Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?
Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.
For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses.
Worms reside in active memory, are self replicating, and usually use native operating system components to do so. Trojans are programs in which malicious or harmful code is contained inside apparently harmless programming or data. Viruses are pieces of programming code that cause some unexpected and usually undesirable event. All of them can really ruin your day.
Everyone who uses a computer can catch a virus. Borrowing disks, swapping floppies, moving data from one machine to another, sending and receiving e-mail, the list goes on. If you use the Internet, your chances increase, even if you use a dial-up modem. Some viruses can be caught just by visiting infected websites.
There are over 50,000 active viruses today. But on any given day, only a few hundred viruses pose a serious threat to your computer. Some of the most destructive--Melissa, Love Letter, and more recent Blaster--caused millions of dollars in damage.
Many systems and networks never completely recover from a virus attack. Though a virus protection program is imperative to your computer's health, it does not in any way ensure your safety.
To be effective antivirus programs require proper setup and frequent updates. Newer applications have built in updaters and if installed properly require almost mo maintenance. However, older programs required user interaction to get the latest definitions.
In a corporate environment, a system can be installed in which the users have no dealings with the antivirus application at all. All monitoring is done by the network administrator and on the server level.
A primary server with groups and group leaders can be defined during setup. Specific systems are assigned to groups usually based on their physical location. The primary server automatically gets its updates from the antivirus vendor. The group leaders then get their updates from the primary server and distribute them to all the members on a daily basis. The network administrator monitors one system that can control the scanning, updating and managing for the entire network.
How can you stay protected?
1. Install anti-virus software and keep the virus definitions up to date.
2. Don't automatically open attachments and make sure your email program doesn't do so automatically.
3. Scan all e-mail attachments.
4. Configure your anti-virus software to boot automatically on start-up and run at all times.
5. Avoid downloading files you can't be sure are safe. This includes freeware, screensavers, games, and any other executable program.
6. Don't use floppies, but if you must, scan them before using them.
7. Educate yourself and your users to learn how to spot viruses.
All past articles written by Greg Richburg are available at http://www.netricks.com/news. Please address article suggestions to: info@netricks.com. Greg Richburg a Microsoft Certified Systems Engineer and the owner of Netricks, Inc. for wed design adn hosting, and KlickCommerce for Internet Marketing Strategies. Please visit http://www.klickcommerce.com/.
![]() |
|
![]() |
|
![]() |
|
![]() |
Identity Theft and Your Personal Information Identity theft is... Read More
Spyware is software that runs on a personal computer without... Read More
Having a good Spyware eliminator on your computer is vital... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
As more people are logging onto the Internet everyday, Network... Read More
While clicking from site to site on the internet you... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
You'd better learn news from media, not from emails, security... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Shopping for horse gifts or other gift items on the... Read More
Since its birth, the Internet has grown and expanded to... Read More
A couple of years back, I paid my dues the... Read More
In recent days, I was one of the unfortunate persons... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Have you ever got an email asking you to confirm... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
If you are a parent, you have probably wondered at... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
When it comes to a secure website and passwords it... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
With the advent of the World Wide Web, a whole... Read More
Many of us have run into an annoying and time-consuming... Read More
Do you really have to know how feeds work? Not... Read More
Despite the current wave of identity theft and corporate security... Read More
Have been an Internet user for more than 9 years,... Read More
Before you enter your name, address or any other data... Read More
We all get the odd virus now and then, but... Read More
Phishing is the act of some individual sending an email... Read More
You've seen it in the news - 40 million credit... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
In the past I've never really paid much attention to... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
So called phishers try to catch the information about the... Read More
Identity theft is one of the most common criminal acts... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Many of us have run into an annoying and time-consuming... Read More
Computer infections can be broken up into 4 main categories... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
When we think of adware, what comes to mind are... Read More
Spyware is software or hardware installed on a computer without... Read More
There you are busily typing away on your PC or... Read More
Have you ever bought a product or service from the... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Since its birth, the Internet has grown and expanded to... Read More
You've seen it in the news - 40 million credit... Read More
Imagine this ? you open up your email box and... Read More
The top five online scams on the Internet hit nearly... Read More
The words Corporate Security may conjure up images of a... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Business on the internet is getting down right shameless. This... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Spyware and adware are becoming major problems for online surfers... Read More
It's late. You've been scouring the web for that perfect... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
If you are a parent, as am I, I think... Read More
Ok, ok, I know you've seen them. All those pop... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
The first thing people think about when defending their computers... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Internet Security |