Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?
Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.
For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses.
Worms reside in active memory, are self replicating, and usually use native operating system components to do so. Trojans are programs in which malicious or harmful code is contained inside apparently harmless programming or data. Viruses are pieces of programming code that cause some unexpected and usually undesirable event. All of them can really ruin your day.
Everyone who uses a computer can catch a virus. Borrowing disks, swapping floppies, moving data from one machine to another, sending and receiving e-mail, the list goes on. If you use the Internet, your chances increase, even if you use a dial-up modem. Some viruses can be caught just by visiting infected websites.
There are over 50,000 active viruses today. But on any given day, only a few hundred viruses pose a serious threat to your computer. Some of the most destructive--Melissa, Love Letter, and more recent Blaster--caused millions of dollars in damage.
Many systems and networks never completely recover from a virus attack. Though a virus protection program is imperative to your computer's health, it does not in any way ensure your safety.
To be effective antivirus programs require proper setup and frequent updates. Newer applications have built in updaters and if installed properly require almost mo maintenance. However, older programs required user interaction to get the latest definitions.
In a corporate environment, a system can be installed in which the users have no dealings with the antivirus application at all. All monitoring is done by the network administrator and on the server level.
A primary server with groups and group leaders can be defined during setup. Specific systems are assigned to groups usually based on their physical location. The primary server automatically gets its updates from the antivirus vendor. The group leaders then get their updates from the primary server and distribute them to all the members on a daily basis. The network administrator monitors one system that can control the scanning, updating and managing for the entire network.
How can you stay protected?
1. Install anti-virus software and keep the virus definitions up to date.
2. Don't automatically open attachments and make sure your email program doesn't do so automatically.
3. Scan all e-mail attachments.
4. Configure your anti-virus software to boot automatically on start-up and run at all times.
5. Avoid downloading files you can't be sure are safe. This includes freeware, screensavers, games, and any other executable program.
6. Don't use floppies, but if you must, scan them before using them.
7. Educate yourself and your users to learn how to spot viruses.
All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com. Greg Richburg a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. for wed design adn hosting, and KlickCommerce for Internet Marketing Strategies. Please visit http://www.klickcommerce.com/.
First of all we need to get some terms stated.... Read More
Phishing is a relatively new form of online fraud that... Read More
Fishing on the Internet has come a long way. However,... Read More
A week or so ago, I received an inquiry from... Read More
Computer infections can be broken up into 4 main categories... Read More
This is the second in a series of articles highlighting... Read More
Before we start, I want to make it clear that... Read More
There are folks out there who use their powers for... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Have you ever bought a product or service from the... Read More
P C. owners are constantly at risk from attacks by... Read More
While clicking from site to site on the internet you... Read More
Microsoft routinely releases new security updates, many of which are... Read More
This is the second in a series of articles highlighting... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
In the past I've never really paid much attention to... Read More
At this point, if you've got the whole "turning the... Read More
As the number of people using the Internet as an... Read More
There is nothing more important that password security in world... Read More
Before you enter your name, address or any other data... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
First, let's do a little recap'. As I stated in... Read More
Today the internet is a mine field of malicious code... Read More
First I would like to stress I am condoning the... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Threats we ordinary Web users face online leave us no... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Let us take the example of scrambling an egg. First,... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
The Message Must Get Through The year is 300A.D.,... Read More
It has been said that with the wealth of information,... Read More
A few nights ago I received an email from "2CO"... Read More
Can you protect your computer from all possible viruses and... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
You've seen it in the news - 40 million credit... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Watching how the traditional media covers the latest virus or... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Despite the current wave of identity theft and corporate security... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Today the internet is a mine field of malicious code... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
First the basic definition of Spyware: It is a type... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
The average computer is packed with hidden software that can... Read More
Many of us have run into an annoying and time-consuming... Read More
Imagine my surprise when I received a phone call from... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
As more people are logging onto the Internet everyday, Network... Read More
Imagine this ? you open up your email box and... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
If spyware were a person and he set himself up... Read More
Sooner or later everyone with an email account will receive... Read More
Viruses are, however, not the only malicious software programs out... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
If you constantly deal with bank or electronic accounts, it... Read More
First I would like to stress I am condoning the... Read More
Since its birth, the Internet has grown and expanded to... Read More
In today's times spyware is a very serious issue and... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
First off I should explain what phishing is. Phishing is... Read More
Internet Security |