Qatar
143 Romania
144 Russia
145 Rwanda
146 Saint Kitts and Nevis
147 Saint Lucia
148 Saint Vincent and the Grenadines
149 Samoa
150 San Marino
151 Sao Tome and Principe
152 Saudi Arabia
153 Senegal
154 Serbia
155 Seychelles
156 Sierra Leone
157 Singapore
158 Slovakia
159 Slovenia
160 Solomon Islands
161 Somalia
162 South Africa
163 South Korea
164 South Sudan
165 Spain
166 Sri Lanka
167 Sudan
168 Suriname
169 Sweden
170 Switzerland
171 Syria
172 Tajikistan
173 Tanzania
174 Thailand
175 Timor-Leste
176 Togo
177 Tonga
178 Trinidad and Tobago
179 Tunisia
180 Turkey
181 Turkmenistan
182 Tuvalu
183 Uganda
184 Ukraine
185 United Arab Emirates
186 United Kingdom
187 United States of America
188 Uruguay
189 Uzbekistan
190 Vanuatu
191 Venezuela
192 Vietnam
193 Yemen
194 Zambia
195 Zimbabwe

 
  Related Industry News


 

Recommended By MCT JV Bloggers


  Recommended By MCT JV Bloggers
 

International MCT JV Bloggers Sponsors Collection

International MCT JV Bloggers Sponsors Collection


This Static Spot is open for sponsor

Advertise Here




Informative Articles

Click Here To View Full Title Page

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
All About Computer Viruses
by: Kara Glover


Feel Free to reprint this article in newsletters and on websites, with resource box included. If you use this article, please send a brief message to let me know where it appeared: kara333@earthlink.net

Word Count = 1,500
Word Wrapped to 60 characters per line
URL: http://www.karathecomputertutor.com
Author photo: http://www.karathecomputertutor.com
Date of copyright: November 2004

All About Computer Viruses
by Kara Glover
kara333@earthlink.net

Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won’t seem to open.

You might have a virus.

Just what exactly is a virus? What kind is in your computer? How did it get there? How is it spreading and wreaking such havoc? And why is it bothering with your computer anyway?

Viruses are pieces of programming code that make copies of themselves, or replicate, inside your computer without asking your explicit written permission to do so. Forget getting your permission down on paper. Viruses don’t bother to seek your permission at all! Very invasive.

In comparison, there are pieces of code that might replicate inside your computer, say something your IT guy thinks you need. But the code spreads, perhaps throughout your office network, with your consent (or at least your IT guy’s consent). These types of replicating code are called agents, said Jimmy Kuo, a research fellow with McAfee AVERT, a research arm of anti-virus software-maker McAfee Inc.

In this article, though, we’re not talking about the good guys, or the agents. We’ll be talking about the bad guys, the viruses.

A long, long time ago in computer years, like five, most viruses were comprised of a similar breed. They entered your computer perhaps through an email attachment or a floppy disk (remember those?). Then they attached themselves to one of your files, say your Microsoft Word program.

When you opened your Microsoft Word program, the virus replicated and attached itself to other files. These could be other random files on your hard drive, the files furthest away from your Microsoft Word program, or other files, depending on how the virus writer wanted the virus to behave.

This virus code could contain hundreds or thousands of instructions. When it replicates it inserts those instructions, into the files it infects, said Carey Nachenberg, Chief Architect at Symantec Research Labs, an arm of anti-virus software-maker Symantec. Corp.

Because so many other types of viruses exist now, the kind just described is called a classic virus. Classic viruses still exist but they’re not quite as prevalent as they used to be. (Perhaps we could put classic viruses on the shelf with Hemingway and Dickens.)

These days, in the modern era, viruses are known to spread through vulnerabilities in web browsers, files shared over the internet, emails themselves, and computer networks.

As far as web browsers are concerned, Microsoft’s Internet Explorer takes most of the heat for spreading viruses because it’s used by more people for web surfing than any other browser.

Nevertheless, “Any web browser potentially has vulnerabilities,” Nachenberg said.

For instance, let’s say you go to a website in IE you have every reason to think is safe, Nachenberg said.

But unfortunately it isn’t. It has virus code hidden in its background that IE isn’t protecting you from. While you’re looking at the site, the virus is downloaded onto your computer, he said. That’s one way of catching a nasty virus.

