History and Background
The virus was one of the first ever threats to computer security. It brought a whole new fear upon computer users. Bugs and glitches could cause damage unintentionally, but a virus created havoc intentionally, and therefore often caused much more damage then just glitches in software. Technically a virus must be in a host file and spread manually by people, versus a worm which spreads by an automated process and doesn't require a host file, but we will include worms as part of the term virus. Therefore, the threat of viruses quickly multiplied expotentially. One computer infected by a virus is manageable, but a virus spreading uncontrollably and automatically can cause damage to sometimes entire populations. And with the introduction of the Internet, billions of computers worldwide could be accessed with a click of a button. These abilities are what made the virus probably the greatest security to personal computers in the 21st Century.
What kind of damage will it inflict?
Since up to 100 new viruses are discovered every minute by anti-virus industries worldwide, the damage they inflict varies considerably. Some will display an annoying popup. Some will swap your mouse buttons. Some will uninstall Internet Explorer. Some will delete all your personal files. And some, though rare, will slow down your computer fan to the point that your computer processor starts smoking. All have 1 thing in common - they reduce your productivity in some way and they inhibit you from comfortably using your PC. Therefore you must take several precautions to insure you do not to become infected with viruses. With just a few simple security measures, the chances of getting infected with a virus can be cut down by over 90%.
Security Measures
The most important step - Be careful of everything you do on the Internet! It is extremely rare for a computer to get infected by a virus if you only download and browse trustworthy sites and emails. If an email has an attachment and looks suspicious it is very likey to be a virus. If a site is providing illegal or inappropiate content, it should be considered a risk. These are basic rules of safe browsing of the Internet and unfortunately, most people only learn these rules after a disaster. Don't learn from experience! Don't let it happen in the first place. Keep your system up-to-date. Nearly every major virus threat to operating systems are patched soon after discovery. Visit your operating system update website often, which is www.windowsupdate.com for Windows users. Get a reliable antivirus solution. The most common is Norton Antivirus, but I personally do not like its unreliability and incompatibility with many PCs. On the otherhand, it is probably the most user friendly antivirus solution on the market, and is probably best for PC beginners. If you're looking for a free yet extremely reliable and easy-to-use antivirus solution, Avast may be your answer. I am currently running Avast and am very happy with it. I previously tried Norton Antivirus, Norton Client Security, NOD32 Antivirus and McAfee Antivirus, but each had their own individual problems and so I had to constantly change antivirus software until I finally reached Avast.
Some people go overboard and install many other security measures but I don't recommend this. These measures only hog resources, confuse users and cause conflicts with other software. Some of this software includes firewalls, memory explorers and file protection. References
www.wikipedia.org
us.mafee.com
www.netmom.com
www.pcworld.com
Links
Avast Antivirus - www.avast.com
Soroush King is a certified programmer, adept in VB, C++, Delphi, as well as web developer and scripter, having considerable knowledge of both PHP and Perl. He also owns and manages several professional websites.
This article was originally published at http://www.articlesandtools.com/adware.php For more information on computer security visit http://www.articlesandtools.com.
If you would like to use this article anywhere else, please just notify me by sending an email to kingofkings@gmail.com (you don't have to wait for a response, as this is just a notification, not permission). Please refer on the page that the author of the article was I, Soroush King, and also please note that the article was originally published at http://www.articlesandtools.com/adware.php by providing a link.
Computer infections can be broken up into 4 main categories... Read More
Fishing on the Internet has come a long way. However,... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
The average computer is packed with hidden software that can... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Be careful of sites that promise to send you "instant... Read More
It has been said that with the wealth of information,... Read More
Much has been said on the theory of password protection... Read More
First, let's do a little recap'. As I stated in... Read More
This really chapped my lips...I recently bought a new computer.... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Long gone are the days that we could feel secure... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
I am the victim of an internet scam. It is... Read More
Pharming is one of the latest online scams and rapidly... Read More
It's late. You've been scouring the web for that perfect... Read More
Every now and then you can read about a new... Read More
A little bit of time invested into learning about internet... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
When surfing the Internet you probably take your anonymity for... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Afraid that someone is monitoring your PC or installed a... Read More
When the Internet first came about, it was realized it... Read More
If you are wondering how to fight spyware for safe... Read More
There is no doubt that "how-to articles" have become a... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
This is the second in a series of articles highlighting... Read More
If you are a parent, you have probably wondered at... Read More
First of all we need to get some terms stated.... Read More
There has not been a time in the history of... Read More
Ebay is a great site and is used by many... Read More
Long gone are the days that we could feel secure... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
The first thing people think about when defending their computers... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
There are ways to insure security though. You can get... Read More
The money being spent online is steadily growing. With billions... Read More
It has been said that with the wealth of information,... Read More
So called phishers try to catch the information about the... Read More
During the release of a new software product specialized to... Read More
What is computer security? Computer security is the process of... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
You and I are a lot alike. We are both... Read More
First I would like to stress I am condoning the... Read More
Credit card fraud is a growing problem for online businesses... Read More
Watching how the traditional media covers the latest virus or... Read More
First off I should explain what phishing is. Phishing is... Read More
Threats we ordinary Web users face online leave us no... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Microsoft routinely releases new security updates, many of which are... Read More
They're out there. Individuals trying to make a quick buck... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
In today's times spyware is a very serious issue and... Read More
P C. owners are constantly at risk from attacks by... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Pharming is one of the latest online scams and rapidly... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Internet Security |