Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?

Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.

For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses.

Worms reside in active memory, are self replicating, and usually use native operating system components to do so. Trojans are programs in which malicious or harmful code is contained inside apparently harmless programming or data. Viruses are pieces of programming code that cause some unexpected and usually undesirable event. All of them can really ruin your day.

Everyone who uses a computer can catch a virus. Borrowing disks, swapping floppies, moving data from one machine to another, sending and receiving e-mail, the list goes on. If you use the Internet, your chances increase, even if you use a dial-up modem. Some viruses can be caught just by visiting infected websites.

There are over 50,000 active viruses today. But on any given day, only a few hundred viruses pose a serious threat to your computer. Some of the most destructive--Melissa, Love Letter, and more recent Blaster--caused millions of dollars in damage.

Many systems and networks never completely recover from a virus attack. Though a virus protection program is imperative to your computer's health, it does not in any way ensure your safety.

To be effective antivirus programs require proper setup and frequent updates. Newer applications have built in updaters and if installed properly require almost mo maintenance. However, older programs required user interaction to get the latest definitions.

In a corporate environment, a system can be installed in which the users have no dealings with the antivirus application at all. All monitoring is done by the network administrator and on the server level.

A primary server with groups and group leaders can be defined during setup. Specific systems are assigned to groups usually based on their physical location. The primary server automatically gets its updates from the antivirus vendor. The group leaders then get their updates from the primary server and distribute them to all the members on a daily basis. The network administrator monitors one system that can control the scanning, updating and managing for the entire network.

How can you stay protected?

1. Install anti-virus software and keep the virus definitions up to date.

2. Don't automatically open attachments and make sure your email program doesn't do so automatically.

3. Scan all e-mail attachments.

4. Configure your anti-virus software to boot automatically on start-up and run at all times.

5. Avoid downloading files you can't be sure are safe. This includes freeware, screensavers, games, and any other executable program.

6. Don't use floppies, but if you must, scan them before using them.

7. Educate yourself and your users to learn how to spot viruses.

All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com. Greg Richburg a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. for wed design adn hosting, and KlickCommerce for Internet Marketing Strategies. Please visit http://www.klickcommerce.com/.

In The News:


pen paper and inkwell


cat break through


Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

Cybercriminals Trick: Targeted Trojan-Containing Emails

Threats we ordinary Web users face online leave us no... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More