During the past two years, another prevalent way to catch a virus has been through downloads computer users share with one another, mostly on music sharing sites, Kuo said. On Limewire or Kazaa, for instance, teenagers or other music enthusiasts might think they’re downloading that latest Justin Timberlake song, when in reality they’re downloading a virus straight into their computer. It’s easy for a virus writer to put a download with a virus on one of these sites because everyone’s sharing with everyone else anyway.

Here’s one you might not have thought of. If you use Outlook or Outlook Express to send and receive email, do you have a preview pane below your list of emails that shows the contents of the email you have highlighted? If so, you may be putting yourself at risk.

Some viruses, though a small percentage according to Nachenberg, are inserted straight into emails themselves.

Forget opening the attachment. All you have to do is view the email to potentially get a virus, Kuo added. For instance, have you ever opened or viewed an email that states it’s “loading”? Well, once everything is “loaded,” a virus in the email might just load onto your computer.

So if I were you, I’d click on View on the toolbar in your Outlook or Outlook Express and close the preview pane. (You have to click on View and then Layout in Outlook Express.)

On a network at work? You could get a virus that way. Worms are viruses that come into your computer via networks, Kuo said. They travel from machine to machine and, unlike, the classic viruses, they attack the machine itself rather than individual files.

Worms sit in your working memory, or RAM, Nachenberg said.

OK, so we’ve talked about how the viruses get into a computer. How do they cause so much damage once they’re there?

Let’s say you’ve caught a classic virus, one that replicates and attacks various files on your computer. Let’s go back to the example of the virus that initially infects your Microsoft Word program.

Well, it might eventually cause that program to crash, Nachenberg said. It also might cause damage to your computer as it looks for new targets to infect.
This process of infecting targets and looking for new ones could eventually use up your computer’s ability to function, he said.

Often the destruction a virus causes is pegged to a certain event or date and time, called a trigger. For instance, a virus could be programmed to lay dormant until January 28. When that date rolls around, though, it may be programmed to do something as innocuous but annoying as splash popups on your screen, or something as severe as reformat your computer’s hard drive, Nachenberg said.

There are other potential reasons, though, for a virus to cause your computer to be acting slow or in weird ways. And that leads us to a new segment – the reason virus writers would want to waste their time creating viruses in the first place.

The majority of viruses are still written by teenagers looking for some notoriety, Nachenberg said. But a growing segment of the virus-writing population has other intentions in mind.

For these other intentions, we first need to explain the “backdoor” concept.

The sole purpose of some viruses is to create a vulnerability in your computer. Once it creates this hole of sorts, or backdoor, it signals home to mama or dada virus writer (kind of like in E.T.). Once the virus writer receives the signal, they can use and abuse your computer to their own likings.

Trojans are sometimes used to open backdoors. In fact that is usually their sole purpose, Kuo said.

Trojans are pieces of code you might download onto your computer, say, from a newsgroup. As in the Trojan War they are named after, they are usually disguised as innocuous pieces of code. But Trojans aren’t considered viruses because they don’t replicate.

Now back to the real viruses. Let’s say we have Joe Shmo virus writer. He sends out a virus that ends up infecting a thousand machines. But he doesn’t want the feds on his case. So he instructs the viruses on the various machines to send their signals, not of course to his computer, but to a place that can’t be traced. Hotmail email happens to be an example of one such place, Kuo said.

OK, so the virus writers now control these computers. What will they use them for?
One use is to send spam. Once that backdoor is open, they bounce spam off of those computers and send it to other machines, Nachenberg said.

That’s right. Some spam you have in your email right now may have been originally sent to other innocent computers before it came to yours so that it could remain in disguise. If the authorities could track down the original senders of spam, they could crack down on spam itself. Spam senders don’t want that.

Ever heard of phishing emails? Those are the ones that purport to be from your internet service provider or bank. They typically request some information from you, like your credit card number. The problem is, they’re NOT from your internet service provider or your bank. They’re from evil people after your credit card number! Well, these emails are often sent the same way spam is sent, by sending them via innocent computers.

Of course makers of anti-virus software use a variety of methods to combat the onslaught of viruses. Norton, for instance, uses signature scanning, Nachenberg said.

Signature scanning is similar to the process of looking for DNA fingerprints, he said. Norton examines programming code to find what viruses are made of. It adds those bad instructions it finds to its large database of other bad code. Then it uses this vast database to seek out and match the code in it with similar code in your computer. When it finds such virus code, it lets you know!

©2004 by Kara Glover














About the author:
Kara Glover is a Computer Tutor and Troubleshooter.
You can find her articles and tutorials on topics such as
Microsoft Word®, Excel®, and PowerPoint® on her website: http://www.karathecomputertutor.com



Circulated by Article Emporium

 



©2005 - All Rights Reserved

This Static Spot is open for sponsor


All About Computer Virus

Read Articles:


 Traditional Antivirus Programs Useless Against ...

 How a computer virus works!

 Virus prevention and removal

 Eliminate computer viruses forever!

 Malware And Antivirus Software

 Advice about the most up-to-date advice with re...

 All About Computer Viruses

 9 Steps to Protect your MS Windows System from ...

 Keeping it Clean: Virus Removal Basics

 Why Do I Need Anti Virus Software For My Computer?

 Different Types of Computer Infection!

 Top 10 Ways To Protect Yourself From Computer V...

 Malware Quiz

 Computer-Virus Writer's: A Few Bats In The Belfry?

 Help Keep the Computers on Earth Clean and Healthy

 Does Your PC Have Worms?

 Is Your Computer Sick?

 Do The Media Spread Computer Viruses?

 Internet Security Basics 101

 Basic Steps To Optimize Your Internet Security

 The never ending Spyware……story

 Alien Intruders!

 Protection for your computer system - Painless ...

 How To Take Care Of Your Laptop Computer

 3 Summer Computer Tips

 How to thwart the Barbarian Spyware!

 More Free Tools Increase Security For Your PC

 Internet Scams 102 -- Hijackings and Spyware

 Tips For Safer Computing Online

 How to Avoid Getting Ripped-Off Online

More Article Pages 1 - 2 - 3

 

Top 10 Ways To Protect Yourself From Computer Viruses
 by: Jim Faller

As more and more people are becoming comfortable using their computers at school, home or in the office it’s only a matter of time before they encounter a computer virus. Here are our top 10 steps to protect you from computer viruses.

Use a high quality anti-virus program. There are many different anti-virus computers programs on the market some of them are better than others. Look to reputable computer magazines or websites for ratings to help you find the one that matches your needs.

Always use your anti-virus software. Make sure your anti-virus software is always turned on and scanning, incoming and outgoing email messages, and any software programs you run.

Keep your antivirus programs up to date. Most programs come with a yearly subscription make sure you take advantage of the updates. More advanced programs allow you to schedule updates or full system scans for “off hours” like 2AM when you aren’t likely to be using your computer.

Keep your computer up to date. From time to time operating systems fall victim to security holes or issue updates. Make sure you check periodically to make sure you are running stable up to date versions of your software.

Backup your data regularly. Most windows computer users keep their documents in the “My documents” folder. This makes it easy to back up all of your important documents. Make weekly or monthly copies to CD or USB drives.

If you use floppy disks or USB drives on public computers like your school computer lab, Kinko’s, or even digital photo printing store make sure you scan them for viruses. Public computers are notorious for not being up to date and properly protected.

Be wary of email attachments. Treat any email attachment as potentially dangerous. Never open attachments from people you weren’t expecting. Also be careful of attachments from people you know but weren’t expecting. Many computer viruses replicate themselves by reading the contacts from an infected computer.

Use text email if possible. While HTML email is prettier and allows you more control over formatting it also can carry computer viruses. If you use text based email the only way to get a virus is by opening an attachment.

Use downloaded freeware and shareware files or software with caution. Try to download them from popular reputable sources that scan the programs before they are uploaded. To make sure you are safe scan the program before you install it on your computer.

Be wary of links in IM or instant messaging software. Don’t accept invitations from people you don’t know and never click a link from someone you don’t trust, they can easily redirect you to another website that will try to install a virus on your computer system.

© Computers.6ln.com, All Rights Reserved.



©2005 - All Rights Reserved





Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

Total Views stat / Page Views stat

Advertise Here

web page counter Copyright 2024. All Rights Reserved.
\n